Access Control

Access Control Services are meant to control and restrict access.

 

Paxton Access Control SystemIf you wish to monitor, control or restrict access in a required area, an Access Control System will perfectly suit your requirements. This Access Control Systems can be simple as a stand-alone door or a multi complex system using a PC based working over the LAN (local area network). The term access control refers to the practice of restricting entrance to a property, a building or a room to authorized persons. Physical access control can be achieved by a guard, bouncer or receptionist. Access Control are divided in many distinct types:

 

Swipe Cards

This days, Swipe Cards has been superseded by proximity cards or key fobs. This Access Control option allows people to access a restricted areas with the use of individually coded proximity cards or key fobs. This proximity cards and key fobs can be cancel at any time, in case that one of this devices are lost. Swipe cards are difficult to duplicate as you will need the specific microchip, some knowledge of radio technology, and the software to be able to implement the protocol.

 

Keypad

This devices allow access to a person after a numeric code has been inserted. On some keypads, you can set up more than one code, one for every person. This option is recommended to be used in a small group of individuals as the codes can be easily shared with other persons.

 

Proximity Tags

Allows access by passing a fob in the front of the reader. As well as Keypad, this fobs are very easy to be shared with other individuals. To increase security, the Keypad can be used in together with Proximity Tags. In that case, to have access into a restricted area you must use your key fob followed by your code.

 

Biometric Fingerprint Readers

Will read your fingerprint in order for you to have access in the restricted area. All of this devices can memorize more than 100 users.

 

Security Risks

In most of the cases a security risk of intrusion of an access control system is simply by following a legitimate user through a door. In many cases, the legitimate user will hold the door for the intruder.  In very high security applications this risk is minimized by using a sally port (security vestibule or mantrap), where operator intervention is required presumably to assure valid identification. There is no perfect security or Access Control system. Every system can be vulnerable to sophisticated attacks. To improve security, other authorization methods can be added to the system.

 

 

 

 

Portfolio

Tags

Random Testimonial

  • ~ Nirmesh Varsani (CEO, Kailash Joiners Limited)

    "We needed a CCTV system installed in our business premises. Zimcos AVS not only produced the lowest quotation but also specified higher end products than the other two competitors we had quote for the job. Installation was carried out quickly and professionally, time was taken to show us how to use the system both at the terminal and via our mobile phones and computers. When we had issues with our dynamic IP address Zimcos AVS knew of the problem before we did because of their attention to detail and great aftercare, and the next day came in to resolve issues and again setup all the external devices to veiw the system remotely. We have since had Zimcos AVS back again to quote for a door entry system and these works will be underway soon. It is a relief to find nice honest hardworking people who do not try and pass off faults once the job is completed even if the fault is caused by the internet provider they still endevour to find a solution. I will continue to use and recommend Zimcos AVS to other people."

  • Read more testimonials »