An electronic access control (EAC) system is a security control system used to physically manage entry and exit...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
into secure areas of an office or work site. You may use this EAC technology with your employee badge to unlock the entrance to your building. Both EAC and biometrics have the same requirement: the user must validate his or her access before entering. This entry can be validated by several methods: a smart card, a smart badge (with a proximity access technology), key pad entry or a biometric check.
For exiting, however, EAC can be configured into two types of systems: free exit or controlled exit. Here's the definition of each:
- Free exit system: There is no requirement for passing out of the secure area. The electronic access control system either detects someone approaching an exit (usually with motion sensors) and unlocks the door, or has a release button or bar that allows people to leave.
- Controlled exit: This uses the same security for travel in both directions: Employees have to enter the code or wave their card to get in or out of the secure area. By law these systems must be set up to allow people to exit if the system fails or power goes out.
So EAC is the security mechanism for access, and biometrics is one of the methods of authentication to enable access to the physical area secured by the EAC.
For more information:
Dig Deeper on Enterprise Risk Management: Metrics and Assessments
Related Q&A from Randall Gamby
Enterprise SSO products have matured over the years, so what's the state of eSSO today? Expert Randall Gamby discusses.continue reading
Enterprises need a full understanding of the FIDO authentication framework before switching to its technology. Expert Randall Gamby looks at the most...continue reading
A self-managed HSM appliance may be the safer external key management system to use with your organization's encryption keys. Here's why.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.