Security Options
Protect your information from intruders

Door Access Control

    Protect your information

    Your company's information is what is most important to you, so it's essential that you're protected from intruders who seek to damage equipment or steal valuable information that your company depends upon. An excellent method of theft prevention is the use of Door Access Control.

    Why Use Access Control?

    Although locks and keys allow you to secure your building, when they are lost or stolent, the inconvenience and expense of changing locks and re-issuing keys can be considerable. There is also the risk of the keys being copier which could result in an even more security risk.

    Every business, whether it be small, medium or large, has assests which need protecting. Along side this, is the staff and their property to think about. In most companys, it's common that buildings that are secured by locks for doors are left unlocked all day. This opens the building up to potential theft and damages.

    An electronic access control system provides the most efficient and convenient way of securing your property. Installing an electronic access control system means you will never have to change your locks again. Tokens are issued to allow access through the controlled doors and in the event that they are stolen or lost, they can be barred from the system, this means they will not have access through the controlled doors.

    Once installed, the doors controlled by the system will lock automatically when the door closes. When the door closes, anyone without a PIN or token will be unable to enter. For convenience, doors may be set to unlock during a designated time frame. Access control can be very flexible over users' access rights. You can allow certain staff through the main door, but not restricted areas. Access can even be restricted by time, granting certain users access at particular times of the day.

    Access control offers a secure, flexible, convenient and cost effective solution to control who has access to your building and when the access is allowed. Access control gives organisations the security they need.

    Which system is for you?

    Standalone access control - The standalone system may be used to control access on one or more independent doors in a building. Depending on which type of access control is fitted, access can be gained by using numeric code, PIN and keypad, or by presenting a proximity or magstripe token. The systems mentioned before are programmed at every door, if tokens have to be barred or codes changed, this must then be completed at every door on the system.

      Typical Applications:
    1. Small business premises
    2. Sports clubs
    3. Storage units
    4. Any small or medium sized site requiring access control


    PC based access control
    PC based access control allows central control of security mechanisms via a network. The security includes PINs with keypads, numeric code or by presenting a proximity token or card.

    This means that any commands which are given at the PC are sent to every door. So when you deny access to a token, it denies access at all the doors instantly, rather than one at a time. Again due to its flexibilty, you're able to give different permissions to different individuals or groups.

    You can even generate reports to monitor what user accessed which door and at what time. Many PC based access control allow control of additional buildings via existing LAN/WAN. These PC based access control systems are increasingly being used to control other services such as fire doors, lifts and intruder alarms within buidlings.

      Typical Applications:
    1. Small/medium premises
    2. Large corporate premises
    3. Multiple-site premises
    4. Government buildings
    5. Universities
    6. Sports clubs
    7. Car parks


    PC based systems are more suited for medium to large sites as they make a large number of doors and users easy easily manageable. The PC based system can easily be extended, and has advanced features such as event reporting and integration with CCTV and other systems make such a system much more than just a replacement for a bunch of keys.