GOT A QUESTION?

FAQS

WHAT IS PHYSICAL ACCESS CONTROL?

The enforcement of how an individual gains access to and from a building, property or any other facility. This is done by assigning credentials (cards, fobs, fingerprint, mobile), which identifies the individual, and in turn, authorizes whether they have permission to enter.

In other words, this is how we CONTROL how someone gains ACCESS into a location.

WHAT IS CLOUD-BASED ACCESS CONTROL?

This form of access control allows you to remotely manage building security and removes the need for onsite servers and dedicated IT resources. Information is stored and managed by a third-party provider using a much larger network (such as the Internet) and you can save, download and access data directly on the hosted service.

In other words, cloud lets you securely access information digitally, so you can use personal devices (smartphone, laptop, desktop, tablet, etc.) to manage your data anywhere, at any time. Cloud-based access control provides larger storage capacity while making information even more accessible.

WHAT ARE SOME PHYSICAL ACCESS CONTROL OPTIONS?

Physical access control options include traditional lock-and-key, on-premise (computer) solutions and cloud-based solutions.

Lock-and-key is the basic level of security technology requiring metal keys that match each lock in your building.

An on-premise solution is an electronic version of the lock-and-key, with the lock controlled by a computer server located inside the business.

A cloud-based solution can secure and control multiple locations from a browser or mobile device, revoke credentials when needed and view live or recorded video from any facility, regardless of location.

See our white paper The Simple Truths of Access Control for more detailed product information.

WHAT ARE THE BENEFITS OF SAAS FOR ACCESS CONTROL?

SaaS (Software as a Service) uses a software “on-demand” approach as opposed to the old way of paying upfront for an entire software suite. Instead of paying for software components you may not need, the SaaS model allows you to decide what you want to use and subscribe to in order to protect your facility.

Benefits include system flexibility and scalability, mobile conveniences, instant access to data and integrations with other systems you use every day. You also have easier access to technical support, reliable system maintenance and can minimize IT and server-related costs.

See our white paper Top 6 Benefits of Cloud-Based Access Control for more information

WHAT MAKES BRIVO INNOVATIVE AND DIFFERENT THAN TRADITIONAL PHYSICAL SECURITY SOLUTIONS?

The components of SaaS, digital cloud, hosted server and remote access are all brought together in the Brivo Onair unified security platform.

Brivo combines access control and video surveillance to easily manage facilities from anywhere, at any time, with any device. Remote management lets security administrators add users, edit permissions, create access schedules and user groups, and open doors without having to be onsite. Administrators now have the ability to secure their facility and support building users with the click of a button. With integrated video, they can link access events to video recordings to gain insight into what is happening at multiple locations around the globe. With integrated visitor entry systems, administrators can make sure their tenant directories are always up to date and securely grant access to visitors from their phone or tablet.

Brivo also takes mobile to another level with cyber secure mobile credentials. Authorized users can open doors by downloading an app on their phone. For added layers of security, mobile biometrics and multi-factor authentication is available for doors and restricted areas. With convenience and ease also comes a commitment to make the world a safer place by securing buildings using reliable, scalable and cyber-hardened technology.

See our infographic Brivo Way Versus Old Way for more information.

HOW DO I DECIDE WHAT I NEED FROM AN ACCESS CONTROL SOLUTION?

When deciding how to choose your access control platform, follow these six steps:

    1. Review past security incidents and identify any weaknesses in your physical security system that led to an incident.
    2. Identify causes for concern to determine functions you want to better manage (e.g. timely opening and closing of business operating hours or the need to monitor employee behaviors).
    3. Figure out what operational inefficiencies you need to solve (e.g. frequent rekeying or keeping your system firmware and software up to date).
    4. Outline your desired outcomes.
    5. Prioritize what you need.
    6. Scope the project and number of doors you need to secure.
HOW DO I DETERMINE WHAT I NEED TO BUY?

Think about the following considerations when deciding what you need in the short-term and long-term:

  • The number of doors you need to secure today.
  • The number of doors you’ll need to secure as you expand—this dictates the type of access control system you’ll want to use. Cloud-based systems are adaptable and scalable.
  • The physical makeup and use of your doors—this dictates which types of locks and entry systems to use.
  • The use of the doors—are some only for customers, employees, or vendors? A cloud-based system will allow you to schedule and grant access to doors by user group.
HOW DO I CHOOSE A SYSTEM PROVIDER?

A provider should accommodate your specific business requirements. The best providers will ask questions and help you choose a system that best fits your needs. It isn’t required for a provider to see your facility, but they should do a site visit or ask for photos of access points to better scope your project. Look for a provider with experience in business and commercial-grade access control.

You also want to consider the ability to integrate physical security with other enterprise systems (e.g. HR system) so you should ask about system capabilities and API. Finally, a big concern in the market today is cybersecurity and how your provider keeps the system secure. There are several questions you should ask your provider to evaluate the cybersecurity of the platform before you install it.

See our white paper Cybersecurity and Physical Security- Questions to Ask Your Provider for more information.

HOW CAN I ALIGN MY SECURITY STRATEGY WITH THE EVER-CHANGING TECHNOLOGICAL ENVIRONMENT?

Major technological factors are disrupting the security industry, such as cloud, social, mobile, big data and IoT. For instance, more businesses are trying to balance security and control with better user convenience. We also see a need for access to more data to improve security and be proactive and preventative. It is important to apply new technologies to create better security solutions and gain insight into how this digital disruption might change market dynamics and affect customer choices.

See our white paper Digital Transformation in Physical Security for more information.

ABOUT BRIVO PRODUCTS

HOW DOES BRIVO MOBILE PASS WORK?

Brivo Mobile Pass is a built-in feature of the Brivo Onair cloud-based access control system. Administrators can send a Brivo Mobile Pass by emailing an invitation to a user. Brivo Mobile Pass skips the reader and communicates from the phone directly to a secure, authenticated cloud. All Brivo Onair accounts can use this feature without the need for new card readers, control panels or smartphone upgrades.

DOES BRIVO WORK WITH DIFFERENT TYPES OF DOORS?

Brivo access control is a keyless entry system, so it can be installed with many forms of entry. The Brivo platform allows a user to open a wide variety of access points including exterior, interior, gate, store-front, glass doors, cabinets, lockers, server racks, elevators and garages with their credentials (keycards, fobs, pin numbers, mobile, etc.).

DOES THE SYSTEM INTEGRATE WITH INTERCOMS, SPEAKERS OR DOOR BUZZERS?

Brivo connects your visitor entry system and physical security platform with our 2N IP Verso Intercom integration. You can seamlessly configure your 2N device from Brivo Onair and set-up automatic downloads so your tenant directory is always up to date. Our integration also allows tenants and attendants to grant access to visitors from their phone.

To integrate other systems, Brivo panels have the necessary inputs and outputs to work with your preferred visitor entry system. Brivo Onair also has an open API to manage users, subscribe to events and control devices.

Visit our API page to learn more about our integrations.

HOW SECURE IS THE SYSTEM? HOW DO I KNOW IT WON'T BE HACKED?

As a physical security provider, we at Brivo believe that information security is of paramount importance to maintaining the safety of your facilities. That’s why information security has been a consideration since day one in our data centers, field hardware, people and processes. Everything from how we build products to how we deploy applications and manage our business has been designed for cybersecurity in today’s enterprise landscape.

Brivo has continuously applied networking and application security best practices to our cloud-based access control system. More than ten years of SOC audits underscore our commitment to protecting customer privacy and data security.

See our overview Cyber Secure Best Practices for more information.

DOES BRIVO INTEGRATE WITH OTHER SYSTEMS?

The Brivo Onair unified security platform is specifically designed for integration. This allows you to be in the driver’s seat and build a security system to your own unique specifications. Our integrations help you achieve better security with less work, optimize mobile convenience, deliver better visitor experiences and create an ecosystem of building automation solutions.

The possibilities are endless—from integrating with third-party camera products to identity and access management solutions like Okta, Azure Active Directory and G Suite. We also integrate with visitor management, multi-family, co-working, health and wellness and elevator control systems.

For a list of all of our integrations, please visit our API page .

WHAT KIND OF DATA SHOULD I EXPECT TO GET FROM THE PLATFORM?
Currently, you can access event and video data. Here are some ways to use the data to improve business operations and physical security:

  • How do daily security patterns compare across my facilities?
  • What signals precede an actionable security event?
  • Which facilities exhibit the most off-hours video events?
  • Where are administrative privileges changed most often?
  • Which locations stand out this week? This month? Every month?
  • What is the seasonal variation in security events?
  • How do my large facilities differ from my smaller facilities?
  • How do my physical security data correlate with other data sources?

HOW TO BUY

N
Talk about your needs
N

Connect with the right partner

N

Customize your solution & install