Sign In  |  Register  |  About Los Altos  |  Contact Us

Los Altos, CA
September 01, 2020 1:26pm
7-Day Forecast | Traffic
  • Search Hotels in Los Altos

  • CHECK-IN:
  • CHECK-OUT:
  • ROOMS:

10 Types Of Access Control To Consider For Your Business Premises

10 Types Of Access Control To Consider For Your Business PremisesPhoto from Unsplash

Originally Posted On: https://spectacularmag.com/2024/03/14/10-types-of-access-control-to-consider-for-your-business-premises/

 

Controlling who goes in and out of your business premises is very important. Your staff and any authorized visitors need to be able to access the premises, but you don’t want to let in thieves and troublemakers. This is where it can be useful to have some form of access control in place. There are many different types of access control to consider, each suited to different circumstances. This post compares 10 of them.

Traditional keys

A traditional lock and key is one way to control who comes in and out. But how many keys should you cut? And who should you give them to? Some companies hand keys to every staff member and may even cut keys for cleaners. The issue with relying on keys is that they’re expensive to replace, and locks can be picked (resulting in other layers of access control sometimes being necessary).

Keycards, fobs, and RFID wristbands

Using a keycard, fob, or RFID wristband is quicker than having to mess around with keys. These locks are also harder to break into because they are electronic. Of course, such locks can experience faults and people can lose their card/fob, so they’re not a flawless security option. When it comes to keycards, bear in mind that there are many different types of prox cards to consider and that some may be better for certain buildings. While keycards tend to mainly be used by staff, there are cases where they may be used by customers (such as to access hotel rooms).

Smartphone access

It’s also possible to distribute digital keys that can be scanned on entry via an app on people’s phones. The biggest benefit of these keys is that a person cannot lose them unless they lose their phone, too. You also do not have to pay per key, allowing you to assign as many keys as you want digitally. The biggest fault with this form of entry is that if someone’s phone runs out of battery, they may not be able to enter.

Code access

Coded entrances are often used in conjunction with traditional keys. The codes may be used to open a key box or activate/deactivate an alarm. These could be punched in via a keypad or cracked using an old-school combination safe lock. Code entry systems do require authorized people to remember the code. Such codes can be regularly changed to keep them secure, but you must remember to notify everyone in advance.

Biometric access

This is a slightly more hi-tech form of access control that involves authorizing people by scanning body parts. Companies sometimes use fingerprint scanners to gain access to certain areas. Facial recognition access controls are also an option. Biometrics is thought to be the strongest form of security as it cannot be easily hacked into and does not require people to remember keys or codes. That said, it is often used in conjunction with other forms of access control, like keys.

Manned access control

Some companies will employ someone to man the entrance. This person manning the entrance can then decide who goes in and who goes out. Such a person could include a bouncer, a security guard manning the door, or a receptionist sitting at a desk by the entrance. It could even include someone sitting in a booth manning the entrance to a car park or road. This person may have a button that they can press to let a person in, or they may wave people in. Such a form of access control has been used reliably for centuries, but it does have its drawbacks – namely, the fact that it requires you to hire someone to constantly man the entrance.

Lanyards

By requiring authorized people to wear lanyards around their necks at all times, you can make it easy to determine who should be in the building and who shouldn’t. This can be seen as less of a form of access control and more of a form of visitor control. That said, lanyards can be used in combination with manned access control by having someone check each one on entry. Such lanyards could be printed off by someone sitting at the entrance or could be assigned elsewhere, but they must be given out to every visitor as they arrive in order to make them an effective solution.

Voice intercoms

Voice intercoms require visitors to speak through an intercom device. This is linked up to a receiver phone that a designated member of staff can answer. This member of staff can then press a button to let the visitor in, provided they recognize their voice or they have given a convincing enough reason to be let in. Voice intercoms are ideal for controlling access remotely if you cannot ask someone to man the entrance. For example, instead of having to employ someone to sit outside the entrance to a car park, you can place an intercom there and link it up to someone in the office.

Video intercoms

Video intercoms are like voice intercoms, but they also use a camera to record live footage of visitors. This video footage is linked up to a screen that a staff member can look at to further help distinguish each visitor and determine whether they can enter. After all, voices can be mimicked or misinterpreted – a video intercom gives you visual evidence so you know exactly who you are talking to.

Number plate recognition

When it comes to access control of vehicles, number plate recognition is a potential option that can help speed up the flow of vehicles. Authorized vehicle number plates can be recorded on a system, and a camera can then be programmed to pick up on these vehicle registrations and automatically open a barrier if the number plate is recognized. It’s a remarkably simple system, but it has its limitations ( if you get a lot of one-time visitors who need to use your car park, you’ll have to take note of their number plates before they arrive, which may not always be possible).

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.
 
 
Copyright © 2010-2020 LosAltos.com & California Media Partners, LLC. All rights reserved.