Access Control
ACCESS CONTROL SYSTEMS
Access control systems provide authorized individuals safe and secure access in and out of various parts of your business while keeping unauthorized people out. They can range from electronic keypads that secure a single door to large networked systems for multiple buildings. All Access Controller components are explained in below sections for your understanding.

FINGERPRINT
This type uses advanced optical scanning technology to store up to unique fingerprints and match them to the finger-surface presented to the scanner.
PROXIMITY
CARD READER
This indoor proximity card reader works great and has an LED to indicate positive card read, and a buzzer.
OUTDOOR PROXIMITY
CARD READER
This outdoor proximity card reader functions in the weather and lights up for easy operation.

CARD READERS
This indoor proximity card reader works great and has an LED to indicate positive card read, and a buzzer.
IRIS SCANNER READER
This type of reader analyzes the patterns in the iris and translates them into a code, providing the access control the information to perform a door lock function.
RFID READERS
This type of readers are used to gather information from an RFID tag, which is used to track individual objects and activate certain functions in the system.




ELECTRIC STRIKE DOOR LOCK
- Fail-secure
- Fail-safe
LIVE USER MONITORING
Access Control systems allows administrators to monitor activities of all entrances where the system is installed. This type of activity includes when a user opens or closes the door, and time when this action took place.
NEW USER CONFIGURATION
Access Control systems can be configured and managed using software. When using such application, administrators can add new users, new FOB codes, in addition to specific functions and operations based on the business need.
BACKUP OPTIONS
User configuration can be backup up to local servers and external drive for security reasons. This allows for backup processes to be implemented and for recovery to be available in case of a disaster.
EXPORT & IMPORT OPTIONS
For easy implementation and scalability, configuration can also be exported and imported into multiple systems at any given time.
