Examining Next Level Security Systems' Access Control

Author: Ethan Ace, Published on Nov 10, 2011

Relative newcomer Next Level Security Systems has built their business model on claims of simple, integrated security appliances. The unification of access control and video surveillance has been the goal of many in the industry. Next Level's appliances are a step towards this goal, but are they a fit for everyone? In this update, we will take a look at their approach, capabilities, and applications it may best fit.

Product Overview

Next Level's offering is based on their NLSS Gateway, a small form factor appliance which manages all functions of the system, including surveillance and analytics, as well as access control. For more details on the gateway, users may refer to our overview of their product offering.

Access control is provided as a no-cost addition to the gateway. No up-front or recurring licensing is required, though the two models of Gateway (Micro and 3000) are capable of handling differing amounts of doors. The number of doors supported also differs based on what type of controller is being used. Higher door counts can be reached with Mercury devices, as opposed to HID or Assa Abloy. Exact quantities can be found on the Gateway spec sheet.

Capabilities

The monitoring and management interface of the NLSS gateway is 100% web-based, accessible from any browser. This interface provides standard functions, such as event monitoring, reporting, door control, and floor plans. Cameras may be associated with doors, and video linked with events, so it may be more easily found, as opposed to manually searching for event video. 

NLSS is currently integrated to controllers from three manufacturers:

  • Mercury: NLSS supports Mercury's EP1501 and EP1502 controllers, and the full range of MR series door interface and I/O boards. Users in need of a higher door density would likely go this route, as the EP1502 supports up to 64 readers per controller.
  • HID Edge: The HID Edge line is normally used when a few doors are needed and PoE switches are in place. It allows systems to be scalable to a single door, instead of requiring purchase of multi-door panels, and simplifies cabling by only requiring UTP to be run to the door, instead of a number of multipair cables.
  • Assa Abloy PoE and Wi-Fi locksets: Assa Abloy's locksets' main benefit lies in ntegrating all functions in the lockset, which reduces device installation time. The Wi-Fi versions especially have become increasingly popular since they require no cabling, and are thus less expensive to install. They're most commonly used in facilities with lighter requirements, looking for little more than a key replacement.

Users should see our previous reports on wireless access control and IP readers for further information on these approaches. Between these three manufacturers, NLSS supports a range of controllers that could be used for many different applications.

Applications

The most likely users of NLSS' access control are those seeking an all-in-one platform, but with low to mid-range door and camera counts. For a small office or multiple small sites, the NLSS Gateway Micro's $2,995 MSRP is reasonable, compared to purchasing a server to run a VMS, associated licensing, and then an access control system which may or may not integrate to it. Lower-cost access control platforms, usually in the $1,000 range, typically do not offer video integration functions, either.

This is not to say that larger entities could not use the NLSS Gateway, as it's capable of running up to 256 doors using Mercury hardware. The vast majority of access control systems are well below this door count. Users at these levels are often suspicious of new entrants, however. Since reliability is a critical concern in access, larger entities have traditionally stuck to the larger incumbent vendors. These companies, while not often innovative, are time-tested. Because of this, penetrating the higher end of the market may prove difficult for NLSS.

The economics of using the NLSS gateway for access control, without integrated video, vary depending on what number of doors users are seeking. The software for small systems is often run on workstation hardware, at the sub-$1,000 level. Adding $1,000 for access management software, users would be $1,000 below NLSS' starting MSRP ($2,995). However, for users choosing server hardware instead, the final costs are much closer to, or on par with NLSS, as a rack server typically runs between $1,000-1,500 or more. Given this pricing parity, and the breadth of hardware that NLSS supports (not typical for entry-level access platforms, which are normally proprietary), NLSS is a reasonable option.

1 report cite this report:

Video Surveillance / Access Control Integration Guide on Mar 12, 2012
One of the most desired high end security system features is integrating video surveillance and electronic access control systems. In this report,...
Comments : PRO Members only. Login. or Join.

Related Reports on Access Control

Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
JCI / Tyco VideoEdge NVR Profile on May 03, 2018
JCI (formerly Tyco) is one of the largest players in the global security industry, both as a manufacturer and an integrator. The company's most...
Access Control Levels and Schedules Tutorial on May 01, 2018
Configuring access levels and setting up schedules is central to maintaining facility security. Many people may need to enter areas but most do not...
Anixter Acquires 'PSIM Platform Inner Range - "Heart of Our Technology Differentiation" on Apr 30, 2018
Anixter Security has made a bold move, acquiring what it calls a PSIM platform as part of a $150 million deal, with Anixter's CEO Bob...
Favorite Access Control Manufacturers 2018 on Apr 26, 2018
150+ Integrators told IPVM "What is your favorite access control management software/system? Why? Unlike the 2016 access favorites where a group...

Most Recent Industry Reports

Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact