Unlocking the future A guide for getting started with access control 45 Main St

Unlocking the future A guide for getting started with access control 45 Main Street, 11201 Brooklyn USA sales@getkisi.com getkisi.com Table of contents 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Introduction What is acces control? Components Overview Biometrics control Why access control? Why access control? Why access control? Access control types Access control software and hardware integrations Guide to access control methodology Guide to access control methodology Guide to access control methodology What does an access control quote look like? What does an access control quote look like? How to setup your access control Migrating and introducing the access control system Conclusions Overview of Kisi’s features Kisi platform Contact Chapter one Chapter two Chapter two Chapter two Chapter two Chapter three Chapter three Chapter three Chapter four Chapter five Chapter six Chapter six Chapter six Chapter seven Chapter seven Chapter eight Chapter nine Introduction Access is one of the most crucial aspects of any company’s security. An access policy regulates the flow of employees and visitors coming into your facility and a weak policy might lead to security breaches and the compromisation of your company’s intellectual property. The goal of this document is to guide you through access control’s components, use cases, and integrations so that you can come up with the ideal setup for your business. Hopefully, this gives you the tools to make the best decisions and clears up any doubts regarding hardware and the technology behind the scenes. Enjoy the read, The Kisi Team 1 What is access control? Purpose The purpose of access control is to grant entrance to a building or office to only those who are authorized to be there. The deadbolt lock, along with its matching brass key, was the gold standard of access control for many years; however, modern businesses want more. Yes, they want to control who passes through their doors, but they also want a way to monitor and manage access. Keys have now passed the baton to computer-based devices and systems that provide quick, convenient access to authorized persons while denying access to unauthorized ones. Today, instead of keys, we carry access cards, ID badges or smartphones to gain entry to secured areas. Access control systems can also be used to restrict access to workstations, file rooms housing sensitive data, printers, and entry doors. In larger buildings, exterior door access is usually managed by a landlord or management agency, while interior office door access is controlled by the tenant company. People new to access control may think that the system is made up of only the card and the card reader mounted on the wall next to the door. But there are a few more parts behind the scenes, all working together to make the magic that grants access to the right person happen. That’s what this guide is about. Reading it will give you a comprehensive understanding of how access control systems work and the language required to communicate with vendors. Chapter one Example of a regular key. Kisi credentials. 2 Components Access control components User facing Access control systems aim to control who has access to a building, facility, or a “for authorized persons only” area. This is typically carried out by assigning employees, executives, freelancers, and vendors to different types of groups or access levels. Everyone may be able to use their access cards to enter the main door, but some may not be able to access areas containing secure or privileged information. For clarity, we divide the components into three groups: user- facing components, admin-facing components, and infrastructure components. Let’s dive into the nuances of the three categories. The most familiar parts of access control systems are the cards, ID badges, and, more recently, the smartphone apps that elicit an OK beep when presented at a card reader and unlock the door. These are also known as credentials since they hold the user's data that tells the reader to grant authorized access or not. Access cards are typically proximity cards that, rather than being swiped or inserted like credit cards, are held two to six inches in front of the card reader. The same procedure is followed for phone apps. The benefit of using credentials is that they are personalized, so any unlock event can be traced back to the person associated with it. There are so many possible credentials that it can become intimidating to choose the best one for your facility. In the table below, we have listed the most common access control credentials and defined their ideal use case. Chapter two Access via Apple watch. Kisi works with turnstiles. 3 Overview Physical keys Keypads Keycards Fobs Web Unlock In App Unlock Tap To Unlock MotionSense Biometrics (face recognition, fingerprints) Yes No No No No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Credential Secure Convenient Scalable Use case It’s unlikely to be a good solution for your business, but it’s something you can live with in certain scenarios. Keypads are good solutions for sharing access with a small number of users, like in a residential setup. While the level of security depends on the keycards and systems used, the main challenge is scalability, as assigning new credentials takes time and unlike phones, they are more prone to be shared. Mobile unlocks made key fobs unnecessary. But in some environments it is still a good credential to provide users with. Web unlocks are primarily designed for admins, so that they can unlock doors remotely. They can be leveraged by end users as well, for instance in the case of temporary visitors that don’t have a keycard or app. Having the option to unlock from a phone is a perfect backup, and works even without a reader installed at the door. One of the most convenient methods, as we all carry our phones on us anyway. Mobile-based authentication combined with a motion trigger (usually moving the hand in front of the reader). While relatively secure, biometric access presents several challenges, from privacy concerns to scalability limits. Chapter two No 4 A word on biometric access control A word on biometric access control If you are into security, you will have heard something about biometrics and its usage in access control in recent years. With biometrics, we mean the patterns in various body features (can be face, iris, fingerprints or voice recognition) that are used, in the context of access control, to unlock doors or to authorize access to determined areas. Biometrics is a very controversial topic as many still consider it as a very shady way to authenticate. The criticism is often around how the biometric data is stored. It is very difficult for a company to ensure that the data won’t be used for other purposes that are not access-related and, for this reason, many employees refuse to even use these solutions in the first place. Moreover, due to the nature of this technology, biometric authentication is hard to scale and doesn’t work with visitors or users requiring temporary access, so its use case can only be limited to low-traffic environments. With time, more biometric-related legislation will be created and these fears will gradually disappear. In the meantime, if you want to learn more about biometric access control, we have created a dedicated guide here. Admin facing The admin-facing side is the management dashboard or portal where the office administrator, head of security, or IT manager sets the parameters of persons allowed to access the premises and under which circumstances they can do so. This involves a management dashboard, often in the cloud, and a way to provision access such as a card programming device. In more advanced systems, the manual operations aspect can be automated. For example, the provisioning (creating and deleting access) can be done automatically by connecting the access dashboard to the company directory of employees. When a new hire shows up in the system, new access is automatically positioned via an API or integrating database service like Google Apps, Microsoft Azure, SAML, or Okta. »One of the main benefits of Kisi is the ability to directly manage member access from the cloud without having to be bothered with traditional access control issues— like managing who has a keycard or fob—because that’s really annoying.« »What we really love about it is the operational efficiency. We can manage access in real time and then grant or relinquish access instantly, if needed. For example, when a new member wants to set her office up on the weekend we can send her a Kisi link and she's ready to set up her mobile key.« How does Kisi improve the admin’s life: The Yard case study Go to case study How Kisi works Biometrics control Chapter two 5 Infrastructure Access control locks The infrastructure components are the ones that rely on your building infrastructure in order to function. uploads/Ingenierie_Lourd/ access-control-guide.pdf

  • 33
  • 0
  • 0
Afficher les détails des licences
Licence et utilisation
Gratuit pour un usage personnel Attribution requise
Partager