Also known as an Electro-Magnetic Lock, a mag lock is a highly secure and reliable locking method widely used in various settings, from commercial buildings to residential properties, typically used on building entry doors and glass doors. Designed with a powerful electromagnet and an armature (a metal plate), this locking system is secure and convenient.
Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the person’s facial contours. Facial recognition technology offers a seamless and efficient way to authenticate users for access control.
Access control is a crucial component of physical security. It is an electronic system that controls the entry or exit of an area. With access control, only authorized personnel are granted entry to restricted areas, which can include a company's main entrance, server rooms, storage areas, and other sensitive locations.
Access Credentials are devices that contain an encoded ID number that can be captured by an access reader. They are an essential component of modern access control systems, providing a convenient and secure way for individuals to gain access to restricted areas. These devices are designed to store and transmit identification data, which is then captured by an access reader. Some of their different forms include cards, fobs, tags, or mobile apps that can be easily carried around. One of the key advantages of access credentials is the range of encoding technologies they utilize. These devices utilize one or more encoding technologies such as proximity, smart card, magnetic stripe, or Wiegand to store and transmit identification data. Proximity technology, for instance, allows individuals to gain access simply by holding their access credential close to the reader, while smart card technology provides enhanced security through the use of encryption and authentication protocols. With the advent of mobile technology, access credentials can now be stored on mobile apps, making them even more convenient and accessible. With DGAPass, you can easily control access levels for each individual user along with schedules. For instance, you could give Employee A access to your retail location between 8 am and 9 pm and Manager A access from 4 am to 11 pm and so on. Each access point (or door) is also 100% customizable so you can limit who can access storage areas, for instance. All of this can be done at any time on the DGAPass web portal and mobile app.
In access control, fail-safe is a locking method that defaults to the unlocked or open position when power is removed or interrupted. Access systems are universally required by code to revert the locking methods to the fail-safe position upon a fire alarm activation to ensure a safe, fast exit for those inside the premises. This is often done with an electromagnetic lock (mag lock). This locking method consists of a powerful electromagnet and an armature (a metal plate). It is typically used in building entry doors or glass doors where the electromagnet is installed on or in the door frame and the armature is attached to the door. When electrified, the electromagnet keeps the door in a locked position. When a mag lock’s electromagnet loses power, the door will remain unlocked. Overall, fail-safe locking systems are crucial in ensuring safety and reliability, and they are essential for your fire safety compliant access control system.
Underwriters Laboratories (UL) is a trusted resource known around the world for product safety and service certification. Since being founded in 1894, UL examines and tests devices, systems, and material to determine how their performance affects life, fire, casualty, hazards, and crime prevention.
Tailgating refers to an action in which a person without a valid access credential enters an access control point by closely following another person who did present a valid access credential. The technique used in tailgating is simple but effective. The tailgater waits for an authorized person to scan their access credential into a secured area, such as an office lobby. They then quickly follow the authorized person through the door. Once inside the secured area, the perpetrator can cause damage to the business by stealing confidential information or sabotaging systems, among other things. Tailgating can be particularly difficult to prevent because it relies on human behavior. It is natural for employees to not confront or even hold the door open for those they perceive to be coworkers out of politeness. It is also challenging to detect since security cameras may not capture the act of tailgating. This is why educating employees about the risks of tailgating and enforcing strict access control policies is essential. One way to prevent tailgating is to train employees to be aware of their surroundings and to report any suspicious activity. Optical turnstiles can also be effective solutions to ensure that each person entering a secured area is authorized to do so.
Integration in security refers to the interactivity between different parts of a security system. Here are some examples of what you can accomplish with an integrated security system.
Access control systems are designed to regulate and manage the movement of people. One of the essential components of access control systems is the portal, which refers to a physical barrier that controls entry and exit from one space to another. The portal is typically a door, gate, or hatch that is managed by a locking device like a key, code, card, or biometric authentication that grants access. The locking device may also have additional features, such as integration with video surveillance systems or intrusion alarm systems for a more intelligent security system. In addition to managing access, portals can also be used to monitor and record the movement of people whose historical records can be accessed from DGAConnect.
Bluetooth is a technology standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. One type of Bluetooth technology that consumes significantly less power is called Bluetooth Low Energy (BLE). This type of Bluetooth remains in sleep mode unless a connection is initiated, which translates to much longer battery life. This is ideal for access control systems since it doesn't use as much power. BLE is the wireless technology used in mobile app-based access credential systems.
Even if your employees use the correct credentials to gain access to restricted areas, holding or propping the door open can create a security risk. This is why Door Held Open Alerts were created. This feature is part of an advanced physical access control system.