Access Control Systems

Whether upgrading an aging system or creating a new solution from scratch, we have you covered.

Schedule a Free Consultation Today

Modern Access Control solutions are practically limitless. From stand-alone single-door controllers, to integrated multi-door systems, to cloud-based multi-facility solutions. Whether controlling office doors, building entrances, or the gate into your parking lot, the right access management system can make the difference between success and frustration.

Even the readers have evolved from keypads and swipe cards, to RFID/NFC cards, to fingerprint readers, iris scanners, and facial recognition scanners. Even smartphones have joined the field with QR Codes, Bluetooth, and WiFi based access control solutions.

The field is really complex, and not all of the features described below are available on all solutions. Let’s work together to select a solution that works for you.

Single door access control

Whether you are running an office, a warehouse, or a school, sometimes all you need is to control one entrance. We have a number of solutions for you. Stand alone door controllers range from keypads, to card readers, to fingerprint readers, even combinations of the above. Any of the controllers can control a single door’s lock, receive an input from a Request-to-Exit device, or a door position sensor, and set off an alert if the door is held open too long. Many of them also include calendar functions to lock the location after hours or on days that you’re closed.

Multi-door access control (traditional)

Traditional access control panels require complex wiring structures, and provide secure and consistent control of multiple doors. A variety of readers can be configured, including prox-cards, RFID, NFC, keypads, and biometric systems. Modern systems can even use various smartphone technologies (bluetooth, WiFi, and NFC) as credentials. Different technologies can deployed on different doors on the same system.

Anti-passback

Anti-passback is an industry term for situations where the client needs users to check in and out of the location.

For example: an employee scans in when they enter the site, and need to scan out to leave the site. This way their comings and goings are tracked, and they can’t pass their credentials to the next person to enter the location.

The way to achieve that is by placing readers on both sides of the door. The door still locks from only one side to comply with fire code, but if the users exits without “scanning out,” their credentials (card, code, or fingerprint) won’t let them back into the location for a pre-determined period of time. An administrator can override the lock-out if necessary.

Man-trap systems

Man-trap systems are used where a space is shared between two constituents and each of them needs to have exclusive access to the space. When user one enters the space, the user two’s credentials are locked out, until user one scans out on exit.

Privileges

Scheduling

Some employees only need access during specific shifts. You may have a building that shuts down for the weekend. With proper configuration, your access system will keep track of your employees’ entries, lock them out after hours, and send alerts when an unauthorized entry is attempted.

Sometimes you need different access permissions even within the same building. Every employee is allowed into the lobby, but once inside, each only needs access to their own department. We can help you with that.

Lock-out

Scan a particular card, or the manger’s card twice, and you can temporarily lock out all other employees. Scan the card again, and the door is back in normal operation. You can do all of that with a fingerprint too.

Stay unlocked

Almost like Lock-out, but in reverse. Using a designated credential, or central control system, you can unlock the door on a long term basis, until you scan the credential again.

IP based systems

IP based systems simplify the wiring necessary to control multiple doors. With power and a network connection individual door controllers can communicate with each other and behave as a single, unified system.

Cloud based systems

Cloud based systems build on the foundation of IP based access control systems. By leveraging internet connectivity, Cloud based access control systems simplify multi-facility management by offering a centralized portal to manage the various systems. Because every reader stores the relevant information internally, cloud managed facilities will continue operating even in the event of an internet outage. If the system loses internet connectivity, it will stop getting updates, but will otherwise continue operating normally.

Cellphone as a credential

An ideal credential are something that the user will have with them at all times, is difficult to counterfeit, and doesn’t inconvenience the user. Cellphones occupy this niche perfectly. Most of us already carry them everywhere, each one has unique identification numbers, and it is not yet another thing the user needs to find space for.

Cellphone access credentials range from the phone’s unique MAC address on the Bluetooth or WiFi card, to dedicated apps that require a pin code or security credential to unlock.

This technology is still emerging, with multiple system manufacturers providing different styles of solutions.

Biometric readers

Fingerprints, palm prints, iris patterns, and faces, are uniquely identifiable characteristics. They don’t require batteries, are difficult to forge, and cannot be lost, stolen, or loaned out. Biometric characteristics are excellent access control credentials.

Multiple companies are competing in the biometric space right now, bringing the costs of the products down and the quality up.

Distress

Whether it’s lock-outs, lockdowns, or silent alarms, we can program your system to respond accordingly. You can trigger the distress condition from your phone, by scanning a specific card, scanning a fingerprint twice, or a traditional panic button.