{"id":12102,"date":"2022-10-11T11:13:50","date_gmt":"2022-10-11T15:13:50","guid":{"rendered":"https:\/\/senstar.com\/?p=12102"},"modified":"2023-04-25T11:09:24","modified_gmt":"2023-04-25T15:09:24","slug":"integrating-access-control-events-with-video-and-on-site-devices","status":"publish","type":"post","link":"https:\/\/senstar.com\/fr\/security-digest\/integrating-access-control-events-with-video-and-on-site-devices\/","title":{"rendered":"Integrating Access Control Events with Video and On-Site Devices"},"content":{"rendered":"<p>Door activity is the most common of all security events, and electronic access control (EAC) systems are widespread. Linking access control events to video and on-site devices like lighting and intercoms is key to getting the most out of your site&#8217;s security investment. The Senstar Symphony Common Operating Platform unifies video management, access control, and security management under a common interface to streamline processes and reduce operator training.<\/p>\n<p>In this digest post, we demonstrate how Senstar Symphony simplifies common access control events while ensuring a high level of security and the proper generation of building activity log metadata.<\/p>\n<p>The Senstar Symphony Common Operating Platform includes a rules engine that processes and combines events from any supported device, including readers, controllers, perimeter sensors, and third-party I\/O. Events from these devices can be used to trigger programmable actions, including alarms and notifications, adjustment of lighting controls, intercoms, and automated camera callup. For example, a card swipe event at an external entrance could be used to turn on additional lighting. The event would also generate the searchable metadata needed to link surveillance footage to card holder data.<\/p>\n<p>The following diagram shows how Senstar Symphony can use common access control (and video analytic events) to trigger specific actions.<\/p>\n<p><a href=\"https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12107 size-medium\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified-680x271.png\" alt=\"Access control solutions matrix\" width=\"680\" height=\"271\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified-680x271.png 680w, https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified-950x379.png 950w, https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified-360x144.png 360w, https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified-1500x598.png 1500w, https:\/\/senstar.com\/wp-content\/uploads\/solutions_matrix_ac_only-tinified.png 1510w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/a><\/p>\n<p>In addition to automating authorized access control activities, Senstar Symphony simplifies the process for handling non-authorized ones, for example, an expired or deactivated swipe card. With its map display and on-screen controls, operators are notified of the event, can immediately assess the situation via automated camera-callup display, engage two-way intercom systems, and take the necessary action (for example, temporarily unlock the door or dispatch security) \u2013 all from a single, intuitive interface.<\/p>\n<h3>Linking Access Control Events to Video<\/h3>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=jQmpwQpQOYE\" target=\"_blank\" rel=\"noopener\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12111\" src=\"https:\/\/senstar.com\/wp-content\/uploads\/linking-access-control-events-to-video.png\" alt=\"\" width=\"606\" height=\"342\" srcset=\"https:\/\/senstar.com\/wp-content\/uploads\/linking-access-control-events-to-video.png 606w, https:\/\/senstar.com\/wp-content\/uploads\/linking-access-control-events-to-video-360x203.png 360w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/a><\/p>\n<h3>For More Information<\/h3>\n<p>For more information on Senstar Symphony access control module, visit its <a href=\"https:\/\/senstar.com\/products\/access-control\/symphony-ac\/\" target=\"_blank\" rel=\"noopener\">product page<\/a> or contact your <a href=\"https:\/\/senstar.com\/contact\/contact-sales\/\" target=\"_blank\" rel=\"noopener\">local Senstar representative<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Door activity is the most common of all security events, and electronic access control (EAC) systems are widespread. Linking access control events to video and on-site devices like lighting and intercoms&#8230;<\/p>\n","protected":false},"author":5,"featured_media":12103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[22,316],"tags":[],"class_list":["post-12102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-digest","category-access-control"],"_links":{"self":[{"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/posts\/12102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/comments?post=12102"}],"version-history":[{"count":0,"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/posts\/12102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/media\/12103"}],"wp:attachment":[{"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/media?parent=12102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/categories?post=12102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/senstar.com\/fr\/wp-json\/wp\/v2\/tags?post=12102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}