Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Are You Following These 6 Access Control Best Practices?

June 16, 2017

Are You Following These 6 Access Control Best Practices?

Researchers estimate that the global access control market is growing at a rate of about 30 percent a year—an astounding figure, no matter what part of the world you live in. No doubt you’ve incorporated various access control systems into your product offering and are looking for ways to continue your success in the future. But how does your approach stack up against industry best practices?

As the access control market continues to boom, now is the time to ensure that you are following these six key best practices:

1. Always optimize your integration opportunities.

Gone are the days when value-added resellers (VARs) and their customers thought of access control as a separate, stand-alone system. Today, access control devices are being integrated closely with a wide range of physical and logical security solutions, including video surveillance, video management software, intrusion detection, fire alarms, and building control.

For each new customer, consider ways in which integrating access control with other systems might improve their level of security, minimize costs, or save on resources. You’ll wind up with a more satisfied customer in the long run.

2. Document each system.

Documentation is important for any technology installation, as it helps you keep track of assets and makes troubleshooting and system expansion much easier. For access control, it’s a must-have, especially in facilities with hundreds or even thousands of doors.

As access control technology grows increasingly complex, many VARs are starting to use CAD-based software and third-party documentation services to ensure that their installations are carefully documented, both now and following any updates or upgrades.

3. Make data security a top priority.

In this age of advanced hacking techniques, it’s more important than ever to carefully secure your customers’ access control data. Make sure you’re implementing technology that uses the most effective security measures for safeguarding information such as PINs, user names, and biometric markers.

4. Train up and down the ladder.

Once your system is installed, employees at all levels of the organization should be fully trained to use its various features. Working with your various contacts at the company, ensure that everyone—from the executive suite to management to hourly employees—understands each aspect of the technology. This will help ensure more seamless everyday use and help employees remain calm during an emergency event.

5. Make a plan for future growth.

Much like video surveillance technologies, access control is advancing at a rapid pace. So be sure that you’re designing each solution with the future in mind.

Your customers may need to upgrade or expand their system in only a few short years. Meanwhile, new innovations will emerge that might provide additional benefits. The goal is to keep your solutions open, agile, and flexible to allow for future growth.

6. Address any issues right away.

Access control is a technology that your customers will use every single day—and, in many cases, several times a day. So any issues that emerge will be noticed quickly and can rapidly become a hassle.

For these reasons, it’s important to address any issues right away. Make it a priority to service your existing customers within 24 or 48 hours of their initial call. That way, you’ll prevent a relatively small problem from escalating into a negative impression of your company.

Have you encountered any other access control best practices that you’ve implemented into your business?