Up in the Clouds: Top 5 Benefits of a Cloud-based Access Control System

Up in the Clouds: Top 5 Benefits of a Cloud-based Access Control System

When it comes to managing your access control, we all want to work smart with speed and efficiency while minimizing the steps to gain total control of an office or facility. Whether you have two doors or two hundred, one building or fifty buildings, managing who goes in and out must be controllable anytime, anywhere. A cloud-based access control system delivers exactly that control—the flexibility to manage multiple access points and locations, at any time, on any mobile device (smartphones, tablets) or desktop computer. Following are several top benefits of a cloud-based access control platform and why you should consider updating your traditional on-site software system.

Full Integration with Superior Flexibility & Scalability

Cloud access control works similar to other enterprise cloud-based applications like Google Drive, Dropbox or Salesforce. The cloud offers a new freedom to operate remotely and on-the-go using just your mobile device. No longer do you have to be on-site with a dedicated computer to administer users, groups or access control settings, remove lost credential or simply to provide access to a staff member or contractor/vendor. Cloud access control offers more than just mobility and convenience. It can be evolved into a connected building platform that delivers comprehensive facility security management through integration with intrusion alarm and video surveillance systems. Engineered and ready for enterprise level scalability, these systems are often able to leverage existing wiring and electronic lock hardware infrastructure as you continue to expand. The cloud-based evergreen software solution provides an easy and cost-effective means of expansion so it can keep up with your growing business needs. For example, the system can utilize an existing network infrastructure to provide remote security management for badging, reporting, and alarm and event monitoring.

Optimized Interface & Reduced Training

Several leading cloud access control systems feature intuitive and familiar user interfaces and experiences. Choosing the right one will depend on your business needs and what works best for you. Ultimately, a real-life demo with the application will be needed. With the right system, platform and integrator, you will be able to minimize ongoing training costs because the system is as intuitive as using your smartphone. 

Future-proof System with Risk Management

With a cloud system, managing the software and the servers are left to the experts, who ensure best practices are implemented at all times. This professional attention assures system reliability via a dedicated technical. Another benefit is the complete elimination of local servers and software. By shifting operational tasks to the cloud, you remove the cost and complexity of a traditional security system. This configuration future-proofs your system while reducing business risk with service delivered from secure, redundant data centers that are monitored year round 24/7. 

Full Automation

Cloud solutions are also commonly known as Software-as-a-Service (SaaS). This is a software licensing and implementation/installation business model that makes the SaaS vendor solely responsible for deploying, managing, and maintaining the critical support infrastructure (servers, operating systems, databases, application security, power, etc.) and processes (patches/upgrades, backups, database administration, etc.). By shifting these responsibilities and tasks to an SaaS vendor you reduce costs and risks and increase up-time. Many businesses with multiple offices and facilities struggle to maintain and update their servers. With limited human resources and time, automated software updates and patches are one of the most significant benefits of cloud access control systems.

Speedy Access to Data & Analytics

We all live in a technical business environment. Today everything operates in real-time. With data collected and stored in the cloud, information and reports can be accessed anytime and anywhere. Furthermore, you now have the ability to view card-holder transactions in real time via your mobile or desktop interface. Preventive measures can include: establishing alerts or notifications when an employee or visitor attempts to access an unauthorized area or setting up tiered access by restricting permissions to specific members of your staff during designated time periods.

How we can help

For nearly 25 years our team at California Commercial Security (CCS) has provided comprehensive, quality security products and services to clients in San Diego County, Southern California and the Southwest. We realize that many businesses have grown weary of dealing with “big” security providers who treat them like another number. At CCS we emphasize personalized services and solutions that are customized to the specific requirements of our clients’ commercial space. 

Let us explain with clarity and transparency how Cloud-based Access Control works—and how it can work for you. Call us today at (800) 286-2555 and schedule a free consultation.

Do You Have 24/7 Live Monitoring For Your Lab Equipment?

Did you know that your lab equipment can be connected to and monitored by your existing burglar alarm system? The last thing a researcher or lab manager wants to find out is that a freezer, refrigerator, or incubator has failed overnight and ruined precious specimens, samples, etc., as well as the loss of countless hours of research.

CCS offers a solution to integrate the monitoring of critical parameters for your lab equipment such as -20° and -80° freezers and incubators with your existing burglar alarm system to provide 24/7 live monitoring. This solution combines two systems into one which makes your job easier.

The individual responsible for that specific piece equipment can be sent alarm notifications via telephone, email, or both.

This live monitoring is far more reliable than the common practice for standalone monitoring systems. Our 24/7 live monitoring will make sure the right person is contacted so the problem is solved before sensitive and expensive samples, specimens, or products are damaged, potentially saving you tens of thousands of dollars and hundreds of research hours.

BioComMaking security simple so you can focus on making science happen.

Contact us: Enter your information below or call (800) 286-2555


Contact Us

StoneCrest office campus adopts Hattrix Hosted Solution

We are happy to commence work on a security upgrade of the four-building StoneCrest office campus from a failing legacy Card Access system to a new Kantech  hosted solution. The system will help the new property management manage security more efficiently and securely.

The difference between standard and encrypted access cards

by Charles Baker, CEO California Commercial Security

Critical improvements in security technology prevent the duplication of access cards


Standard Access Cards:

The tried & true proximity technology inside standard cards and key fobs is an old method using a unidirectional relationship between an access credential (card or fob) and a proximity reader. When a credential is presented to a proximity reader, an internal chip is energized and sends its data to the reader. The reader then transmits the data to the controller.

Today it is easy and inexpensive to use a 3rd party product or service to read and duplicate standard proximity credentials.

Encrypted Access Cards:

Encrypted access cards employ bidirectional communication between the access credential and the reader that requires mutual authentication. This handshake authenticates the relationship between the card and the reader via an encrypted key before releasing the actual card data,  after which the reader transmits the data to the controller.

This bi-directional verification eliminates the unauthorized duplication described above,  and represents one of the most effective card technologies available today.

Manufacturers are constantly evolving their security technology in response to ongoing pressures in the marketplace from bad actors. At CCS we are doing our part to educate our clients and encourage the adoption of newer and safer technologies. We only install card readers with new encrypted technology.

California Commercial Security has been serving the San Diego community for over 15 years and we have installed hundreds of card readers, serving thousands of users. If you’re interested in learning more about access control in your facility, please give us a call (800-286-2555) or contact us here.

Four Reasons a Life Science Startup Needs Access Control

by Charlie Baker, CEO California Commercial Security

The Life Science Security Struggle

When you work at a startup, the entire team comes in every day with a laser focus on one thing—developing the next medical breakthrough. With such a strong focus on your core objective, it’s easy to put off or neglect other essential aspects of your business, specifically physical security. When we say “physical security”, we’re not talking about armed security guards or angry guard dogs. We’re referring to the technology and systems that you use to keep your building, labs, equipment, and people safe and secure from both internal and external threats.

As you grow, and at any size, it’s always important to have and maintain the appropriate level of access control to monitor and record who is accessing your equipment, intellectual property, and facility, and when they are doing it.

If your team is still using standard/mechanical keys and locks, (or a guard dog) here are four compelling reasons for you and your team to upgrade to an access control system.

1. Improved Security: Keep up with the bad guys

Security technology improves every year, and so do the technologies that threaten your security. For example, there are cell phone apps today that can scan and copy mechanical keys within 30 seconds. Mechanical locks are less secure today than they’ve ever been. Access control technology can truly secure your facility.

2. Stronger Record-keeping: Critical audit trail 

An Access Control system maintains an audit trail of entry & exit information so that you always know who is in your building and when. Records can also be reviewed to see who was in a facility in case of incidents. This record keeping is necessary for companies with compliance requirements.

3. Scalability: System can grow with you

As your company grows, so can your Access Control System. Adding security for new suites is not too different from adding an additional phone to your VOIP system.

4. Focus on your Purpose: Make science happen

Our hosted access control solution makes security simple so you can focus on making science happen. Our security solutions also include apps that allow you to control your security system from anywhere.


California Commercial Security has been serving the San Diego Life Science community for over 15 years and we have installed hundreds of card readers, serving thousands of users. If you’re interested in learning more about access control in your facility, please give us a call (800-286-2555) or contact us here.

Take advantage of the NEW $1 million tax benefit by investing in security and life safety measures

Are you eligible for $1million in tax deductions?

Businesses have been always been able to deduct business-related equipment placed in service, but security systems did not qualify – now they do. Beginning in 2018, the Tax Cuts and Jobs Act  allows qualifying businesses to deduct the full cost of new “Security and Fire Protections Systems,”up to $1 million. Prior to passage of the Act, companies had to be depreciate the system cost over a period of up to 39 years. The legislation was passed to encourage businesses that are considering capital investments in this critical area and promote industry investment.


The Security Industry Association (SIA) worked with industry groups to expand deductions under Section 179 of the IRS tax code which empowers businesses to deduct the full purchase price of qualifying equipment and/or software purchased or financed during the tax year. The revised tax code permanently expands eligibility for deductions to fire protection, alarm, and security systems along with other equipment placed in service in 2018 and beyond.

Talk to your accounting partner to understand the impact this could have on your business.

Enter your information below to receive a call or reach out directly at (800) 286-2555!

Contact Us

CCS & Fairway Technologies

We are pleased to announce that California Commercial Security has been selected by Fairway Technologies, a software development firm based in Irvine with a second office in San Diego, to provide their security integration solutions.

Working with the Fairway Technologies team, CCS System Sales Engineer Emma Bowlin was able to devise a security solution tailored to the company’s needs.

New Access Card Duplication Kiosks Pose Security Threats

The Problem

More than 30 self-service key duplication kiosks have been installed at convenience stores and supermarkets in San Diego. These kiosks offer an inexpensive and easy-to-use “card or fob” duplication service. The service has been tested and fully functional duplicate cards and key fobs were received.



What does this mean?

Individuals with standard proximity RFID cards/fobs can easily purchase duplicate cards/fobs without your authorization or knowledge. This service undermines the intent and security of card access systems. It means a system may have unknown quantities of duplicate cards in use.

What can you do?

Call us at (858) 503-7500 or email at sales@calcomsec.com

We have developed a solution to upgrade your system and make sure your facility is secure. Customers can move to advanced credential technologies that use the latest encryption accepted by the academic community and international standards for much stronger protection against cryptographic attacks. HID Global credentials that support SEOS technology provide state-of-the-art cryptography for mutual authentication and data encryption. This technology protects the privacy of contactless communications and ensures no traceable credential identifier is exchanged during card sessions, which prevents data associated to a given card from being divulged or cloned.

We are alerting all of our clients immediately about this emerging issue due to the serious security risks it represents.

We hope this information is helpful and encourage you to call (858) 503-7500 or your systems consultant for more information.

Arcturus Therapeutics

CCS has been selected to provide security for Arcturus Therapeautics’ new San Diego research facility.

Unlike their “old” solution with on-site software, the new Kantech Hattrix hosted solution allows the Arcturus team to manage their system in ways that fit their schedule and business.

Arcturus Therapeutics

CCS continues to provide tailored security solutions to the Southern California Life Sciences community.

CCS & Rady Childrens Physician Management Services

We are pleased to have completed a new Kantech hosted card entry solution for Rady Childrens Physician Management Services at their new San Diego facility.

Working with their team, our systems engineer was able to develop a quality hosted solution that met their needs and their budget.

We are happy to welcome the entire RCPM team to our growing list of physician services clients!