A Guide To Standalone Access Control

Access control systems are available with so many options depending on a number of factors. If you are looking for a cost-effective solution for a single door or two that doesn't require a high level of security, a standalone system is likely to be the best option.
 

What does standalone mean for an access control system?


A standalone access control system is literally a system that can "stand on its own" without the requirement for a network or a PC. 


Different types of standalone system


There are two main types of standalone access control system. The most popular combines the functions of a door controller into the reader or keypad itself on the door's unsecured side. This does have its drawbacks as the system's design leaves it somewhat exposed to unauthorised access if the reader were to be removed from the wall and the right wires shorted. In reality, this sort of standalone system is useful for internal doors but not recommended for external doors due to its vulnerabilities. 

These standalone readers use their inbuilt programming to capture, record, verify and store data internally as audit trails and logs such as which users have accessed the door and at what times. Some systems allow data logs to be uploaded to a USB stick or similar should the information need to be analysed. User credentials are typically enrolled at the reader using specific programming cards. This makes the reader far more useful as a security device than purely straightforward access restriction.

The second type is a split system that uses a separate reader or keypad on the door's unsecured side and a standalone door controller on the secure side. Whilst this does require a little additional effort to install, both systems require a power supply within the building with cable extending through the wall on an external door and the benefits of a split system far outweigh the additional installation time. 

This type of standalone system has a much higher security level due to the containment of the control equipment within the building. Programming to capture, record, verify, and store data is carried out by the separate control unit, but the reader itself is used to enrol user credentials. As with the other variant of standalone system, enrollment of user credentials is often carried out with a set of enrollment cards, but some systems use a handheld programmer. 
Audit trails and logs such as which users have accessed the door and at what times are stored within the control unit and can often be uploaded to a USB stick or similar should the information need to be analysed. 



Standalone access control system components


As with a PC based system, you will require several components to install a standalone system. 

 

Power supply unit

 

As with all electronics, the components of the system will require power. A fused spur and the appropriate PSU to supply your system should be positioned internally no matter which type of standalone system you install.

 

Electric locking device

 

In order to allow access through a restricted door, you will need an electronic lock of some description for the access control system to release.

 

Exit device

 

What type of exit device you need will depend on the requirements of the secure area. If the facility requires a log of which user was granted egress, a second reader will be required on the door's secure side. Generally, this option is only available with a split system that has a separate door controller. In other situations, you would require an exit button. 

 

Emergency exit device

 

Any access controlled door should have the facility to override the system in the event of an emergency evacuation. Most commonly used is the breakglass unit.

 

Credential reader

 

There are several options available, depending on which type of credential reader will best suit the end-user and the security level required.


Door controller (if using a split system)

 

If you are using a split system, you will require a standalone door controller.


Standalone credential readers

 

Similarly to a PC based system, there are different credential reader options available to suit all requirement and security levels. These include:

 

Proximity reader

 

Proximity readers require cards or fobs programmed into the system and allocated to an individual. They allow entry into certain areas of your business when detected by a reader they have access rights to. Access is granted (or denied) with a wave of the fob or card in front of the reader. 

 

Keypad

 

Keypad access requires no consumable. Access is granted (or denied) with entry of a pin code at the keypad. The pin code is programmed into the system and allocated to an individual or group of users. 

 

Combination pin and prox

 

Pin and prox readers combine keypads with proximity reader technology and are designed for higher security installations. This dual method of identification uses a PIN for the keypad and a proximity card or fob. This second layer of identification allows for much greater security.

 

Magnetic stripe reader

 

Similarly to a proximity reader, swipe card readers work by granting access when an employee swipes a card through a sensor. This type of technology allows each user to have unique credentials programmed to them, so every person's swipe card is unique and gives them specific access rights.

 

Bluetooth reader (BLE)

 

A newer development in the access control industry, Bluetooth (BLE) readers utilise the technology on a user's mobile phone as a credential. This is a useful addition to the industry as it is rare a user will forget their mobile phone!

 

Biometric

 

Biometric readers enable access based on an individual's physical attributes, such as fingerprints, facial recognition, voice recognition, or retinal scans. False authentication is made much more difficult with physical attribute identification due to the complexity of the credential. For example, fingerprint biometric recognition technology works by scanning the unique ridges and patterns within a person's fingerprint. This is almost impossible to replicate in a real-life scenario. 

In the wake of COVID-19, it is becoming more common to use thermal imaging systems as a form of biometric access control to measure an employee's temperature before granting them access to the building. This is another way to keep your employees safe as a high temperature could indicate a highly contagious COVID-19 infection. 


Pros of standalone access control

 
  • Cost-effective - due to the lower level system abilities, standalone systems can be more cost-effective in both their component cost and installation cost.
  • Easy install - no requirement to connect to a network makes a more straightforward install all carried out at the door itself.
  • Scalable - additional doors can be added to the system as required.
  • Variety of credential options available - Different options of credential reader available to suit the facility

Cons of standalone access control

 
  • Inability to monitor in real-time: With no centralised PC controlling the system, reports and logs need to be uploaded regularly and cannot be analysed in real-time
  • Lack of personalised groups and timezones: Standalone systems do not allow the level of personalisation that a PC based system offers
  • Revisions to users need to be made individually: Administering user credentials is done at the reader, and so modifications need to made in the same way for each card/fob

Ideal applications for standalone access control

 

Standalone access control systems are ideal for: 
 

  • Smaller sites
  • up to 4 separate doors to secure (it is possible to use standalone systems for as many doors as required, but the maintenance required for more than four would make a PC based system more effective)
  • Low-security requirement
  • Low number of users
  • Sites that do not require high levels of control over the system
  • No real-time analysis
Related Products