Control who accesses your buildings — when, where, and how.
It’s too easy for keys to end up lost or in the wrong hands. And when you have multiple buildings requiring restricted entry points, controlling access becomes harder. With a sophisticated access control (AC) system, you have virtually unlimited flexibility for scheduling, authorization and authentication from single door to nationwide coverage.
Limiting Access to Permitted Individuals
From visitors to employees, it’s important to control who accesses a space. AC provides multiple ways to prove identity before access, all of which can be reprogrammed electronically to restrict or allow new levels of access. User clearances can be set by role to speed the addition of new hires or position changes. Visitor management systems replace handwritten badges with professional looking printed badges. The visitor’s provided identification, e.g. business card or driver’s license is scanned and retained by the visitor management system. Visitors can be granted partial, single or multi-day schedules
Many organizations have employees who need access to buildings during non-standard hours. Physicians, nurses, employees with extended hours, and tech support professionals are common examples. AC’s scheduling system makes it easy to designate when any individual is authorized entry.
Controlling Facility Entry Points
AC enables you to determine which individuals are authorized to open specific doors. This is especially critical when there are hazardous, high-security, engineering, private, or other restricted areas. Many organizations also use AC to control entry to parking lots. Doors can be secured using electric strikes or magnetic locks. AC can lock or release all doors with a few mouse clicks. Optical turnstiles offer an attractive way of controlling access without an intimidating look. Stainless steel and glass turnstiles attractively compliment building architecture.
Credential and Reader Options
Access control cards can be preprinted with organization logos, graphics and other information. Access control fobs are available in many different colors and shapes. Card and fob readers are offered in a wide variety of technologies, sizes, styles and formats to architecturally compliment adjacent areas and fit into existing structures. Badge printers and digital cameras allow you to generate your own credentials at one or multiple locations. Higher security needs can be addressed with smart cards (HID SEOS), non-standard bit patterns, biometric readers (fingerprint, iris scan, vein geometry, etc.) or via multi-factor authentication. Multi-factor authentication can be accomplished via keypad / proximity reader combinations, biometrics, etc.. Common biometric reader options are fingerprint, iris scan, facial recognition and vein geometry. Readers can communicate via traditional hardwired or newer blue tooth or wifi technologies.
EAS systems can alarm designated users when doors are forced open, doors are left open, use of the same badge in two different places (network anti-passback), passing the same card to another employee (local anti-passback).
Large facilities like educational facilities and multi-tenant buildings can have hundreds of keys. Keys have to be correctly labeled, securely stored, tracked and changed when employees leave. Access control replaces cumbersome manual key management systems and rekeying with mouse clicks.
For most mid to large sized installations, we use Software House CCure 9000, which operates on an intuitive user interface much like like a web browser. Administrators can immediately change or revoke access credentials from any remote location.
Servers can be virtualized to reduce downtime and system failures. Integration with HR systems prevents duplicate or incorrect entry of individual data.
New, edge-based devices house an IP address at each door. These edge devices are directly connected to the LAN/WAN Ethernet system, effectively putting every door on a network. Power can be provided by Ethernet switches via p.o.e. If power is lost, the doors are still controlled and operable, assuming the Ethernet switches are connected to a UPS.
In certain locations — such as mother-baby wards, classrooms, hazardous areas, and laboratories — keeping track of who is present in specific places and during specific times is critical. Muster reports, powered by active RFID technology, provide a visual, real-time account of a person’s exact location, as well as time of entry and exit. The report is viewed on screen, and uses a grid-based system and avatars to show the exact location of each individual.