Why do I need to invest in Access Control ? ACCESS CONTROL - TopicsExpress



          

Why do I need to invest in Access Control ? ACCESS CONTROL systems provide the ability to control, monitor and restrict the movement of people or assets in, out and around a building or site. In its simplest form, an ACCESS CONTROL system consists of: • An Access Control reader • An Electronic controller. • An electronic door lock, Access Control Readers are mounted on the outside of doors, and are the only part of the ACCESS CONTROL system most people see. In a modern ACCESS CONTROL system, the readers are designed to recognize codes (something you know), credentials (something you have), or biometrics (something you are). When a code or credential or biometrics is presented to a reader, the reader sends the information, to a controller. The controller compares information received to an access control list (stored or already programmed information) and then either grants or denies entry into the protected area if the information corresponds or differs respectively. When access is denied based on the access control list, the door remains locked. If there is a match between the information presented and the one the access control system has, the controller operates a relay that in turn releases a lock/unlocks the door. Keypad (code) readers are the simplest and least expensive form of access control readers. The system uses a code reader; you enter a Personal Identification Number (PIN) into a keypad to identify yourself to the system. Keypad readers have two drawbacks however: codes can be easily shared and easily stolen. Because of these two drawbacks, keypads should be avoided in high-security application unless they are combined with any of the other forms of reading technology- a credential or biometric technology. This two factor authentication is a very secure approach to access control. With a credential reader, you would present a card or key fob. These cards or fobs can hang on your keychain or fit in wallets. The most common credentials are Radio Frequency Identification (RFID) cards. RFID cards can be read from a distance hence they are usually referred to as proximity cards. The most common RFID cards use a format which was developed by HID Corporation. This has been widely adopted and used by access control manufacturers worldwide. Biometric readers are designed to scan a unique part of your body- your fingerprint, Iris/ Retina, face etc - and create a digital template. This template is stored or enrolled in the access control system. When you come to a door and request entry, the ACCESS CONTROL system scans your fingerprint, etc. and compares the new scan to the stored template. If the two match, youre in. Biometric readers have been used widely in time and attendance applications providing a platform for employees to clock in or clock out. The information gathered from this can be used to establish the number of hours worked per employee and this in turn can be exported directly to your HR or Payroll system, removing the potential for error and data double entry. This solution has been known to greatly enhance security within companies, reduce absenteeism and improve punctuality. You can evaluate your need for ACCESS CONTROL by asking these three questions: • Do I need an audit trail, i.e. a time and date stamped record of every opening or attempted opening of a door? • Should different employees have different access privileges based on time and day? • Does a lost or stolen key represent an immediate security threat to my facility? Answering yes to any of those questions can justify the investment in an ACCESS CONTROL system. Audit Trail- An audit trail gives a time and date stamped record of every opening, or attempted opening, of a lock. Audit trails are particularly useful for server rooms. Depending on your industry, a record of access to specific areas may be mandatory. For instance in a supply chain department, the tracking of movement for goods and equipment out of a warehouse is one area where audit trails are helpful. If supplies go missing, you know who was in the area and when - information that may lead you directly to the culprit. Time Zones - In some cases, you may want to restrict access to your premises based on time and day. Cleaning crews are an obvious example. If they are scheduled to clean your office at a specific time or day, then there is no reason to distribute a key that will work at all times. An ACCESS CONTROL system allows you to create custom keys that will only operate on specific dates and at specific times. Lost or Stolen Keys- A lost or stolen key almost always creates a serious breach in your physical security. Re-keying your mechanical locks can be very inconvenient and sometimes expensive. By contrast, an ACCESS CONTROL credential or biometric information can often be deleted or deactivated in a matter of minutes at little or no cost. The ACCESS CONTROL system will tell you when and where someone attempted to unlock a door with the deactivated credential/biometric information. At Chrematech we are poised to offer a wide range of access control solutions customized for any budget. We are available to offer professional advice on choices of products as we have forged strategic alliances with top notch manufacturers worldwide. Contact us by Email: info@chrematech or by telephone:+234 80741550053 to request a quotation or book an appointment today.
Posted on: Sat, 16 Aug 2014 07:37:32 +0000

Trending Topics



Recently Viewed Topics




© 2015