Putting Access Control Myths to Rest


Making the switch to EAC (electronic access control) from conventional solutions involving
physical keys and security guards can be a daunting process. With technology that is constantly
changing, making the move to embrace modern security solutions is a challenge for those who
have spent years with conventional products. While most decision makers may think that they
have a grasp on the pros and cons of going with one solution over another, it is important to
have an understanding of some of the misconceptions and myths that surround the field of EAC.
Here we will take a look at what some of these access control myths are and what the reality is in today’s security landscape.


#1. EAC Solutions are only for doors:

While it is true that these solutions were in their earliest iterations developed for door control
through hard-wired systems, the current technology extends across a wide array of standalone
products used in a variety of applications. Electronic padlocks and lockboxes are often
connected with EAC software and used to securer fences, sheds, garages and other outdoor
equipment, as well as indoor items such as cabinets, lockers and other interior storage.
Windows are commonly protected by EAC, and these solutions may also be used to tailor
access from person to person within an organization, splitting groups of people by access level.


#2: EAC Solutions are too expensive:

Although out-of-pocket costs are a given when replacing or implementing electronic security, the
benefits over the short to medium term are often enough to deliver a significant return on
investment, depending upon what issues the system was put in place to address. In some
cases, a strong EAC system can actually put money back into the businesses that use them by
eliminating labour and other overhead costs associated with the upkeep of antiquated systems.


#3: EAC Solutions are complicated:

Rather than create additional hurdles to jump for the enterprise security staff, modern-day EAC
technology is designed to address the pain points of traditional systems specifically to make
their use easier than the alternative. An organization making use of mechanical solutions would
have to deal with delays and downtime while trying to gain authorized access to restricted areas
or materials. But using EAC, employees can self-serve access to critical materials and sites
using mobile phones or access cards with complete assurance that only the right personnel are
gaining access to sensitive locations. Security managers will benefit from both flexible access
control and the enhanced monitoring made capable by a system that keeps constant and
accurate logs of all access and access attempts.


#4: EAC Solutions lack durability

While some may assume EAC products to be made from vacuum-formed plastics, the truth is
that they are generally made with the same quality or better of materials as their mechanical
counterparts are. The misconception that EAC products lack durability due to them containing
more technology is mostly baseless. Bluetooth enabled locks, for example, come to market
featuring wide metal bodies and boron alloys to resist cutting and sawing attacks just like
industry standard heavy duty mechanical locks. Many EAC solutions are weatherproofed to
prevent rusting and deterioration caused by harsh outdoor conditions. Also, the lack of a
keyhole helps prevent the effects of weathering by preventing moisture and particulates from
entering into the functional mechanism.


#5: EAC Systems are less secure

Bluetooth is one of the most popular short-range radio communications standards in use today.
When used in EAC applications, the user’s credentials remain protected behind the security
measures of their smartphone such as a PIN or biometrics. Within the last several years, 2FA or
two-factor authorization has been used to protect further from unauthorized access. With a
conventional keyed system of access control, the theft or loss of the keys would be a major
emergency and possibly require rekeying of multiple locks. Using EAC solutions, access is
controlled centrally and does not require any physical manipulation of a locking mechanism, so
a lost key card can simply have its access privileges removed. This is a major cost and time
saving measure over time and a big reason why huge segments of multiple industries are
switching to EAC.


The security of data in these solutions can be protected with 256-bit AES, end-to-end mil-spec
encryption to proof against hacking or tampering efforts. This is a standard that the NSA
maintains internally to be resistant to brute force attacks and is significantly more secure than
using just the standard security on a smartphone.

As you may be able to tell, EAC is becoming the de-facto standard for security. This market is
projected to continue to expand along the increased need for both physical and data security in
residential, commercial, industrial, and government facilities. Those who have not made this
transition away from lock and key security measures risk being vulnerable to increased
long-term costs as well as security breaches, particularly those occurring internally.
With reliability, scalability, and seamless integration into legacy security, EAC has shown over
the years to be worth the investment and even more than pay for itself in a wide array of
industries. Make today the day you make the move into the future of access control for your project.


Contact us today:

Call us 24/7 at 210-446-4863