Having supplied many schools, colleges and universities with a wide range of access control solutions, TDSi has developed particular expertise in the integration of access control and proprietary management information systems (MISs).

Schools are increasingly incorporating sophisticated management systems covering enrolment, attendance records and academic performance.  Such packages form an integral part of timetable planning and the development of curriculum courses, as well as linking to the development and ongoing control of finances and school resources, and allowing schools to review, analyse and report on a wide range of data for staff and pupils.

Typically though, schools are also looking to include access control into their overall facilities management structure - either by introducing new modules into the system, or by integrating previously stand alone processes and procedures.

One such school had for some time run two databases - Capita's School Information Management System (SIMS), and a completely separate security and access control system.   Although both were managed independently, much of the core data held in the two databases was common; the school therefore explored the potential for integrating the two systems, potentially to generate cost savings, but equally importantly, to deliver operational benefits and reduce the risk of error posed by the duplication of data entry.

Similarly at another school, an MIS system had been installed to provide a complete registration and management information system for the school.  Again though, the need for an access control system to be incorporated was identified, both to complement the existing perimeter security fence and to control a series of entrance/ exit turnstiles at each of its main entrance sites.

For each of these schools, TDSi has worked closely with the nominated security management and installation companies to develop integration modules that will link access control to the respective proprietary systems.  These modules are based on the company's advanced access management software, eXguard PRO, and through the use of Synchronisation and Fusion scripting tools take data directly from the record database to populate the access control system, making security and access rights fully integrated elements of the schools' information systems. 

Proven in applications throughout the world, eXguard PRO allows for great flexibility in operation.  For instance, it may be configured to give certain groups access rights to different parts of the school campus (for example, allowing only A level chemistry students access to laboratories); or, it may be used to tag specific groups as ‘trackable' by the system once their cards are used to access pre-determined areas.  The software also allows a wide range of user-defined management reports to be run directly from the system enabling security and movement to be reviewed and monitored.

Because the access control systems are now directly linked to the schools' staff and student information records, they are also always up to date; as students or staff leave and are taken off the central register, their access rights are immediately withdrawn, further improving active site security.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...