Blog

DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 16th, 2024

A two-person rule, also referred to as an escort rule, is a highly effective access control security measure that requires two authorized cardholders to be present in order to grant access to a specific area or item, such as a door or display case. This feature is often used to protect sensitive locations like specific doors, product storage areas, vaults and safes, and server rooms. By requiring the presence of two cardholders, the two-person rule ensures an added layer of security, minimizing the risk of unauthorized access or potential breaches. This feature is a great way to layer additional security elements to your physical access control system. While financial services firms, banks, jewelry businesses, cannabis growers and operators most frequently request these advanced features, they offer useful applications in many other types of businesses and buildings.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
April 25th, 2024

A Credential Reader, also known as a Card Reader, captures an access credential's encoded data and transmits it to an Access Control Unit (ACU). The ACU then determines whether to grant or deny access based on the cardholder's access rights.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 29th, 2024

A mobile access credential is a convenient app installed on your employees' smartphones that allows them to gain access to an access point by simply tapping or twisting their phones near the access point. This technology utilizes BLE (Bluetooth Low Energy) or NFC (Near Field Communication) which offers reliable and accurate access. Mobile access credentials widen your access control options beyond the more common access fobs and cards and can replace or supplement the use of physical access credentials.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 22nd, 2024

A Passive Infrared (PIR) sensor is a type of motion sensor. This technology operates by detecting movement within a specific area by measuring the infrared radiation emitted by objects.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 15th, 2024

The Door Forced Feature is an important part of an access control system. It is designed to activate an alarm if the door is opened without a valid access card being presented or an associated REX (Request to Exit) signal. This feature is especially useful in case of forced entry by criminals who may forcibly attempt to open the door.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 1st, 2024

A local door sounder is a siren device that provides an audio alert when a protected door is held open past a preset time period, typically 15-30 seconds. Its purpose is to promptly and effectively alert individuals that a door has been held open for an extended period. By doing so, it not only prevents unauthorized access but also ensures that the security of the premises remains intact.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
January 25th, 2024

A REX device, short for Request to Exit, is a device in access control systems that provides a simple and convenient way to exit through access-controlled doors. A REX device is required for any door secured with a magnetic lock (mag lock). This ensures that individuals inside a secured area can exit in an emergency.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
January 11th, 2024

Panic hardware is a type of locking hardware designed to allow immediate exit at all times and is a crucial component of building safety. Its primary purpose is to provide a quick and efficient means of escape during emergency situations. Unlike traditional locking mechanisms, panic hardware allows individuals to exit a building swiftly without the need for any lever or knob rotations. The simplicity and reliability of panic hardware make it an indispensable part of any building's safety infrastructure.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
January 4th, 2024

Biometric readers scan an individual's unique morphological characteristics such as a fingerprint, palm, voice, iris, or face as a form of access control. Fingerprint and palm readers are the most popular choices due to their ease of use and high level of accuracy, but DGA also employs modern facial recognition readers, which are highly convenient and accurate forms of access control.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
September 28th, 2023

Fail-secure refers to a locking mechanism that defaults to a secure or locked position when it experiences a failure or power loss. This is the opposite of fail-safe, which defaults to an open position when power is lost.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
September 14th, 2023

Also known as an Electro-Magnetic Lock, a mag lock is a highly secure and reliable locking method widely used in various settings, from commercial buildings to residential properties, typically used on building entry doors and glass doors. Designed with a powerful electromagnet and an armature (a metal plate), this locking system is secure and convenient.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
September 7th, 2023

Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the person’s facial contours. Facial recognition technology offers a seamless and efficient way to authenticate users for access control.