This 15 page report provides the most in-depth guidance on specifying Access Control systems you will find.
Specifying Access Control correctly can be tricky, because every opening has quirks and are prone to outside factors that impact system performance. Not only this, but what you don't specify can be just as problematic as what you do.
Most access RFPs have serious problems. While they comprehensively spell out contract conditions and business terms, they are typically scant on relevant details about the system. Not only do they tend to be a random smattering of technical points, pulling them together into a cohesive system is often needlessly costly or may even be impossible to build.
The Big Mistakes
Most of the trouble specifying access has a root cause in one of the three areas below:
1. Incomplete details, where things you don't know can ruin your budget and system goals.
2. Difficult to build, where details that sound prudent may actually limit selection and significantly drive complexity to integrate.
3. Proprietary, where even generic boilerplate writes in choices that lock you into one vendor.
In this report, we address the best strategies to avoid these problems.
Doing It Right - 18 Key Specification Areas
The good news is that you do not need to be an expert to specify great systems. In the sections below, we cover the right details to include, how to include them, and how to avoid common traps through addressing these 18 areas:
- Is This An Expansion or New System?
- Determining Access Security Goals
- Establishing Monitored, Managed, or Forensic Use
- Identifying Other System Integrations
- Which Credentials To Use
- Defining Doors/Opening Detail
- Defining Turnstile Use
- The Importance of Door Position Switches
- Defining Existing Locks/Hardware
- Specifying Readers
- Deciding to Use IP or Serial based Controllers
- How To Use PoE For Powering Systems
- System Edge vs. Centralized Architecture
- Is System Networking Wired or Wireless?
- Considerations For Using Existing Databases
- Evaluating User Management Features
- Using Special Features Like Time and Attendance & Mustering
- Establishing System Maintenance Expectations