Access Controls
Electronic Card Access System offers a better alternative as their authorisation to your office is programmable. An employee who leaves the firm can be denied access simply by programming the reader. While they are generally referred to as Card Access Systems, the technology is varied and include Keypad PIN numbers, proximity cards, RFID, MIFARE as well as biometric fingerprint. We offer a wide range of card access solutions, suited to your needs and budgets. Check out the various solutions below or contact us for an obligation free evaluation and quote. |
Single Door Access
Single Door Access applications utilised controllers that comes with a built-in reader and keypad. They can be
In many applications, there is seldom a need to link to a computer except where the office has many staff (beyond 20) and it would be difficult to manage the cards without the use of the a computer. Or where they wish to track when staff come into the office. |
Multiples Door Access
Multiple doors access applications utilized controllers that are connected with a wide range of readers. They are linked in a network with a PC running an Access Management software. Such applications tended to be in offices where there is more than 1 doors to be controlled. They are also implemented in commercial buildings, condominiums as well as industrial plants. And they are used to control gates, barriers, turnstiles, auto sliding doors as well as office doors and private apartments. The systems can be integrated with other systems like CCTV, Fire Alarm, Building Automation and Burglar Alarm Systems, and customized according to your need. Depending on your scale, budget and complexity, we have the various ranges and brands to meet your needs. |
Biometric & Facial Recognition
There are several forms of biometric identification employed in access control. They are:
All biometric readers function by comparing templates stored in its memory to the scan obtained during the process of identification. If the scan match the the template, the ID number of that person is sent to a control panel. The control panel then checks permissions of the user and makes the decision whether to grant access or not. The communication between the reader and the control panel is usually done in the industry standard Wiegand protocol. The only exception is intelligent biometric readers that do not require any panels and directly control all door hardware. |