Tuesday, 17 January 2017

10.1 ACCESS CONTROL

TAKE CONTROL

You may have a high-security environment that requires the highest level of access control. Or you may have more modest needs, such as providing photo ID badges that allow or restrict employee access.
On-site or Remote
Access control systems start with card access for employees. When high security is needed, biometric authentication involving hand, finger, facial, or eye recognition can be added. These can be combined with gate, elevator, and turnstile access, as well as telephone entry, intercoms, security cameras, and alarms.
Access control systems can be managed on-site or remotely, including card access, visitor entry, parking control, security cameras, and fire and intrusion detection. In addition, because it is available online, you can access it from anywhere in the world using your web browser.
Access control and security management systems:Access Control Systems
  • Provide secure access to a facility and a safer work environment
  • Manage people more effectively and increase operational efficiency
  • Restrict access to sensitive or controlled areas within a facility
  • Reduce theft of assets and deter violence and vandalism
  • Lock and unlock doors according to pre-set parameters
  • Provide access system audit reports
  • Provide photo identification of employees
  • Manage and track visitors to a facility
  • Reduce security manpower costs
  • Administer and control access to multiple facilities remotely through one interface
  • Avoid expensive re-keying when employees leave or when keys are lost, copied, or provided to unauthorized persons
Security Access Card Reader
  • Proximity (prox) readers and cards
  • Mag stripe (swipe) readers and cards
  • Barcode readers and cards
  • Multi-technology readers and cards
  • Long-range readers
  • LCD keypad readers
  • Biometric hand geometry readers
  • Biometric fingerprint readers
  • Biometric facial recognition readers
  • Biometric retinal scanners
  • Proximity (prox) key fobs
  • Proximity (prox) key tags
  • RFID asset tags
  • Photo ID card printers/Badging systems
  • Access server and client hardware
  • Access management software
  • Electromagnetic door locks
  • Electric door strikes
  • Door controllers

1 comment:

  1. Essential security from my telefon and leptop vostro, and televizor blaupunct. Essential security from my family.

    ReplyDelete