
Access Control
Once an individual's identity is verified, the system verifies privileges and if appropriate grants access. Any attempt is logged in to the system database. Unlike legacy keyed locks, which can be easily duplicated, electronic credentials are unique and difficult to forge. Credentials may be altered by an administrator as company roles are redefined. Time-based restrictions can also be applied, such as granting access during specific hours or for temporary purposes. Lost or stolen credentials, such as RFID cards, can be easily deactivated and replaced, minimizing security risks.
On high security installations security personal can monitor access attempts in real time through instant notification of suspicious activity and repeated failed login attempts. Integration with surveillance systems allows for immediate rapid confirmation.
Access control systems can be scaled to accommodate facilities of any size and multi-factor authentication or integration with visitor management systems, can be incorporated as required.
Electronic systems reduce reliance on security personnel and the costs associated with employee responsibilities. The cost associated with physical security and pad lock keying can be reduced by programable access.