Blog

DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
December 11th, 2024

In access control systems, a transaction refers to a record containing pertinent information about an access control event. Transaction history refers to the activities of the access control system that can be recalled on demand. These activities include access granted, access denied, and unauthorized attempts classified by credential, door, and time, such as an entry attempt at the main entrance using an invalid badge at 3:00 PM. Transaction history is an important tool in managing your access control system and knowing who has gained access to what and when. Regularly checking transaction history can help you to keep your business secure by monitoring for suspicious activity.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
November 13th, 2024

Dual-factor authentication, also known as two-factor authentication (2FA) or multi-factor authentication (MFA), requires two pieces of evidence (credentials) to be granted access.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
October 30th, 2024

A high-security tag is a type of access credential in the shape of a small, round sticker. Other types of access credentials include access cards, key fobs, and mobile-based apps.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
August 22nd, 2024

An elevator access control reader is an important part of your access control system that manages elevator access to floors within a building. Elevator readers are typically mounted within an elevator near the floor buttons and look like normal access readers. Just like other types of access control readers, elevator readers can accept multiple forms of access credentials, including mobile, tag, fob, etc.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
July 18th, 2024

Anti-passback is a process or software control that prevents a user from allowing someone else to utilize his or her access credential to enter a specific entry point after the user has entered the protected area.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 27th, 2024

Also known as an Authority Level, Access Levels control which users can access what doors, cabinets, or drawers during specified time periods. A user can be assigned one or more Access Levels depending on their role. Think of Access Levels as logical groupings within your business, such as departments, floors, or work shifts that share the same access requirements. Each Access Level is comprised of where (specific doors) and when (schedules). Depending on their role, a user can be assigned one or more Access Levels. With DGAPass, you can easily control Access Levels for each individual user along with schedules. For instance, you could give Employee A access to your retail location between 8 am and 9 pm and Manager A access from 4 am to 11 pm and so on. Each access point (or door) is also 100% customizable so you can limit who can access storage areas, for instance. All of this can be done at any time on the DGAPass web portal and mobile app.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 13th, 2024

Turnstiles are physical barriers that control pedestrian traffic flow and access at security checkpoints. They are designed to ensure that only authorized individuals are permitted entry, thus providing an additional layer of security. Turnstiles come in various customizable options, ranging from simple waist-high turnstiles to more sophisticated full-height ones to suit different security needs. Furthermore, turnstiles have evolved with the latest technology, including biometric scanners and contactless access systems. This integration of technology makes entry authorization secure, but still quick and easy for users. DGA's exclusive Facepop™ identification technology integrates with turnstiles to instantly present stored visitor images upon the presentation of credentials, further enhancing security measures.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 30th, 2024

Electric strikes are a common locking method used in modern access control systems. They consist of a hinged catch that releases to open the door when an authorized credential is presented to the reader. Electric strikes can be configured to be fail-safe or fail-secure, depending on the type of door they are installed on. Typically, electric strikes are configured as fail-safe to allow for safe exit from the premises. Although electric strikes operate on different hardware than magnetic locks, they follow the same principles of access control.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 23rd, 2024

An Access Control Unit (ACU) is a panel to which all door-locking hardware (see Electric Strike and Mag Lock) and credential readers are connected. The ACU functions as the traffic controller as well as the primary power source for all the devices connected to the access control system.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 16th, 2024

A two-person rule, also referred to as an escort rule, is a highly effective access control security measure that requires two authorized cardholders to be present in order to grant access to a specific area or item, such as a door or display case. This feature is often used to protect sensitive locations like specific doors, product storage areas, vaults and safes, and server rooms. By requiring the presence of two cardholders, the two-person rule ensures an added layer of security, minimizing the risk of unauthorized access or potential breaches. This feature is a great way to layer additional security elements to your physical access control system. While financial services firms, banks, jewelry businesses, cannabis growers and operators most frequently request these advanced features, they offer useful applications in many other types of businesses and buildings.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
April 25th, 2024

A Credential Reader, also known as a Card Reader, captures an access credential's encoded data and transmits it to an Access Control Unit (ACU). The ACU then determines whether to grant or deny access based on the cardholder's access rights.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 29th, 2024

A mobile access credential is a convenient app installed on your employees' smartphones that allows them to gain access to an access point by simply tapping or twisting their phones near the access point. This technology utilizes BLE (Bluetooth Low Energy) or NFC (Near Field Communication) which offers reliable and accurate access. Mobile access credentials widen your access control options beyond the more common access fobs and cards and can replace or supplement the use of physical access credentials.