ACCESS CONTROL SYSTEMS Access control systems are necessary to identify people in enterprises or other organizations and control access to facilities. Personal identifier with uniquecode (electronic key, magnetic card, chip-card or proximity card) is issued to every user of the system (all personnel of organization). When user wants to enter a room the user puts his or her identifier to the reader, which reads a code. Then reader sends the code to control module, which keeps in memory the list of codes that have access to the facility. If code that was read corresponds to any code in the list, control module gives signal to electronic door lock to open the door. |
|
TYPES OF IDENTIFIERS Electronic keys Access control system based on electronic keys has the most efficient price/quality ratio. Electronic keys have exceptional reliability and extended life cycle, because chip (microchip that contains all personal data) is armored in a stainless steel can. Keys are not affected by magnetic fields, and have built-in unique security identifier number to exclude falsification. |
|
Electronic key advantages:
|
|
Magnetic cards Magnetic cards as identification means are used worldwide. Majority of global payment systems use these cards to store information Advantages of magnetic cards:
|
|
Proximity cards Proximity card is modern, prestige and easy-to-use identifier. Compared with magnetic card, lifecycle of the proximity card is much longer and they can work in extreme conditions, for example: on street, where humidity level is high, dust etc. Proximity reading of information makes use of access control system easier. It is especially important when reading distance is more than 10 cm. For example: if reader is based in car parking place, it is enough to reach one's hand out of car's window to identify oneself. In order to increase security and confidentiality, it is possible to embed scanning device into the wall. This option does not affect scanning quality. |
|
Advantages of proximity cards:
|
|
What are access control systems for ?
Security from outsiders Access control system will guarantee safety of employees and facilities in organization. Only those people who have permission to enter or who are welcome will be able to enter the room. Outsiders will not disturb employees or endanger your property. |
|
Control of employees You can control personnel of your firm with access and security system. All actions of system users are registered in system journal. It is possible to monitor in real time dislocation of every employee and status of system devices (doors opened/closed, alarms on/off etc.). This feature makes easier work of guard and helps to monitor events in enterprise |
|
Open all doors with one identifier You do not need different key for every door - you can quickly and easily open all doors, which you are allowed to open with the same identifier. |
|
Possibility to set up alarm with identifier You can set up alarm for any room with the same key you open the door with. If there is room, which should not be accessible to other people during your absence, you can easily set up alarm when you go away and deactivate it when you come back. |
|
How to choose most convenient access control system? Which access control system is most convenient for you depends on features of your enterprise (number of employees, number of rooms, and their dislocation) and tasks that system should perform. |
|
ACT 2204 - system
without a computer ACT-2204 is simple access control system without a computer. This system consists of reader of identifier and control module which is installed for every door separately and it performs standard functions of the access control system - provides access control and possibility to set up alarm with the same identifier. We recommend ACT-2204 if: |
|
|
|
D`ACCESS -
system with computer D`AACCESS is system that consists of identifier card reader and control modules that are united together in one system by special module - pre-processor. It gives you opportunity to receive different outputs and allows controlling personnel. We recommend D`ACCESS if: |
|
|
|
D`ACCESS - multi-computer user system D`ACCESS 2000 is system that consists of multiple sub-systems with one computer, which are connected together by access control server. It allows uniting in one access control system rooms that are located in different buildings. We recommend D`ACCESS 2000 if: |
|
|
|
SYSTEM WITHOUT A COMPUTER ACT 2204 is simple access control system that controls access and organizes alarm system using electronic keys, magnetic cards and proximity cards |
|
ACT 2204 features:
|
|
Control module ACT 2204
|
|
D'ACCESS System Description is a new generation of access control systems based on modern technologies of data identification and transmission. D’ACCESS is designed for sophisticated access control as well as for time attendance accounting at middle- and big-size companies with several departments branches) connected via LAN or WAN. Our system allows to organize automated pass-points, to restrict access into private premises, to control employees’ presence inside company and to count working hours, as well as to generate reports on personnel truancies. It is also possible to integrate D’ACCESS with personnel management, accounting and EDP systems. A choice of reports for departments sorted by many parameters (truancies, personnel early leaves, summarized and detailed day, week, month, quarter, year and/or any other period of time reports, alternative lists) can be generated by the system. The system allows to determine tight working schedule for any employee (fixed, mixed, sliding, free, etc.), as well as allows to account overtime and night hours. System implementation allows to increase internal security, personnel control and working efficiency many times, as well as allows to reduce staff. Why Should Be Chosen?
D'ACCESS has the following advantages :
Architecture
The system consists of the following basic modules:
Technical
Specifications |