Access Control

Introduction

Access control offers safe and secure entry into a premises, limits access to information and information processing systems, while decreasing the risk of loss.

It can act as a management tool of time and attendance for staff and visitors as it allows the client to authorise people entering the building at any time of the day.

With advancements in software and integration, you can enhance your security system by enabling your access control system to connect to other security systems such as a Fire Alarm, CCTV and Intruder Alarm.

On occasion where a high level of security is needed due to a high number of staff, students or customers, an access control system can be used for its lockdown capabilities securing everyone from a threat.

Stand Alone Access Control

Standalone access control is usually one or two small units wired directly onto a door panel to control access to the door. There is no need for a PC network and you don't have to secure every single door within your building, only those you wish to.

Staff and visitors are issued with electronic tokens instead of keys. If someone loses their token, it can be simply barred from the system by presenting a shadow card to a reader. This ensures that if the token was found, it could not be used to gain entry and compromise the security of your building.

PC & Network Based

Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed. 

Access to the network will be given according to the profile of the person and the results of a posture / health check. For example, in an enterprise the HR department could access only HR department files if both the role and the endpoint meet anti-virus minimums.

Mobile / Smartphone Based

Mobile access control takes mobile phones, smartphones, tablets, and wearable electronic devices and allows them to function as a user’s credentials to enter offices or other business facilities.

Mobile access control is powered by Bluetooth, allowing phones to communicate with a reader placed on a door. These days, there’s no need for pairing devices manually, like Bluetooth Low Energy (BLE) technology will take care of that often frustrating process. A secure Bluetooth connection can be established from a few feet away, giving Bluetooth access a noticeable edge over traditional RFID card technologies with an average read range of about an inch. Thanks to mobile access control, there’s also no longer a need for access control cards.

Iris Recognition

Iris recognition systems are non-intrusive. A number of vendors and researchers are developing technologies capable of capturing images of irises at distances beyond one meter and for subjects that are moving.

The procedures for iris recognition usually consist of four stages: image acquisition, iris segmentation, feature extraction, and pattern matching. Iris recognition has been acknowledged as one of the most accurate biometric modalities because of its high recognition rate.

Bluetooth Access Control

Access control functions by using mobile phones with Bluetooth technology. The telephone system itself identifies the user. The advantage of this system is the reader's operating distance, which makes it very useful for vehicle and pedestrian access.

Bluetooth door entry utilises each individual user's smart phone with installed app for wireless transmission of access credentials and a Bluetooth Access proximity reader to receive the signal.

Proximity & Barcode Readers

Proximity readers continuously transmit a low-level fixed radio frequency (RF) signal that provides energy to the card. When the card is held at a certain distance from the reader, the RF signal is absorbed by a small coil inside the card that powers up the card’s microchip which contains a unique identification code.

IoT/Cloud Based Solutions

Iris recognition systems are non-intrusive. A number of vendors and researchers are developing technologies capable of capturing images of irises at distances beyond one meter and for subjects that are moving.

The procedures for iris recognition usually consist of four stages: image acquisition, iris segmentation, feature extraction, and pattern matching. Iris recognition has been acknowledged as one of the most accurate biometric modalities because of its high recognition rate.

Visitor Management

Visitor management refers to tracking the usage of a public building or site. By gathering this information, a Visitor Management System can record the usage of facilities by specific visitors and provide documentation of visitor's whereabouts.

Visitor management systems offer integration with other workplace management systems, such as access control and Wi-Fi credentials.

Time & Attendance

Time and attendance systems (TNA) are used to track and monitor when employees start and stop work. A time and attendance system enables an employer to monitor their employees’ working hours and late arrivals, early departures, time taken on breaks and absenteeism.

There are two different classes in biometric attendance: Firstly, physiological biometrics in which fingerprints, hand, face, iris, etc... are captured and compared. Fingerprints are the most widely used physiological biometric.

Have a Question?
Want to enquire online?
Our Brochure