• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

The Complete List of Access Control Options

Need to beef up the physical security of your facility? A wide variety of access control options are available to improve the safety and convenience of employees’ comings and goings, and offer better management and automation of the company.

April 10, 2019 Lisa Montgomery 1 Comment

An access control system provides a high level of security to an organization by actively controlling and monitoring who is permitted to enter the building, as well as adjunct areas like elevators, offices and other spaces. The concept is simple: employees with the appropriate credentials are able to freely enter; those without the appropriate credentials are unable to open the door. While the main purpose of an access control system is keeping the facility safe from unwanted visitors, it also affords employees with a more convenient mode of entering the facility than a traditional lock and key, and provides the business itself with useful data to better manage its operations.

So which type of access control system is best for your business? Here is a list of options, from the most basic to the most sophisticated, along with the advantages and disadvantages of each. Keep in mind, in many cases, a combination of systems often yields the best results. HID Global senior director, strategic partnerships Brandon Arcement notes it’s usually a blend of three different modes of authentication that works best: “Something you have (such as a badge, keyfob or credentials carried on a mobile phone), something you know (such as a code to punch into a reader), and something you are (biometric information provided by fingerprint, iris and facial recognition technologies).”

The Something You Are—Facial, Fingerprint and Iris Recognition

Unlike something an employee physically carries with them to enter a building which runs the risk of being stolen or copied, a biometric type of authentication model can’t be duped. For this reason, fingerprint, facial and iris recognition is considered to be the most secure type of access control.

It is also the quickest and most convenient for employees to use. Rather than pulling out a phone or fumbling with keys, a user simply looks at or places a finger on the biometric reader, the door unlocks if their identity is recognized and they move on. This “frictionless” form of access keeps traffic flowing; and gives employees a sense that they’re being well protected by what is deemed the most sophisticated of all access control options.

The downside is cost. Like any technology, the more sophisticated it is, generally, the more it costs to implement. Moreover, the enrollment process of each employee into a biometric-style system can be tedious and time consuming, adds John Nemerofsky, president, CGL Techonologies.

Something You Have: Credentials on a Smartphone, Card, Keyfob, or Wristband

Digital cards and keyfobs are easy to use and are a very secure and highly manageable form of access control– unless they are stolen, lost, hacked or cloned—the latter two issues becoming increasingly common. With the appropriate software, restrictions can be set; for example, allowing only certain people in through certain doors and certain times. Additionally, cards, keyfobs, and wristbands can be temporarily or permanently revoked, giving administrators a high degree of control over the management of the facility.

The biggest downside, of course, is the risk of these forms of identification falling into the wrong hands. They also pose a potential bottleneck in operational efficiency, which can manifest in increased costs. Cards, fobs, and wristbands must be ordered, shipped and dispensed to each employee. This takes time and effort and is an ongoing process; when new employees are hired new cards, fobs, or wristbands must be ordered, shipped, configured, and delivered.

For these reasons, many companies are transitioning to mobile credentials. The identification and authentication data resides on users’ mobile phones instead of a chip on a physical card. A phone is something most people carry with them as a matter of course, so there’s no need to spend money on special devices. The unique access codes given to each employee can be delivered remotely, which simplifies and reduces costs of operations.

Something You Know—Passwords to Entered into a Reader

Perhaps the most outdated of access control options, asking employees to punch in passwords is becoming “less and less common,” says Arcement. “We have so many passwords to remember; our brains are cluttered with them, so they are easily forgotten. Plus, passwords can be shared, so they are often considered security vulnerability.” The upside is that deploying this type of authentication process usually less expensive than other options and is one that most people are very familiar with using.

Trends in Access Control

The Cloud: When the time, date and location of employees who enter and leave a building or parts of a building can be logged and stored in a cloud-based server, your company saves money on equipment you might otherwise need to purchase and keep on premise. This makes cloud-based monitoring and management of access control systems a boon to small and mid-sized companies. “Instead of making a huge capital investment, they can pay a much smaller recurring monthly  fee for the cloud service,” says Drew Alexander, director of product management at  Stanley Security.

Automation: Increasingly, access control systems are being integrated with other technologies on-premise, such as surveillance cameras, lighting, security system, and more. Nemerofsky offers this example: “Let’s say an employee comes to work on a Saturday—after is card has been identified, he is the door to the parking garage opens, as he puts a card to a reader in the elevator, he is given access to log onto the company network, and the lights to his office turn on.”

Analysis: When the cloud and automation combine, administrators are able to glean a very clear picture of how and when certain areas of a facility are used. This can lead to significant cost reductions and better workflow management. Nemerofsky continues: “You can start to accumulate some very important data; for example, if you see that more people enter though a certain door than another, you can invest more of your security dollar where it matters most.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Access Control

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Comments

  1. Mindy Jollie says

    July 9, 2019 at 2:23 pm

    I like the point you made about storing coming and leaving details of employees on the cloud so that you can save space and money. It’s nice to know that there are so many options with new technology available, like cloud networks. If I had a business, I would make sure that we used some security measures like security cameras and access control.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.