<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.teracomsolutions.com.au/blogs/access-control/feed" rel="self" type="application/rss+xml"/><title>Teracom Solutions Pty Ltd - Blogs , Access Control</title><description>Teracom Solutions Pty Ltd - Blogs , Access Control</description><link>https://www.teracomsolutions.com.au/blogs/access-control</link><lastBuildDate>Wed, 26 Nov 2025 15:41:29 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Access Control 101]]></title><link>https://www.teracomsolutions.com.au/blogs/post/Access-Control-101</link><description><![CDATA[<img align="left" hspace="5" src="https://www.teracomsolutions.com.au/Access Control/Access Finger.jpeg"/>Access-Control-101]]></description><content:encoded><![CDATA[
<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pLgi31WRROCDJfhZF87iTQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer"><div data-element-id="elm_ceq11XRsSCGqbXaT10RYnQ" data-element-type="row" class="zprow zpalign-items- zpjustify-content- "><style type="text/css"></style><div data-element-id="elm_ba02LfeqThSx7JpGdy-3Mg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_OEiucFRcSAS5ox0stgQGFA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_OEiucFRcSAS5ox0stgQGFA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Secure your Business</h2></div>
<div data-element-id="elm_oAG4DczjQd-x77EpSrP9FA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oAG4DczjQd-x77EpSrP9FA"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="font-size:16px;"><span style="color:inherit;"><img src="https://charlestonsecuritysystems.net/wp-content/uploads/2014/08/access-control-101-blog.jpg" style="width:1113.66px;height:227px;"></span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Keeping your business safe is one of the key priorities of any owner or manager. The goal is to give your staff and customers the most secure environment possible, with the least inconvenience. But most business owners or managers have little experience in security solutions.</p><p style="font-size:16px;">That’s why we wrote this brief guide. It outlines the basic knowledge you’ll need when thinking about how to secure your premises. It also arms you with tips and tricks from our staff and customers to make sure you can make an informed decision.</p><p style="font-size:16px;"><span style="font-weight:700;"><br></span></p><p style="font-size:16px;"><span style="font-weight:700;">In This Article:</span></p><p><span style="font-weight:700;font-size:20px;">What is Access Control?</span></p><p><span style="font-weight:700;font-size:20px;">Why Access Control?</span></p><p><span style="font-weight:700;font-size:20px;">Benefits</span></p><p><span style="font-weight:700;font-size:20px;">The Basics</span></p><p><span style="font-weight:700;font-size:20px;">Choosing your Access Control System</span></p><p><span style="font-weight:700;font-size:20px;">Conclusion</span></p><div><br></div>
<div><br></div><div><span style="color:inherit;"><span style="font-size:30px;">What is Access Control?<p style="font-size:16px;">The aim of access control is to manage entry so only authorized people can enter a building or premises, or specific areas within a building. Access control systems help a business to minimize risk and create a safe environment. They restrict unauthorized users while providing an unobtrusive experience for approved people.</p><h2>Why Access Control?</h2><p style="font-size:16px;">Your site may have areas where you need to restrict and monitor who can enter. You might also have health and safety requirements that mean you need to know where your team is at any given time. You could run a 24/7 facility that needs to save power during downtime while still offering user access. Or it could be that you have a gate that needs to open for the right people at the right time. You can meet all these needs, and much more, using access control.</p><h2>Benefits<p style="font-size:16px;">Is your business still using traditional locks and keys? Surprisingly, this technology has not progressed much since the 1860s when Linus Yale Jr. patented his cylinder pin-tumbler lock. And yes, it’s the same Yale you still see on padlocks today!</p><p style="font-size:16px;">Technology has led to major changes in access control. RFID keycards and PIN access have been commonplace for many years now. This evolution has continued with the introduction of mobile phones, biometrics, and the Internet of Things.</p></h2></span></span></div>
<div><br></div><div><span style="color:inherit;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/History_of_Access_Diagram.png"></span><br></div>
<div><span style="color:inherit;"><br></span></div><div><div><div><span style="color:inherit;font-weight:700;font-size:20px;">There are many advantages to having a modern access control system. Benefits to your business could include:</span><span style="color:inherit;"><br></span></div>
</div></div><div><span style="color:inherit;"><span style="font-size:18px;"><br></span></span></div>
<div><div><span style="color:inherit;font-weight:700;">Increased safety and security&nbsp;thanks to your robust, flexible system.</span></div>
<span style="font-weight:700;"><span style="color:inherit;margin-bottom:15px;"><div><span style="color:inherit;">Peace of mind&nbsp;because of the visibility your solution offers.</span></div></span><span style="color:inherit;margin-bottom:15px;"><div><span style="color:inherit;">Enhanced employee satisfaction&nbsp;due to ease of use.</span></div></span><span style="color:inherit;margin-bottom:15px;"><div><span style="color:inherit;">Potential upfront capital savings&nbsp;because your new access control system may work with some of your current security infrastructure like motion sensors or existing cabling, saving replacement costs.</span></div></span><span style="color:inherit;margin-bottom:15px;"><div><span style="color:inherit;">Third-party integrations&nbsp;allow you to maintain a single system for your access and security while incorporating all the added functionality you might need – such as wireless locking, elevator controls, or video surveillance.</span></div></span><span style="color:inherit;margin-bottom:15px;"><div><span style="color:inherit;">Extra cost savings and efficiencies&nbsp;by integrating with a Building Management System to reduce energy consumption by controlling HVAC (heating, ventilation, and air conditioning), lighting, and more.</span></div></span></span></div>
<div><span style="color:inherit;margin-bottom:15px;font-weight:700;">No more ongoing costs&nbsp;to rekey doors each time someone loses a key. Simply deactivate their card and issue a new one.</span><br></div>
<div><span style="color:inherit;"><br></span></div><div><span style="color:inherit;"><div><br></div>
<div><span style="font-weight:700;"><span style="color:inherit;margin-bottom:15px;">No more after-hours trips&nbsp;because someone has left their key at home. You can grant access or change settings remotely.</span><br><span style="color:inherit;margin-bottom:15px;">Save time&nbsp;by adding features like automatic attendance recording – no more manual timesheets.</span><br><span style="color:inherit;margin-bottom:15px;">Increased business efficiencies&nbsp;by using monitoring and reporting functions as a tool to make evidence-based decisions such as checking to see how often a meeting room is used and by how many people, then re-deploying it if it’s underutilized.</span><br><span style="color:inherit;margin-bottom:15px;">Respond quicker to problems&nbsp;by setting up instant notifications to your mobile or monitoring service when an unusual event like a forced door or broken window is reported.</span><br><span style="color:inherit;margin-bottom:15px;">Perfect for a COVID world&nbsp;because you can have touch-free access, automatic contact tracing register, and enforce social distancing by limiting access to certain areas when at capacity.</span><br><span style="color:inherit;margin-bottom:15px;">Future proof your business&nbsp;by choosing a modular system like Teracom's&nbsp; that uses secure encryption protocols and can scale with your business growth.</span></span><span style="font-weight:700;"><br></span></div></span></div>
<div><br></div><div><img src="https://www.sdmmag.com/ext/resources/Issues/2018/November/3xlogicCloud-Access-Control.jpg?1541980600" style="color:inherit;"><br></div>
<div><br></div><div><span style="font-size:16px;color:inherit;">However safe traditional locks were, imagine how much money you could save by not calling out a locksmith to rekey all the locks because someone has lost a key. And the time saved by not reissuing keys to everyone.</span><br></div>
<div><span style="color:inherit;"><p style="font-size:16px;">Modern access control systems give you the flexibility to make even small changes when you need them. If a card is lost, simply deactivate it and issue another without affecting anyone else’s access. Use schedules to change settings to ensure security is not compromised on a public holiday or enable after-hours access for cleaners, so you are not dealing with any more 2:00 am callouts. You can even allow or disable access to certain areas on a temporary or permanent basis.</p><p style="font-size:16px;">Ease of use is a crucial factor and removes a pain point for staff. Say goodbye to that clunky bunch of keys, and replace them with a single card, fob, or your mobile phone, which allows access to all authorized doors.</p></span></div>
<div><br></div><div><br></div><div><span style="font-size:30px;color:inherit;">The Basics</span><br></div>
<div><span style="color:inherit;"><span style="font-size:30px;"><p style="font-size:16px;">You might have noticed a lot of jargon that surrounds access control. In this guide, we have kept it as simple as possible but there are still a few concepts to familiarize yourself with. Before we move on to&nbsp;Choosing your Access Control system, here are the basics you should know:</p><p style="font-size:16px;"><br></p><h3>Parts of a Security and Access Control System<p style="font-size:16px;">To most people, the only visible parts of a commercial access control system are the keycard and the reader next to the door that you touch or swipe. But there is a lot more that goes on behind the scenes to make a complete security system.</p><p style="font-size:16px;">A credential is what you present to the reader for validation. It could be a keycard, fob key, PIN code, mobile phone, or even your finger or face. Not all credentials are created equal though, so be sure to check out our article about&nbsp;choosing the correct card technology.&nbsp;</p></h3></span></span></div>
<div><br></div><div><img src="https://sitebuilder-692300520.zohositescontent.com/Mon%20May%2003%202021-1.png" alt="Access, card, door, keypad, reader, security, swipe icon - Download on  Iconfinder" style="width:264px;height:264px;"><img src="https://cdn-images-1.medium.com/max/800/1%2AuvUrnOsse260FqniqwnQ4g.png" style="color:inherit;width:469.94px;height:270px;"><img src="https://www.hidglobal.com/sites/default/files/pivclass-rkclb40.png" style="color:inherit;width:360px;height:360px;"><br></div>
<div><br></div><div><img src="/Mon%20May%2003%202021.png" alt="" style="color:inherit;width:1078.28px;height:136px;"><br></div>
<div><br></div><div><span style="color:inherit;"><p style="font-size:16px;">The card reader checks your credential and validates it with the system before granting or denying access.</p><p style="font-size:16px;">Besides these publicly visible parts, there are elements that only property managers would see. They get an overview of and can control the system using a status page (like a dashboard) in the access control software. This system can report on events generated by the system and manage any security issues in real-time.</p><p style="font-size:16px;">This software can allow integrations with systems and databases to automate tasks. This could be onboarding new employees from a staff management system, or a visitor and contractor management solution such as the&nbsp;HealthSafe SecurePass integration&nbsp;(available in New Zealand and Australia).</p><p style="font-size:16px;">The final component of an access control system is the security infrastructure. This can include a controller (which is the ‘brains’ of the system), battery backups, wiring, electronic locks, and additions such as security cameras or passive infrared (PIR) motion detectors.</p><p style="font-size:16px;">Put all these parts together and you can start to see how flexible (and potentially complex!) a modern access control system can be.</p></span></div>
<div><br></div><div><span style="color:inherit;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/Infrastructure_Diagram.png"></span><br></div>
<div><br></div><div><br></div><div><span style="color:inherit;"><span style="font-size:24px;">Types of Access Control Models<p style="font-size:16px;">Most businesses currently use a form of the Role-Based Access Control (RBAC) model.&nbsp;</p><p style="font-size:16px;">This allocates permissions according to roles, which are then assigned to individual users.&nbsp;</p><p style="font-size:16px;">For example, you could give all members of the Finance team the same access rather than adding permissions individually.&nbsp;</p><p style="font-size:16px;">Other models you will see are DAC (Discretionary Access Control), MAC (Mandatory Access Control) and increasingly ABAC (Attribute Based Access Control).</p><p style="font-size:16px;"><br></p><h3>The 5-Step Method<p style="font-size:16px;">The purpose of access control is to secure your premises so that unauthorized people cannot walk in off the street.&nbsp;</p><p style="font-size:16px;">There is a five-step method that acts as a pathway to ensure the correct process is being followed.</p><p style="font-size:16px;">By following this path, you can be sure that you’ll have a robust system in place to protect your business.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;text-align:center;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/5_Step_Method_-_Authorize.png" alt="" width="271" height="271">&nbsp; &nbsp; &nbsp;</p><p style="font-size:16px;"><span style="color:inherit;"><span style="font-size:24px;">Authorize</span></span></p><p style="font-size:16px;text-align:center;">The process of changing a stranger&nbsp;</p><p style="font-size:16px;text-align:center;">to someone known to your organization.&nbsp;</p><p style="font-size:16px;text-align:center;">Once authorized, you will likely use&nbsp;</p><p style="font-size:16px;text-align:center;">RBAC (Role-Based Access Control) to&nbsp;</p><p style="font-size:16px;text-align:center;">assign their privileges.</p><p style="font-size:16px;text-align:center;"><br></p><p style="font-size:16px;text-align:center;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/5_Step_Method_-_Authenticate.png" alt="" width="271" height="271"></p><p style="font-size:16px;text-align:center;"><span style="color:inherit;"><span style="font-size:24px;">Authenticate</span></span></p><p style="font-size:16px;text-align:center;">The user presents their credential to their reader for authentication.&nbsp;</p><p style="font-size:16px;text-align:center;">The system decides whether to grant access.</p><p style="font-size:16px;text-align:center;"><br></p><p style="font-size:16px;text-align:center;"><br></p><p style="font-size:16px;text-align:center;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/5_Step_Method_-_Access.png" alt="" width="271" height="271"></p><p style="font-size:16px;text-align:center;"><span style="color:inherit;"><span style="font-size:24px;">Access</span></span></p><p style="font-size:16px;text-align:center;">If authenticated, access is granted, and your</p><p style="font-size:16px;text-align:center;">&nbsp;infrastructure unlocks the door so they can enter.</p><p style="font-size:16px;text-align:center;"><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;text-align:center;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/5_Step_Method_-_Manage.png" alt="" width="271" height="271"></p><p style="font-size:16px;"><span style="color:inherit;"><span style="font-size:24px;">Manage</span></span></p><p style="font-size:16px;text-align:center;">Administrators can track activity, change area permissions,&nbsp;</p><p style="font-size:16px;text-align:center;">and manage changes including adding new staff.&nbsp;</p><p style="font-size:16px;text-align:center;">You can do this all remotely, which is helpful in the current COVID environment.</p></h3></span></span></div>
<div><br></div><div><br></div><div><br></div><div><span style="color:inherit;"><p style="font-size:16px;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/AC_Article-Audit.png" alt="" width="271" height="271"></p><span style="font-size:24px;">Audit</span><p style="font-size:16px;">Certain organizations have specific legal compliance&nbsp;</p><p style="font-size:16px;">requirements that auditing can meet.&nbsp;</p><p style="font-size:16px;">It is also good practice to ensure that your system</p><p style="font-size:16px;">&nbsp;is working and create a baseline to help track suspicious activity.</p></span></div>
<div><br></div><div><br></div><div><br></div><div><span style="color:inherit;"><span style="font-size:30px;">Choosing your Access Control system</span><p style="font-size:16px;">As you can see there are many things to consider when thinking about an access control system.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="font-weight:900;">“The fundamental thing to think about is what is the purpose of the security system? Ask yourself what security perception are you trying to portray?&nbsp;</span></p><p style="font-size:16px;"><span style="font-weight:900;">A highly secure premise with multiple security layers like gates, access doors and turnstiles, or an open and welcoming space with restricted areas such as a retail store?&nbsp;</span></p><p style="font-size:16px;"><span style="font-weight:900;">Then identify your risks – for example, staff and/or customer safety, burglary, robbery, espionage – and decide which of those risks you need to mitigate and to what level. Don’t forget to also consider if you have any specific insurance requirements.”&nbsp;</span></p><p style="font-size:16px;"><span style="font-weight:900;"><br></span></p><p style="font-size:16px;"><span style="font-weight:900;"><br></span></p><p><span style="font-size:20px;font-weight:700;">Our experts can guide you through this process, but there are some questions to ask yourself before you begin:</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">How many doors and areas are you looking at securing, and how secure do these areas need to be?&nbsp;</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">Will people need a card to get out as well as in, or just push a button to exit?&nbsp;</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">And will any doors require both a card and PIN?</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">&nbsp;This will determine the number and type of card readers you’ll need.</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">What existing hardware (for example, motion sensors or card readers) do you have already?&nbsp;</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">There may be opportunities to integrate these with your new system and save capital costs.</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">Do you want to use proximity card technology for readers and credentials, or would you prefer mobile phones with Bluetooth, or even biometrics (fingerprint or face scanning)?</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">Does the system need to integrate with a new or existing CCTV surveillance system?</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">Is there potential to integrate with a Building Management System (BMS) to control elements such as lighting and HVAC and reduce energy consumption and operating costs?</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">Does your business have any specific requirements that might be out of the ordinary?&nbsp;</span></p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;">What do you do differently that we should know about?</span></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="font-weight:900;"><span style="color:inherit;"><img src="https://www.ict.co/media/blog/Beginners%20Guide%20to%20AC/Choosing_Access_Control_System.png"></span><br><br></span></p><p style="font-size:16px;"><span style="font-weight:900;"><br></span></p><p style="font-size:16px;"><span style="font-weight:900;"><span style="color:inherit;"><span style="font-size:18px;">It’s important to understand that not all access control systems will give you the flexibility to do this.&nbsp;</span></span></span></p><p style="font-size:16px;"><span style="font-weight:900;"><span style="color:inherit;"><span style="font-size:18px;">A Teracom Solutions' system brings together all elements of access control, intruder detection, and building automation into a single unified solution. Our open technology can integrate with, or takeover, some existing systems to add value to the infrastructure your business already has.&nbsp;Contact Teracom&nbsp;to discuss what options are available for your site.</span></span><br></span></p><p style="font-size:16px;"><span style="font-weight:900;"><span style="color:inherit;"><span style="font-size:18px;"><br></span></span></span></p><p style="font-size:16px;"><span style="font-weight:900;"><span style="color:inherit;"><span style="font-size:30px;">Conclusion</span></span></span></p><p style="font-size:16px;"><span>After reading this Beginner’s Guide to Access Control, you should now understand the basics of how to secure your business using an access control system.</span></p><p style="font-size:16px;"><span><br></span></p><p style="font-size:16px;"><span>We have shown you the benefits of installing an integrated electronic system, including increased security and monitoring, and adding flexibility, control, and ease of access.&nbsp;</span></p><p style="font-size:16px;"><span>It can also give you the visibility you need to make business decisions with confidence, and deliver cost savings and efficiencies by integrating with other areas of your organization.</span></p><p style="font-size:16px;"><span style="font-weight:900;"><span style="color:inherit;"></span></span></p><p style="font-size:16px;"><span>When implemented correctly, your access control system gives you the best protection possible, whilst being unobtrusive and providing the peace of mind that your most valuable assets – your people and your property – are secure.</span></p></span></div>
<div><br></div><div><br></div><div><span style="color:inherit;"><span style="font-size:24px;">Ready to secure your future?</span></span><br></div>
<div><br></div></div></div><div data-element-id="elm_Cid0KzxBQfGwREph6NdR0g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Cid0KzxBQfGwREph6NdR0g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center"><style type="text/css"></style><a role="button" class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 May 2021 20:15:19 +1000</pubDate></item><item><title><![CDATA[Choosing and Access Control Systems]]></title><link>https://www.teracomsolutions.com.au/blogs/post/choosing-and-access-control-systems</link><description><![CDATA[<img align="left" hspace="5" src="https://www.teracomsolutions.com.au/Access Control/aa_EMEA_DAS_PR_mobileaccess_866x473.jpg"/>Choosing and Access Control Systems]]></description><content:encoded><![CDATA[
<div class="zpcontent-container blogpost-container "><div data-element-id="elm_fgIoVzyBRkCQhLT9S4Zm_A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer"><div data-element-id="elm_GjgdN-TPSACbDYNLTeoURw" data-element-type="row" class="zprow zpalign-items- zpjustify-content- "><style type="text/css"></style><div data-element-id="elm_MOJhB3fNSGGkJBR53ZllZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_MOJhB3fNSGGkJBR53ZllZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_caPgDHABRMaFKRM2InAytg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_caPgDHABRMaFKRM2InAytg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><p style="margin-left:0.01in;"><span style="font-size:30pt;font-weight:bold;">Types of Access Control Systems</span></p></span></h2></div>
<div data-element-id="elm_ofDu2N-9Q6iUxm2gBP2z5A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ofDu2N-9Q6iUxm2gBP2z5A"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="margin-left:0.39in;"><span style="font-size:24px;"><span style="color:inherit;"><div style="margin-left:0.39in;"><span><span style="color:inherit;"><p style="margin-left:0.01in;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-5.png" alt=""></span><span style="font-size:18pt;font-weight:bold;"><br></span></p><p style="margin-left:0.01in;"><br></p><p style="margin-left:0.01in;"><span style="font-size:18pt;font-weight:bold;">Technology is rapidly changing the physical security landscape. Installing an access control system can increase the level of security attained as well as providing tracking tools to monitor access to secure areas.</span></p><p style="margin-left:0.01in;"><span style="font-size:18pt;font-weight:bold;">A top consideration of any security system is the level of security offered, but it is not the only one. Other important factors might include the quality of the hardware, ease of updating the software to reduce vulnerability to hackers, and the encryption of credentials. </span></p><p style="margin-left:0.01in;"><span style="font-size:18pt;font-weight:bold;">The systems can operate as a standalone device or integrated within an existing system. </span></p><p><span style="color:inherit;"></span></p><p style="margin-left:0.01in;"><span style="font-size:18pt;font-weight:bold;">The ease of changing user credentials, user experience, use of multifactor authentication, and level of administrative control can narrow down the system selection.</span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-6.png" alt=""></span><span style="font-size:18pt;font-weight:bold;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><span style="font-size:40pt;font-weight:bold;">Evaluate</span></span><span style="font-size:18pt;font-weight:bold;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Application Needs</span></p><div style="margin-left:0.39in;"><span style="font-size:20pt;">The first step is to evaluate the need for access control. </span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;">Where will the system be installed and what level of security is required for that area. </span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;">Who will need access and during what hours? The application will determine the features required.</span></div><div style="margin-left:0.39in;"><br></div><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><div style="margin-left:0.39in;"><span style="font-size:20pt;">Consider entry doors, storage, or IT rooms, along with desks, file cabinets, or other doors and drawers holding secure information, valuable assets, or expensive systems. Sensitive information might include client, company, or vendor data and assets.</span></div><p style="margin-left:0.01in;"><img src="/Sun%20May%2002%202021-8.png" alt="" style="color:inherit;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-7.png" alt=""></span><span style="color:inherit;"><span style="font-size:40pt;font-weight:bold;"><br></span></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Security Needs</span></p><div style="margin-left:0.39in;"><span>•What level of security does the area require?</span></div><div style="margin-left:0.39in;"><span>•What level of security does the building require?</span></div><div style="margin-left:0.39in;"><span>•Will single authorization suffice or does security concerns require multi-factor authorization?</span></div><div style="margin-left:0.39in;"><span>•How many users will need credentials?</span></div><div style="margin-left:0.39in;"><span>•What level of monitoring will maintain security?</span></div><div style="margin-left:0.39in;"><span>•What types of card credential are required?</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><div style="margin-left:0.39in;"><span>•Do they require a integrated system?</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><img src="/Sun%20May%2002%202021-10.png" alt="" style="color:inherit;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-9.png" alt=""></span><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Compliance and Regulatory Requirements</span></p><div style="margin-left:0.39in;"><span>•What regulatory arms monitor the security measures the company chooses? </span></div><div style="margin-left:0.89in;"><span>•E.g Security Risk assessment, Consultant</span></div><div style="margin-left:0.39in;"><span>•Does meeting compliance requirements include regular reports?</span></div><div style="margin-left:0.39in;"><span>•What policies and procedures must coordinate with the security measures implemented?</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><div style="margin-left:0.39in;"><span>•Do we need to meet Government approvals?</span></div><p style="margin-left:0.01in;"><img src="/Sun%20May%2002%202021-12.png" alt="" style="color:inherit;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-11.png" alt=""></span><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Installation Requirements</span></p><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>How will the company install the system?</span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Will the new system integrate with existing security protocols or operate as a standalone access control system?</span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Will management use in-house staff to install the system or is professional installation needed?</span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>How many locks will the control panel operate?</span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>What are the company’s software integration needs?</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Is the system compatible with third-party hardware?</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><img src="/Sun%20May%2002%202021-14.png" alt="" style="color:inherit;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-13.png" alt=""></span><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"><br></span></p><p style="margin-left:0.01in;"><span style="font-size:18pt;font-weight:bold;"><br></span></p><p style="margin-left:0.01in;"><span style="font-size:18pt;font-weight:bold;"><br></span></p><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Compatibility with Existing Security</span></p><div style="margin-left:0.39in;"><span style="font-size:24px;">•<span>Can the system integrate new protocols with the current system.</span></span></div><div style="margin-left:0.39in;"><span style="font-size:24px;">•New systems may require all new locking devices or could utilize the existing hardware.</span></div><div style="margin-left:0.39in;"><span style="font-size:24px;">•Is the new system compatible with other security components such as surveillance cameras?</span></div><p style="margin-left:0.01in;"><span style="color:inherit;font-size:24px;"></span></p><div style="margin-left:0.39in;"><span style="font-size:24px;">•Can we reuse existing hardware?</span></div><div style="margin-left:0.39in;"><span><br></span></div><div style="margin-left:0.39in;"><span><img src="/Sun%20May%2002%202021-16.png" alt="" style="color:inherit;font-size:15px;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-15.png" alt=""></span><br></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><div style="margin-left:0.39in;"><span style="color:inherit;"><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Communication</span></p><div style="margin-left:0.39in;"><span>•How will the new system communicate with existing technology within the company?</span></div><div style="margin-left:0.39in;"><span>•How will user key cards communicate with the reader to verify credentials?</span></div><div style="margin-left:0.39in;"><span>•What type of authentication will the system support?</span></div><div style="margin-left:0.39in;"><span>•Do we need to install and new cabling?</span></div><div style="margin-left:0.39in;"><span>•Any third party high level interfaces?</span></div><div style="margin-left:0.89in;"><span>•CCTV</span></div><div style="margin-left:0.89in;"><span>•Lift</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><div style="margin-left:0.89in;"><span>•Analytics (LPR or Face)</span></div></span></div></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><img src="/Sun%20May%2002%202021-17.png" alt=""></span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Expandability</span></p></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Will the system grow with the company?</span></div>
<div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Can it expand and upgrade as the company grows and technology changes?</span></div>
<div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Do we need to connect multiple sites?</span></div>
<div style="margin-left:0.39in;"><span style="font-size:20pt;"><span style="font-size:103%;">•</span>Do we need to connect multiple campus’?</span></div></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><img src="/Sun%20May%2002%202021-18.png" alt=""></span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Ease of Use</span></p></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><div style="margin-left:0.39in;"><span><span style="color:inherit;"><div style="margin-left:0.39in;">•How easy is it for managers or administrators to configure and maintain the software?</div>
<div style="margin-left:0.39in;">•Can they overcome technical issues, cancel, and reissue entrance credentials, and monitor the activity in the secure area?</div>
<div style="margin-left:0.39in;">•Also consider the ease of use for everyday users, which could include individuals, employees, subcontractors, or customers. The user experience will factor into the effectiveness of the security system.</div>
<div style="margin-left:0.39in;">•Security measures users find it difficult to manoeuvre can encourage shortcuts and actions taken to bypass protocols, which can compromise the system.</div></span></span></div></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><img src="/Sun%20May%2002%202021-19.png" alt=""></span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><br></span></span></div><div style="margin-left:0.39in;"><span><span style="color:inherit;"><div style="margin-left:0.39in;"><span style="color:inherit;"><p style="margin-left:0.01in;"><span style="font-size:40pt;font-weight:bold;">Cost</span></p><div style="margin-left:0.39in;"><span>•Cost how much will the access control system cost to purchase, install, and maintain over the next decade.</span></div><p style="margin-left:0.01in;"><span>Conduct Regular Checks</span></p><div style="margin-left:0.39in;"><span>•Security checks can include ongoing staff training, log reviews, and tracking measures that audit the effectiveness of the system.</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"></span></p><div style="margin-left:0.39in;"><span>•A critical review of audit data on an ongoing basis can uncover new problems, highlight vulnerabilities, and uncover new areas that need additional security.</span></div><p style="margin-left:0.01in;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-20.png" alt=""></span><span style="font-size:40pt;font-weight:bold;"><br></span></p><p style="margin-left:0.01in;"><br></p></span></div></span></span></div></span></span></div></span></span></div></div>
</div><div data-element-id="elm_7bktH7hzQZa1S5eeJzpXxw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center"><style type="text/css"></style><a role="button" class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 May 2021 21:43:04 +1000</pubDate></item><item><title><![CDATA[Access Control Tailgating Explained]]></title><link>https://www.teracomsolutions.com.au/blogs/post/electronic-locks-fail-safe-versus-fail-secure-systems1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.teracomsolutions.com.au/Access Control/Access Control people.jpg"/>Fail-Safe Versus Fail Secure Systems]]></description><content:encoded><![CDATA[
<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K26sMEkhRBSLJ_ePWvQ6NQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer"><div data-element-id="elm_eRdSTI27QCy-uiPyvPO5cw" data-element-type="row" class="zprow zpalign-items- zpjustify-content- "><style type="text/css"></style><div data-element-id="elm_OWQqnK-MRGyCnmtCvyQ4wQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Zwfr3GSmQrqUxU99M17D3Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Tailgating Explained</span></span></h2></div>
<div data-element-id="elm_Dcj3Te0YQi2pR_jySLDu5w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"></span></p><div style="margin-left:0.39in;"><div style="margin-left:0.39in;"><span style="color:inherit;font-size:24px;">Tailgating (also known as piggybacking) is one of the most widespread security breaches affecting businesses today and often goes undetected.&nbsp;Tailgating can be simply described as the passage of unauthorised personnel, either forced or accidental, behind that of an authorised user.</span><br></div></div><div style="margin-left:0.39in;"><span style="color:inherit;"><span style="font-size:16px;"><br></span></span></div><div style="margin-left:0.39in;"><span style="color:inherit;"><span style="font-size:16px;"><br></span></span></div><div style="margin-left:0.39in;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-3.png" alt=""></span><span style="font-size:20pt;"><br></span></div><div style="margin-left:0.39in;"><span style="color:inherit;"><br></span></div><div style="margin-left:0.39in;"><div style="margin-left:0.39in;"><span style="color:inherit;font-size:24px;">One of the most frequent instances of tailgating occurs when an employee politely holds open a door for a colleague or visitor. This unintentionally creates a security breach by enabling an unauthorised user to access the building or area. Another instance where tailgating can occur is when an oblivious employee allows a door to slowly close behind them, leaving the opportunity for an unauthorised user to enter via the closing door. Tailgating can also happen unintentionally by third parties such as subcontractors propping open a door whilst carrying out works. Tailgating can be a particular problem in multi-tenanted buildings where there are a large number of employees and contractors accessing the building.</span><span style="color:inherit;"><br></span></div></div><div style="margin-left:0.39in;"><span style="color:inherit;"><div style="margin-left:0.39in;"><span style="color:inherit;"><div style="margin-left:0.39in;"><span style="color:inherit;font-size:24px;"><p style="font-size:16px;margin-bottom:15px;text-align:justify;"><br></p></span></div></span></div></span></div><div style="margin-left:0.39in;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-4.png" alt=""></span><span style="font-size:20pt;"><br></span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><br></span></div><div style="margin-left:0.39in;"><span style="color:inherit;"><div style="margin-left:0.39in;"><span style="font-size:20pt;">Employee training is the most effective way to combat this vulnerability. Other measures to mitigate the risk of tailgating include using security cameras, multi-factor authorization, or requiring duel authentication.</span></div><div style="margin-left:0.39in;"><div style="margin-left:0.39in;"><span style="color:inherit;"><span style="font-size:24px;">A&nbsp;Security Revolving Door<span style="text-align:justify;">&nbsp;or&nbsp;</span>Security Portal<span style="text-align:justify;">&nbsp;can provide the highest level of anti-tailgating detection, ensuring the user is alone.&nbsp;Security Revolving Doors and&nbsp;</span>Security Portals</span><span style="font-size:16px;text-align:justify;"><span style="font-size:24px;">&nbsp;can also enable sites to operate 24/7 with unmanned access, ensuring only authorised users can gain access day or night.</span>&nbsp;</span></span><span style="font-size:20pt;"><br></span></div></div></span></div><div style="margin-left:0.39in;"><span style="color:inherit;"><img src="https://www.meesons.com/wp-content/uploads/2020/12/Tailgating-Icon-1024x141.png"></span><span style="font-size:20pt;"><br></span></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><br></span></div><div style="margin-left:0.39in;"><div style="margin-left:0.39in;"><span style="color:inherit;font-size:24px;"><strong style="font-size:16px;text-align:justify;">Speed Gates – Tailgating (piggybacking) detection</strong>&nbsp;– the user presents a valid ID card, the gate opens and the user enters the lane. When a second user without a valid ID card enters the lane tailgating is detected. An alarm output is given and the gate closes.</span><span style="font-size:20pt;"><br></span></div></div><div style="margin-left:0.39in;"><span style="font-size:20pt;"><br></span></div></div>
</div><div data-element-id="elm_TlwkfiwsRMqkD0ieLh_5YQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center"><style type="text/css"></style><a role="button" class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 May 2021 21:24:24 +1000</pubDate></item><item><title><![CDATA[Electronic Locks Fail-Safe Versus Fail Secure Systems]]></title><link>https://www.teracomsolutions.com.au/blogs/post/electronic-locks-fail-safe-versus-fail-secure-systems</link><description><![CDATA[<img align="left" hspace="5" src="https://www.teracomsolutions.com.au/Access Control/strikes_catalogue.jpg"/>Fail-Safe Versus Fail Secure Systems]]></description><content:encoded><![CDATA[
<div class="zpcontent-container blogpost-container "><div data-element-id="elm_V4FLisYOTKe5MekIQU6lEA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer"><div data-element-id="elm_phTiNa5xRViJhW-33P-OYQ" data-element-type="row" class="zprow zpalign-items- zpjustify-content- "><style type="text/css"></style><div data-element-id="elm_4ruzrBasQ6KP0-ZnZnLm1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_4ruzrBasQ6KP0-ZnZnLm1A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2uqDmVlGQB2Q13rqK-39Jg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2uqDmVlGQB2Q13rqK-39Jg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Fail-Safe Versus Fail Secure Systems</span></span></h2></div>
<div data-element-id="elm_VYdbLzmNRpipYZuY_gD7HQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VYdbLzmNRpipYZuY_gD7HQ"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:24px;">A <span style="font-weight:700;">Fail-Safe lock</span> remains unlocked until an electrical current activates the lock.&nbsp;</span></p><p><span style="font-size:24px;">The power requirement creates a system vulnerability because natural disasters,</span></p><p><span style="color:inherit;font-size:24px;"></span></p><p><span style="font-size:24px;">storms, or sabotage can create a power failure, leaving an area unsecured.</span></p><p><span style="font-size:24px;"><br></span></p><p><span style="font-size:24px;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021.png" alt=""></span><br></span></p><p><span style="font-size:24px;"><span style="color:inherit;"><img src="/Sun%20May%2002%202021-1.png" alt=""></span><span style="color:inherit;"><br></span></span></p><p><span style="font-size:24px;"><span style="color:inherit;"></span></span></p><p><span style="font-size:18pt;">Requires power to remain active. A Loss of power will unlock door/drawer causing application to remain unsecured until the power comes back online.</span></p><p><span style="font-size:24px;"><br></span></p><p><span style="font-size:18pt;"><span style="font-weight:700;">Fail-Secure </span>systems require electrical power to release the access control system.&nbsp;</span></p><p><span style="font-size:18pt;">Even in the event of a power failure, the system remains intact, maintaining security until the restoration of power, or a system override releases the lock. Fail-secure locks offer the highest level of security available. </span></p><p><span style="font-size:24px;"><span style="color:inherit;"></span></span></p><p><span style="font-size:18pt;">The level of security needed, items secured, fire codes, and compliance regulations impact which system works best in the given application.</span></p><p><span style="color:inherit;"><img src="/Sun%20May%2002%202021-2.png" alt=""></span><span style="font-size:18pt;"><br></span></p><p><span style="color:inherit;"></span></p><p><span style="font-size:18pt;">Requires power to release the lock. In the event of a power failure, the door/drawer remains locked until someone activates an override.</span></p><p><span style="font-size:18pt;"><br></span></p><p><span style="font-size:24px;"><br></span></p></div>
</div><div data-element-id="elm_SzThl0GFSimr3Elv99d4aw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center"><style type="text/css"></style><a role="button" class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 02 May 2021 21:16:09 +1000</pubDate></item><item><title><![CDATA[What is Access Control?]]></title><link>https://www.teracomsolutions.com.au/blogs/post/What-is-Access-Control</link><description><![CDATA[<img align="left" hspace="5" src="https://www.teracomsolutions.com.au/Access Control/access-control-access-granted.jpg"/>Consumers interact with electronic access control systems every day through keyless entry and smart home technology.]]></description><content:encoded><![CDATA[
<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VQsRfvACQ0WI4eOOOh_etA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer"><div data-element-id="elm_RiIt9PQxSu22g6ztgoA1Ww" data-element-type="row" class="zprow zpalign-items- zpjustify-content- "><style type="text/css"></style><div data-element-id="elm_bpiszvA-QpGQKQkaTpqBbQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_bpiszvA-QpGQKQkaTpqBbQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jJjnkIhoQuSu2IpY-QZtSg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jJjnkIhoQuSu2IpY-QZtSg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36pt;font-weight:bold;">Access Control&nbsp; Solutions</span></span></h2></div>
<div data-element-id="elm_182bGHhGREihU8ty0egJhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_182bGHhGREihU8ty0egJhA"].zpelem-text{ border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="margin-left:0.01in;"><span style="font-size:20px;"><span style="font-weight:bold;"><br></span></span></p><p style="margin-left:0.01in;"><span style="font-size:20px;"><span style="font-weight:bold;">Consumers interact </span>with electronic access control systems every day through keyless entry and smart home technology.</span></p><p><span style="font-size:20px;">The first thing that comes to mind is often the remote key, keypad, or key card used to enter an office, car, or home.</span></p><p><span style="color:inherit;font-size:20px;"></span></p><p><span style="font-size:20px;">However, there is a lot more to access control than an FOB and a card reader at the entrance of a door.</span></p><p><span style="font-size:20px;"><span style="color:inherit;"><img src="/Wed%20Jan%2027%202021-38.png" alt=""></span><br></span></p><p><span style="font-size:20px;"><br></span></p><p><span style="font-size:20px;"></span></p><p><span style="font-size:20px;"><span style="color:inherit;font-size:36px;">What are Electronic Access Control Systems?</span><br></span></p><p><span style="font-size:20px;">Access control systems <span style="font-weight:bold;">restrict entrance to secure areas </span>of a property, building, room, file cabinet, drawer, safe, home, garage, apartment or other area containing sensitive or proprietary information, assets, or data.</span></p><p><span style="font-size:20px;">The automated nature of the system provides <span style="font-weight:bold;">24/7 protection along with 24/7 access. </span>As the front line of defence, companies use locks combined with log-in credentials to enhance traditional security measures. Any space requiring limited access to authorized personnel only should have an access control system in place.</span></p><p><span style="font-size:20px;font-weight:bold;">Businesses today want to do more than simply restrict entry. </span></p><p><span style="font-size:20px;">They want to <span style="font-weight:bold;">monitor and manage access</span>. </span></p><p><span style="font-size:20px;">Increased security and monitoring require more than a deadbolt and keyless lock. It requires an <span style="font-weight:bold;">access management system. </span></span></p><p><span style="font-size:20px;"><span style="color:inherit;"></span></span></p><p><span style="font-size:20px;">One that controls who may enter, </span><span style="font-size:20px;font-weight:bold;">where they may go, and when they have permission to be in a secure location.</span></p><p><span style="font-size:20px;"><span style="color:inherit;"><img src="/Wed%20Jan%2027%202021-39.png" alt=""></span><br></span></p><p><span style="font-size:20px;"><span style="color:inherit;"><br></span></span></p><p><span style="font-size:20px;"><span style="font-weight:bold;">Computer-based electronic </span>access control systems marry the needs of physical security with the capabilities of information security. </span></p><p><span style="font-size:20px;">With the use of credentials such as codes, <span style="font-weight:bold;">FOB, key cards, or biometrics, </span>systems have the capability to <span style="font-weight:bold;">provide quick and convenient access </span>to authorized personnel, while tracking and monitoring the movement of those who enter.</span></p><p><span style="font-size:20px;">New technologies have rapidly increased not only the ability to restrict access to secure areas, but also the ability to <span style="font-weight:bold;">monitor and manage that access through electronic means to better protect assets and data.</span></span></p><p><span style="font-size:20px;">Users gain entry after the system verifies the <span style="font-weight:bold;">credentials presented</span>. </span></p><p><span style="font-size:20px;">The software tells the <span style="font-weight:bold;">system</span> when to <span style="font-weight:bold;">unlock the door, records the event</span>, and can relax the area to maintain security. </span></p><p><span style="font-size:20px;">In the <span style="font-weight:bold;">event of credential failure</span>, the system records the failure and might activate back up security, such as video cameras, alarms, or electronic notifications. </span></p><p><span style="font-size:20px;"><span style="color:inherit;"></span></span></p><p><span style="font-size:20px;">Attempts of forcible entry will also record the breach and <span style="font-weight:bold;">activate an alarm</span>.</span></p><p><span style="font-size:20px;"><span style="color:inherit;"><img src="/Wed%20Jan%2027%202021-40.png" alt=""></span><br></span></p><p><span style="font-size:20px;"><span style="color:inherit;"><br></span></span></p><p><span style="font-size:20px;"></span></p><p><span style="font-size:20px;"><span style="color:inherit;font-size:36px;">Why Companies Choose Access Control Systems?</span><span style="color:inherit;"><br></span></span></p><p><br></p><p><img src="/Wed%20Jan%2027%202021-42.png" alt="" style="color:inherit;font-size:20px;"><br></p><p><span style="font-size:20px;"><img src="/Wed%20Jan%2027%202021-44.png" alt="" style="color:inherit;font-size:15px;"><span style="color:inherit;"><img src="/Wed%20Jan%2027%202021-43.png" alt=""></span><br></span></p><p><span style="font-size:20px;"><span style="color:inherit;"><br></span></span></p><p><span style="font-size:20px;"><span style="color:inherit;"><br></span></span></p><p><span style="font-size:20px;"></span></p><p><span style="font-size:20px;"><span style="color:inherit;"><span style="font-size:36pt;"><span style="font-size:36px;">How Access Control Systems Operate</span><br></span><span style="font-size:18pt;">An access control system includes the following steps:</span></span><span style="color:inherit;"><br></span></span></p><div style="margin-left:0.38in;"><span style="font-size:20px;">1.<span style="font-weight:bold;">User presents a CARD</span></span></div><div style="margin-left:0.38in;"><span style="font-size:20px;">2.<span style="font-weight:bold;">Card Reader forwards the Credential to the control panel or Access Unit</span></span></div><div style="margin-left:0.38in;"><span style="font-size:20px;">3.<span style="font-weight:bold;">The Control Unit process the card and compares it with the User database</span></span></div><div style="margin-left:0.38in;"><span style="font-size:20px;">4.<span style="font-weight:bold;">If the credentials don’t match the door remains locked</span></span></div><div style="margin-left:0.38in;"><span style="font-size:20px;">5.<span style="font-weight:bold;">If the credentials match panel sends a signal to the relay to unlocks the door</span></span></div><p><span style="font-size:20px;"><span style="color:inherit;"></span></span></p><div style="margin-left:0.38in;"><span style="font-size:20px;">6.</span><span style="font-size:20px;font-weight:bold;">The system logs both acceptances and rejections in a database</span></div><p><span style="font-size:20px;"><span style="color:inherit;"><img src="/Wed%20Jan%2027%202021-46.png" alt=""></span><span style="color:inherit;"><br></span></span></p><p><span style="font-size:20px;"><span style="color:inherit;"><br></span></span></p><p><span style="font-size:20px;"><br></span></p><p><span style="color:inherit;font-size:36px;">Essential Components of an Electronic Access Control</span><span style="font-size:20px;"><br></span></p><p><span style="font-size:20px;">The term access control often brings images of vaults, secure elevators, and buildings. However, today’s access control also includes rooms, <span style="font-weight:bold;">workstations</span>, file cabinets, <span style="font-weight:bold;">desk drawers</span>, vending machines, along with equipment like printers or computers.</span></p><p><span style="font-size:20px;">A typical system has two major components: </span></p><p><span style="font-size:20px;"><span style="font-weight:bold;">One controlling the access to a physical location </span>and a <span style="font-weight:bold;">system verifying the presence of authorized personnel</span>. </span></p><p><span style="font-size:20px;">The <span style="font-weight:bold;">electronic access controlling </span>the physical location, such as a door, typically contains several elements:</span></p><div style="margin-left:0.31in;"><span style="font-size:20px;">•The Lock</span></div><div style="margin-left:0.31in;"><span style="font-size:20px;">•The Card Reader</span></div><div style="margin-left:0.31in;"><span style="font-size:20px;">•The Control panel to authenticate the credentials</span></div><p><span style="color:inherit;font-size:20px;"></span></p><div style="margin-left:0.31in;"><span style="font-size:20px;">•</span><span style="font-size:20px;">The Access control hardware and software.</span></div><p><span style="color:inherit;"><img alt="" id="imageUriImported"></span><span style="font-size:20px;"><br></span></p><p><span style="font-size:20px;"><br></span></p><p><span style="font-size:20px;"><br></span></p></div>
</div><div data-element-id="elm_idv7znqkTE-AsCQ-LfUNYg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center"><style type="text/css"></style><a role="button" class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 27 Jan 2021 23:03:45 +1100</pubDate></item></channel></rss>