Wouldn’t it be great if you could control who has access to your facility and its assets, and make changes easily as conditions or employees change? An access control system can do just that.
Think of it as a digital master key that grants or denies access. The system enables the magnetic locks in your facility to be controlled using a keypad, card reader, fob reader, or biometric scanner – allowing complete control over the comings-and-goings of authorized personnel to specific areas at specific times.
There are five key functions associated with an access control system:
- Authorization – Is the action permitted?
- Authentication – Is the user providing the right credentials?
- Identification – Is the person identified as a trusted user?
- Access approval – Is the person approved for access?
- Accountability – Is the activity logged appropriately?
Consider these available access options:
Keypads. A keypad entry device is typically placed at an entry door where all tenants or employees need to enter a code or PIN to gain access. In many professional buildings, a keypad entry serves as a night lock, requiring code access after-hours. An expanded system might also include a keypad at restricted office suites or rooms that can be accessed using a different code.
Card/fob readers. A card or fob reader is a more secure than a keypad. For example, a person accesses his room at a hotel using a card key. After the person checks out, the hotel wipes the card clean of data with a new access code. Card readers and fob scanners (or “proximity readers”) are the most common devices for access control systems in a commercial setting.
Biometric scanners. Security can be further enhanced by using biometric scanners, such as finger-print readers or retina scanners. Typically, these devices are used to limit personnel access to highly restricted areas. Because it is not possible to share a code or borrow someone’s card, access is more fool-proof. Common applications are at financial institutions and medical facilities.
Manage Multiple Areas Easily
A huge advantage of an access control system over a keyed system is its ability to digitally “lock out” and re-program multiple areas. No more lost keys or re-keying locksets!
Your access control system also maintains a log that serves as an audit trail of who accessed what areas and when. By combining this log with video surveillance, you have the evidence necessary to identify theft and fraud when it occurs. To the business owner, this can mean tens of thousands of dollars in savings!
These systems can be managed as stand-alone units (data stored at the source), IP managed, or cloud networked and monitored.
What is the best access control system for your company? Give Pro Technologies a call today for a free security assessment.