Skip to content

The easy way to a smart office: tips for implementing a modern access control system

“Smart office“ sounds like the future: hip technology companies and expensive new buildings. In fact, the first steps on the road to a smart office are easier than they seem. A good starting point is a modern access control system. It ensures security and, in combination with smartphone-based ID solutions, more productivity in everyday work. We reveal which aspects companies need to consider to make an implementation a success.

A good starting point to a smart office is a modern access control system.

ID cards and keyfobs based on RFID (Radio Frequency Identification) have proven their worth in connection with access control. However, new solutions now also incorporate so-called mobile credentials. The digital smartphone credentials have clear advantages. For companies, they are easy to manage. For employees, they provide greater convenience by allowing the company cell phone to be used as a universal identification medium: electric vehicle charging, time recording, access to meeting rooms, logging on to the computer with single sign-on, secure printing, paying in the canteen — it all works completely seamlessly. Last but not least, employees save time that they can invest in value-adding activities. Simple access is provided by an app that implements the appropriate authorizations on the smartphone. This allows iOS and Android devices to communicate directly with RFID readers. Here are some tips to make a modern access control system a success.

Tip No. 1: Go for a holistic consulting approach

To ensure that the solution actually meets the expectations of users and operators, careful planning is the key. In the run-up to implementation, a whole series of questions must therefore be clarified, such as: Should access control be introduced for a single building or for different properties and possibly even across national borders? Are several technologies and credentials already in use? Which applications are to be covered? Comprehensive pre-sales consulting therefore includes an inventory and requirements analysis (including documentation of results), a feasibility study, proof-of-concept, and a project and rollout plan. In the implementation phase, hardware and software integration, application development, configuration and all customizations as well as testing and verification of protocols should be covered by the solution provider.

Tip No. 2: Invest in future security

Requirements and IT infrastructures change over time — and so does the overall system. Technical support must therefore not end with the initial integration. Only with a flexible system that provides for optimizations, adaptations and upgrades are companies also on the safe side in the future. As a solution provider, we at ELATEC therefore provide our customers with the DevPack software development kit. The versatile DevPack contains a range of tools that make it possible to easily adapt the products delivered in standard configuration to specific requirements — even via remote access.

Tip No. 3: Look for flexibility

For companies with several office buildings, the introduction of a uniform access solution for all properties is worthwhile. After all, central remote maintenance of digital badges significantly reduces administrative effort. However, implementation can be a challenge, especially for companies with international operations. Often, different technologies are even in use from country to country. The solution: multi-frequency readers from ELATEC. The devices are compatible with up to 60 transponder technologies and certified for sale in up to 110 countries worldwide. The devices use RFID for authentication and access as well as NFC (Near Field Communication) or BLE (Bluetooth® Low Energy) technologies to integrate mobile devices into access control systems.

Tip No. 4: Make the system secure

Access control systems are designed to protect people and assets, so they must be secured against tampering. On the one hand, the physical security of the reader must be taken into account. On the other hand, the reader must support the credentials and encryption algorithms appropriate for the application’s security level. For effective and holistic security, not only the reader but the entire system must be included in the security concepts.

After a consistent implementation of the tips, all doors are open for a successful digital access control solution.

Would you like to know more about this topic? You can find more insights in our whitepaper.

Sign up today