Patrick Torpey • June 3, 2010

Integrating Your Access Control System with Your Intrusion Alarm System

I often get asked to integrate the alarm system with the access control system such that employees don’t have to arm and disarm the alarm system. They want this to be automated and they want their employees to be able enter and exit the facility as needed with their access control card.This request can be driven by a number of factors. Sometimes it is the shear size and layout of the facility. If the facility is large or the layout is complex they find their employees unwilling to walk the facility prior to arming the alarm system, thus the employees either don’t activate the alarm system or they activate the alarm system with employees still in the facility. Sometimes this is driven by the number of employees. The more employees the less likely the alarm system will be activated, unless you task this to a specific group of employees. If your policy is the last one out arm the alarm system; then the larger the organization the less likely this will get done. If your policy is the facilities (security, custodial, etc.) department to arm the alarm system then it is more likely to be accomplished. The integration of these two systems starts with the system design. Depending on the products we are using we can accomplish this in two different ways.Perimeter Alarm with Local Door AlarmsThis method will work with any access control system. It requires an intrusion alarm system that can be programmed to automatically arm and disarm.The alarm system is designed with perimeter protection only. All the perimeter doors are contacted and all the perimeter glass is monitored. The system is programmed to automatically arm and disarm based on a provided schedule.At each of the perimeter access controlled doors we install a local door alarm. This local door alarm ties into the access control system and the intrusion alarm system. This unit allows employees to enter and to exit without triggering the alarm system. After-hours when the alarm system is active your employees can enter with their access control card and freely exit the building even when the alarm system is active.The local door alarm serves a secondary purpose as well. It alerts employees of door prop open conditions prior to alarm activation. If the access control door is left in an open position the local door alarm will sound a pre-alarm warning. If the door is shut during this pre-alarm then no alarm is generated. However, if the door remains open for an extended period of time then an alarm will be generated at the local door alarm and if the building intrusion alarm system is active this same alarm will be transmitted to the monitoring station.This is a great solution for companies that may have personnel working all hours of the day or night. We find this solution works well with our high tech customers that may have engineers or software development personnel that tend to work long hours or off hours.The downside to this type of system is that it is providing only building perimeter protection. If an intruder can get inside your facility without forcing a door open or breaking the glass then they will be undetected. S2 Security Access Control + Intrusion Alarm SystemS2 Security has an innovative interface for integrating the intrusion alarm system with their access control system. With the S2 Security system the access control system monitors the status of the intrusion alarm system and based on a schedule and the alarm system in a normal condition will activate the alarm system. This allows for an intrusion alarm system that includes not only door contacts and glassbreak detectors but also interior motion detectors. Providing a greater level of security to the facility; the motion detectors are designed to detect the interior presence of an intruder.This system does not require the local door alarms, because it is never active when employees are inside the facility, unlike the perimeter alarm system. Based on a schedule and when there a no faults on the alarm system the S2 Security system will arm the intrusion alarm system. Once armed the first authorized employee to present their access control card will disarm the system prior to gaining entry into the facility.

Perimeter Alarm with Local Door Alarms
S2 Security Access Control + Intrusion Alarm System
By Ian Torpey May 14, 2026
Learn the 5 signs it may be time to upgrade your access control system, from limited scalability to outdated hardware and difficult system management.
By Ian Torpey April 27, 2026
Compare cloud vs. on-premises physical security systems and learn which model best fits your business based on control, scalability, IT requirements, and long-term growth.
By Ian Torpey April 17, 2026
Learn how Eagle Eye 911 Public Safety Camera Sharing gives emergency communication centers real-time access to selected cameras during a 911 call, helping businesses improve safety, response speed, and situational awareness.
By Ian Torpey April 9, 2026
Learn how Eagle Eye Complete Program gives businesses a cloud video surveillance system with predictable monthly pricing, lower upfront costs, and lifetime repair and replace support.
By Ian Torpey April 1, 2026
Learn how the Brivo access control system uses cloud management, scalable controllers, and mobile credentials to secure modern facilities.
By Ian Torpey March 24, 2026
Discover how remote video monitoring services from Eagle Eye provide proactive security using AI, real-time monitoring, and trusted partners to protect your business.
By Ian Torpey February 3, 2026
Brivo has recently announced they are no longer supporting several of their legacy control panels. These panels will need to be replaced before February 28, 2026. Affected Legacy Panels The following Panels have reached the End-of-Life and requires replacement Brivo ACS5000 Brivo IPDC Brivo Edge (HID-Edge) Replacement Options Brivo ACS6100 Replacement for the Brivo5000 legacy panel Brivo ACS300 Replacement for both Brivo EDGE and Brivo IPDC legacy panels Issues If Not Replaced Brivo's legacy hardware does not support many of Brivo's current and planned features. Also, the legacy hardware exposes companies to potential security risks and supportability issues as the legacy panels cannot comply with modern security standards. We are Here to Help When upgrading your legacy hardware with PPSS, we will take every step to ensure that there are minimal disruption to your operations. Our experienced technicians will coordinate a seamless transition with low downtime, maintaining the security integrity of your property throughout the upgrade process. For more information or to schedule your system upgrade, please contact our office today.
By patrick September 30, 2024
Does Verkada’s Access Control Tailgate Detection solution work you?
By patrick July 16, 2021
Openpath is a secure cloud based access control system offering some very impressive and unique features not found in other access control systems. The Openpath access control system primarily utilizes mobile credentials allowing users to use their phones for access into the building. Openpath Readers Allow for Hands Free Entry One of their unique features is the hands free entry. The Openpath readers can be configured to allow the wave of your hand to unlock the door. Allowing you to keep your phone in your pocket, backpack, or purse and not having to present it to the reader. The Openpath readers work with the mobile credentials as well as the Openpath cards and tags. They will even work with legacy HID Proximity credentials that many companies still utilize. Video Reader Pro Openpath has just introduce the Video Reader Pro. This reader contains both the Openpath reader technology and a 5MP super high definition camera in one compact unit. It is designed to automatically associate the video clip with the access control event, allowing you the ability to see the activity at your door. Triple Unlock Technology Openpath’s patented triple unlock technology makes the use of the mobile credential very easy and reliable. This technology works with Bluetooth, WiFi, and LTE cellular data for fast authentication. Bluetooth is utilized directly by the reader and local Smart Hub. The WiFi allows for both local Smart Hub or cloud authentication. The cellular data is authenticated in the cloud. These three technologies combine to make for a quick verification and authorization. Allowing authorized users to pass quickly through secured entry points. Guest Pass If authorized your mobile users can provide Guest Passes for visitors allowing them entry into the building. These passes are provided via text or email and allow visitors entry at a specific reader or group of readers and are valid for a user specified time. Integrations Openpath has a number of integrations with various third party software and services allowing you to link your access control system to these other systems. The integrations include identity providers: Google G Suite, Microsoft Azure Active Directory, Okta, and OneLogin. They also integrate with a number of video systems: Camio, Rhombus, Milestone, and Cisco Meraki. The Openpath system will integrate with the Envoy visitor management system, as well as other integrations with Slack (business communications), Allegion (wireless locks), Zapier (business automation), Cove (tenant experience), and ButterflyMX (intercom system).
Verkada Cloud Based Video Surveillance System
By patrick March 9, 2021
Verkada Video Surveillance System is a commercial grade enterprise cloud based video surveillance system. The Verkada video surveillance solution is an advance featured cloud based system that is powerful, easy to use, and easy to share. It requires no onsite video recording equipment.