Access Control: Combo Reader / Controllers Tutorial

Author: Brian Rhodes, Published on Jul 22, 2013

Economical or foolhardy? Industry professionals are torn on combination door readers. These units typically integrate credential readers and door controllers into a single unit hung outside the door. Does the tampering risk also mean they are a security risk? We look at the units in this note, weigh the pros and cons, and address whether and where the risk is worth the benefit.

The Risk

********** *** ********** ** *** ******* ** *** ****** **** means ** *** ** ******** ****, **********, ** ******** *******. When *** ****** *** ********** *** ******** *******, **** **** is *********. *** ********* **** ** ******** ** *** ****** or ****** ****, *** ** *** ********** ********* ** ********* ****** such ******, ** ****** ******* ********** ** ***** *** ****.

*******, **** *** ****** *** *** ********** *** *** **** device, ** ****** ********** *** *************. ** ******* **** * combo **** *** *** ****, **** *** ******** ****** ******, or **** ** ****** *** *** ******** ******* **** * wide **** ****? ***** **** ********* ******* *** ********* **** as *** ***** ** *** ***** *****, * ****** **** ******* the **** ** *** *** **** *** *** ***** *** without **********.

****** ****

**** ****** ********** ***** ******* * '**********', ***** *********** **** ********, *** * '******', ***** ** *** ******* ********** *********. *************, ***** ********** have **** ********, ******** ***** **** **** **** ** ** ********* and *********.

*******, ******* ****** ************* ***** '***********' ***** **** ***** *********** and ******* **** * ****** ****. ***** ******** ***** '*************' compatible ******** ******* *** *** **********, *** *** * ****** box ** ******* **** ** ********** ****** ** ***.

*** ** *** ****** ***** ******** ** * ***** **** is ****** **** *** ***********, ******** *** **** ******** ** ***** ** **** '********* readers' **** ******* '***** *****' *********. ******, *** ****** **** includes * ****** ** ****** ******** *** *********** **** ******** is ********** ** *** **** ****: **** ********** *********.

 

Hardware *******

*** **** ** ******* ******** **** ********** *** **** ** risk ********* ********. *** ***** **** ******* ********* *****, **** maglocks, ******** *** ********** *** ********* ***** ** *** ***** and ***** **** ** ** *********. *******, ******** ******* *** generally *** ********** ** ********** *******, *** ******* ***** *********.

********:**** **** ******** *** ************* ******* *** *** '******** *******' from *** **********, *** ********** **** ** * ***** ** the ***** *******, *** ******** *** ********** ****** *** *******. The ***** ***** ************* ******* **** ********:

******** *******:******* ** *** **** ** ****** *** **** *****, **** simply ***** **** ******** ** ****** ****** ***** ********** *** door ** ****. ** **** *****, *** ****** ** ********* until *** ****** ****** ******* * **** ** ****. ****, the ********** ****** ***** ** *** ******, ******** *** **** lock ** ***** ****** ******* *** ******.

***** ******, **** ******* *** **** ** ******** *** ********** free *************; ** *** ********** ** ****, *** ****** ******* unpowered *** *** **** ***** *****. ** ****, ** ***** require ** ********** ** ***** ****** *** ********* ** ***** wires ***** *** ****** ** ***** ** '******' *** ****. While ***** * *************, **** ***** ** ********* ******** **** familiarity **** **** ** *** *******.

Tamper *************

********* ** ***** *********** ********* ******* * '****** ******' **** detects ******* ******* ** *** ********** **** *** ****, *** locks *** *** **** **** ******* ********** ***** ** *******. This ****** ****** *** **** ******* ***** ******** **** ***** authorities/operators **** *** ********** ** ***** ********:

***** *** ********* ***** ** ****** ******, **** *** *** mechanical **** ***** *****, ****** *** ** '******* ******' **** uses ** ** ******* ** ****** ********. ** *** ****, using **** ***** ****** * ******** **** ** ********** *** ********** and ****, **** ****.

****

*** ******* ************* ** ***** ***** ***** ***** **** ****** cost **** *********** *******. *** *******:

********: ** *** **** ***** ~$***, *** ****** * *** ****** at ~$** ***** ****** $***.  *******, ****** *** ******** ***** cost ** ******* *** ****** *** *** ~$** - ~$*** to *** ****, *** * ***** ******* ** *** $****.

*****: * ****** **** *** ***** ***** ~$***. *********** *** installation **** ** ******* ********* ******* ** $** - $*** savings *** ****.

External **********

** ******** ***** *** *************** ** * ***** **** *** high, ********** *** **** ****** ************ ******* ***************** ******* *** ****. ************* ************* ******** **** **** ********* ******* *** **** ***** ** environmental ********** ******* ******** *** **** - ****** ******* ** optical *******.

***** ********** *** ** ***** ** *******, *** * ********* designed **** ********* ****** ***** ** ****** *******, *** ********* mount **** * ****** ******* **** **** ********** **** ***** fasteners.

*******, ****** ********** *** *********, ********** **** ***** *** ***** cost ** ****** ***. ********** **** ******* ~$** - $*** each, ********* ********** *** ******* ** ***** * '*****' **** to ***** ****. 

***************

*********** ***** *****, ***** ***** ****** **** ** **** ** *** to ****** ******** ******** ***** **** ** *** *** ********:

  • ******** *****:******* ***** ****** * ******** *** ****** ******* ****** ** security *** *** ****** ***** ********* ** '*****' *********** **** video ************ *** ****** ***** *** *** ***** ** ****** attempts.
  • ***** **** ********: *** **** ** ****** ********* ******** ** *** ***** ** recommend ***** **** ** ******* ***** ******* ** **** *** security.
  • ** **** ********:******* ***** *** ******* ***** ***** **** ***** *******, **** should ** ******* ** '**** ********' ******* ****** ** ********** or ************* ****** *******. ***** *** **** ** *****, ***** it ******** ** *** **** ****** *** ***** **********.

Brute *****: *** **** ****

***** ***** ***** ***** ***** ************* **** *** **** **** standard ***********, *** ******* ****** ** ********** ***** ******* *************** brute ***** *******. ***** ***** **** *** ********** ** ******, most ******* **** *** **** *** **** *** **** *** knowledge ** ******* ****, ****** ******** ******* ** ****** *** opening ******. 

*** ********* ***** ***** ***** ***** ****** ** ****** ** part ** * ****** ****** ** ********** ******* '******** ********' of *** ****** *******. ** ** ******** ****** **** ***** through ******** * ********** *** *** ****, *** ********* *** use ***** ***** ** ***** **** *** ****, **** *** issue ** ********.

Comments (8)

*** ********* ********** ** ****** * ******, **********, *********** ** device ** *** **** *** ********. *** **** **** ***** adoption ** ****** **** ******* (***** ** *********** **** ********** than ******* ** **** **** **** *******). ******** ** * matter ** ******, *** ********. * ****** *** ********** ********** functionality *** ***** **** **** ******* **** ********* ******** *************** which *** ** *********** *********.

** ********* **** *** *****-**** **************** ** ***** ********* ** the **/** ***** ******* ***** *** ******* ** ***** ****** in *** *****'* **** ***** ** * **** *****. *** exterior ***** **** ****** ** ****** ************ **** ******. *** would **** **** **** *** *********** ** *** ****?

**

***** *** **** ** ** ****:

*** ******* *** ** ********** ** ** *********** ***** ******. The *****/**** ****** *** ******** **** ***** ** **** ** fire ** **** *** ****...

*** **** ***** *** ******* ****** *** ** ********** **** a ******* ****** ** *** ****** ********* ** ** **** the ****.. ** ***'* **** **** **** *** ** ** doable

** *** ****/********** ****** *** ******* ******* ***, **** **** the **** ***** ***** *** ***** ** *** *** ****** thereby ******** ***** **** *** **********, ***** *** *******...

** *** ********* **** *** ******/********** ** *********** ******* *******, we *** ****** *** **** **** ******* **** *********** ******* the ********* ****...

* *** ******* ** **** ***-**-*** ***** *** **** ***, from ******* *** *****. **** ********* **** **** ****:

* ******* ** ***** **** *** ******, ********** *** ****** are *** ** *** ****. ***** ******* *** *******, * am ******** **** ****** *** ****** ********** *** ******** ** a **** *****, ***** ** ***** ** ****** ** ****** the ***** ***** ******* *** ******.

** **** ***** ** *** ***** *** *************** **** *** introduced?

***** **** *** **** ***** ** *** *** ** ******** strike. *** **** ***** ** ********* ** *** ****** ******** the ***** **** *** ***** ****** ** ******.

***** ** * '***** *****' ****. **** ** *********** **** your ********** **** ******** ***.

**, *** ** **** *** *** ****, **** ***** ***** them? :)

** **** ** *****, ***** **** ********* *******:

***** ****** ******* *********

**** *******. ***** *** *** ********* *** **** ******.

* ***** *** ****'* ******* ** *** **** ***** *****'* now ** ******* *** ****. ** *** ***** ** *** powered ** *** * *** **********, *****'* *** ***** ***** that *** *** ***** ** *** ******. ***, ** ***** bring ***** ** *** *** ****** *** *** ***** **** even *** *** *** ******* **** * *** ** *** team **** * ******** ** *** * * ** **** battery ** ***** ********, ***** ** ** **** ****** **** the ******* ****. ***** *** ******* ** ****** ********* ******* outside *** ******** *** *** ******, * ***'* ***** ****'* too ***-*******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Course Winter 2018 on Jun 11, 2017
The Winter 2018 IPVM Access Control Course is now open; save $50 on early registration. IPVM offers the most comprehensive access control course...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
HID Edge EVO Tested on Jun 07, 2017
HID Edge controllers have been one of most common offerings in IP door controllers for years. The new generation is called Edge EVO. We tested...
Access Control AHJ Nightmares on Jun 01, 2017
For access control jobs, a single person can be the difference between finishing a job, costing thousands in extra dollars, and being profitable...
US States Security Licensing Guide on May 30, 2017
In the US, many states require integrators to be licensed to install burglar alarms, CCTV, electronic access control, or all three, and...
Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...

Most Recent Industry Reports

Importance of Sales To Integrators - Statistics on Jun 23, 2017
One of the top trends in the industry over the past few years has been the rise of across-the-board sales (e.g.: Hikvision Sales, Dahua Sale,...
Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...
Manufacturers Shipping Unlicensed H.265 Products on Jun 22, 2017
While H.265 support in video surveillance is growing, IPVM's research shows that most surveillance manufacturers are shipping H.265 products with...
Uniview Low-Cost Bullet PTZ Tested on Jun 21, 2017
Uniview is offering a HD zoom bullet camera, the IPC742SR9-PZ30-32G, with an integrated pan / tilt positioner, for the price of a low-cost...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
45 Drives 'Lowest Cost' Enterprise Storage Company Profile on Jun 21, 2017
45 Drives claims the "lowest cost per Hard Drive Slot in the industry." But who or what is '45 Drives'? What started as a product design to...
No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
Resolver / PPM 2000 Incident Management Platform Profile on Jun 20, 2017
You might have seen the company whose employees wear hockey jerseys at trade shows and wondered "what do they do?" PPM 2000 has been active in...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact