Patrick Torpey • November 30, 2009

Access Control Systems

Access Control – Card Entry Systems

Access control systems are used to restrict and track users, these systems are used to protect key areas and limit users based on door, time, and days.

In some instances these systems are nothing more then a replacement to the hard key eliminating the need to constantly re-key a building after an employee or tenant leaves. In other cases they are one part of a comprehensive security program.

History

Access control systems emerged in the 1980’s as a means of electronically controlling and tracking entry into a building. These Host based systems, VAX or Unix type systems used video terminals that were very expensive and cumbersome to use. They were limited in the controls and reporting capabilities. These systems were typically employed by the government and larger companies.

Starting in the 1990’s Windows based PCs, client server environment, allowed these systems to evolve and be more user friendly, at the same time the costs came down substantially. These systems grew in popularity with large and small companies, property managers, buildings owners, and government entities employing them.

Today the PC based systems continue to be very popular as well as browser based systems have emerged. The browser based systems allow more flexibility than the PC based systems and are more easily deployed throughout an entire organization.

Typical Components:

  • PC or Web Browser Software
  • Access Control Panel(s)
  • Power Supplies (access control panel & door hardware)
  • Card Readers and Cards
  • Electronic Door Hardware
  • Cabling

Software:

Each access control manufacturer develops their own software, some run on Windows, some are Linux based, with very few being Mac compatible. It is wise to review the software of the system you are considering to deploy to make sure it is user friendly and has the features you would like as well as the capabilities to expand.

Access Control Panels:

Depending on the system being deployed the control panels can typically handle anywhere from 1-14 readers. Our cost effective system can control 1-2 readers per panel. Our mid grade PC based system can control 2, 4, 6, 8, 10, or 12 readers from one control panel. Our browser based system can control 2, 4, 6, 8, 10, 12, or 14 readers from one control panel. All our systems can be expanded to control hundreds to thousands of doors and readers.

Proximity Technology:

This is the most popular reader technology. With proximity technology a proximity card is presented within a 2”-4” read range of the card reader. The reader will be beep and the LED on the reader will change colors to indicate the card has been read. If the card is authorized the door will unlock.

Costs:

Typical per door cost is $2,500 - $3,000. This includes all the necessary components and labor to install. This average cost is based on a system with a minimum of four or more doors with no special electronic door hardware needs.

Electronic Door Hardware – The Real Cost Variable

The overall system costs will be greatly impacted by the type of door hardware required to control the doors. The cost estimates given above are for electric locksets, electric mortise lock bodies, electric strikes, and electrifying of Von Duprin 33 or 99 series crash bars.

Specialty electronic hardware or complete replacement of existing vertical rod crash bars will drive these costs much higher. I have seen instances where equipping doors with the correct electronic hardware have run $5,000 - $10,000 for just the hardware.

System Integration

One of the real powers of the browser based system (S2 Security) is the ability to seamlessly integrate with video surveillance (digital video recorders, network video recorders, and network cameras), photo identification management, and intrusion alarm systems. The S2 Security system provides features and functionalities that were previously only available to large system users at an affordable level.

For more information on the products offered by Protection Plus Security Services see our website www.protectionplussecurity.com

By Ian Torpey May 14, 2026
Learn the 5 signs it may be time to upgrade your access control system, from limited scalability to outdated hardware and difficult system management.
By Ian Torpey April 27, 2026
Compare cloud vs. on-premises physical security systems and learn which model best fits your business based on control, scalability, IT requirements, and long-term growth.
By Ian Torpey April 17, 2026
Learn how Eagle Eye 911 Public Safety Camera Sharing gives emergency communication centers real-time access to selected cameras during a 911 call, helping businesses improve safety, response speed, and situational awareness.
By Ian Torpey April 9, 2026
Learn how Eagle Eye Complete Program gives businesses a cloud video surveillance system with predictable monthly pricing, lower upfront costs, and lifetime repair and replace support.
By Ian Torpey April 1, 2026
Learn how the Brivo access control system uses cloud management, scalable controllers, and mobile credentials to secure modern facilities.
By Ian Torpey March 24, 2026
Discover how remote video monitoring services from Eagle Eye provide proactive security using AI, real-time monitoring, and trusted partners to protect your business.
By Ian Torpey February 3, 2026
Brivo has recently announced they are no longer supporting several of their legacy control panels. These panels will need to be replaced before February 28, 2026. Affected Legacy Panels The following Panels have reached the End-of-Life and requires replacement Brivo ACS5000 Brivo IPDC Brivo Edge (HID-Edge) Replacement Options Brivo ACS6100 Replacement for the Brivo5000 legacy panel Brivo ACS300 Replacement for both Brivo EDGE and Brivo IPDC legacy panels Issues If Not Replaced Brivo's legacy hardware does not support many of Brivo's current and planned features. Also, the legacy hardware exposes companies to potential security risks and supportability issues as the legacy panels cannot comply with modern security standards. We are Here to Help When upgrading your legacy hardware with PPSS, we will take every step to ensure that there are minimal disruption to your operations. Our experienced technicians will coordinate a seamless transition with low downtime, maintaining the security integrity of your property throughout the upgrade process. For more information or to schedule your system upgrade, please contact our office today.
By patrick September 30, 2024
Does Verkada’s Access Control Tailgate Detection solution work you?
By patrick July 16, 2021
Openpath is a secure cloud based access control system offering some very impressive and unique features not found in other access control systems. The Openpath access control system primarily utilizes mobile credentials allowing users to use their phones for access into the building. Openpath Readers Allow for Hands Free Entry One of their unique features is the hands free entry. The Openpath readers can be configured to allow the wave of your hand to unlock the door. Allowing you to keep your phone in your pocket, backpack, or purse and not having to present it to the reader. The Openpath readers work with the mobile credentials as well as the Openpath cards and tags. They will even work with legacy HID Proximity credentials that many companies still utilize. Video Reader Pro Openpath has just introduce the Video Reader Pro. This reader contains both the Openpath reader technology and a 5MP super high definition camera in one compact unit. It is designed to automatically associate the video clip with the access control event, allowing you the ability to see the activity at your door. Triple Unlock Technology Openpath’s patented triple unlock technology makes the use of the mobile credential very easy and reliable. This technology works with Bluetooth, WiFi, and LTE cellular data for fast authentication. Bluetooth is utilized directly by the reader and local Smart Hub. The WiFi allows for both local Smart Hub or cloud authentication. The cellular data is authenticated in the cloud. These three technologies combine to make for a quick verification and authorization. Allowing authorized users to pass quickly through secured entry points. Guest Pass If authorized your mobile users can provide Guest Passes for visitors allowing them entry into the building. These passes are provided via text or email and allow visitors entry at a specific reader or group of readers and are valid for a user specified time. Integrations Openpath has a number of integrations with various third party software and services allowing you to link your access control system to these other systems. The integrations include identity providers: Google G Suite, Microsoft Azure Active Directory, Okta, and OneLogin. They also integrate with a number of video systems: Camio, Rhombus, Milestone, and Cisco Meraki. The Openpath system will integrate with the Envoy visitor management system, as well as other integrations with Slack (business communications), Allegion (wireless locks), Zapier (business automation), Cove (tenant experience), and ButterflyMX (intercom system).
Verkada Cloud Based Video Surveillance System
By patrick March 9, 2021
Verkada Video Surveillance System is a commercial grade enterprise cloud based video surveillance system. The Verkada video surveillance solution is an advance featured cloud based system that is powerful, easy to use, and easy to share. It requires no onsite video recording equipment.