Mustering Tutorial

By: Brian Rhodes, Published on Apr 01, 2013

Access control can be used for more than just securing buildings. Among these powerful 'other' functions is mustering, which immediately accounts who is where in a building. However, a system has to be designed properly and carefully to use this. In this note, we look at mustering, and what it takes to implement in a typical system.

Mustering's Two Approaches

First, one must select / differentiate between the two types of mustering, depending on how much adminstrative oversight is required:

  • Area tracking
  • Checking In

Area tracking: The concept of mustering uses access control to generate a roster of occupants in a certain area. Every time an occupant scans a card to enter and leave an area, the access system logs the time, date, and credential holder of the credential. This data can be used to determine who is in the area at any given time, including emergency situations.

Checking In: Alternatively, mustering can be implemented in some systems as a 'opt-in' control, where a credential reader located at an evacuation point is scanned as cardholders reach that location. Then that list of names can be compared against the assigned list of evacuees who should scan into that reader during emergency. The report screen below is an example output screen from a 'mustering reader':

In either use case, the goal of mustering is to account for specific individuals, so if they are not confirmed present within an area, then additional action can be taken to investigate where they are. In an emergency situation, the resources to search for the unaccounted are limited, and having an accurate list of who is present helps bring focus to those efforts.

Where Is Mustering Used?

Aside from 'Emergency Roll Calls', mustering functions can be applied in several ways. In industrial or mining facilities, mustering can be used for 'Lock Out/ Tag Out' situations, where machinery should not be restarted or an area reoccupied until all maintenance personnel are accounted for. If even one maintenance person has scanned in to an area, but not yet scanned out, all machines are de-energized until everyone can be accounted for.

Likewise, in facilities where frequent headcounts are important, like prisons, daycares, or passenger manifests, mustering can be configured to ensure that all members of a group are present in an electronically logged system. 

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Depending on how mustering is implemented, it can send notifications or print reports to predefined locations. Not only can 'absentee reports' be sent to nearby printers within an evacuation area, it can send emails or text messages to current occupants alerting them to emergencies (ie: severe storms, bomb threats, or other emergency circumstances).

Additional Design Required

Depending on how a system implements mustering, additional software configuration and hardware may be required. If 'mustering readers' are used, then configuring this function may be no more than selecting a few checkboxes. This configuration often requires cross referencing other readers in the system to confirm occupants are not elsewhere in the system, or may even cross-reference shift or vacation schedules to confirm occupants are gone.

However, other forms of mustering may require additional readers. In order to take an accurate inventory of who is present in an area, occupants must 'scan out' when they leave. Most access controlled openings simply require 'scanning in' for access, so the addition of an out reader, even when hardware is not linked to it, adds cost and complexity to a system.

System Examples

Implementation of the feature varies by access control software, but is typically supported by enterprise level offerings. For example:

  • CCURE: Older versions of CCURE support mustering by way of designating specific readers as "Evacuation Points", however current versions include exception reporting that generate a list of names in an area on demand. 
  • DSX: This system supports mustering readers, as well as input/output linking that can be used to create 'mustering reports'. When 'Time & Attendance' readers are used, mustering reports can be filtered by who is currently present in a facility.
  • LENEL: OnGuard supports both reference readers and exception reports method in all versions, and can be integrated with other systems.

If mustering is important to you, make sure to check carefully check how it is implemented in your access control software as approaches and availability vary greatly.

3 reports cite this report:

Paxton Access Control Company Profile on Dec 07, 2015
This note profiles access company Paxton, our 3rd installment in an ongoing series, following our profiles of Tyco Kantech and DSX. Inside we...
Avigilon Access Control Tested on Jun 22, 2015
Avigilon aims to deliver an end-to-end solution of video surveillance and access control. But how good is their access control? In 2013, Avigilon...
The Coolest New Access Control Product In Years is from Tyco on Oct 22, 2014
Cool. Access control. Tyco. 3 things that you or I may have never contemplated together. In this note, we examine Tyco's new access control...
Comments (10) : PRO Members only. Login. or Join.

Related Reports

Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
Lens Focal Length Tutorial on Jul 10, 2019
3mm, 6mm, 2.8 - 9mm, 5 - 50mm, etc. Camera specifications often list lens lengths but what do they mean? These metrics are important in...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
Directory of 60 Video Surveillance Startups on Jun 25, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...

Most Recent Industry Reports

How To Quickly Assess An Unknown Company on Jul 23, 2019
There are hundreds of companies in the physical security markets, ranging from a flood of new startups to small companies that may or may not be...
Bosch Starlight 8000i Cameras Tested on Jul 23, 2019
Bosch has released their new Flexidome IP Starlight 8000i cameras, claiming "exceptional detail even in extreme low-light situations." To see...
Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
Vivotek Trend Micro Cyber Security Camera App Tested on Jul 22, 2019
Vivotek and Trend Micro are claiming five million blocked attacks on IP cameras, with their jointly developed app for Vivotek cameras. This new...
Avigilon ACC7 VMS Tested on Jul 22, 2019
Avigilon's Control Center 7 boldly claims it will "transform live video monitoring" with the new Focus of Attention "AI-enabled" interface. We...
History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to emerging into an AI cloud era.  The goal of this history...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...
Wyze AI Analytics Tested - Beats Axis and Hikvision on Jul 17, 2019
$20 camera disruptor Wyze has released free person detection deep learning analytics to all of their users, claiming users will "Only get notified...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact