Accessing Access Control
Over the last few years, the interest in smart security systems has grown dramatically. Video management systems alone are not enough. Considering the present-day circumstances, they are simply not covering all of the customer's demands and needs. That is why here, in Luxriot, we focus on making the software compatible with many third-party systems, so that we can team up with other systems. Thus, the video management system fulfills its portion of workload, at the same time being able to communicate with external systems for immediate response/reaction.
One of these integrations provides a gateway to access control systems, and we shall take a closer look at it in this article.
Interoperability and Collaboration
Customers want to be able to control the whole system from one place, but the systems are growing in size and complexity. Due to both increasing technology availability and security requirements, there is a need for a simple and user-friendly architecture. The components of such a system should remain sophisticated, but the intricate layers are to be transparent for the end-user, leaving all the hard work to the automation. There is no universal feature-rich system that would satisfy everyone; rather, people piece together different software to gain maximum profit, and this composition varies from system to system, depending on the customer specifications.
Co-operation on the software level not only provides a unified interface, making it more convenient for the end-user to manipulate the system but also allows proactive scenarios to be set up to operate system-wide. Events generated by one component trigger a response in another part. This happens automatically, without human control, but with human confirmation or supervision, if required. This saves a lot of time and minimizes the effect of human error and potentially negative effects from social engineering, thus mitigating security risks. You just cannot collaborate with the camera, making it possible to sneak into a classified installation, as you could do with a human guardsman.
In light of the above-mentioned facts, it seems evident that making a video management software work together with an access control system provides benefits for the customer. So what does Luxriot EVO offer in this regard?
Unified Interface and Proactive Security Measures
Luxriot EVO software offers two-way integration with several access control systems, including:
- Gallagher Command Centre
- Doors .NET by Keri Systems
- Keep by Feenics
- Roger RACS 5
- Paxton Net2 Access Control
At the configuration stage, it is the reader list that you receive: EVO servers obtain the reader information from the access control systems and bind it to doors in the EVO configuration. Exact messages from the readers may depend on the integration, so the available information may vary from system to system. Further, these data can be used to generate events in the Event & Action Configurator and bind them to different actions. For instance, such a setup fits the scenario when you need to receive notifications of unauthorized persons trying to access a specific location. Using actions, you can also send triggers back to the access control software, changing the door status.
If you have used EVO on bigger installations, no doubt, you know EVO has interactive maps — either based on an image or on the world map. Door status changes are reflected on maps in EVO Monitor, too, if configured. For this, door markers are put onto maps, immediately allowing you to see the door status and also to change it. In addition, miscellaneous system events - DI triggers, user buttons pressed, a face from the whitelist recognized — can be used to change the door status. Using automation instead of human control minimizes interaction time, thus helping build a highly efficient system for routine operation.
EVO Monitor application offers advanced investigation based on reader events and cardholder data. The cardholders' details are entered in the access control system itself, but the search can be performed on the EVO side, allowing you to see the events along with the associated video footage. Thus, there is no need to switch to the access control interface if you wish to review the event history.
Now, how do you set up EVO to be smart enough to do this for you?
Set Up, Configure and Use
To cut the long story short, let us consider you have got both Luxriot EVO and your access control system up and running. To establish the connection between the two, follow these steps:
- make sure the access control software is ready for the incoming third-party connections. Normally, the procedure is described in its user guide: ports to be opened, licenses to be applied, etc.,
- add an access control configuration in EVO Console,
- add doors under this configuration,
- use them in the status monitoring, live view, investigation mode, and, of course, Event & Action scenarios.
While the first three stages are typically done by the system administrator or the CCTV engineer, the latter one is for the security people, desk clerks, visitor control officers, and others having limited access to the video management system resources (and not the configuration UI).
Create an Access Control Connection in EVO
In your EVO Console application, switch to the Access Control under the Configuration section (scroll to the very bottom to find it). Here, you can create a new entry. Note that, depending on the third-party access control engine, the required parameters may vary:
- for Keri Doors .NET connection you will be requested to enter the port number
- in case you are using Paxton Net2, you will be additionally asked for the Client ID (must be provided by Paxton software), and there is also an option to use HTTPS
- for the Keep server (by Feenics) connection, you only need to enter the instance number, as the connection URL is hard-coded
Now you can create a new door from the same section by using the drop-down list in the upper panel. If everything is fine and the connection between the modules has been established, you will have a list of readers to pick from. When filling in the details, you will have an opportunity to select a channel: video from this channel will be then associated with the target door, allowing you to view it in the investigation mode in EVO Monitor.
Track Door Status in Console
Once you have added the door configuration, you can check their current state in the Monitoring section of EVO Console, under Access Control. Door open state, lock state, and other details, if any, are displayed here.
If the connection is still being established as you check the status here, use F5 on your keyboard or the Refresh button on the upper panel to reload the door list.
Put Doors On the Maps
Why use maps? You can create interactive layouts and put all cameras and doors onto them by using the floor drawings. Floors can be then interlinked, producing a layered building plan. Further, operators can simply click items on the map to make them pop up and trigger associated actions.
You will find the Maps category in EVO Console, in the Configuration section. From here, you can add both geo- and image-based maps.
Place as many door markers as you need by dragging and dropping them from the panel above the map preview. For each one, you can select how different door states look like: controls on the right enable you to change both the icon and its color. When you use this map later in the EVO Monitor application, the markers will reflect the door status with your defined style. Thus, door status monitoring is possible from the client application without granting user permissions for EVO Console access.
Click any door marker on the map to bring up a drop-down menu. The list will include available door actions: lock, unlock, and temporarily unlock the door. This kind of activity will be reflected not only in the Access Control section of EVO Monitor but also, as you might expect, in the third party access control module as well.
Implement Preventative Security Measures
Whether you have a multi-building project or just a single door installation, access control integration enables you to control the whole facility from one and the same place. And, thanks to the EVO Event & Action Configurator feature, a substantial part of these control routines can be automated.
Here are just a few scenarios (from the whole variety of possible combinations!) offered by EVO E&A:
- If a certain door is opened during after-hours (e.g., at night), notify the security guards with a text message and a sound alert, and send an email notification to the responsible person.
- When the video goes missing from a critical camera, perform partial facility lockdown. Optionally, manual unlock (override) can be ensured by means of user buttons.
- Upon an unauthorized access attempt, make a PTZ camera turn to a specific preset and pop up its live video on the screen.
Unauthorized access may be a situation when someone without any access permissions tries to open a door. Also, this may be a result of someone trying to enter a facility with restricted access, where "restricted" applies to specific hours or shifts. As all door events are logged, you can later investigate the facility access history to verify that only authorized personnel have entered it, and/or to make sure no one is using other people's access tokens.
- If a door to a critical area (e.g., server room) is forced open, immediately start emergency recording for a certain amount of time, or until the security officer stops it.
- When a door is held open for more than 10 seconds, send a pre-configured audio file with an announcement to be played by the adjacent camera.
EVO Event & Action Configurator is available with both EVO S and EVO Global license editions. To set up events and the actions they trigger, you are welcome to use the Events & Actions section of EVO Console. There are separate configuration subsections for events and actions. Once these are created, go into the Rules category and create scenarios you want.
For any existing rule, you can add rule modifiers: schedules, conditions and delay times.
- Schedules allow you to limit the days and hours, during which the rule is active, e.g., night only, weekends only.
- Conditions enable you to combine two events to trigger a single action. For example, send out a notification when two doors have the "open" status simultaneously.
- Delay timers suspend the resulting action for a specified time.
Supervise and Investigate
When EVO Monitor is connected to at least one EVO server with an access control configuration, an additional tab appears on the top panel. Access control investigation has the following modes:
- events: search door events by door, by event, or by cardholder
- doors: door list with current statuses
- cardholders: the list of cardholders
You can filter the events based on the time interval, door name, specific cardholder name, as well as the target event name. For example, you can:
- see which doors were opened by someone during the day,
- verify if the person was using their own access tag/card by comparing the cardholder photo to the event video,
- check the current door status and lock/unlock it manually, if necessary.
After clicking any event on the list, you can play back the video footage associated with it. (As described earlier in this article, a channel can be bound to a door at the door creation step in EVO Console.) Playback appears on the right-hand side, in the form of the instant playback, with all controls usual to the instant playback mode.
In the Doors mode, click any door in the list to see its live status. You will also have an opportunity to lock/unlock the door from here. In the Cardholders mode, as you might have already guessed, you will see the list of all cardholders present in the access control module database. If the person entering the cardholders' list in the access control software cared to add their photos, you will have an opportunity to see the pictures in EVO, too. Thus, it is easy to see if there is a match between the footage and the card used to unlock doors.
Made For Efficient Operations
Do you still hesitate if the integrated solution is the right thing for you? Let's sum up what we have here.
Access control software configuration takes the same time as usual, plus an extra fifteen minutes to teach EVO to communicate with the third-party engine and receive the door information. In exchange, your security officers get a single user-friendly interface. No more switching from window to window; no need for extra displays for every software client. (Better use the redundant displays for camera live view, right?)
For typical, routine access control related actions, there is no need to switch to a different user interface, as everything can be done from the EVO Monitor application. While every action may take just a second or two, considering the number of such actions during the day, the total amount of optimized time is appreciable. And even the most complex scenarios are fully automated, which means you only set them up once and then enjoy the effect, at the same time sheering away from the human-caused error.
From the point of view of the access control software, there is no difference if the doors (readers) are controlled from the native interface or from the integrated software. Of course, the integration does not cover everything there possibly is, but incorporating a whole access control engine into VMS would be too much. Instead, the most popular functionality has been brought to you and made available via EVO interface.
Still not convinced? Using an access control system, which is not on our list yet? Let us know!