top of page

Access Control

What is an access control system?

An access control system is the brains behind the card reader and electronic locking hardware you use to enter a locked building. With the swipe of a badge, the access control system can verify the identity of the cardholder, grant/deny entry to the locked door and keep a detailed log of that users' access transactions. Access control can be integrated into a wide range of security systems to provide a unified security hub.

Why do I need an access control system?

An access control system is the best way to authorize entry to authorized users with valid credentials. It replaces the need to hand out physical keys to those requiring access to your premises. Users can be quickly added to the system (such as for a new hired employee) and access can be revoked just as quickly (such as a terminated employee) without the need to distribute or revoke physical keys. Physical keys can be copied, lost or stolen but with an electronic access control system, these issues are non-existent. Employee attendance can also be monitored through reporting features that show when/where an employee accessed the building.

What else can an access control system do?

Aside from the basic operations of locking and unlocking doors, access control systems can be integrated into many existing systems to expand their functionality. Some examples of access control integrations:

  • Turnstiles: unlock turnstiles to allow authorized employees into a secured area

  • Barrier gates: unlock and raise barrier gate arms to allow vehicles into a fenced area

  • Remote unlocking: unlock a door remotely either through software or through a physical unlock button

  • Elevator floor controllockout certain floors from being accessed in an elevator and unlock with a swipe of a badge

  • Overhead door control: unlock and raise overhead doors in a parking garage with a wireless fob or card reader

  • Equipment lockout: lockout operation to a piece of machinery to limit access to unauthorized operators

  • Alarm system integration: integrate access control with alarm system to allow arming/disarming of areas according to access levels

  • Video surveillance integration: integrate access control with video surveillance to visually verify identity of a user

  • Biometrics: use biometric scanners (fingerprint, retina) to verify the identity of an individual

bottom of page