Access Control Statistics

Monitor card usage, authorization patterns, security events, and access attempt analytics for comprehensive facility security

Overview

The Access Control Statistics page provides comprehensive analytics on access card usage, authorization patterns, and security events. Monitor who's accessing your facility, when they're entering, and identify any security concerns through detailed card activity tracking. Access this page from Statistics → Access Control in the main navigation.

Key Features:

  • Card Inventory: Track total, active, and expired access cards
  • Hourly Access Patterns: Visualize card usage throughout the day
  • Authorization Analysis: Monitor authorized vs denied access attempts
  • Security Monitoring: Track and investigate denied access attempts
  • Time Filtering: Analyze patterns across 24h, 7d, 1m, 6m, 4y periods
  • Real-Time Alerts: Identify suspicious access patterns immediately
🔒 Security Priority: Access control statistics are critical for facility security. Regular monitoring helps identify unauthorized access attempts, card misuse, and potential security breaches before they escalate.

Dashboard Metrics

The top section displays key access card metrics that provide instant visibility into your facility's access control system health and card inventory status.

Total Access Cards

Description: Complete count of all access cards registered in the system
Icon: Blue card symbol
Includes: Active, expired, suspended, and deactivated cards

  • Represents total card inventory across all users and zones
  • Includes both physical RFID cards and virtual access credentials
  • Essential for card procurement and inventory management
  • Updates when cards are issued, activated, or deactivated
💡 Inventory Tip: Maintain 5-10% spare cards beyond total active users to accommodate new hires, replacements for lost cards, and temporary access needs.

Active Cards

Description: Number of cards currently authorized for access
Icon: Green checkmark symbol
Status: Valid, non-expired cards with active permissions

  • Only cards with current authorization and future expiry dates
  • Excludes suspended, revoked, or administratively disabled cards
  • Represents actual operational access capacity
  • Should align closely with current employee/user count
✓ Best Practice: Regularly audit active cards to ensure they match current personnel. Deactivate cards immediately when employees leave or credentials are compromised.

Expired Cards

Description: Cards that have passed their expiration date
Icon: Yellow/orange clock symbol
Access: Automatically denied at all access points

  • Includes cards that expired naturally based on set duration
  • Does not include manually suspended or revoked cards
  • High count may indicate need for card renewal process
  • Users with expired cards will be unable to access facility
⚠️ Renewal Alert: Send expiration reminders 30 days before card expiry to ensure uninterrupted access. Consider implementing automatic renewal workflows for ongoing employees.

Hourly Access Patterns

The Hourly Entrances bar chart displays access card usage distribution across 24-hour periods, revealing facility access patterns, peak times, and unusual activity windows.

Chart Features

  • X-Axis: 24 hours from 0:00 to 23:00 in hourly increments
  • Y-Axis: Number of access card uses (automatically scaled)
  • Bars: Blue vertical bars indicating access volume per hour
  • Hover Tooltips: Shows device name and exact access count (e.g., "Entrance @ 8:00 - 24")
  • Grid Lines: Horizontal reference lines for easier reading

Understanding Access Patterns

Typical access patterns by facility type:

Facility Type Expected Peak Hours Pattern
Office Building 7:00-9:00, 17:00-19:00 Morning arrival, evening departure spikes
24/7 Facility 7:00, 15:00, 23:00 Three shift changes throughout day
Data Center 9:00-17:00 Business hours only, minimal after-hours
Residential Distributed 6:00-22:00 Even distribution, individual schedules
Healthcare 6:00-8:00, 14:00-16:00 Morning staff, afternoon shifts
Office Building
Peak: 7:00-9:00, 17:00-19:00
Pattern: Morning arrival, evening departure spikes
24/7 Facility
Peak: 7:00, 15:00, 23:00
Pattern: Three shift changes throughout day
Data Center
Peak: 9:00-17:00
Pattern: Business hours only, minimal after-hours
Residential
Peak: Distributed 6:00-22:00
Pattern: Even distribution, individual schedules
Healthcare
Peak: 6:00-8:00, 14:00-16:00
Pattern: Morning staff, afternoon shifts

Security Anomalies

Watch for unusual patterns that may indicate security issues:

  • Late Night Spikes: Unusual access at 23:00-5:00 requires investigation
  • Weekend Activity: Access during closed days may be unauthorized
  • Volume Drops: Sudden decrease could indicate system failure
  • Unexpected Peaks: Abnormal spikes outside normal hours need review
🚨 Security Alert: Set up automated alerts for access attempts during closed hours (e.g., 2:00-5:00 AM) to catch potential unauthorized entry or system tampering.

Access Card Types Distribution

The donut chart visualizes the breakdown of access attempts by authorization status, providing immediate insight into system security effectiveness and potential issues.

Chart Categories

  • Authorized (Green): Successful access attempts with valid, active cards
  • Denied (Red): Rejected attempts due to expired, invalid, or unauthorized cards
  • Unknown (Gray): Unrecognized cards or system read errors

The center number shows the total count of authorized attempts, representing successful facility access events.

Healthy Distribution Indicators

What to expect in a well-managed system:

  • ✅ 95%+ Authorized: Most attempts should be successful
  • ✅ < 5% Denied: Small percentage from occasional expired cards
  • ✅ ~0% Unknown: Should be minimal or zero in normal operation
✓ Benchmark: A ratio of 98% authorized, 2% denied, 0% unknown indicates excellent access control management with minimal false rejections.

Warning Signs

Unusual distributions that require immediate attention:

  • 🔴 High Denied Rate (> 10%): Many expired cards or unauthorized access attempts
  • 🔴 Many Unknown Cards (> 5%): Unregistered cards, damaged readers, or security breach
  • 🔴 Sudden Spike in Denials: Mass card expiration or system misconfiguration
  • 🔴 Zero Activity: System may be offline or not recording properly
⚠️ Action Required: If denied attempts exceed 10%, immediately review Recent Denied Access Attempts table and contact users to update expired credentials.

Recent Denied Access Attempts

The Denied Access Attempts table is your primary security monitoring tool, displaying all rejected access attempts with full details for investigation and response.

Table Columns

  • User: Name or identifier of person/card attempting access
  • Description: Reason for denial (expired card, invalid card, no permissions, etc.)
  • Date: Timestamp of denied attempt (YYYY-MM-DD HH:mm:ss format)
  • Count: Number of consecutive denied attempts (indicates persistence)

Common Denial Reasons

Description Cause Action Required
Card Expired Expiration date passed Renew card with new expiry date
Invalid Card Card not registered in system Investigate source, register if legitimate
No Access Permission Card lacks zone authorization Assign appropriate zone access
Card Suspended Administratively disabled Verify reason, reinstate if appropriate
Outside Schedule Access attempted outside allowed hours Adjust schedule or deny if correct
Card Expired
Cause: Expiration date passed
Action: Renew card with new expiry date
Invalid Card
Cause: Card not registered in system
Action: Investigate source, register if legitimate
No Access Permission
Cause: Card lacks zone authorization
Action: Assign appropriate zone access
Card Suspended
Cause: Administratively disabled
Action: Verify reason, reinstate if appropriate
Outside Schedule
Cause: Access attempted outside allowed hours
Action: Adjust schedule or deny if correct

Investigation Priority

Focus your security investigations on:

  1. Count > 5: Indicates determined unauthorized access attempts
  2. Unknown Users: Unregistered cards are security red flags
  3. After Hours: Denials at 23:00-5:00 require immediate review
  4. Same User Repeatedly: May indicate forgotten card renewal or malicious activity
  5. Unknown Cards: Priority investigation - potential security threat
  6. Document Actions: Log all investigations and resolutions
🚨 Response Protocol: Contact user within 24 hours of denied attempt. For multiple denials or unknown cards, escalate to security immediately and review camera footage.

Time Period Filtering

The time period selector allows you to analyze access control patterns across different timeframes, revealing trends and identifying anomalies specific to each duration.

Available Time Periods

Period Label Security Use Case
24 Hours 24h Real-time security monitoring, daily access review
7 Days 7d Weekly patterns, identify unusual weekly activity
1 Month 1m Monthly security reports, card expiration trends
6 Months 6m Semi-annual audit, seasonal access changes
4 Years 4y Historical analysis, long-term security trends
24 Hours
Label: 24h
Use Case: Real-time security monitoring, daily access review
7 Days
Label: 7d
Use Case: Weekly patterns, identify unusual weekly activity
1 Month
Label: 1m
Use Case: Monthly security reports, card expiration trends
6 Months
Label: 6m
Use Case: Semi-annual audit, seasonal access changes
4 Years
Label: 4y
Use Case: Historical analysis, long-term security trends

Analysis Use Cases

  • 24h View: Morning security check, investigate overnight activity
  • 7d View: Weekly reporting, identify day-of-week patterns
  • 1m View: Monthly security audits, card renewal planning
  • 6m View: Seasonal staffing analysis, budget forecasting
  • 4y View: Facility growth trends, system capacity planning

Filter Effects on Data

When you change the time filter:

  • ✓ Hourly Entrances chart recalculates for selected period
  • ✓ Access Card Types distribution updates with period's data
  • ✓ Denied Attempts table filters to show only period's rejections
  • ✗ Total/Active/Expired card counts show current inventory (not filtered)
💡 Analysis Tip: Start with 24h for daily operations, then zoom out to 7d or 1m to identify patterns. Use longer periods for strategic planning and trend analysis.

Security Insights & Analysis

Extract actionable security intelligence from your access control statistics to improve facility security and operational efficiency.

Proactive Monitoring

Key metrics to watch daily:

  • Denied Attempts Spike: > 10% increase indicates problem
  • Expired Card Growth: Rising count means renewal backlog
  • Unknown Card Appearance: Immediate security concern
  • After-Hours Access: Verify legitimacy of 22:00-6:00 entries

Trend Analysis

Compare periods to identify patterns:

  • Week-over-week: Spot immediate changes in access behavior
  • Month-over-month: Track seasonal variations and staffing changes
  • Year-over-year: Measure facility growth and capacity needs

Operational Optimization

  • Staff Scheduling: Align security staff with peak access hours
  • Reader Placement: High-traffic hours indicate need for additional readers
  • Maintenance Windows: Low-activity hours ideal for system maintenance
  • Card Issuance: Batch renewals before expiration spikes
Integration with Other Systems: Correlate access control data with video surveillance, time tracking, and visitor management for comprehensive security oversight.

Best Practices

Follow these security-focused recommendations to maximize access control effectiveness and maintain robust facility security.

Daily Security Monitoring

  • ✅ Review 24h view every morning to check overnight activity
  • ✅ Investigate any denied attempts with Count > 3 immediately
  • ✅ Verify that access patterns match expected facility schedule
  • ✅ Check for unknown cards and investigate source
  • ✅ Monitor expired card count - renew proactively before users locked out

Card Management Excellence

  • ✅ Send expiration reminders 30 days before card expires
  • ✅ Deactivate cards immediately when employee leaves
  • ✅ Audit active cards quarterly - verify all match current users
  • ✅ Maintain 5-10% spare card inventory for immediate issuance
  • ✅ Set appropriate expiration periods based on user type (temp vs permanent)

Security Response Procedures

  • ✅ Establish clear escalation process for security events
  • ✅ Set up automated alerts for after-hours access attempts
  • ✅ Document all denied attempt investigations and resolutions
  • ✅ Coordinate with video surveillance for visual verification
  • ✅ Implement lockdown procedures for multiple unknown card attempts

Data Retention & Privacy

  • ✅ Define access log retention period per regulatory requirements
  • ✅ Restrict statistics access to authorized security personnel only
  • ✅ Anonymize data when sharing for operational analysis
  • ✅ Export and archive historical data before purging
  • ✅ Comply with GDPR, CCPA, and local privacy regulations
✓ Security Gold Standard: Aim for 98%+ authorized rate, zero unknown cards, and investigation of all denied attempts within 24 hours. This demonstrates world-class access control management.