Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Access Control: Google Me an Access System

By Bill Zalud
July 1, 2006
Web-hosted access control solutions allow end-user security to create user directories, which are housed off-site on server farms. The application includes activity logs and other features. Display courtesy of Brivo Systems

Well, not exactly. However, Google Lab’s announcement last month follows or validates – depending if you own Google stock – an emerging security systems model: Web-based electronic access control.

Don’t bother buying Windows Excel software; don’t bother with software at all. Google Spreadsheets is a browser click away – just sign up for the service. You can create basic spreadsheets; upload CSV or XLS data; and save your work online or to your own computer. And there’s collaboration, too.

Is Bill Gates shaking in his Birkenstocks? Maybe. But Microsoft has got its own Web-based application experiments, too.

Whether spreadsheets or access control, history continues to repeat. Products turn into systems and systems turn into services. Security experts interviewed at major conferences believe the industry is in the middle of the second “turn.” There are caveats. For some, it is better to own than rent. And different people define Web-based access in vastly different ways.
 

Shift to browser GUI

Many access control system manufacturers and systems integrators who design have shifted to a browser GUI. Over a local area net, enterprise Intranet or wide area net, security uses the Web browser rather than software on a computer. It also eases the integration of access control with other security functions.

The approach yields significant business benefits including standardization across the enterprise, no matter the number or distance of location; scalability; universal and instantaneous upgrading; as well as a more traditional feeling of ownership. Web-based access systems that require no locally installed software also are better able to meet different and changing configurations while more easily integrating into various industry-leading hardware controllers.

Still, another advantage of the browser, especially in an emergency, is remote operation. Through the browser or an alarm event, security from any location can lock down a facility or a selected area or remote facility in an emergency situation instantaneously,

Then there’s IT.

Systems that require software being loaded on the organization’s network needs more IT involvement since it is responsible for the main integrity of the net.
 

Down on the farm

For a growing number of chief security officers and security directors, there’s yet another way to view Web-based electronic access control, one that’s best viewed from down on the farm, the server farm, that is.

Pioneering service providers – ASP or application service providers specializing in security – now can manage an end-user’s central access control database on a set of server farms. Enterprise security is not required to be connected to a specific personal computer or have any software on their computer or network at all. Enterprise security, however, has typical access control features locally. It’s what some call the ultimate in flexibility.

To understand this latter approach, the best analogy is online banking. Most security executives are familiar with that. They have a secure login and password that protects their data. It’s that same scenario with access control services free of local PCs or software.
 

SIDEBAR: VoIP – It Has Security Uses, Too

Voice over IP or VoIP – hotter for corporate and home phones than on Wall Street these days – also has plenty of volume when it comes to security applications.

For example, Talk-a-Phone’s Voice over IP (VoIP) Interface allows its 400-series emergency phones to be used over an IP data network. The VOIP-1 integrates seamlessly with existing VoIP phone systems, and supports all major VoIP protocols – H 323, SIP and SPP.

There will be a new set of buzzwords and features as VoIP catches on with security. For instance, voice prioritization often uses industry-standard Differentiated Services Protocol (DiffServ QoS). Equipment such as that from Talk-A-Phone has Ethernet connectivity and full IP compatibility with existing routers and WAN infrastructure.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Build a Complete Access Control System

    See More
  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing