Blog

MANAGING LARGE ACCESS CONTROL SYSTEMS Managing large access control systems

When it comes to access control, scalability is a cornerstone of ensuring security and operational efficiency, especially as organizations expand. When an access control system includes numerous doors, hundreds of users and multiple administrators, the need for advanced features becomes apparent. These features, which may seem overkill for smaller facilities, are essential for managing larger systems. […]

read more
VISITOR MANAGEMENT! Door Cloud visitor access Key link

Key Link has proven to be a hugely practical solution for guest or visitor access. However, that alone is not yet a full, proper visitor management system. Yes, it can suffice for a small number of visits in a less formal environment, but it’s not enough to call it proper visitor management system (VMS). Due […]

read more
GREAT EXPECTATIONS: ACCESS CONTROL AND AI

What can we expect from AI? This question is currently is on the minds of almost everyone, including the access control community. The broad consensus is that we should expect the unexpected. We agree completely, access control is not an exception. However, there are a couple of features already taking shape on the horizon. So, […]

read more
MANAGING SECURITY INCIDENTS MANAGING SECURITY INCIDENTS

Did you know that Door Cloud offers a full-featured security management platform called "Incidents"? But before we go any further, let us define what we mean by security management […]

read more
FOUR CABLING STRATEGIES FOR ACCESS CONTROL Four Cabling Strategies for Access Control

When we talk about wiring strategy in access control, we are really talking about controller networking. But before we get to that, what about wireless locks? Some may think that we do not even need to talk about cabling, so let us start right there. Some home systems can indeed be wireless. For example, with […]

read more
TRANSFORMING ALARM MANAGEMENT Transforming Alarm Management

There are some really exciting times ahead for alarm management. Sensors are going wireless, the Internet of Things (IoT) is taking them directly to the cloud, and mobile is the “new normal” management platform. All of this has a profound, transformative impact on how we detect, distribute and manage alarms. The alarm industry has been […]

read more
SO, WHAT HAPPENS OFFLINE?

These days the internet is quite reliable and dropouts are rare. The internet has become critical infrastructure, much like electricity. Any longer dropout, impacting more than a single building is a dramatic affair, something you would probably hear about in the evening news. Similar, if not higher availability standards are expected from hosting platforms and […]

read more
GUEST ACCESS WITH KEY LINK

Being the smartest access control in the cloud means that we can do some amazing things. One of such things is granting access via web link. Key Link is a very convenient solution for granting temporary access, especially at a distance as nothing material needs to be sent or received. The recipient does not need […]

read more
ASMAG FEATURED ARTICLE: TOP 7 REASONS FOR CLOUD ACCESS CONTROL

We are witnessing a huge IT migration to the cloud. General benefits of the cloud are well known, and they all apply to cloud access control. However, to truly understand the advantages of the cloud for access control we need to look a bit closer. Read the rest at Asmag.com >>

read more
ASMAG FEATURED ARTICLE: CLOUD ACCESS CONTROL AND THE FEAR OF HACKING

There are many advantages of access control in the cloud. The main objection, however, has been internet security, or simply put the fear of hacking. To be able to properly weigh the benefits against the risks, we need to address security concerns specific to cloud access control. In the cloud, internet security is a natural […]

read more
OSDP READERS – PROS & CONS

You have probably come across the new card reader connection standard called OSDP. OSDP stands for Open Supervised Device Protocol and is being endorsed by all major manufacturers. So why is it important? Are there any second thoughts? PRO1: OSDP is more secure Previous connection methods (Wiegand and Data Clock) were glaringly insecure. OSDP is […]

read more
DITCH THE BADGES AND SAVE THE OCEANS

Got another fancy loyalty card? It gives you a 20% discount for your next car rental, so you consider keeping it. But where? Your wallet is already clogged with ATM cards, credit cards, ID cards, insurance cards, membership cards, fishing permit cards, loyalty cards (admit it) and well, your access control card. Inevitably, cards clog […]

read more
ASMAG FEATURED ARTICLE: THE FUTURE OF SECURITY DOESN’T NEED TO INCLUDE CARD READERS

There is a good chance that your company uses access control card readers. People who have the right security clearances can use their badges or cards on readers to enter rooms. You may assume that card readers are essential security devices. When you think about it for a second, though, you can probably imagine a […]

read more
ARE READERS BECOMING OBSOLETE

As we all know, one of the latest trends in Physical Access Control (PAC) is replacing cards with smartphones. This trend seems very natural. Why would we need cards when we already carry much more capable identification token with us, our smartphone? The card reader manufacturers are adapting by releasing new generation of readers, capable […]

read more
TOP 5 REASONS TO MOVE TO THE CLOUD

Welcome to the Door Cloud blog! In our 1st post let’s ask ourselves the most fundamental question, why move to the cloud. Moving to the cloud is probably the most dominant trend in the IT industry at the moment and the very same arguments apply also to the Physical Access Control (PAC). While trying to […]

read more