Mustering Tutorial

By: Brian Rhodes, Published on Apr 01, 2013

Access control can be used for more than just securing buildings. Among these powerful 'other' functions is mustering, which immediately accounts who is where in a building. However, a system has to be designed properly and carefully to use this. In this note, we look at mustering, and what it takes to implement in a typical system.

Mustering's Two Approaches

First, one must select / differentiate between the two types of mustering, depending on how much adminstrative oversight is required:

  • Area tracking
  • Checking In

Area tracking: The concept of mustering uses access control to generate a roster of occupants in a certain area. Every time an occupant scans a card to enter and leave an area, the access system logs the time, date, and credential holder of the credential. This data can be used to determine who is in the area at any given time, including emergency situations.

Checking In: Alternatively, mustering can be implemented in some systems as a 'opt-in' control, where a credential reader located at an evacuation point is scanned as cardholders reach that location. Then that list of names can be compared against the assigned list of evacuees who should scan into that reader during emergency. The report screen below is an example output screen from a 'mustering reader':

In either use case, the goal of mustering is to account for specific individuals, so if they are not confirmed present within an area, then additional action can be taken to investigate where they are. In an emergency situation, the resources to search for the unaccounted are limited, and having an accurate list of who is present helps bring focus to those efforts.

Where Is Mustering Used?

Aside from 'Emergency Roll Calls', mustering functions can be applied in several ways. In industrial or mining facilities, mustering can be used for 'Lock Out/ Tag Out' situations, where machinery should not be restarted or an area reoccupied until all maintenance personnel are accounted for. If even one maintenance person has scanned in to an area, but not yet scanned out, all machines are de-energized until everyone can be accounted for.

Likewise, in facilities where frequent headcounts are important, like prisons, daycares, or passenger manifests, mustering can be configured to ensure that all members of a group are present in an electronically logged system. 

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Depending on how mustering is implemented, it can send notifications or print reports to predefined locations. Not only can 'absentee reports' be sent to nearby printers within an evacuation area, it can send emails or text messages to current occupants alerting them to emergencies (ie: severe storms, bomb threats, or other emergency circumstances).

Additional Design Required

Depending on how a system implements mustering, additional software configuration and hardware may be required. If 'mustering readers' are used, then configuring this function may be no more than selecting a few checkboxes. This configuration often requires cross referencing other readers in the system to confirm occupants are not elsewhere in the system, or may even cross-reference shift or vacation schedules to confirm occupants are gone.

However, other forms of mustering may require additional readers. In order to take an accurate inventory of who is present in an area, occupants must 'scan out' when they leave. Most access controlled openings simply require 'scanning in' for access, so the addition of an out reader, even when hardware is not linked to it, adds cost and complexity to a system.

System Examples

Implementation of the feature varies by access control software, but is typically supported by enterprise level offerings. For example:

  • CCURE: Older versions of CCURE support mustering by way of designating specific readers as "Evacuation Points", however current versions include exception reporting that generate a list of names in an area on demand. 
  • DSX: This system supports mustering readers, as well as input/output linking that can be used to create 'mustering reports'. When 'Time & Attendance' readers are used, mustering reports can be filtered by who is currently present in a facility.
  • LENEL: OnGuard supports both reference readers and exception reports method in all versions, and can be integrated with other systems.

If mustering is important to you, make sure to check carefully check how it is implemented in your access control software as approaches and availability vary greatly.

3 reports cite this report:

Paxton Access Control Company Profile on Dec 07, 2015
This note profiles access company Paxton, our 3rd installment in an ongoing series, following our profiles of Tyco Kantech and DSX. Inside we...
Avigilon Access Control Tested on Jun 22, 2015
Avigilon aims to deliver an end-to-end solution of video surveillance and access control. But how good is their access control? In 2013, Avigilon...
The Coolest New Access Control Product In Years is from Tyco on Oct 22, 2014
Cool. Access control. Tyco. 3 things that you or I may have never contemplated together. In this note, we examine Tyco's new access control...
Comments (10) : PRO Members only. Login. or Join.

Related Reports

Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Assa Acquires LifeSafety Power on Sep 04, 2019
Assa Abloy is acquiring LifeSafety Power, adding to their growing collection of access control brands like Mercury, August, Pioneer Doors, and...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
ProdataKey (PDK) Access Company Profile on Aug 09, 2019
Utah based ProdataKey touts low cost cloud access, wireless controllers, and no dealer required national distribution availability. But how does...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...

Most Recent Industry Reports

ONVIF Suspends Huawei on Sep 20, 2019
Huawei has been 'suspended', and effectively expelled, from ONVIF so long as US sanctions remain on the mega Chinese manufacturer. Inside this...
Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Axis Perimeter Defender Improves, Yet Worse Than Dahua and Wyze on Sep 19, 2019
While Axis Perimeter Defender analytics improved from our 2018 testing, the market has improved much faster, with much less expensive offerings...
Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Uniview Prime Series 4K Camera Tested on Sep 18, 2019
Is the new Uniview 'Prime' better than the more expensive existing Uniview 'Pro'? In August, IPVM tested Uniview 4K 'Pro' but members advocated...
US Army Base To Buy Banned Honeywell Surveillance on Sep 17, 2019
The U.S. Army's Fort Gordon, home to their Cyber Center of Excellence, has issued a solicitation to purchase Honeywell products that are US...
Vivotek "Neural Network-Powered Detection Engine" Analytics Tested on Sep 17, 2019
Vivotek has released "a neural network-powered detection engine", named Smart Motion Detection, claiming that "swaying vegetation, vehicles passing...
Schmode is Back, Aims To Turn Boulder AI Into Giant on Sep 16, 2019
One of the most influential and controversial executives in the past decade is back. Bryan Schmode ascended and drove the hypergrowth of Avigilon...
Manufacturers Unhappy With Weak ASIS GSX 2019 And 2020 Shift on Sep 16, 2019
Manufacturers were generally unhappy with ASIS GSX, both for weak 2019 booth traffic and a scheduling shift for the 2020 show, according to a new...