By Brian Rhodes, Published Apr 09, 2020, 10:38am EDT
Access control users have included capabilities that are not commonly used that can help zero-in and discover potential Coronavirus hotspots in a facility: system activity logs.
Getting this data requires tight access system configurations, which can give integrators an opportunity to consult or sell end-users on optimizing their systems and using access logs.
Inside this note, we discuss how to do this on any access system and which data is needed to make it happen. We also examine automated exposure reports from Genetec and Detrios.
*** ************* ** ******** individuals ** * ******** or ****** *** *** they ******** **** ** essentially *** ******* **** of *** ******:
*****, ****** **** * potentially ******** *** ******** 'global **********' ********-**** ******** that *** ******** **** visitors ** *********** **** delivery *******, ******** ********** systems **** ******** ****** the **** ** **** for *********.
Multi-Building ******* **********
********** **** ******** ***** different ********* ** * campus, **** ******* ******** or ******* ********, ***** able ** ******* ********* everywhere ** ******** ****** has **** ** * benefit ** ******* **** potential *********.
Risk: ********* ********* *** ** ********
***** ******* ****** ** used ** ******* ********** for *********** ********* *****, but ***** ******* *** only ******* ********** ******* infections *** ****** ******* the ****** ****** ******* it.
* ******** ** **** if ****** ***** *** infected *** *** ********** people ** * ***** group ********* ***** **** can *********** ****** **** without ******* *****, *********, or ******* ** ***.
** *** *** ** integrator ******* *** ********, contact ***-***** *** ***** them ** ******** *** to *** ****, ********** up ****** ******, *** setting ** ******* ********** to **** ********* ********* risks.
* ****** ** ****'* systems *** ****** **** will ****** ******* *** opportunities ** ******* **** for ***** *** ******.
******* ***** ****** ** keeping '*********' ***** ****, it *** **** ****** the **** ** *********** exposure ***** *******. ** also * ***** ****** to ******* ***-***** *** can ******** ******** ** a *********** ****.
Comments (0)
Read this IPVM report for free.
This article is part of IPVM's 6,804 reports, 913 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.
Comments (0)