Solutions to 5 Common Access Control Problems

Author: Brian Rhodes, Published on Nov 21, 2016

Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used properly. In many cases, proper operational controls fail to be implemented and enforced.

In IPVM's Access Control courses, students share real world situations where access control does not work. Over the span of multiple courses, key trends emerged.

5 common problems include:

  • Using Only One Credential or One Access Schedule
  • Door Props Are Rampant
  • Tailgating Is Not Addressed
  • Uncontrolled Doors Are Used
  • Lousy Visitor Management

Inside, we examine each one and explain how to solve them.

********* ******** ** **** **** **** **** *********. ** ****, thousands ** ******* ** ********** ****** ******* *** ** ****** if **** *** *** **** ********. ** **** *****, ****** operational ******** **** ** ** *********** *** ********.

** ****'******* **************, ******** ***** **** ***** ********** ***** ****** ******* **** not ****. **** *** **** ** ******** *******, *** ****** emerged.

* ****** ******** *******:

  • ***** **** *** ********** ** *** ****** ********
  • **** ***** *** *******
  • ********** ** *** *********
  • ************ ***** *** ****
  • ***** ******* **********

******, ** ******* **** *** *** ******* *** ** ***** them.

[***************]

IPVM ****** ********

** *** ***-********** ******** *****************, ** *** *** ********* ******** ********** ******** ** **** three:

"**** ******** ** ****** ********** ********** ****** *****. ** *** know *** **********/***** **** ****? **** ** *** ***** **** are ***** *****/ *** ****** ** ** *****?"

**** ***** ******** *** ***** *** ********** ** ******** **** access *** ******.****** ****** ******** ** ****** **** ****** *** **** *********** and ***** *******. **** *** ******** ******** ** ********* ****** classes.

Only *** ********** ** *** ****** ********

*** **** ****** ******* *** *** ***** ****** *** ******* access ***** *** ******** *** *** *****, ** **** *****: sharing *** ******* ********** ***** ******** *****. **** ***** ****** with *** ********** *** *** ******* ********** ***** ** ***** times, **** **** '********** *****' ***** ******** ** *********. ******** comments ********:

  • "*************, *** ** *** ****** ******** *** **** ***** **** mechanical **** *** ****** **** ** ******** ********* ******* ******* it, **** ****'* ****** **** ** ********* **** * **** later (******* ****** *** ****** ******** *** *****)."
  • "* **** ** *** ******** **** **** ****** ***** ****** to **** ****, *** **** *** ***** ****** (** ********, technicians, ******, ***.) ** ****** ****** ********* ** ******* ***** areas **** *** ******. ********* **** **** **** *** ** the ********* *** ******** ***** ** *** **** *** ***** use ** *** ********* ** *** *****."
  • "*** **** ******* * **** ** ***** **** ****** ****** all *** ***** ** *** ******* *** **** **** *** last ****** ******, **** * ****** *** **** *** ********. This ** * ******** ****** ** **** *** ****** *** designed ***."
  • "** * ****** ** ****, * ****** ****** *** ********** manager *** ******** ******* ** **** ** ****** ** ***** his ****** *********** ******* ******* **** ********* *** ******** ****** the ****** ****** *** ************ **** ***********/********* *****, ***... *** really ********, **** ********, *** ***** ** *** ****** ***** during ***** ** ****'* **** **** *****."
  • "*'** **** ***** ***** **** ***** ****** **** ********* *** main ***** ** * ****** ******* ****** ** ********* * holiday ******** ***** ******* ***** **** **** *** ****** ******** so **** *** ******* ***** ****** *** ***** *** ******** but ** *** ** ***** ******** ******** ****** ** *** interior ** *** ******** *** *** ***** ******* **** *** unlocked ** ****."
  • "* **** * ******** **** * ******* **** ******* **** employs ****** ** "*** ****" ********* **** **** ******* * high ******** ****. ***** **** ** ******* * ****** ***** and ** ***** ******* *** ******** ** ***** *********! ** spend ** **** ******** ***** *** ***** *********** **** *** database. ** ***** ** ** **** ****** ** **** *** the ***** ***** **** *** ***** **** *** ** *** next *** *****."
  • "* *** ******* ** **** * **** **** **** ** users **** *** ******** *** **** **** ******. ** *** system, *** ****** **** ****** **** *** ********!"

*** ********: ******* ** ******** ********* *** ************ ******* ****** *** *********** ************* ******* *** ******* ********* ** ********** ****** **** simple ********** ***** *** ****. ***** ****** ** ************ ******* to ****** *** ******* *********** *** ***** ****** ****** *** discrete ****** ****** ***** ** *** ***** ******** ****. *********** or ******* ****** **** *** ********** ** ***** ***** ******** and ****** *** **********.

** *****, ***** ********* ** ****** ** ****** **** ****** of *** ****** *** ****** *** ****** ***** *** ********** electronic ******.

Door ***** *** *******

******* ****** ******* *** *** *** ** **** *****- ********* finished **** ******** ****-*****, ********* **** ****** ** **** ** trash - **** **** *** ****** ** ******* ***** **** and ********, ******* ********** **** **** *********** ** ********** ****** at ***:

  • "*** ** *** ******* -- * ****** **** * ********* on ** ***** -- *** ****** ******* ** *** ***** doors, *** **** ********* ****-**** **** ***** ** *** ** the ********* ***** ** **** ********* ***** ******* ** ***** can *** **** **. *** **** ***** *** ***** **** after ********* ** ****. * ******** **** ** ****** *** door *****."
  • "*** ******** ****** **** ** ***** ******* **** **** *** only ******** ** *** ***** **** ********. *** *** * reader ** *** **** ** ******** ** **** ***** ** prop *** ****? * *** *** *** *** ****** ***** on * ******* *** *** **** ** *** **** ** people **** *** *** ** ***** *** *** *** **** the ******. *** **** ****** ****** ** ******."
  • "**** ****** ***** * **** *** **** **** *** ***** is *** ***** ** ******** ***** - ********* ******* ********* need ** ** *** *** * *****, *** ***'* ** bothered ***** ***** ***********."
  • "***** *** ****** ******* ** ***** ***** ****** *** ******** guys **** ** *** **** ***."
  • "* ******** ******* * ********** ** ** *** ** ** audio ****** *** *** *** *** *** **** ***** **** propped **** **** ********. **** * **** * ******* ** the ******** ********, ** ****** **** ** *** ***** **** left ****/******, **** *** **** ***** ** ************. **** ****** to **** * ******** **** **** ****** ** ***** '***** sweat *****'."

*** ********: ** ** ****** ** ************ *** **** **** ***********, *** ****** ******** ** ** ******* ** *** **** prop ****** ** ******** ****. ** **** *****, **** *** require ******** ******** ***** **** * *********** *** ************ ****-*****, but ***** ** ***** ********* ******* ** *****, ***** ****, rocks, *** ****** **** **** ****** *** ********** ** ***** under * ****.

****** **** **** ** *********** * ******* ********** *** **** mitigate * ********* ******** **** *********** *** ****** ******.

Tailgating ** *** *********

*** ******* *** ** **** ** *** ** *** *********** a ****** **** **** * **** **** *** ******** ****** entering ** ******* ** ****, ******* ********** *** ****** ****** from '***********' ****** ** ***. ** **** *** **** ***** of *** ***** ** ************* - ****** ******* ************ *** ******* *** ********* ****** ******** *** ******** ** a ******* ******** ******:

  • "** *** * ******* **** ****** **** ******* ** * highly ****** ******* ******** ****** *** *** ********* **** ******** to *** *** ********** ** **** ** ************. *******, **** would *** **** *** ******** ** *** ********* **** ** tailgating ** ******* *** **** ****."
  • "********** **** ******* *** **** **** ****; ****** **** **** lunch, ********* ** ****** ***** ***** *** ******** **** * reads, **** ** *** **** '************' ****..."
  • "***** *** ** **** ********** ***** *** **** ***** *** door **** *** *** ** ****** ****** ** * *** that ***'* **** **** **** *****. *****."
  • "* ****** ** * ** *** ***** **** **** *** patrolled ** ***** *** **** *******-**** ** *** *******, *** it *** **** ****** *** ******* ** **** *** **** and ***** ********** ** ******** *********** **** **** ******** ***** inside **** ** ************* ** *** *****."
  • "*** ********* ******* *** ********* ******* *** *** **** ********, and *** ********** ***** ******* ** *** ********* ******* ****** for *** ********* ******* ** **** **** *** ******** *** tailgate, *** ***** *** *** ********."

*** ********: ******** *********** ******** *** ********* ** ********** ** ******* tailgating, **************** **** ******* ** ****** ********* **** ***** *********. *******, ** **** ******** *** **** effective ****** ******* ******** *********, **** ********, *** **** ******* notifying *** ******* *** ***** ** *** *****.

Uncontrolled ***** *** ****

*********, *** ***** **** ** ******** ** ** ****** ******* system, *** *** ** ************ ** ********* ***** ************ ******** in * ******** ******* *******. *** **** ** ***** ***** doors ***** *** ****** ****** ***** ** ******* ********* *** not ********** *** ******** **** ** ******* * ******** ******:

  • "* **** **** ** **** ******/ ********* ********* ***** *** front ****** ** ******* *******. *******, *** ***** **** **** around *** **** *** *** **** ** ***** **** **** and ** *** *** ****** ** **** *** **** **** walking ** ** *** ***** ******."
  • "*** ***** * **** ** ****, *** ******* **** ****** doors ****** *** ******** *** **** ** *** ***** ****'* have * ****** ** *** **** **** *** ******. *** of ***** ***** *** ***** **** ** ** *** **********. It ****'* **** * **** ****** ****** ** **, *** it *** ** ***** ** *** ***** ***** **** ** tempting ** *** ** ** **** ******* ****. * *** of ** ***** **** ***** ** *** **** ** *** access. ****** ** *** ********** ***** **** *** **** *** the **** *** *** *******, ******** ****** **** *** ******** without ****** ** **** *** ***********."
  • "******* ********** **** * **** ******** **** ******* *** ********, but *****'* ******** **** ***** **** ******* *** ****** ***** doors **** ****** *** ***** ** ***** ****. ***** **** stolen *** *** ****."
  • "* ****** * ****** ** *** ********** ****** **** *** intent ** ****** ******* ******* *** ****** ** ***** ** verify *** ******* ******** *** ******. **** ***** **** ****** had ** *** **** *** **** ******** ***** ******* *** hardware ** ***** *** **** ****. **** ****** *** ********** entrance ***** ** *** ********."
  • "*** **** ********** ***** ** *** ***** ******** *** *********** medical ***** ******* **** *** **** ****** * **** **** that *** ***** ****** *** *** ** *** ******** *** workers."

*** ********: **** *********** *** ******** ****** **** ** ********* ***** perimeter ******** *** ********** *** ***, *** **** **** ****** to ****** ******, ****, ** *** ************ ******** **** *** access ******. ***** ******** ** **** ********** *** ************** ***************** ******* **** ****** ** **** *** ********* ****** *****, they *** *** ****** ** ****** ******* ************ *****.

Lousy ******* **********

*******, ******** ** *** ************ ************** ********* ** ********* ******** into **** ****** ******* ********** *** ** *** ******* ***** of *** ******. ***** **** ******** *** *** *****, * small ********** ***** ** **** *******, *** ******* ******* ********** in ***** **** *** ******* ** *** ****** **********:

  • "*** ** ** ******'* **** ***** ** ******* *** ******* badges *** ******* *** ***********. **** ***'* **** ***** ** who *** ***** ***** ****** **."
  • "*'** **** **** ********* **** ************ *******. *******, **** *** EAC *** ** ******** ** *** ******* ** *** ********, but ***'* ******* **** *** ***** **** *** ****** ********. That ***** **** *** ********* ****** ****** ******* **, **** have ****** ** *** **** ** *** ****."
  • "*********** ***** ****** ** ***** **** ** *** *** ******** who *** *** ******* ** *** ** **** ****** ** isn't * **** ******** ****."
  • "*** ** *** ******* ******** ** ********* ** ******** ** visitor **********. ***** ** ****** ******* **** ******** ****** **** visit ***** **** ****, ** ****** ****** ** *** ******** areas."
  • "* ****** ** * ***** ************ ***** ******** **** ******** to ****-** *** **** ******** ***** ******. ***** *** ****** control ** *****, ******* ** *** ***** **** ********* **** open ***** ***. **** *** ******** *** ****** ********, **** had * **** **** **** **** ** **** **** **** probably ****** ****."

*** ********: ** ** ****** ** ********** ********** ******* ************, **** ****** ********* **** ** ***-** ****** ** ************ visitor ****** ******** **** *** ******, *********** *** **** ** a ****** ********** ******* '***** **' ******. ***** ******* ** not ********* ****** *** ******* ************** ********, *** **** ** unaccounted ******** ******* ******** ** ******* **** *** ** ************* mitigated ******* ********** ******* ********** ********.

Comments (1)

*** **** ********** ***** ** *** ***** ******** *** *********** medical ***** ******* **** *** **** ****** * **** **** that *** ***** ****** *** *** ** *** ******** *** workers.

*** ******* *** *** ******** *** **** ****** ***** **** 'hot' ********* **** *********** ***** *******?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Multipoint Lock Access Control Tutorial on Oct 17, 2017
Doors are notoriously weak at stopping entry, and money can be misspent on wrong locks that leave doors quite vulnerable. While closed and locked...
PoE Powered Access Control Tutorial on Oct 12, 2017
Powering access control with Power over Ethernet, like for IP cameras, has become increasingly common.  However, the demands for access power are...
Dahua Access Control Tested on Oct 10, 2017
Can Dahua become a major force in access control? We bought Dahua's ASC1202B to find out. We tested Dahua access and its management application...
Exporting Video Surveillance Tutorial on Oct 05, 2017
Exporting video surveillance is important when incidents or crimes occur. However, there are multiple ways to export video which have their pros...
Delayed Egress Access Control Tutorial on Oct 04, 2017
Is it ever legal to lock people into a building? The answer is: Yes... under specific situations. With so much of access control driven by life...
Propped Doors Access Control Tutorial on Sep 28, 2017
Doors should keep 'bad guys' out. One of the most basic problems with doors is people propping them open: Even worse, door propping...
Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...

Most Recent Industry Reports

Dahua Removes Auto Rebooting on Oct 17, 2017
For years, Dahua has automatically programmed its IP cameras to reboot weekly, a highly atypical and questionable practice. Following IPVM...
Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Multipoint Lock Access Control Tutorial on Oct 17, 2017
Doors are notoriously weak at stopping entry, and money can be misspent on wrong locks that leave doors quite vulnerable. While closed and locked...
Buy From B&H, Ship Direct From ADI on Oct 16, 2017
B&H, one of the largest online sellers of video surveillance equipment to end users, regularly purchases their video surveillance equipment...
Competing Against Siemens on Oct 16, 2017
Siemens entered the integration business with 15,000+ customers, through their acquisition of Security Technologies Group in 2001. Since that time,...
Geovision GV-EDR2100 Tested Vs Hikvision on Oct 16, 2017
A number of ADI's top selling IP cameras are, at least surprisingly to us, from Geovision. We recently bought and tested the Geovision EDR2100...
Top Problems Searching Surveillance Video (Statistics) on Oct 13, 2017
When crimes, accidents or incidents happen, the video surveillance system is a key component in finding out and proving what actually...
Exacq M Series Low Cost NVR Tested on Oct 12, 2017
With recent cyber security issues hitting NVRs and cameras from low cost leaders Dahua and Hikvision, users are increasingly seeking alternatives...
Long Time Industry Exec Leads New Security Franchise Offering on Oct 12, 2017
John Nemerofsky previously built and sold a $150 million dollar integration business, and then was VP of Niscayah from its spinout of Securitas,...
PoE Powered Access Control Tutorial on Oct 12, 2017
Powering access control with Power over Ethernet, like for IP cameras, has become increasingly common.  However, the demands for access power are...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact