Use Access Control Logs To Constrain Coronavirus

By: Brian Rhodes, Published on Apr 09, 2020

Access control users have included capabilities that are not commonly used that can help zero-in and discover potential Coronavirus hotspots in a facility: system activity logs.

IPVM Image

Getting this data requires tight access system configurations, which can give integrators an opportunity to consult or sell end-users on optimizing their systems and using access logs.

Inside this note, we discuss how to do this on any access system and which data is needed to make it happen. We also examine automated exposure reports from Genetec and Detrios.

Risk ********** ********** *** ********** ****, '*********' ***********

**** ***********, ***** **** shuttered ***** **** ********* working **** ****, ***** 'essential' ********** ****** *****, like ******* *** *********, food *** ********** ********, and ******** **************.

*** ***** '*********' **********, knowing *** **** ***** and *** **** **** potentially ********** **** ******* especially ******** *** *********** risk *** ***** ** direct ************ *** ******** first ** **** *** spread.

Access ******* ******* ****** **** ************

***** **** ***-***** *** considering ******** ********* ******* ********** ** combat ***********, ***** ** * good ****** **** ******* have ** ********* **** not ***** *** ** full ***: ****** ******* logs.

***** ****** ****, ************ to **** *** ***** people **** **** *** who **** **** **** in ******* **** ***** avoid *** ****, ***********, and ****** ****** ** quarantining *** ******* *** cleaning ** ** ****** facility, ********** *** *******-******** buildings **** *********.

****** **** ******* * disruptive '********/** *******' ****** for ******** **** *** limit ** ******** *** assets *** *********, *****-*********** the ******** *** ************ of ** ******** ********** offers * **** ********* and ******** **** *** countermeasures.

**** ****** ******* ******* a ****** **** **** example, **** ***** ***** badges *** **** ** specific *******/ ********* ** a ********:

IPVM Image

***** ******* ** ***** response ****** ******* *** narrow ********* ** *****/********* specific ***** ******** *** test * ******** ********** group ** ******.

***** **** ** ******* monitor * ******* ****** of ****** **** ******** risks **** ****** **** down ** ****** *********** vital ******** ***** ***** unneeded ******* ***** *********.

*** ****** **** ********* ******** **** ** disinfecting ****** ******** *** monitoring **** *********** ** just * *** ********* zones.

Access ****** ********* ****

* *** ******* ** access ******** ******** ******* ****** *** Schedules**** *** ******* ****** where * ********** ****** is ******* ** * facility.

**** **** *******, '** Tech' **** **** *****, the ******** ** **** allowed ****** *** *** door *** * ******** room. **** **** *********** to *****/******** **** ***** areas:

IPVM Image

***** '****** & *********' ***** ********* *** only ***** ****** ** areas **** ****.

** *** ******* *****, for * ********* ****** like ***********, ** ******* non-IT ******** ********* ** the ******** **** ****, but ***** *** ** logs ******* ***** *********** with ** ****** **** areas ******** ** **** example ******, ***** ************ can ** ***** ***.

Visitor ********** ****** **** ***

** ********* ** ***** logs ** ***-********* ********** holders, **** **** ********, can ** ******** ******* using****** ******* ********** *******.

*** ************* ** ******** individuals ** * ******** or ****** *** *** they ******** **** ** essentially *** ******* **** of *** ******:

IPVM Image

*****, ****** **** * potentially ******** *** ******** 'global **********' ********-**** ******** that *** ******** **** visitors ** *********** **** delivery *******, ******** ********** systems **** ******** ****** the **** ** **** for *********.

Multi-Building ******* **********

********** **** ******** ***** different ********* ** * campus, **** ******* ******** or ******* ********, ***** able ** ******* ********* everywhere ** ******** ****** has **** ** * benefit ** ******* **** potential *********.

Risk: ********* ********* *** ** ********

***** ******* ****** ** used ** ******* ********** for *********** ********* *****, but ***** ******* *** only ******* ********** ******* infections *** ****** ******* the ****** ****** ******* it.

* ******** ** **** if ****** ***** *** infected *** *** ********** people ** * ***** group ********* ***** **** can *********** ****** **** without ******* *****, *********, or ******* ** ***.

** ***** *****, ** infected *************, *********** ***********, ** ********* ********* existing ****** ******** *** enter ** **** ** contact ****** ******* ** the ******'* *******, **** method **** *** ****** it.

Integrators *** **** *****/******

**** *********** *** ************ **** **** ** customers **** *** **** amidst ********* *** ******* uncertainty, *** ******** *** to *** ***** ******* can ** *** ***** details ** *** ***** time *** ***-***** ********** Coronavirus.

**** ** *** **** already ********* ** ******* in ** ****** ****** may ** ******* ** not ******** ** ***-***** unless *********** **** ** show **** *** ** use **.

******** ***-***** *** ** use **** **** *** not **** * ******** in *** ****, *** now ********** *** ****** closure ** * ******** versus *** ********* ** just * *** ****** might ** ************* ******** detail **** *********** *** pitch ** ***-***** ***** able ** *******.

Using ****** **** ******* ***********

* *** ****** ** keep ** **** *** integrators ********* ***** ** a ********* *********** **** management ****:

********* **** **** *******: ******* ****** *** of ****** **** ** not ****** ******** ***** to ********* ***** ****** systems. ** ***** *** for * '****' ** 'flat' ****** ****** ****** that ***** ***** ********** into *** **** ** they ******, *** ******** of ******* *** *** possible ** *** ******* reduced.

** ***** *** ***** 'flat' **************, ****** ** becomes *** ***** **** an ********** *** ***** to ****, **** ********** the ******* ****** ******.

*******-**, *******-***: ** ***-***** ** not******** ****** ******* *******, *** ********** ****** is ********* **** *** or ******** ***********. *** system ******* ************* **** valuable *** ******* **** worthless.

********** ****:******* ***** ** ******** log ******** ** *** possibility ** * ****** user ******* * **** open *** ******** ****** entering ** ******* ** area. **** ******** ** access ****** **** '***********' access ** ***. ** note *** **** ***** of *** ***** ************: ****** ******* *********** ******* *** ********* polite ******** *** ******** be * ******* ******** threat.

************ *****: *********, *** ***** door ** ******** ** an ****** ******* ******, and *** ** ************ or ********* ** ***** uncontrolled ********. *** **** of ***** ***** ***** means *** ****** ****** could ** ******* ********* but *** ********** *** intended **** ** ******* a ******** ****** *** potentially ******* ** ******** people *** ***** ** area ******* ********** ** the ******.

**, ****** *** ******, it ******* ***** **** an ************ **** ** putting ** ****** ******** at ****, ****** ********* work ******* ** ******* and **** ******.

Genetec ******** '********* ******' **** *****

**** ****** ********* **** Genetec **** ***** ******** customized ****** ***** ** automate ********* *********. *** example, **** *** '******** *********/********* ******', ***** ***:

******** * ******** ********* report ** *********** *** might **** **** ** contact ** ** ***** proximity **** * ******** individual ****** * ******* time *****.

******* ***** ****** **** report ** ******** *** configuring * **** ***** in ******** ******.

******* ********* ** ** that *** ****** *** not ******** *** ********* Coronavirus ************ ******* ** monitors **** *** ******** of * ******** **** are ******-**********:

*** ****** ** ***** for ********, ********* *****, elevators, **********, ***.

*******, ******* ********** *** operational ***** ** **** that ****:

**** ****** *** ****** does *** ****** ***** spaces, *** **** **** we *** ******** *********** entering ***** ***** ****** through ******* ******** **** permit ** ** ****** down *** ********* ****** who *** **** *** contact **** ******* **** was ************, *** ****** them ** ******.

**** ******** ****** *** known ** **** ****** positive, * ****** ** names ** ***** *********** with *** **** ********/*******/********* within * ******* **** period ** *********:

IPVM Image

Detrios *****-** ******** ****** ****

******* ******* ***************** * ******* **** of ******** ****** *** no **** *********** ********** to * ****** ** access ******* ********* ****, Avigilon ***, ********* ********, LenelS2, ***, *** ******** House.

*** **** ********* ** activity ****** ***** *** same **** ** ********* potential ********* ***** ** others ** * ********:

**** ****** *** ** specified ****** *** ***** a *****-** ******** ********** entered ** ****. ************** can **** ******* * CSV ****** ** ***** potentially ******* ** *****-**, with *** ******* ** obfuscate *****-** ******** ** exposed ***********’ *****, ** protect ******’* ********** *** calculate *** ********* ** exposure.

*** **** **** **** **** ***** Convergint's************ ******** *****.

*******

** *** *** ** integrator ******* *** ********, contact ***-***** *** ***** them ** ******** *** to *** ****, ********** up ****** ******, *** setting ** ******* ********** to **** ********* ********* risks.

* ****** ** ****'* systems *** ****** **** will ****** ******* *** opportunities ** ******* **** for ***** *** ******.

******* ***** ****** ** keeping '*********' ***** ****, it *** **** ****** the **** ** *********** exposure ***** *******. ** also * ***** ****** to ******* ***-***** *** can ******** ******** ** a *********** ****.

Comments (0)

Read this IPVM report for free.

This article is part of IPVM's 6,541 reports, 882 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
HID Presents Mercury Security & Aero Access Controllers on Aug 25, 2020
HID presented Mercury Security & Aero Access Controllers at the 2020 IPVM...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Avigilon Face Mask Detection Tested on Jun 24, 2020
Face mask detection or, more specifically not wearing a face mask, is an...
Directory of 207 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
Avigilon Social Distancing Analytics Tested on Aug 26, 2020
Avigilon released its social distancing analytics in response to the...
Density Presents Occupancy Monitoring For Coronavirus Protection on May 22, 2020
Density presented its cloud-based occupancy sensor to deal with Coronavirus...
Omnisense "Mass Fever Screening and Pandemic Control System" Examined on Jun 11, 2020
Omnisense Systems is marketing a "Mass Fever Screening and Pandemic Control"...
Actual Coronavirus Testing Options Examined on Aug 13, 2020
Fever cameras have emerged as an indirect and flawed way to test for...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...

Recent Reports

Temperature Tablet Shootout - Dahua, Hikvision, ZKTeco, TVT + 5 More on Sep 30, 2020
Temperature tablets, aka terminal or stations, have emerged as a 'low-cost...
New Products Show Fall 2020 Tomorrow Bosch, FLIR, Hanwha, Tyco, Avigilon More! on Sep 30, 2020
IPVM's sixth online show concludes tomorrow with our special temperature...
ButterflyMX Raises $35 Million on Sep 30, 2020
Startup ButterflyMX has raised $35 million for its smartphone based intercom...
Worst Access Control Manufacturers 2020 on Sep 30, 2020
200+ Integrators told IPVM "In the past year, what access control...
Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Avigilon / Motorola VS Virtual ISC West on Sep 29, 2020
ISC West has historically been so dominant that no player would think of...
Dartmouth College Deploys K3 Temperature Screening on Sep 29, 2020
While Dartmouth College has a $6+ billion endowment, the College has bought...
Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...