Access Control Management Software Guide

Author: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** *****, ******* *** *********** *** ** what **** *** *** *** *** ********** ******** ***** ********** is **********. ** **** *****, ** ***** *** **** ****** parts ** **** ******** *** ******* ** ******** ** *** the ****** ****** ** ******** ** ****** ******.

Basic *******

*** ******** ** ****** ******* ********** ******** ** ********, **** distinct ********* *** ********** *******:

  1. **** ****: ********** *** ******* ***** ** *** ****** ******; ** doors *** ******/********, *** ***** ***** *** *********** **** *****.
  2. **** **********: *********** ***** ******* ** ********, ** ****** ** ***** and ******* ****** ** ******** ** ********* ************.
  3. ********** **********: ************* *** ********* ***** *** ***** ****** ****** **********, and ******** ***** ******* ** ******.
  4. *********: **** ****** ***** ** ************ ****** *** ******* ********* by *** ****** - **** *** ***** *********** **** ****, and **** ******** **** ********.

** ******* **** ** ***** **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** ****** ***** ** ********** *** ***********, it ******** *** **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** ********** 
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** ********* ** * ****** or ********* ******** **** **** ***********. ****** ******** *** ******* numbers ** ******* *** ***** *** ** ****** ** * dedicated *****, *** ********** ******* *** ******* ******* ******* ** host *** ******** *** ************ ** ***** ******* ** *****.

Monitoring *********

 **** **** ****** ********* ** **** ** ** *** ******* state ** ***** ** **** ****.  ***** ********* ******** *** layout ****, *** **** *******:

  • **** ******: ***** **** ******* ******** ******* ******* * ****, * lock ********, ** * **** ** ****** *** ***** ** logged.
  • ***** ******: ** ******* ***** * **** **** *** ****, ****** a **** ****, ** *************** ******* **********, *** ********* ***** ** ***** ** ***** operator ********* ** *** *****.
  • ****/****** ********: ** ******** *** *** ****** ** ******** ****** ** lock * **** ********, ***** ** *** ***** ** * single '********' *********.

**** ********** ***** *** **** *********** ** ********* ********* *** organized, ******* ** * ******** ** ***** ********:

*** ***** ***** ***** ** ******** ** **** *******:


***** *********** ******* ******** **** ***** ***** **** ** ***** photos ** ********* *** ******** ****** *** ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* ** *** *** *********** and ** ****************** ** ***** ******* ** *** **** *******. ******* **** opening ** **** ***********, **** ***** ********** ** *** **** hardware *** **** ** ** ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' ******** ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** ********** ****** ******* ****** ********** ***** and **** **** ** *** ******* ** ******** **** *** when *********** *** ** ****. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** **** ******** ***********. ********* and ****** *** ******** ************ **** ** ***** *******:

 

***** ********* ******* ****** ******, ******** * ***** ** ******** doors ** *********** ******** ******** **********. *** ****** ***** **** off *** ****** ** ***** ********:

****** *****


****** *********


 User **********

****** ********** ******* ****** **** *********** *****. ***** ****, *** the *********** **** *******, *** ******** ****** ** *** ******. The ****** **** ********** ********* ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** ** ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** ******** **** ** *** equivalent ** ********* *** ******** *****.  *** **** ***** ** a ***** ******** ** **** ** ****** *** *** ** is ********* ** ** ****** ********** ********:


 

Comments (18)

***** **** **. ******. **** *********** ******. ** **** ***** HID ** ******** *** ***** ********?

**** **** ****.

***** **!

************, ***** ***** ** ** **** **** ******* ** *** camera ********** *** *** ****** ******* *******? *** ******? *** Hardware ****** ***..

**** *** *******.

[****: **** *** **** ***** ** *** *** **********:**** ****** ******* ******?]

********* **** ** ***** * *********** ****** ** **** ** the ******** ***** ****** ******* ** *********...***** **** *** *** end ** **** * ******* ************ *** ** ********* **** duplication.

  1. ** *** * **** **** **** ******* ** *** ************’* hardware *** ********, *** **** ** **** *** ******** *****. My **** ******** ******** ******** *** ******** *** ************. ** a ********** *** **** **** *** ********/****** *** ****** ******** the ******** ***, * ******** *** *** ******** ****’* ** more. ***** ****** *** **** *********** **** ***** ** **** insight ** **** ***** ************* *****.

***** *** *****. ** *** ******** **** *** *** *** and ** *** **** * *** ***** ************ ** * familiar *******.

****** *****, **** *** * ****** **** **** *** ****** informative ************. * ******** ******** *** ********** ********** ******** *** one ** *** ******** * ***** ** ***** **** * think ***** ** ****** ********** ** * ****** ***** *** which ****** ** ** ****** ** ***** ****** ** ******** users ***** ** ********* ******* ** ******** ** ** ****. Potentially **** ******* ** *** **** ** *** ** ****** Shooter ********* ***** * ******** ** ****** ** ** ***********, this *** ** ********* ****** *************** **** *** ******* ****** computer. * ** *** ****** ******** **** * ******* ** software ********* ** ** **** * ******** ******* ** ****?

* ** *** **** ***** ****, *** *** ****** ******* I ** **** ******** **** ** ******* ******** *** ***** lockdowns. ***** *** ** ********* ******* ********, ******* ** *****, or ** ***** * ********* ********** ****. **** ******* *** multiple ****** ** ********, **, ********* ** *** *********, *** can ****** ******* ******* **** *****, ******* *** *****, ********* access ******, ***.

**** ***********, ** ** ******* *** ******* *** *** **** has. * ****** **** ******* **** ***** ** * ***** failure **** **** *** * **** **** *** ***** ** no **** ** *********. ** *** ***** ******?

** ***** ****** ** ******* *** **** ******** ** * Fail-Safe ** ****-****** ***. *** ****** **** ***** *** *********** between *** *** ** * ***** *****.

** **** ***** **** ******* ** *** *** ****** ** designed/programed. **** *** ****** **** **** ***** **** ****** ** fail ****** ***** *** ***** ****** ****** *** *** ** overridden **** * ****** ***. * **** *** * ** government ****** **** *** ****** ******* ***** ** **** ** our ********* ** ** **** ***** ** **** ****** ** any ***** **** ****** ********* *** **** ** *** ***** doors **** *** ****** **** ******* ******* **** *** ******* public *** **** **** ** **** *** ****** ****** ** case ** ********* ** ***** *******.

**** *****, *** **** ****** ** ******* **** ****** ******** that ****** **** ****** ** *** *****. **** ***, ****** inside *** ****** *** ***, *** *** ***** ******* ****** from ******* ** **** ** *********/***** *******.

**** ******* *** * ***** *** ** ******** *** *** differences ** ****** *********.

** **** ******** ***** ****** *****, ** * ***'* **** see **** **** *******

****** ***** *** ****** ********* ***. ?

******, *** ******** ****** **** **** *****.

***** ************. **** ** *** ****, *********** ** ********* **** one ****** ******* ****** ** *******, ***, *** ***** ***** are *** ****.

***** *** *** ******* ***** *****. ** *** **** ***********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It covers our 20 manufacturer favorability rankings and 20 manufacturer...
Safes And Vaults Alarm Sensors on Jul 07, 2017
Vaults and safes are designed to protect valuables by enclosing them in steel or concrete boxes with thick doors and strong locks. However, any...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
Smartcard Copier Tested (13.56MHz) on Jul 05, 2017
Copying 125kHz cards is certainly easy, as our test results showed, but how about 13.56MHz smart cards? Are they more secure? IPVM focused on the...
Biometrics Pros and Cons For Electronic Access Control on Jun 26, 2017
Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
Access Control Course Winter 2018 on Jun 11, 2017
The Winter 2018 IPVM Access Control Course is now open; save $50 on early registration. IPVM offers the most comprehensive access control course...
Hikvision Hardening Guide Recommends Port Forwarding on Jun 09, 2017
Hikvision's Network Security Hardening Guide recommends port forwarding as a 'standard configuration', highlighted below: In this note, we...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
HID Edge EVO Tested on Jun 07, 2017
HID Edge controllers have been one of most common offerings in IP door controllers for years. The new generation is called Edge EVO. We tested...

Most Recent Industry Reports

Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We tested Axis'...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It covers our 20 manufacturer favorability rankings and 20 manufacturer...
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Knightscope Laughs off Robot Drowning on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue: The implied message is that...
Microsoft Video AI Cloud Services Examined on Jul 18, 2017
Microsoft has released one of the most amazing video analytics marketing videos ever. In it, they detect oil spills, track individual people giving...
Hikvision USA Head of Cybersecurity Exits on Jul 18, 2017
Hikvision USA's Head of Cybersecurity has exited the company. In this note, we review the move, share Hikvision's feedback and examine the...
'Suicidal' Knightscope Robot Drowns on Jul 17, 2017
Knightscope continues its hyper growth, at least when it comes to controversy, this time with a 'suicidal' robot in Washington DC. And here is...
March Networks Company Profile on Jul 17, 2017
March Networks was one of the most well-known video surveillance manufacturers of the 2000s. In 2012, March was acquired by Chinese / American...
Milestone Beats OnSSI In Court on Jul 17, 2017
The litigation between former partners Milestone and OnSSI has finished, confirmed by both parties. In April 2016, OnSSI sued Milestone and in...
Power For Burglar Alarms on Jul 14, 2017
In order to operate, alarm panels require the high voltages found in electrical outlets be converted to the low voltages they run on. In this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact