Nous poursuivons notre apprentissage de votre langue

Nous travaillons dur pour que toutes les pages de milestonesys.com soient disponibles dans autant de langues que possible. Mais c’est un processus qui requiert du temps. En attendant, un grand nombre de nos fonctions sont déjà proposées en plusieurs langues. Certaines pages, comme celle-ci, ne sont pas encore disponibles dans votre langue.
Merci de votre compréhension.

How access control works with Milestone's XProtect VMS

octobre 31, 2024

Traditionally, video management and access control software operated in isolation, limiting their effectiveness and efficiency. However, modern integrated solutions, including Milestone's XProtect® video management software (VMS), offer capabilities that significantly enhance the overall security ecosystem.

Integrated access control systems send metadata and door events to the XProtect platform, allowing administrators to associate security camera video with entry and exit access points, parking gate activity, etc. This article explains what’s needed to integrate access control with the XProtect VMS, the differences between unidirectional and bidirectional integrations and what operators get from different integration options. Lastly, for those who are not yet XProtect customers, we’ll discuss the pros and cons of choosing our VMS over alternative solutions.

Access control and video surveillance systems often operate independently, making it difficult to correlate events and gain a comprehensive view of security incidents.

What’s needed?
  • Access Control System (ACS): The ACS connects access points, such as doors, parking gates, automated security bollards, and other security tools. These are products sold by Milestone technology partners, such as LenelS2, Brivo, Genea, RS2 Technologies, Vanderbilt Industries, Open Options and many others. You can learn more about Milestone’s access control partners using our technology partner finder.
  • ACS integration plugin for XProtect: The integration plugin is a connector from the ACS manufacturer that collects system information for XProtect, connecting the devices and metadata in the VMS. When you’re purchasing an ACS, make sure you investigate the cost for the integration plugin along with other associated expenses.
  • XProtect VMS: The XProtect open platform connects to your security camera network, capturing and streaming video for live viewing or recorded footage. XProtect delivers a highly intuitive interface, making navigation and operation easier. You’ll gain access to robust features such as efficient video retrieval and seamless integration with various cameras and devices. The video technology enables you to monitor live camera video, store video archives for playback and manage your data from any location. Discover how to create safer spaces with XProtect VMS by visiting our product page on our website.
  • XProtect Access: When using XProtect VMS, the access control extension is necessary to enable communication between the video platform and the access control management software. XProtect Access allows you to control access to your premises directly in the XProtect Smart Client, giving you a complete overview of all access points, cardholders and visitors.

You will need a base license for XProtect Access. In addition, you will need a license for each access control door you want to add. The purchase of these licenses supports the access control software you require for your system.

You can find more about XProtect Access in our product documentation. This add-on can be activated in variants of the VMS using additional licenses. The extension works with the following variants:

  • XProtect Express+
  • XProtect Professional+
  • XProtect Expert
  • XProtect Corporate

Here is more information on the various XProtect products.

To complete your security system, you may need additional components, including:

  • Security cameras (existing or new hardware)
  • Door readers
  • Security locks (electrified locks, electromagnetic locks, etc.)
  • Access control panels
  • System servers
  • Authentication tools (keycards, PIN pads, biometric access control, etc.)

Make sure you do your research on integrating components and software. We can connect you with a qualified security integrator to help navigate related decisions.

  • IT Infrastructure: Your network architecture may be simple or complex. Every organization will have different needs, depending on what they hope to accomplish. Some may want an on-premise system, while others prefer hybrid or cloud-based video surveillance and controlled access. XProtect VMS is cloud-ready, and many of our access control technology partners also have cloud-based options. We can help you decide which direction works best for your needs. With that in mind, you should consider any hardware and software costs for your cloud-based access control and video management. Network bandwidth is usually a significant consideration for your security video. However, access control data is more easily transmitted across the network because it is less bandwidth intensive than video.
What’s the difference between unidirectional and bidirectional integrations?

While unidirectional integration allows one system to send data to another, bidirectional integration enables two-way communication, offering greater flexibility and functionality. Bidirectional integration allows XProtect to share information and video with access control systems. The ACS can return door control information to the video management platform. This two-way communication creates a more comprehensive and responsive security environment.

With unidirectional Integration, information flows in one direction, typically from the access control system to the video management system. This approach is simpler to implement but can limit the potential for advanced functionality.

Unidirectional integration is quite common in the industry. XProtect has unidirectional integration with major access control manufacturers. Bidirectional integration is more complex, so it is not widespread. However, it is valuable for enterprise security deployments.

For example, the bidirectional integration between XProtect VMS and LenelS2's OnGuard access control system enables a rich exchange of information, empowering operators with comprehensive situational awareness. By leveraging bidirectional integration, organizations can create a more unified, efficient, and responsive security infrastructure that adapts to evolving threats and operational needs.

Bidirectional integration allows for two-way communication between the access control and video management systems. This enables more sophisticated interactions and enhanced functionality. This seamless interaction improves operational efficiency and provides a more comprehensive security solution, but it is less common due to the complexity.

What do security operators get out of the integration?

The integration lets you add video capabilities to your access control and intrusion systems, manage them all from one centralized interface, react faster to events and reduce costs and complexity.

XProtect Access supports integration with various commercial door access control systems, allowing customers to choose their preferred solution. The bidirectional integration with LenelS2 ACS platform offers advanced features such as two-way alarm handling and controlling doors directly from the XProtect Smart Client. In addition to the Smart Client, you can grant or deny access remotely via notifications in the XProtect Mobile Client.

Here are a few of the benefits you’ll get with XProtect Access:

  • An operator user interface for multiple access control systems in the XProtect Smart Client
  • Faster and powerful integration of access control systems
  • More functionality for the operator

In the XProtect Smart Client, the operator gets:

  • Live monitoring of events at access points
  • Operator-aided passage for access requests
  • Map integration
  • Alarm definitions for access control events
  • Investigation of events at access points
  • Centralized overview and control of door states
  • Cardholder information and management
  • The audit log sends user commands that users perform to the ACS
What is video verification?

Video verification is a vital component of integrated access control and video systems, enhancing security operations significantly. When an access control event occurs, the system automatically retrieves relevant video footage, allowing security personnel to confirm the identity of individuals attempting to gain entry. This capability enhances real-time situational awareness, enabling quick assessments and informed responses to potential threats.

Operators can make more informed decisions by visually verifying visitor identities in real-time before granting access. Video verification also moves the operator from a reactive to a proactive stance, giving them instant ability to respond quickly to developing situations.

Additionally, the integration streamlines investigations by correlating access logs with video evidence, saving time and improving efficiency. Administrators can configure automated alerts to display video feeds during specific events, reducing false alarms and ensuring adequate security resources. By combining access control data with visual evidence, organizations can enhance their security posture, making more accurate and timely decisions regarding security incidents.

The seamless exchange of data between systems improves the experience for security operators. Access control events are displayed directly within the XProtect interface. At the same time, personnel can view video footage using the access control software. In the case of a bidirectional integration, operators can use either platform to suit their needs.

Integrating door access control with video management addresses several key challenges:

Real-time situational awareness: Security personnel gain immediate access to relevant video footage when access control events occur, enabling faster and more informed decision-making.
Efficient resource management: Integration allows for better allocation of security resources by providing a comprehensive view of security operations.
Data-driven insights: Combined data from access control and video systems can reveal patterns and trends, informing security strategies and operational improvements.
Rapid response: Automated alerts and actions triggered by integrated systems enable quicker responses to potential security threats.
Enhanced asset and personnel protection: The synergy between access control and video surveillance creates a more robust security ecosystem, safeguarding people and assets.

Fire and life safety codes

Access control systems must comply with fire and life safety building codes, such as NFPA and IBC. The exact guidelines can vary depending on which state, municipality and sector you operate in. For example, your system might need to be fail-safe, meaning that doors automatically unlock in the case of a power failure, prioritizing occupant safety for emergency exits. Fail-secure, however, keeps doors locked during power loss, maintaining security to prevent unauthorized access. The latter option might be mandatory for certain critical infrastructure scenarios.

Rules and regulations surrounding access control can get complicated, but the good news is that Milestone has a global network of resellers and system integrators who offer region-specific expertise. They can help you navigate the relevant codes to help give you peace of mind.

Why XProtect?

XProtect is an open platform, device-agnostic video technology that provides significant flexibility for users. Milestone is centered on empowering organizations with data-driven software that adapts to various needs and environments.

XProtect open platform works with a wide range of hardware choices, including cameras and IoT sensors. Users can integrate their existing hardware or choice from multiple vendors to supply their needs.

Companies typically face two main options when choosing integrated security platforms: end-to-end and open platform systems. Each has its own set of pros and cons.

End-to-end systems are like buying a complete package from one company. They offer smooth integration between different components, and you only deal with one vendor for support. However, these systems can be rigid. You might find it hard to add new features or expand the system as your needs grow. Plus, the choice ties you to that one vendor for everything. If you decide to change your system, you may have to replace everything, losing your previous investment.

Conversely, open platform systems give you more freedom to mix and match. You can pick the best components from different vendors to build a system that fits your needs perfectly. It's usually easier to add new features or expand these systems. The downside is that putting all these pieces together might be complex, and you'll need to manage relationships with multiple vendors. As a bonus, you may be able to leverage existing equipment, such as cameras or servers, saving money in the long run.

XProtect’s open video management platform allows users to manage installations ranging from a single location to multiple sites with numerous access points. It can also integrate with various building access control systems simultaneously, providing flexibility for organizations with complex security needs.

Ultimately, the choice depends on what works best for your specific situation and plans.

Milestone offers a robust partner program supporting value-added resellers (VARs) and security integrators. This huge network of partners allows customers to leverage the expertise and local presence to deliver products and service to end customers.

Get in touch

If you want a qualified Milestone VAR that covers your region, here are more details on our website.

Discover more about access control integration with XProtect VMS. Your local Milestone representatives are available to discuss the complexities and options you have available. Just schedule a meeting to learn more.

Tags
Ready to see what we have to offer with smart video technology? 
Book a demo
You will be logged out in
5 minutes and 0 seconds
For your security, sessions automatically end after 15 minutes of inactivity unless you choose to stay logged in.