Access Control Management Software Guide

Author: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** *****, ******* *** *********** *** ** what **** *** *** *** *** ********** ******** ***** ********** is **********. ** **** *****, ** ***** *** **** ****** parts ** **** ******** *** ******* ** ******** ** *** the ****** ****** ** ******** ** ****** ******.

Basic *******

*** ******** ** ****** ******* ********** ******** ** ********, **** distinct ********* *** ********** *******:

  1. **** ****: ********** *** ******* ***** ** *** ****** ******; ** doors *** ******/********, *** ***** ***** *** *********** **** *****.
  2. **** **********: *********** ***** ******* ** ********, ** ****** ** ***** and ******* ****** ** ******** ** ********* ************.
  3. ********** **********: ************* *** ********* ***** *** ***** ****** ****** **********, and ******** ***** ******* ** ******.
  4. *********: **** ****** ***** ** ************ ****** *** ******* ********* by *** ****** - **** *** ***** *********** **** ****, and **** ******** **** ********.

** ******* **** ** ***** **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** ****** ***** ** ********** *** ***********, it ******** *** **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** ********** 
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** ********* ** * ****** or ********* ******** **** **** ***********. ****** ******** *** ******* numbers ** ******* *** ***** *** ** ****** ** * dedicated *****, *** ********** ******* *** ******* ******* ******* ** host *** ******** *** ************ ** ***** ******* ** *****.

Monitoring *********

 **** **** ****** ********* ** **** ** ** *** ******* state ** ***** ** **** ****.  ***** ********* ******** *** layout ****, *** **** *******:

  • **** ******: ***** **** ******* ******** ******* ******* * ****, * lock ********, ** * **** ** ****** *** ***** ** logged.
  • ***** ******: ** ******* ***** * **** **** *** ****, ****** a **** ****, ** *************** ******* **********, *** ********* ***** ** ***** ** ***** operator ********* ** *** *****.
  • ****/****** ********: ** ******** *** *** ****** ** ******** ****** ** lock * **** ********, ***** ** *** ***** ** * single '********' *********.

**** ********** ***** *** **** *********** ** ********* ********* *** organized, ******* ** * ******** ** ***** ********:

*** ***** ***** ***** ** ******** ** **** *******:


***** *********** ******* ******** **** ***** ***** **** ** ***** photos ** ********* *** ******** ****** *** ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* ** *** *** *********** and ** ****************** ** ***** ******* ** *** **** *******. ******* **** opening ** **** ***********, **** ***** ********** ** *** **** hardware *** **** ** ** ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' ******** ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** ********** ****** ******* ****** ********** ***** and **** **** ** *** ******* ** ******** **** *** when *********** *** ** ****. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** **** ******** ***********. ********* and ****** *** ******** ************ **** ** ***** *******:

 

***** ********* ******* ****** ******, ******** * ***** ** ******** doors ** *********** ******** ******** **********. *** ****** ***** **** off *** ****** ** ***** ********:

****** *****


****** *********


 User **********

****** ********** ******* ****** **** *********** *****. ***** ****, *** the *********** **** *******, *** ******** ****** ** *** ******. The ****** **** ********** ********* ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** ** ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** ******** **** ** *** equivalent ** ********* *** ******** *****.  *** **** ***** ** a ***** ******** ** **** ** ****** *** *** ** is ********* ** ** ****** ********** ********:


 

Comments (16)

***** **** **. ******. **** *********** ******. ** **** ***** HID ** ******** *** ***** ********?

**** **** ****.

***** **!

************, ***** ***** ** ** **** **** ******* ** *** camera ********** *** *** ****** ******* *******? *** ******? *** Hardware ****** ***..

**** *** *******.

[****: **** *** **** ***** ** *** *** **********:**** ****** ******* ******?]

********* **** ** ***** * *********** ****** ** **** ** the ******** ***** ****** ******* ** *********...***** **** *** *** end ** **** * ******* ************ *** ** ********* **** duplication.

  1. ** *** * **** **** **** ******* ** *** ************’* hardware *** ********, *** **** ** **** *** ******** *****. My **** ******** ******** ******** *** ******** *** ************. ** a ********** *** **** **** *** ********/****** *** ****** ******** the ******** ***, * ******** *** *** ******** ****’* ** more. ***** ****** *** **** *********** **** ***** ** **** insight ** **** ***** ************* *****.

***** *** *****. ** *** ******** **** *** *** *** and ** *** **** * *** ***** ************ ** * familiar *******.

****** *****, **** *** * ****** **** **** *** ****** informative ************. * ******** ******** *** ********** ********** ******** *** one ** *** ******** * ***** ** ***** **** * think ***** ** ****** ********** ** * ****** ***** *** which ****** ** ** ****** ** ***** ****** ** ******** users ***** ** ********* ******* ** ******** ** ** ****. Potentially **** ******* ** *** **** ** *** ** ****** Shooter ********* ***** * ******** ** ****** ** ** ***********, this *** ** ********* ****** *************** **** *** ******* ****** computer. * ** *** ****** ******** **** * ******* ** software ********* ** ** **** * ******** ******* ** ****?

* ** *** **** ***** ****, *** *** ****** ******* I ** **** ******** **** ** ******* ******** *** ***** lockdowns. ***** *** ** ********* ******* ********, ******* ** *****, or ** ***** * ********* ********** ****. **** ******* *** multiple ****** ** ********, **, ********* ** *** *********, *** can ****** ******* ******* **** *****, ******* *** *****, ********* access ******, ***.

**** ***********, ** ** ******* *** ******* *** *** **** has. * ****** **** ******* **** ***** ** * ***** failure **** **** *** * **** **** *** ***** ** no **** ** *********. ** *** ***** ******?

** **** ***** **** ******* ** *** *** ****** ** designed/programed. **** *** ****** **** **** ***** **** ****** ** fail ****** ***** *** ***** ****** ****** *** *** ** overridden **** * ****** ***. * **** *** * ** government ****** **** *** ****** ******* ***** ** **** ** our ********* ** ** **** ***** ** **** ****** ** any ***** **** ****** ********* *** **** ** *** ***** doors **** *** ****** **** ******* ******* **** *** ******* public *** **** **** ** **** *** ****** ****** ** case ** ********* ** ***** *******.

**** *****, *** **** ****** ** ******* **** ****** ******** that ****** **** ****** ** *** *****. **** ***, ****** inside *** ****** *** ***, *** *** ***** ******* ****** from ******* ** **** ** *********/***** *******.

**** ******* *** * ***** *** ** ******** *** *** differences ** ****** *********.

** **** ******** ***** ****** *****, ** * ***'* **** see **** **** *******

****** ***** *** ****** ********* ***. ?

******, *** ******** ****** **** **** *****.

***** ************. **** ** *** ****, *********** ** ********* **** one ****** ******* ****** ** *******, ***, *** ***** ***** are *** ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Glass Doors and Access Control Tutorial on Feb 22, 2017
The biggest challenge for many access control systems are glass doors. Here's what happens when a maglock is improperly installed to an existing...
Customized Access Control Cans (Altronix Trove) on Feb 14, 2017
Access control installs typically require hanging at least two or three different enclosure cans, each holding individual parts.  Open wall space...
Avigilon New VMS Version ACC6 Examined on Feb 13, 2017
Almost 4 years after ACC5 was released, Avigilon is releasing the next major revision of their VMS, which includes their Appearance...
Lenel Favorability Results 2017 on Feb 09, 2017
At this point, it is not surprising that Lenel is one of the most disliked security manufacturers. From stories like Lenel Partners Angry, Lenel...
VPNs for Video Surveillance on Feb 07, 2017
Remote access in surveillance networks is a key cyber security and usability issue. With cyber attacks rising, how can users ensure their systems...
LAST DAY - Camera Course Winter 2017 on Feb 02, 2017
[NOTE: Today, Thursday is the last day to register.] Learn video surveillance and get certified. IPVM provides live online classes, recorded...
Scathing Honeywell Favorability Results on Jan 24, 2017
Honeywell is one of the biggest brands in security, with offerings for intrusion, fire, wire, video surveillance, access control, plus they own one...
Integrator Service Vehicle Guide on Jan 23, 2017
Few assets are as commonly used by integrators and installers as their service vehicles. 125 integrators explained to IPVM in detail about their...
Paxton Hosted Access - Disruptive Low Dealer Pricing on Jan 19, 2017
Paxton is entering the hosted access game, with BLU, at a cost that is a fraction of key competitors. The different approach could be very...
Cut in Half, Everfocus Shifts Strategies on Jan 17, 2017
The race to the bottom impact continues. Now, Everfocus, who used to be one of the larger budget providers, is shifting strategies after years of...

Most Recent Industry Reports

Honeywell Sues Alarm.com For Violating Anti-Trust Laws on Feb 24, 2017
Is Alarm.com about to dominate the smart home software market? That is what Honeywell alleges in its new lawsuit, first reported by...
Axis: "Everything is IP" - False on Feb 24, 2017
Axis is congratulating itself, with executive Fredrick Nilsson declaring: "Now the conversion is all done and everything is IP and analog is...
Advertising Like Avigilon at the ISC West Airport on Feb 24, 2017
Avigilon has grabbed a lot of attention over the last few years advertising at the Las Vegas airport when attendees fly in. But how does that...
Artificial Intelligence Robot Assistant (ACTi) on Feb 23, 2017
Has artificial intelligence come to the video surveillance industry? ACTi has released 'SARA' which it bills as an 'AI assistant that brings...
Cutting Costs 70% Using Milestone With HD Analog on Feb 23, 2017
HD analog and enterprise VMSes are often thought of as being on opposite sides of the spectrum, with HD analog best for small jobs due to its low...
Dahua 4K HD Analog Cameras Announced on Feb 23, 2017
HD analog has been gaining popularity (even if Axis hopes otherwise). Last year, HD analog's max resolution doubled from 1080p to 4MP (see our 4MP...
Uniview (UNV) IP Cameras Tested on Feb 22, 2017
"We're #3," in China says Uniview (UNV). While the company significantly trails Hikvision and Dahua in total sales, one notable difference is that...
Glass Doors and Access Control Tutorial on Feb 22, 2017
The biggest challenge for many access control systems are glass doors. Here's what happens when a maglock is improperly installed to an existing...
Exacq Favorability Results on Feb 22, 2017
For years, Exacq has been one of the most frequently favored VMSes in IPVM integrator statistics (e.g., see Favorite VMS Manufacturers...
The Hot RMR Company - Electric Guard Dog on Feb 22, 2017
The financiers at the Barnes Buchanan conference praised a company named 'Electric Guard Dog'. While the name sounds fairly low tech, the money and...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact