ADVERTISEMENT

5 Ways to Deliver a Deeper Dive Into Access Data

Published: 2016-09-30

Access control systems, and the data they generate, can be leveraged far beyond their current deployment of allowing or limiting entrance to specified areas of a building.

Much more can be done with access control data if we parse out additional attributes such as employee and building security, and, by combining access control data with other data streams we can provide unique business and operational insights. Here’s how: 

Reducing the Information Overload

During any busy period, an access control system can detect large numbers of events, sometimes at the rate of a million a month, often leaving system administrators overwhelmed by the volume of alarms triggered and the amount of information coming in.

One solution to reduce excess “noise” and pinpoint potential problem areas is to add a set of filters on historical or retroactive data. For example, operators can review the access control data for line and communication errors to detect readers that may be malfunctioning. By leveraging this data to detect the source of the noise, both the integrator and customer benefit with improved system operation.

FEATURED REPORT

Improving Situational Awareness as Video Verification

A recent review of an organization’s data log showed that attempted access to a door was denied. Within several minutes of this first attempt, doors nearby were forced open. The assumption was made that an employee’s access card did not work, so a key was used. There is a high probability that those were legitimate alarms, which should always be investigated and — if there was video — that footage would be used to verify.

Enlisting Designated Sensitive Areas

Spatial context can be added to access control data by introducing the concept of zones, a designated set of panels and readers that require special attention. Often, some areas within a corporate campus, for example, have higher security requirements for various doors designated as “sensitive areas.”

Sometimes, employees will have multiple access denials within a short time period, indicating a potential problem with the employee’s access card or system setup. Other times, access attempts at odd hours [could be] a sign of an insider threat.

Analytics software can be configured to flag intrusion attempts in such vicinities. Organizations can glean valuable information based on these patterns.

Revealing Employee Behavior & Building Security

Data from access control systems can be parsed to pull out employee information, enabling customers to draw extensive insights into employee behavior. For example, alarms associated with employees can be visualized separately, which, when analyzed, show any number of patterns linked with their activity.

Sometimes, employees will have multiple access denials within a short time period, indicating a potential problem with the employee’s access card or system setup. Other times, access attempts at odd hours when an employee is not scheduled to work could be a sign of an insider threat. The analytics may help an organization thwart a potential breach before it happens.

Likewise, tools such as online dashboards, display a variety of unique statistics, including the average number of individual employees that enter a building per day.

The frequency of how often an employee enters a building, as well as the circumstances in which the building is used can be documented. Various applications are in place for these types of statistics such as providing real-time knowledge of which employees are located where and office footprint planning.

Creating a Better Risk Profile

Many intriguing opportunities are possible for risk assessment by combining access control data with additional data sets. One example is to create an overall Building Risk Score by adding area crime data and the amount of sensitive locations within a building with the alarm data from the access control system.

By combining this data, an algorithm can be developed to rank and score each building, providing the security personnel with a proactive view. The high risk buildings can be reviewed to ensure that they have adequate staff levels or to understand if offices should be moved to a separate location.

Dave Bhattacharjee is VP, Data Analytics, for Stanley Security. Reach him at .(JavaScript must be enabled to view this email address).

Posted in: Insights, News

Tagged with:

ADVERTISEMENT
ADVERTISEMENT
B2B Marketing Exchange
B2B Marketing Exchange East