Digital Locks / eCylinder Tutorial

Author: Brian Rhodes, Published on Feb 07, 2012

In some applications ‘traditional’ panel/controller based Electronic Access Control are difficult to justify the total cost. After the costs of hardware, cabling, installation, and training are all tallied, it is not uncommon to spend upwards of $2500 USD per controlled opening (i.e. door, gate, entry, etc...). This can quite simply prove to be too expensive to consider, no matter the need.

In other applications, installation of the prevalent form factor Access Control equipment (Controller Panels, Power Supplies, Card Readers, etc) may be difficult or impossible. In still other cases (such as records storage cabinets or controlled substance carts), there might be a need to indeed ‘control access’ only to the same degree that keys and locks already provide, but provide additional features such as scheduling controls and audit trails against the opening.

** **** **** **** ** *** ******, *** ‘******* ****’ has ****** *********. ‘******* *****’ *** **** ******** ********** ** branding **** ** ‘**********’, ‘***-*-****’,‘*****’, ‘****’, ‘****** **’** ** **** ****** ************ **** ** ‘*******-********** *****’, ‘**** locks’, ‘***** *****’, ** ‘**** *****’ – ***** ** **** cases ***** ** * ********.

Manufacturer *********

** *** **** ******** ******, ***** *** ********** *** ************* that *** **** ******** ** *** ********; ************ **** ********* Rand, **** *****, *** ******* *** ***** **** *****. ‘******* Locks’, ** * ************ ******* ** *** ******, **** ** be ****** ** ******* **** ***** ********* (**** ** *** ‘high ********’ ***** ******) ** **** ***** ** ****. ** is ******* ******* ** *** *** ***** ‘*** *****’ ** this ****** **** ****** ** ****** ******* ******** ** *** same **** ******.

***** ***** ******* **** *** ****, ** ******* *** ‘******* lock’ ** ********* **** * *********** ************ ***. *** **** itself ******* *********, ** ** ******* ** *** ************ ** the *** **** *** ****** **** * ***** ****** ***** into *** ***. **** *****, * **** ************** ** ******** to ******* *** **** – *****, ** ******* ********** *********** takes ***** ******* *** *** *** *** ****, *** ********, with * ***** **********, *** **** **** ****** ****** ** be ****** ** *** *********** ****** ** ******** ** *** key.

***** ******** ****** ************* ******* ** ********** *****, *** **** the ********** ***** ** ********* ** ******* ******** **** **** be ******** *****. *** *** **** ** ******** ********* ************, and **** *** ** ***** ** *** ******* ** *** lock, ** *** *** **** *** ******* *** ****.

*** ***** ***** ***** *** ***** '****' ** ***** *****:

Advantages ** * '******* ****' ******

*** **** *********** ********* ** **** ****** ** *********** ****** appears ** ** *** ****** *** **** ** ************ ******** openings (*.*. ****, ****, *****, ***...) **** **** *** ******* hardware **. *** ************** ** ****-***** ********** ****** ******* ********. The **** ******* ** ***** ‘******* *****’ ***** *** ******** already ******** – ******* *********, *** *******, *** *********, *****, cam *****, ******* *****, ******** *****, *** ******** *** **** ‘digital ****’ ******** ***** *********. **** ***** **** * ****** exchange ** ******** ** *** **** ** ******** ** **** the ******** *************. **** **** ** ******** ******** **** $** to $*** *** ********* ** *** *******/**** ******, *** **** not ******* *** ************ ** *** *******, ******** ********, ** utility ** *********.

* *** ** ******** ******* **** **** ***/** *** ** stored ** *********** ****** ******* **** *********. ********, ** ** 5000 ****** *** ** ****** *** ******** ** * ******* database **** *********** *******. **** ‘***** *****’ ******* *** **** records ********** ********, *** ************ ******** ** ****.

Disadvantages ** * '******* ****' ******

*** ******* ** **** * *** ***** **** ****** * certain ********, ** ** ********* **** * *** *******, ** a ******** ******** ** ***. **** ******* ** **** ******** with ‘******* ****’ *******. *******, * ****** ************ **. *********** EAC ** ****, ** ***** ** ********** ********** * ***, each ********** ********** **** **** ** ******* **** *** ******** via ******** *********** **** ***** *****. ***** **** *** *** prove ** ** * ********* *** **** ***********, ******* ** continuously ****** **** ********** (******** ******* *** ********* ** * ‘programming ***’) **** ***’* * ********* ********** *** **** ****** deployments **** **** ***** ** **** *****.

******* ****** ************ ** ‘******* ****’ ******* *** *** ************* high ***** ** *** *** **. *********** ‘**** *****’ *** systems. ********* ***** *** ***** ** ****** *** **** **** $5 ***, ***** * ‘******* ****’ *** *** **** $**+ USD, *** ***** **** ** ** ************ *** ** ***** for ***. ***** ***** ******** ***** *** ** ******** ********* in *** ******, *** ****** ** ********* **** ** ****** restricted *** ******* ** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Introduction To Burglar Alarm Systems on Jan 04, 2017
While alarm systems are popular, balancing between the right level of protection, the appropriate components and an acceptable price can be very...
2017 Access Control Book Released on Dec 15, 2016
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significanlty updated for...
5th Acquisition for ACRE, Adds ComNet on Dec 14, 2016
Mercury, Siemens Security, Vanderbilt, ACT and now ComNet. While other companies are trying to get out of security, emerging conglomerate ACRE...
Access Control Integration Statistics 2016 on Dec 13, 2016
When it comes to connecting access control with other security systems, integrator survey results clearly show it is not common for most.  However,...
Secured Combo Controller - Hartmann Access on Dec 12, 2016
Typically, combo controllers are risky, because they combine sensitive door controllers with readers on the exposed unsecured side of the...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Massively Strong Maglock (Securitron) on Nov 16, 2016
One of the market's strongest maglocks has a twist: the 4,000 pounds claimed bond power is not purely magnetic. Securitron's hybrid MM15 maglock...

Most Recent Industry Reports

Top ISC West 2017 Booth Trends on Jan 16, 2017
There are significant moves among many major manufacturers on the ISC West show floor, and very few prime spaces left unoccupied. In this report we...
Genetec Favorability Results on Jan 16, 2017
In the race to the bottom and flight to 'solutions', Genetec has taken a contrary path. The company remains independent, focusing up market,...
Free VMS Software Directory on Jan 13, 2017
Many Video Management Software (VMS) providers offer free versions, either open source, for a limited number of cameras or for a limited amount of...
Milestone Essential Subscription Removed on Jan 12, 2017
Subscriptions may be the future for Milestone and VMSes but not right now. Responding to negative feedback, Milestone has removed subscriptions...
Alarm Reporting Formats Overview on Jan 12, 2017
Alarm reporting formats are methods for communicating complicated information quickly, using plain old telephone service. It is still the main...
Amazon Sales of Hikvision China Cameras on Jan 12, 2017
Hikvision has become widely available in the US, including on popular retail outlets like Amazon, with over 2,600 results: 4MP Hikvision outdoor...
Last Day IP Networking Course January 2017 on Jan 12, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
ONVIF Favorability Results on Jan 11, 2017
ONVIF has been one of the most debated aspects of the video surveillance industry. On the one hand, its aim to increase interoperability has been...
Honeywell Ademco Vista Intrusion System Tested on Jan 11, 2017
One of the biggest brands in security holds one of the most common intrusion lines. We bought and tested a Honeywell Vista 15P intrusion...
ADI Battles Manufacturer Partners on Jan 11, 2017
ADI is battling their manufacturer partners, building up their own competitive house brand W-Box, while manufacturers still fund ADI's business...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact