Blog

DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
July 18th, 2024

Anti-passback is a process or software control that prevents a user from allowing someone else to utilize his or her access credential to enter a specific entry point after the user has entered the protected area.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 27th, 2024

Also known as an Authority Level, Access Levels control which users can access what doors, cabinets, or drawers during specified time periods. A user can be assigned one or more Access Levels depending on their role. Think of Access Levels as logical groupings within your business, such as departments, floors, or work shifts that share the same access requirements. Each Access Level is comprised of where (specific doors) and when (schedules). Depending on their role, a user can be assigned one or more Access Levels. With DGAPass, you can easily control Access Levels for each individual user along with schedules. For instance, you could give Employee A access to your retail location between 8 am and 9 pm and Manager A access from 4 am to 11 pm and so on. Each access point (or door) is also 100% customizable so you can limit who can access storage areas, for instance. All of this can be done at any time on the DGAPass web portal and mobile app.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 13th, 2024

Turnstiles are physical barriers that control pedestrian traffic flow and access at security checkpoints. They are designed to ensure that only authorized individuals are permitted entry, thus providing an additional layer of security. Turnstiles come in various customizable options, ranging from simple waist-high turnstiles to more sophisticated full-height ones to suit different security needs. Furthermore, turnstiles have evolved with the latest technology, including biometric scanners and contactless access systems. This integration of technology makes entry authorization secure, but still quick and easy for users. DGA's exclusive Facepop™ identification technology integrates with turnstiles to instantly present stored visitor images upon the presentation of credentials, further enhancing security measures.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 30th, 2024

Electric strikes are a common locking method used in modern access control systems. They consist of a hinged catch that releases to open the door when an authorized credential is presented to the reader. Electric strikes can be configured to be fail-safe or fail-secure, depending on the type of door they are installed on. Typically, electric strikes are configured as fail-safe to allow for safe exit from the premises. Although electric strikes operate on different hardware than magnetic locks, they follow the same principles of access control.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 23rd, 2024

An Access Control Unit (ACU) is a panel to which all door-locking hardware (see Electric Strike and Mag Lock) and credential readers are connected. The ACU functions as the traffic controller as well as the primary power source for all the devices connected to the access control system.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 16th, 2024

A two-person rule, also referred to as an escort rule, is a highly effective access control security measure that requires two authorized cardholders to be present in order to grant access to a specific area or item, such as a door or display case. This feature is often used to protect sensitive locations like specific doors, product storage areas, vaults and safes, and server rooms. By requiring the presence of two cardholders, the two-person rule ensures an added layer of security, minimizing the risk of unauthorized access or potential breaches. This feature is a great way to layer additional security elements to your physical access control system. While financial services firms, banks, jewelry businesses, cannabis growers and operators most frequently request these advanced features, they offer useful applications in many other types of businesses and buildings.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
April 25th, 2024

A Credential Reader, also known as a Card Reader, captures an access credential's encoded data and transmits it to an Access Control Unit (ACU). The ACU then determines whether to grant or deny access based on the cardholder's access rights.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 29th, 2024

A mobile access credential is a convenient app installed on your employees' smartphones that allows them to gain access to an access point by simply tapping or twisting their phones near the access point. This technology utilizes BLE (Bluetooth Low Energy) or NFC (Near Field Communication) which offers reliable and accurate access. Mobile access credentials widen your access control options beyond the more common access fobs and cards and can replace or supplement the use of physical access credentials.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 22nd, 2024

A Passive Infrared (PIR) sensor is a type of motion sensor. This technology operates by detecting movement within a specific area by measuring the infrared radiation emitted by objects.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 15th, 2024

The Door Forced Feature is an important part of an access control system. It is designed to activate an alarm if the door is opened without a valid access card being presented or an associated REX (Request to Exit) signal. This feature is especially useful in case of forced entry by criminals who may forcibly attempt to open the door.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 1st, 2024

A local door sounder is a siren device that provides an audio alert when a protected door is held open past a preset time period, typically 15-30 seconds. Its purpose is to promptly and effectively alert individuals that a door has been held open for an extended period. By doing so, it not only prevents unauthorized access but also ensures that the security of the premises remains intact.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
January 25th, 2024

A REX device, short for Request to Exit, is a device in access control systems that provides a simple and convenient way to exit through access-controlled doors. A REX device is required for any door secured with a magnetic lock (mag lock). This ensures that individuals inside a secured area can exit in an emergency.