To effectively implement the Security policies within an organisation we should consider the various functions available from most Access Control systems. Both surveillance and intrusion systems are fundamentally preventative methods of controlling an area whereas Access Control has to guarantee speedy access while preventing unauthorised admission.

cabecera coaxial

From a technological point of view one of the priorities of any system should be to correctly identify authorised users, using ID’s (cards, tags, keys), PIN’s or by using some biometric method. This last method, biometry, is by far the most secure but is also the slowest which means many end users still opt for cards and tags. These have several advantages over physical keys: they are harder to copy, permissions can be dynamically changed, they can be scheduled for different requirements and they can quickly be removed if lost or stolen.

5n1

Three principal types of Access Control Systems are available:

  • Stand-alone systems: Do not require any type of infrastructure or connectivity, the Access Control terminal itself has the memory and the capability to manage users. These entry-level systems are usually limited by the number of users which can be stored and generally don’t allow for scheduling. One or two entrances can be controlled. They are ideal for small shops, offices, warehouses, etc. with a maximum of 30 registered users.
modelos disponibles
  • Managed systems: Are networked and connected to a central software application from which users are administered, hours and calendars are controlled together with entry permissions. Managed systems also allow for system-wide monitoring and complete audits to be produced showing who entered where and when. These functions, when combined with CCTV surveillance and intrusion can offer very high levels of security at relatively low cost. For organisations of up to 2,000 employees
5n1
  • Corporate systems: Offer a complete web-based, multi-platform, multi-site software management system which can parameterise many different types of entry requirements. These solutions allow for seamless integration with third party systems: CCTV surveillance, intrusion, vehicle access, intercoms, alerts, messaging, asset management, cyber-security (mange both physical and logical access), time and attendance, tele-assistance, etc.
5n1

At Visiotech we pride ourselves on our knowledge of both Access Control & Time and Attendance Systems and we offer our expertise to our client-base to assist with their consultancy work and projects.

You have no rights to post comments