Access control

Access control makes it possible to determine who, when and where an individual is authorised to enter an area or not. The main objective is to protect people, property and company data from intrusions and malicious acts.

Access control: the key to security

Controlling inputs and outputs

An access control system can be used to restrict entry to a location (physical control) or a computer system (logical control) to a certain number of identified people.

This filtering is possible both at the entrance and exit of a building and in the various areas of the site. This can be based on the identity of the person (employees, visitors, suppliers, etc.) and other criteria such as the time of day (all the time, at certain times of the day and/or night), etc.

    • Protect employees from malicious intrusion
    • Protect assets and production tools (theft, fire)

.

    • Limit access to sensitive or restricted premises
    • Know everyone on site in real time to generate a list in the event of a fire or accident
    • Monitor attendance time and movements for statistical purposes and security audits

.

* Whatever the purpose of access control, this system allows you to locate and identify a danger so you can react as quickly as possible and make the best decisions.

Need an access control system? Multi-expertise solutions from the DEF Network

Contact us

How does an access control system work?

There are currently four categories of access control system: mandatory (applies to everyone), discretionary (certain people have specific authorisations at the administrator’s discretion), based on people’s roles and based on rules defined by the administrator.

If we are thinking more specifically of keys, badges, or even security agents to filter passers-by, several technologies are possible:

  • Badge
  • Code keypad
  • Magnetic key
  • Biometric reader
  • Video door entry system/intercom
  • Open by QR code
    • Using the smartphone
    • Opening system via Bluetooth
    • RFID chip (radio frequency identification)

.

  • Raising barriers
  • Turnstiles

3 control steps for door opening

An access control system proceeds in three stages:

  • Authentication: when users present their badge (or any other piece of identification), the system compares the proof of identity with its database.
  • Authorisation: the system checks whether the person has the necessary rights to access the requested location and, if so, grants entry authorisation.
  • Traceability: as each access request is recorded, the system can track the movements of people within the company.

Obligations and standards

Access control obligations and standards

Installing an access control system is compulsory for Operators of Vital Importance (OVI) and the agri-food sector (subject to the IFS Food standard). For other sectors, the installation of access control is a matter for the head of the establishment to decide.

In all cases, access control is one of the most important security levers in a building. It is recommended for use in sensitive areas such as education, finance and banking, energy, data centres, healthcare, etc.

The law and regulations

Access control systems are governed by several laws…

  • Labour Code (Articles L 120-2, L121-8 and L 432-2-1- and Code Civil (article 9)
  • Through the European text RGPD, the CNIL frames the main rules for data processing and retention.

… as well as guidelines for use…

… and norms.

Access control for your home in 5 stages

When it comes to access control systems, there are as many solutions as there are requests. Because every situation is different, depending on the sector, regulatory requirements and customer expectations, the system is installed in 5 stages, allowing it to be tailor-made.

  • Risk diagnosis and analysis

    Description of requirements, risk analysis and definition of intrusion scenarios, zoning, prioritisation of actions, definition of resources to be implemented.

  • Technical study and estimate

    Drawing up of specifications. Choosing the equipment best suited to your needs and budget. Proposal for an estimate.

  • Declaration to the CNIL

    Before any implementation, it is necessary to sign a compliance undertaking for the project and to obtain a favourable opinion from the CNIL.

    For biometric access control, a data protection impact assessment and a specific authorisation request are required.

  • Installation

    Design of the solution in the workshop. Equipment installation and commissioning. User training.

  • Maintenance

    Preventive and corrective maintenance by a qualified and certified service provider. Remote or on-site troubleshooting.

DEF Sûreté, your DEF Network access control expert

DEF Sûreté has specialised in the installation and maintenance of electronic security systems for over 30 years. It can work with you on a simple access control system (single-site) or a complex centralised system (multi-site).

DEF Sûreté manages the solutions of the main manufacturers on the market and the most widespread reading technologies (MIFARE, DESFire, SEOS, etc.). Thanks to this multi-brand approach and our proven expertise in locksmithing, we can offer comprehensive solutions tailored to everyone’s needs and problems.

DEF Sûreté

France

Expert in electronic security solutions
Tel (+ 33) 1 64 47 90 10

En savoir plus


To find this expertise in other countries, click here.

Multi-expertise solutions from the DEF Network A global vision of fire safety for your project

Learn more