Skip to main content
A person badging against an ICT tSec Reader

The ICT Guide to Access Control

 Keeping your business safe is a top priority for any owner or manager. An effective access control system can help provide your staff and customers with a secure environment while minimizing inconvenience.

That’s why we wrote this brief guide. It outlines the basic knowledge you’ll need when thinking about how to secure your premises. It also arms you with tips and tricks from our staff and customers to make sure you can make an informed decision.

Many industry professionals have noted that this article is a helpful tool for giving their customers simple explanations on access control and for educating new staff.


In response to the high success of this article, we created a downloadable follow-up guide.


In this updated guide, we expand on the foundations talked about here and give you the latest information you need for your access control journey.

What is Access Control?

Access control is a type of security system that manages entry, ensuring only authorized individuals have access. This can be to a building or site, specific areas within the building or even a digital environment, and helps organizations minimize risks and maintain a safe, secure environment.

By restricting unauthorized entry, access control systems offer a seamless and unobtrusive experience for approved users. These systems can range from physical barriers, like keycard access to restricted areas, to advanced digital authentication protocols, depending on the level of security required.

Why use Access Control?

Your site may have areas where you need to restrict and monitor who can enter. You might also have health and safety requirements that mean you need to know where your team is at any given time. You could run a 24/7 facility that needs to save power during downtime while still offering user access. Or perhaps you have a gate that needs to open for the right people at the right time. You can meet all these needs, and much more, using an access control solution.

Your site may have areas where you need to restrict and monitor who can enter. You might also have health and safety requirements that mean you need to know where your team is at any given time. You could run a 24/7 facility that needs to save power during downtime while still offering user access. Or it could be that you have a gate that needs to open for the right people at the right time. You can meet all these needs, and much more, using an access control solution.

The Benefits of an Access Control System

Many businesses still use traditional locks and keys. Surprisingly, this technology has not progressed much since the 1860s when Linus Yale Jr. patented his cylinder pin-tumbler lock. And yes, it’s the same Yale you still see on padlocks today!


Technology has led to major changes in access control. RFID keycards and PIN access have been commonplace for many years now. This evolution has continued with the introduction of mobile phones, biometrics, and the Internet of Things (IoT).

There are many advantages to having a modern access control system. Benefits to your business could include:

  • Increase in safety and security brings peace of mind.
  • Enhance employee satisfaction due to ease of use.
  • Save on replacement costs as your new system may work with some of your current security infrastructure (like motion sensors or cabling).
  • Reduce false alarms that would be reported to monitoring services or authorities.
  • Incorporate added functionality into a single security system with third-party integrations (such as wireless locking, elevator controls, video surveillance).
  • Gain extra cost savings and efficiencies by integrating with a Building Management System to reduce energy consumption by controlling HVAC (heating, ventilation, and air conditioning), lighting, and more.
  • The ability to sync data with external sources like HR systems or student management software so there’s a single source of truth.
  • No more ongoing costs to rekey doors each time someone loses a key. Simply deactivate their card and issue a new one.
  • No after-hours trips when someone has left their key at home. Grant access or control the property remotely via web or phone.
  • Respond instantly to problems by setting up instant notifications to your mobile or monitoring service when an unusual event like a forced door or broken window is reported.
  • Future proof your business by choosing a modular system like ICT’s that can scale with your business growth.

The benefits of a modern access control system are numerous - the right one can not only protect your premises and people, but also streamline operations with functions like automatic holiday schedules or temporary access for after-hour cleaners. They also add ease of use for staff or tenants - no need to carry around a clunky bunch of keys when your access card is already on your phone.

The right system also ensures you're meeting your compliance requirements with ease, as most access control systems are designed to comply with industry standards and regulations.

Access Control System Basics

Parts of a Security and Access Control System

To most people, the only visible parts of a commercial access control system are the keycard that you swipe at the card reader to get in, or perhaps the keypad where you set the alarm. But there is a lot more that goes on behind the scenes to make a complete security system.


A building access control system is a critical component of overall security for commercial properties, ensuring that only authorized individuals can enter specific areas.


A credential is what you present to the reader for validation. It could be a keycard, fob key, PIN code, mobile phone, or even your finger or face. Not all credentials are created equal though, so be sure to check out our article about choosing the correct card technology.

What You Have

An access card or fob.

What You Know

This could be a PIN or password.

Who You Are

A biometric credential like a fingerprint or facial scan.

The card reader checks your credential and validates it with the system before granting or denying access.


But there is a lot more that goes on behind the scenes to make a complete security system. It all starts with a controller – the heart of your system. From here you can add different products depending on your business needs. A small business may just need one or two doors secured with a card reader for access and a keypad for an alarm. While a large organization may require many more features such as wireless locks, video surveillance, and elevator control.

Overview and control of the system comes from your interface – which can be web-based, a mobile app, or standalone security client. Your access control software will have a status page (like a dashboard) which shows events generated by the system, and allows you to manage any security issues in real-time.


Security systems allow integrations with third-party products for added functionality, and secure transfer of data from external databases to automate tasks. This could be onboarding new employees from a staff management system, or a visitor and contractor management solution.


Other security infrastructure you will see in access control systems are battery backups, wiring, electronic locks, and additions such as security cameras or passive infrared (PIR) motion detectors.


Put all these parts together and you can start to see how flexible (and potentially complex!) a modern access control system can be.

The 5-Step Method

The purpose of access control is to secure your premises so that unauthorized people cannot walk in off the street. There is a five-step method that acts as a pathway to ensure the correct process is being followed.

By following this path, you can be sure that you’ll have a robust system in place to protect your business.

Step 1 Authorize

Authorize

The process of changing a stranger to someone known to your organization. Once authorized, you will likely use RBAC (Role-Based Access Control) to assign their privileges.

Step 2 Authenticate

Authenticate

The user presents their credential to their reader for authentication. The system decides whether to grant access.

Step 3 Access

Access

If authenticated, access is granted, and your infrastructure unlocks the door so they can enter.

Step 4 Manage

Manage

Administrators can track activity, change area permissions, and manage changes including adding new staff. You can do this all remotely, which is helpful in the current COVID environment.

Step 5 Audit

Audit

Certain organizations have specific legal compliance requirements that auditing can meet. It is also good practice to ensure that your system is working and create a baseline to help track suspicious activity.

Types of Access Control Systems

Access control systems come in various forms, each designed to meet specific security needs. Understanding the different types can help you choose the right access control solution for your business. Here are some of the most common types:

  • Physical Access Control Systems: These systems manage access to physical locations like buildings, rooms, or specific areas within a facility. They use physical barriers such as doors, gates, and turnstiles to restrict entry, ensuring that only authorized individuals can gain access.
  • Logical Access Control Systems: These systems control access to digital resources, including computer networks, databases, and applications. They employ logical barriers like passwords, biometric authentication, and encryption to protect sensitive information and ensure that only authorized users can access digital assets.
  • Biometric Access Control Systems: Utilizing unique biological traits such as fingerprints, facial recognition, and iris scanning, these systems provide a high level of security. Biometric access control systems authenticate users based on their physical characteristics, making it difficult for unauthorized individuals to gain access.
  • Mobile Access Control Systems: Leveraging the ubiquity of smartphones and tablets, these systems use mobile devices as access credentials. Users can gain access to physical locations or digital resources by presenting their mobile device to an access control reader, offering convenience and flexibility.
  • Cloud-Based Access Control Systems: These systems store and manage access control data in the cloud, allowing for remote access and management. Cloud-based access control systems provide scalability and ease of use, making it simple to update and manage access permissions from anywhere.

Components of an Access Control System

An effective access control system is composed of several key components, each playing a crucial role in ensuring security. Here’s a breakdown of the essential parts:
Access Control Panel: Often referred to as the brain of the system, the access control panel processes access requests and controls access to various resources. It communicates with other components to grant or deny access based on predefined rules.

  • Access Control Readers: These devices read access credentials presented by users. Whether it’s a card, key fob, biometric data, or a mobile device, access control readers authenticate the credentials and send the information to the access control panel for validation.
  • Access Control Credentials: These are the tokens that users present to access control readers to gain access. They can be physical items like cards and key fobs, or digital tokens such as biometric data and mobile devices.
  • Security Systems: These include the physical or logical barriers that restrict access, such as doors, gates, and encryption methods. Security systems work in tandem with access control components to ensure that only authorized individuals can gain entry.
  • Video Surveillance: Integrating video surveillance with access control systems provides visual monitoring of access points and areas. This helps in detecting and preventing security breaches by offering real-time video feeds and recorded footage.
  • Visitor Management: This component manages visitor access, including registration, badging, and tracking. Visitor management systems ensure that guests are properly documented and monitored, enhancing overall security.

Access Control Credentials

Access control credentials are the keys to your access control system, allowing users to gain access to secured areas or resources. Here are some common types of access control credentials:

  • Cards: Physical cards, often embedded with magnetic stripes or RFID chips, are a popular choice for access control. Users simply swipe or tap their card on a reader to gain entry.
  • Key Fobs: Small and portable, key fobs contain access control data using RFID chips or Bluetooth technology. They offer a convenient alternative to cards, are extremely durable to withstand harsh environments, and can be easily attached to keychains.
  • Biometric Data: This includes unique biological traits such as fingerprints, facial recognition, and iris scanning. Biometric credentials provide a high level of security by ensuring that only the person with the matching biological trait can gain access.
  • Mobile Devices: Smartphones and tablets can be used as access credentials, leveraging technologies like NFC (Near Field Communication) or Bluetooth. Mobile access control offers flexibility and convenience, allowing users to gain access with a device they already carry.
  • Digital Certificates: These are digital tokens that contain access control data, such as encryption keys and digital signatures. Digital certificates are commonly used for securing access to digital resources and ensuring data integrity.


By understanding the different types of access control credentials, you can choose the best option for your security needs, ensuring that your access control system is both effective and user-friendly.

Choosing your Access Control System

As you can see there are many things to consider when thinking about an access control system.

“The fundamental thing to think about is what is the purpose of the security system? Ask yourself what security perception are you trying to portray? A highly secure premises with multiple security layers like gates, access doors and turnstiles, or an open and welcoming space with restricted areas?”

Chris Newton – Head of Project Design at Focus Digital Security Systems

Now, take a moment to think about potential risks such as the safety of your staff and customers, theft, or even spying. Decide which of these risks are most important to address and how thoroughly you need to manage them. Also, make sure to check if there are any specific insurance requirements you need to meet. 

Our experts can guide you through this process, but there are some questions to ask yourself before you begin:

  • How many doors would you like to secure, and how secure do these areas need to be? Will people need a card to get out as well as in, or just push a button to exit? And will any doors require both a card and PIN? This will determine the number and type of card readers you’ll need.
  • If it’s a retrofit, what do you already have? You may be able to save money by using existing hardware such as motion sensors or card readers with your new system and save costs.
  • Would you prefer to use a mobile credential on your smartphone, a physical card/fob, or even fingerprint or face-scanning biometrics?
  • Does the system need to integrate with a new or existing CCTV surveillance system?
  • Is there potential to automate things like lighting and air-conditioning to reduce energy consumption and operating costs?
  • What industry does your business fall under? And is there anything that you do differently that we should know about?

Access control solutions can be tailored to meet the specific needs of different environments, ensuring optimal security and usability.

It’s important to understand that not all access control systems will give you the flexibility to do this. An ICT Protege system brings together all elements of access control, intruder detection, and building automation into a single unified solution. Our open technology can integrate with, or takeover, some existing systems to add value to the infrastructure your business already has.

If you'd like to continue your access control journey, we recommend reading up on our recommended credential of choice, DESFire smart devices in our short article: The Benefits of a DESFire solution.

Conclusion

Now that you have read our Beginner's Guide to Access Control, you should understand the basics involved in securing a location using a modern access control system.


With an understanding of the terms you might hear, questions you're likely to be asked, and the benefits provided by an integrated security platform like ICT's Protege WX, Protege X, or Protege GX, you can now move forward with confidence in your decision.

Talk to one of our experts today. They can put you in touch with one of our qualified installation partners in your region, so you can take the next step in your security journey and provide peace of mind that your most valuable assets – your people and your property – are secure.

Originally posted April 2021, updated November 2024.

Originally published August 12, 2024

Ready to secure your future?