Door Cloud divides access control management into four distinct roles, all with adjustable scope and rights management that can be configured down to the individual level.
Although the user role is typically more participatory and less managerial in nature, Door Cloud users can do a lot more than just open doors. For example, using a smartphone, users can request instant access, or report security-related incidents.
The client administrator manages access control within the client organisation. Their scope and level of permissions are set according to their responsibilities and security clearance in the client organisation.
Local Door Cloud partner is typically a local security company. Their administrators typically manage access control for several client organisations. Their scope and access rights depend on how management responsibilities have been divided between the partner and a particular client.
Master administrators have a complete overview of all Door Cloud performance and provide support to partners. Normally, master admins don’t have operational access to clients. Master admins provide backup support only if explicitly requested by clients or as the result of an escalated incident.
In its simplest terms, access control means deciding who can go where and when.
Although it can be complex to set up initially, once it has been set in motion, it should seamlessly blend into the background. The real action begins only when something out of the ordinary happens.
Door Cloud has a built-in alarm management system that provides adjustable reaction times, timeouts, prioritization, case delegation and escalation.
Cases or incidents, as they are known on the system, can be triggered by sources such as soft or hard-wired alarms and are escalated through workflow stages and administrator levels until resolved.
The fast and efficient handling of cases ensures these are rapidly recognized and proper responses are given to potential security incidents. The entire process is also backed up by a multi-level escalation scheme.
Door Cloud is based on Zone (TM) access controllers by Spica. The Zone DC series have been specifically designed for cloud communication ensuring safe and secure management over the internet.
Zone controllers are officially certified for use with Microsoft Azure.
Support for controllers from other selected manufacturers will be added in the future.
Thanks to location and microlocation technologies used by the Door Cloud smartphone app, card readers can be eliminated from some or even all access points.
Instead of using the reader for identification, the user is identified online from the mobile app and the door is determined using the phone location.
Door Cloud users can grant access simply by sending a Key link. Being the ordinary web link, Key link requires no app and can be used by anyone with a smartphone and internet connection, directly from the browser. That makes it extremely useful in situations such as apartment rent.
Door Cloud supports generic card readers via Zone Access controllers. Several connection standards are supported including OSDP. Biometric readers emulating standard reader interfaces can be used as well.
Zone Access controllers are tested to work with readers from HID, including readers offering HID Mobile Access so cards can be combined or replaced altogether with smartphones. Many other readers on the market which are compatible with HID can also be used. Also some which are not, for more please ask – use the chat widget.
Door Cloud works with Aperio wireless locks from Assa Abloy. Wireless locks can be freely combined with wired locks and readers. Aperio lock can be opened also without a card, using the Door Cloud mobile app’s feature – readerless access.
Aperio wireless hubs are connected via Zone Wing controller ensuring the continuous operation in case of internet dropouts.
Door Cloud has been developed for the cloud ecosystem. Fully featured API is now available to Door Cloud users and 3rd parties for wide range of integrations.
We are also looking into opportunities for building tighter mutual integration with cloud based video surveillance and intruder detection solutions. Several alternative access control hardware brands are also being evaluated. Follow us on Twitter for the latest integration news!