Access Control Management Software Guide

Author: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** *****, ******* *** *********** *** ** what **** *** *** *** *** ********** ******** ***** ********** is **********. ** **** *****, ** ***** *** **** ****** parts ** **** ******** *** ******* ** ******** ** *** the ****** ****** ** ******** ** ****** ******.

Basic *******

*** ******** ** ****** ******* ********** ******** ** ********, **** distinct ********* *** ********** *******:

  1. **** ****: ********** *** ******* ***** ** *** ****** ******; ** doors *** ******/********, *** ***** ***** *** *********** **** *****.
  2. **** **********: *********** ***** ******* ** ********, ** ****** ** ***** and ******* ****** ** ******** ** ********* ************.
  3. ********** **********: ************* *** ********* ***** *** ***** ****** ****** **********, and ******** ***** ******* ** ******.
  4. *********: **** ****** ***** ** ************ ****** *** ******* ********* by *** ****** - **** *** ***** *********** **** ****, and **** ******** **** ********.

** ******* **** ** ***** **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** ****** ***** ** ********** *** ***********, it ******** *** **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** **********
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** ********* ** * ****** or ********* ******** **** **** ***********. ****** ******** *** ******* numbers ** ******* *** ***** *** ** ****** ** * dedicated *****, *** ********** ******* *** ******* ******* ******* ** host *** ******** *** ************ ** ***** ******* ** *****.

Monitoring *********

**** **** ****** ********* ** **** ** ** *** ******* state ** ***** ** **** ****. ***** ********* ******** *** layout ****, *** **** *******:

  • **** ******: ***** **** ******* ******** ******* ******* * ****, * lock ********, ** * **** ** ****** *** ***** ** logged.
  • ***** ******: ** ******* ***** * **** **** *** ****, ****** a **** ****, ** *************** ******* **********, *** ********* ***** ** ***** ** ***** operator ********* ** *** *****.
  • ****/****** ********: ** ******** *** *** ****** ** ******** ****** ** lock * **** ********, ***** ** *** ***** ** * single '********' *********.

**** ********** ***** *** **** *********** ** ********* ********* *** organized, ******* ** * ******** ** ***** ********:

*** ***** ***** ***** ** ******** ** **** *******:


***** *********** ******* ******** **** ***** ***** **** ** ***** photos ** ********* *** ******** ****** *** ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* ** *** *** *********** and ** ****************** ** ***** ******* ** *** **** *******. ******* **** opening ** **** ***********, **** ***** ********** ** *** **** hardware *** **** ** ** ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' ******** ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** ********** ****** ******* ****** ********** ***** and **** **** ** *** ******* ** ******** **** *** when *********** *** ** ****. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** **** ******** ***********. ********* and ****** *** ******** ************ **** ** ***** *******:

***** ********* ******* ****** ******, ******** * ***** ** ******** doors ** *********** ******** ******** **********. *** ****** ***** **** off *** ****** ** ***** ********:

****** *****


****** *********


User **********

****** ********** ******* ****** **** *********** *****. ***** ****, *** the *********** **** *******, *** ******** ****** ** *** ******. The ****** **** ********** ********* ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** ** ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** ******** **** ** *** equivalent ** ********* *** ******** *****. *** **** ***** ** a ***** ******** ** **** ** ****** *** *** ** is ********* ** ** ****** ********** ********:


Comments (16)

***** **** **. ******. **** *********** ******. ** **** ***** HID ** ******** *** ***** ********?

**** **** ****.

***** **!

************, ***** ***** ** ** **** **** ******* ** *** camera ********** *** *** ****** ******* *******? *** ******? *** Hardware ****** ***..

**** *** *******.

[****: **** *** **** ***** ** *** *** **********:**** ****** ******* ******?]

********* **** ** ***** * *********** ****** ** **** ** the ******** ***** ****** ******* ** *********...***** **** *** *** end ** **** * ******* ************ *** ** ********* **** duplication.

  1. ** *** * **** **** **** ******* ** *** ************’* hardware *** ********, *** **** ** **** *** ******** *****. My **** ******** ******** ******** *** ******** *** ************. ** a ********** *** **** **** *** ********/****** *** ****** ******** the ******** ***, * ******** *** *** ******** ****’* ** more. ***** ****** *** **** *********** **** ***** ** **** insight ** **** ***** ************* *****.

***** *** *****. ** *** ******** **** *** *** *** and ** *** **** * *** ***** ************ ** * familiar *******.

****** *****, **** *** * ****** **** **** *** ****** informative ************. * ******** ******** *** ********** ********** ******** *** one ** *** ******** * ***** ** ***** **** * think ***** ** ****** ********** ** * ****** ***** *** which ****** ** ** ****** ** ***** ****** ** ******** users ***** ** ********* ******* ** ******** ** ** ****. Potentially **** ******* ** *** **** ** *** ** ****** Shooter ********* ***** * ******** ** ****** ** ** ***********, this *** ** ********* ****** *************** **** *** ******* ****** computer. * ** *** ****** ******** **** * ******* ** software ********* ** ** **** * ******** ******* ** ****?

* ** *** **** ***** ****, *** *** ****** ******* I ** **** ******** **** ** ******* ******** *** ***** lockdowns. ***** *** ** ********* ******* ********, ******* ** *****, or ** ***** * ********* ********** ****. **** ******* *** multiple ****** ** ********, **, ********* ** *** *********, *** can ****** ******* ******* **** *****, ******* *** *****, ********* access ******, ***.

**** ***********, ** ** ******* *** ******* *** *** **** has. * ****** **** ******* **** ***** ** * ***** failure **** **** *** * **** **** *** ***** ** no **** ** *********. ** *** ***** ******?

** **** ***** **** ******* ** *** *** ****** ** designed/programed. **** *** ****** **** **** ***** **** ****** ** fail ****** ***** *** ***** ****** ****** *** *** ** overridden **** * ****** ***. * **** *** * ** government ****** **** *** ****** ******* ***** ** **** ** our ********* ** ** **** ***** ** **** ****** ** any ***** **** ****** ********* *** **** ** *** ***** doors **** *** ****** **** ******* ******* **** *** ******* public *** **** **** ** **** *** ****** ****** ** case ** ********* ** ***** *******.

**** *****, *** **** ****** ** ******* **** ****** ******** that ****** **** ****** ** *** *****. **** ***, ****** inside *** ****** *** ***, *** *** ***** ******* ****** from ******* ** **** ** *********/***** *******.

**** ******* *** * ***** *** ** ******** *** *** differences ** ****** *********.

** **** ******** ***** ****** *****, ** * ***'* **** see **** **** *******

****** ***** *** ****** ********* ***. ?

******, *** ******** ****** **** **** *****.

***** ************. **** ** *** ****, *********** ** ********* **** one ****** ******* ****** ** *******, ***, *** ***** ***** are *** ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Paxton Hosted Access - Disruptive Low Dealer Pricing on Jan 19, 2017
Paxton is entering the hosted access game, with BLU, at a cost that is a fraction of key competitors. The different approach could be very...
Cut in Half, Everfocus Shifts Strategies on Jan 17, 2017
The race to the bottom impact continues. Now, Everfocus, who used to be one of the larger budget providers, is shifting strategies after years of...
Genetec Favorability Results on Jan 16, 2017
In the race to the bottom and flight to 'solutions', Genetec has taken a contrary path. The company remains independent, focusing up market,...
IP Networking Course January 2017 on Jan 12, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Camera Course Winter 2017 on Jan 05, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Introduction To Burglar Alarm Systems on Jan 04, 2017
While alarm systems are popular, balancing between the right level of protection, the appropriate components and an acceptable price can be very...
Calculating Video Surveillance Storage / Bandwidth on Dec 29, 2016
Calculating surveillance bandwidth is complex, and inexperienced users can easily underestimate bandwidth, leading to reduced storage durations...
Lux Rating / Minimum Illumination Guide 2017 on Dec 23, 2016
Lux ratings are one of the poorest specifications to use in selecting cameras. Now, with the rise of integrated IR, they are increasingly...
The PPF / PPM Video Surveillance Guide on Dec 23, 2016
Pixels per foot / Pixels per meter is the most fundamental and valuable, though imperfect, metric for specifying video surveillance image...
HD Analog vs IP Guide 2017 on Dec 19, 2016
For years, HD resolution was IP camera's greatest advantage. However, starting in 2013, analog cameras with HD resolution started shipping and,...

Most Recent Industry Reports

Jim Cramer Sucks Up To Knightscope on Jan 19, 2017
Credit must be given to Knightscope. They are raising money right now and despite their $80 million pre-money valuation against a lowly sub $1...
ADT Launches Canopy - Professional Monitoring For DIY Devices on Jan 19, 2017
The intrusion industry has criticized DIY security systems for years, claiming systems like Canary or Scout cannot match professionally installed...
Dahua (Un)Favorability Results on Jan 19, 2017
Dahua, the mega-Chinese surveillance manufacturer not primarily owned by the Chinese government has been trying to break out of the shadow of...
Paxton Hosted Access - Disruptive Low Dealer Pricing on Jan 19, 2017
Paxton is entering the hosted access game, with BLU, at a cost that is a fraction of key competitors. The different approach could be very...
Geovision Launches Direct Cloud Offering on Jan 18, 2017
Add cloud, subtract integrator. Geovision has launched myGVcloud, an offering that allows consumers to buy cameras and cloud services directly...
Anixter / Bosch Sells Direct to Amazon on Jan 18, 2017
Anixter regularly says they do not sell direct to end users or that they do not do it anymore. However, over the past year, Anixter has sold Bosch...
Smart Power Tools For Security Installs on Jan 18, 2017
Installing a smart camera? Perhaps you should use a 'smart' drill. The intelligent appliance / IoT trend has hit power tools. In this note, we...
Canon 250MP Prototype Targeted At Surveillance on Jan 17, 2017
At one point Axis declared the megapixel race was over, but now parent company Canon is showing an imager that would be a rocket ship in a...
Cut in Half, Everfocus Shifts Strategies on Jan 17, 2017
The race to the bottom impact continues. Now, Everfocus, who used to be one of the larger budget providers, is shifting strategies after years of...
Top ISC West 2017 Booth Moves on Jan 16, 2017
There are significant moves among many major manufacturers on the ISC West show floor, and very few prime spaces left unoccupied. In this report we...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact