{"id":14070,"date":"2019-01-07T08:07:45","date_gmt":"2019-01-07T06:07:45","guid":{"rendered":"https:\/\/www.centsys.co.za\/?p=14070"},"modified":"2019-01-07T08:07:45","modified_gmt":"2019-01-07T06:07:45","slug":"the-road-to-peace-of-mind-plotting-the-access-control-journey","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/","title":{"rendered":"The Road to Peace of Mind: Plotting the Access Control Journey"},"content":{"rendered":"<p>Recent years have seen commercial and industrial properties being erected with much sturdier security backbones than has historically been the case. Place, for instance, a retail establishment built a mere ten years ago alongside one that was developed this year, and it brings into stark contrast the sensibilities and priorities of property developers of the time versus those of today. This can be seen as a somewhat inevitable scenario when one considers the plethora of technological advances that have been made over the course of the past decade or so, but it also puts into perspective the phase shift that has taken place globally from a security awareness point of view.<\/p>\n<p><strong>But are developers and integrators getting it right when it comes to perimeter security? <\/strong><\/p>\n<p>Part of the problem lies in identifying possible threats and designing security systems around those threats, be they tailgating of vehicles, pedestrian intrusion, unauthorised entry to sensitive areas, internal security breaches, etc., etc. One could even posit an ideal scenario whereby the security system is completely holistic and succeeds in combating a wide range of threats without having to rely on a massive infrastructure. This might strike the casual reader as fanciful thinking, but such integrative systems do exist and have proven to be highly effective in commercial settings.<\/p>\n<p><a href=\"https:\/\/www.centsys.co.za\/sliding-gates\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Gate motors<\/strong><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-14076\" src=\"https:\/\/www.centsys.co.za\/wp-content\/uploads\/2019\/01\/Gate_motors_graphic-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/p>\n<p>Gate motors are an absolute staple of access control and offer a reliable and cost-effective means of preventing unauthorised access and promoting security and convenience. Many modern gate motors come equipped with advanced functionality and various high-security features such as time-barring technology and built-in intruder-detection alarms.<\/p>\n<p><a href=\"https:\/\/www.centsys.co.za\/traffic-barriers-accessories\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Traffic barriers<\/strong><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-14077\" src=\"https:\/\/www.centsys.co.za\/wp-content\/uploads\/2019\/01\/Traffic_barriers_graphic-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/p>\n<p>Traffic barriers remain an immensely popular and effective choice with regards to controlling vehicular access into and out of parking areas, but it\u2019s important to ensure that the barriers are suitable for the particular application and environment. For example, if they are to be used in a commercial or industrial milieu, they need to be capable of coping with high traffic volumes (possibly thousands of operations per day) and should be outfitted with some sort of battery backup facility to ensure continued operation in the event of a power failure.<\/p>\n<p><a href=\"https:\/\/www.centsys.co.za\/claws\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Tyre killers<\/strong><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-14078\" src=\"https:\/\/www.centsys.co.za\/wp-content\/uploads\/2019\/01\/Tyre_Killers_graphic-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/p>\n<p>While traffic barriers do make formidable sentries on their own, integrating ancillary devices such as tyre killers and pedestrian barrier fences ensures that vehicular access points are as comprehensive as possible and leave precious little room for trespass.\u00a0 More and more commercial operators are seeing the value of this as a means of combating tailgating and vehicle theft out of parking lots, and adding further security to, for example, tenant parking facilities by integrating proximity access control systems and biometric readers. These technologies not only facilitate access control, but due to their inherently integrative nature and compatibility with software packages and PC administration, they provide administrators with a means of logging transactions, tracking employee movement for time and attendance-based logging, remote site surveillance, etc.<\/p>\n<p><a href=\"https:\/\/www.centsys.co.za\/bollards\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Bollards<\/strong><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-14079\" src=\"https:\/\/www.centsys.co.za\/wp-content\/uploads\/2019\/01\/Bollards_graphic-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/p>\n<p>Interestingly, the term \u201cbollard\u201d has its origins in maritime use, meaning a post or pillar used to moor ships. Therefore, in a sense, its earliest function was to stop or control movement. In the context of access control, bollards perform a variety of functions, including restricting access to high-risk areas such as banks and embassies, traffic calming and demarcating pedestrian areas.<\/p>\n<p>Bollards may be seen as offering the highest level of security and, with their tough construction, they provide a virtually impenetrable barrier against many different types of attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent years have seen commercial and industrial properties being erected with much sturdier security backbones than has historically been the case. Place, for instance, a retail establishment built a mere ten years ago alongside one that was developed this year, and it brings into stark contrast the sensibilities and priorities of property developers of the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[5],"tags":[],"class_list":["post-14070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-acces-control"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>The Road to Peace of Mind: Plotting the Access Control Journey - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"Are developers and integrators getting it right when it comes to perimeter security? We attempt to answer this question by plotting the road to peace of mind\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"The Road to Peace of Mind: Plotting the Access Control Journey - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"Are developers and integrators getting it right when it comes to perimeter security? We attempt to answer this question by plotting the road to peace of mind\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2019-01-07T06:07:45+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"The Road to Peace of Mind: Plotting the Access Control Journey\",\"datePublished\":\"2019-01-07T06:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/\"},\"wordCount\":582,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"acces control\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/\",\"name\":\"The Road to Peace of Mind: Plotting the Access Control Journey - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-01-07T06:07:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"description\":\"Are developers and integrators getting it right when it comes to perimeter security? We attempt to answer this question by plotting the road to peace of mind\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-road-to-peace-of-mind-plotting-the-access-control-journey\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Road to Peace of Mind: Plotting the Access Control Journey\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Road to Peace of Mind: Plotting the Access Control Journey - Centurion Systems French","description":"Are developers and integrators getting it right when it comes to perimeter security? We attempt to answer this question by plotting the road to peace of mind","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/","og_locale":"en_US","og_type":"article","og_title":"The Road to Peace of Mind: Plotting the Access Control Journey - Centurion Systems French","og_description":"Are developers and integrators getting it right when it comes to perimeter security? We attempt to answer this question by plotting the road to peace of mind","og_url":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/","og_site_name":"Centurion Systems French","article_published_time":"2019-01-07T06:07:45+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"The Road to Peace of Mind: Plotting the Access Control Journey","datePublished":"2019-01-07T06:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/"},"wordCount":582,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#primaryimage"},"thumbnailUrl":"","articleSection":["acces control"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/","url":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/","name":"The Road to Peace of Mind: Plotting the Access Control Journey - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-01-07T06:07:45+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"description":"Are developers and integrators getting it right when it comes to perimeter security? We attempt to answer this question by plotting the road to peace of mind","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/the-road-to-peace-of-mind-plotting-the-access-control-journey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"The Road to Peace of Mind: Plotting the Access Control Journey"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/14070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=14070"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/14070\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=14070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=14070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=14070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}