SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Importance of open technology platform for electronic access control

Karen Keating
Karen Keating
Contact company
Contact Allegion plc
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Open technology platforms enable seamless integration of electronic access control systems.
  • Electronic access control categories include Standard, High Security, Interior Upgrades, Specialty, Standalone.
  • Biometric and multi-factor authentication enhance security in high-risk areas.
Open solution makes integration of the various products – from doorway to doorway – seamless and simple

Looking at electronic access control (EAC) from an applications perspective is very helpful to security professionals when analysing how to best protect a facility and its people. The fact is, no two doors are alike and no two end users are alike. Breaking down individual doors into a series of classifications can be most helpful in assuring that the EAC is performing to the highest standards that the budget allows. Karen Keating, Allegion Portfolio Marketing Manager, Electronic Access Control, explains that to do so, an open solution is beneficial. It makes integration of the various products – from doorway to doorway – seamless and simple. An open technology platform can adapt to any environment throughout the organisation with virtually any access control system the end user installs and supports.

Using an open solution, EAC can be broken into five categories of applications –

  1. Standard: EAC is used to secure the perimeter access points in real time. Standard applications feature hardwired card readers and system accessories including electrified locks, electronic strikes and electromagnetic locks.
  2. High Security: EAC is used to control highly restricted or sensitive openings. It features multi-factor authentication and biometrics.
  3. Interior Openings and Upgrades: Here, EAC is used predominantly in retrofit applications that feature integrated electronic locks, which eliminate the need to run wires to each opening.
  4. Specialty: Access control used in remote or hard to reach areas which feature wireless devices that eliminate running wires to challenging locations.
  5. Standalone: Access control that is typically applied to openings that do not require monitoring or updating in real time.

Let’s take a quick look at each.

Standard Applications

In office suites, government buildings and light commercial facilities, tenants want flexible access control solutions that let them work with what they already have without making major new investments. Readers should be designed on an open platform and work with a variety of credential technologies from PINs to proximity to smart and even NFC-enabled smart phones. Such a system provides easy transitions to upgraded technologies over time and as budgets grow.

In hospitals, surgical centres and medical office buildings, double doors can be used to control traffic in a hallway or corridor. Electronic trim will ensure that only authorised individuals have access to secure areas and also enable centralised lockdown at a moment’s notice. Such applications often use locking systems that combine the electrified lock, reader, door position and REX switches together into one device.

In office, commercial, industrial and medical buildings, perimeter exits and entrances need both secure access and reliable door operation that is in compliance with safety codes. For high traffic doors, electric strikes should feature heavy duty stainless steel construction for use with single, double and fire-rated doors.

Wireless locks provide the benefits of hardwired access control without the need to run wires
A multi-technology reader with keypad lets organisations implement multi-factor authentication for increased security

In many buildings, the automated opening can serve as a secure perimeter entrance that combines EAC with ADA-compliant accessibility. In others, doors with delayed egress are used where it’s critical that staff have time to verify identity and secure an individual, if needed, before the door opens.

High Security Applications

Research laboratories, biohazard areas, pharmaceutical dispensaries, data centres and record offices typically have a limited number of users but require a very high level of security to protect private, dangerous or expensive materials, goods or information. For these areas, smart cards utilise encrypted technology to offer the highest in credential security. A multi-technology reader with keypad lets organisations implement multi-factor authentication to provide increased security by requiring both a card and PIN to enter.

Biometric technologies, such as hand geometry readers, deliver the highest level of security because the credential is directly tied to one user and it cannot be duplicated. Only biometrics verifies that the right person is entering an opening at the right time. Such security works for both perimeter and interior openings. When placed at a school’s entrance, biometrics can be used to manage access of parents, visitors and staff.

Interior Openings and Upgrades

Universities, classrooms, older historic buildings and other similar facilities find upgrading to be challenging, especially when dealing with brick and concrete construction. Wireless locks provide the benefits of hardwired access control without the need to run wires.

Stairwell doors sometimes require controlled access to various floors while ensuring safe egress in emergencies. Wireless trim can be used to upgrade exit devices.

Two story entrances can create a host of problems. A wireless reader interface will connect the reader to the access control system without having to run new wires up and over the ceiling.

Specialty Applications

With an open platform, they can create EAC solutions which increase security throughout the facility while helping keeping budgets in check

Extending access control to remote buildings and storage sheds is simplified with wireless technology that seamlessly integrates into existing access control systems and eliminates digging trenches. Communications range is up to 1,000 feet and remote antennas will increase that.

Using wireless, organisations can control access to the parking gates using the same credential used in the building, accessing the same access control system. Restricting access via elevators to specific floors is simplified and much less costly. A wireless portable reader will extend the perimeter of any facility at a moment’s notice or validate credentials at remote or temporary access points. Kits are available for such applications to make installation much easier.

Standalone Applications

Standalone locks provide a cost-effective way to manage access to openings that do not require real-time monitoring and control such as at common areas, storage rooms, retail store fronts and secondary or employee entrances. Audit trails can provide a record of who requested access. The locks can interface with peripheral devices such as automatic operators, electric strikes and electromagnetic locks and be used with offline access control software to set time zones, holiday schedules and retrieve audits.

For schools that are looking to upgrade classroom level security but do not have the budget for a fully networked access control system, an affordable standalone solution can provide immediate local lockdown by simply pushing the button on a remote fob from anywhere in the classroom.

No Two Doors Are Alike

By looking at EAC from an application standpoint, organisations can assure that each door is provided the level of security that is required. With an open platform, they can create EAC solutions which increase security throughout the facility while helping keeping budgets in check.

Only biometrics verifies that the right person is entering an opening at the right time

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Electronic security systems
  • Office security systems
  • Airport security
  • Hospital security
  • Security access systems
  • Electronic door locks
  • Electronic access control
  • Related links
  • Briton Mechanical digital locks
  • Briton Electronic locking devices
  • Schlage (Allegion) Access control readers
  • Schlage (Allegion) Electronic locking devices
  • Schlage (Allegion) Access control cards/ tags/ fobs
  • Articles by Karen Keating
  • Related categories
  • Audio, video or keypad entry
  • Mechanical digital locks
  • Access control readers
  • Electronic locking devices
  • Access control cards/ tags/ fobs
  • Electronic keypads
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Expert commentary
About this page

Boost security system efficiency with advanced analytics, seamless integration, and innovative technologies for unparalleled safety solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec