Access Control

Access Control2025-03-11T10:47:52+00:00

We can design and install simple or advanced access systems to allow controlled access to and from your premises.

Automated and Monitored Doors

Access systems are continuously changing and being updated with new technology and we aim to offer the most up-to-date systems to fit in with your requirements.

Simple systems include connection to a personal computer that monitors the activity at your entrance. We also offer systems with varying levels of restriction such as ID cards and a reader which allows individual monitoring, anti-passback systems that will recognise and prevent an unidentified individual from exiting and biometric retinal or fingerprint scanning at entry and exit points to provide stringent security measures.

All our access systems work in combination with our fire systems, CCTV instalments and intruder alarms, hence, in the event of a fire, doors can be coordinated for both swift egress and automated closure to isolate the fire. Additional features such as a fire role call can be emailed to a smartphone or device while the fire alarm goes off, triggering an automated call-out at the fire station.

Access Control

What about the privacy and security of data a biometric fingerprint reader retains?2025-03-04T15:12:20+00:00

For individuals concerned about privacy or the potential misuse of their fingerprint, it’s important to understand that biometric fingerprint readers do not store or replicate the actual fingerprint. Instead, these devices capture and analyse up to 100 unique reference points from the fingerprint.

These reference points and their spatial arrangement create a unique pattern that identifies the registered user. Importantly, it is not possible to reconstruct a usable fingerprint from these reference points. The resulting numerical codes and patterns derived from your fingerprint image are specifically designed for access control and have no practical use outside that context.
This means that law enforcement, hackers, or thieves cannot exploit the stored pattern. If someone were to attempt to compare this data with a criminal database, it would yield no results, ensuring the privacy and security of your biometric information.

Will access control integrate with existing security systems?2025-03-04T15:11:50+00:00

Yes, access control systems can be seamlessly integrated with existing security systems, including automated gates, to facilitate efficient and secure access management. Both building access and gate automation utilise technologies such as PIN code keypads and RFID card readers.

Additionally, multiple access points can be managed under a single system, enabling comprehensive control over all entry points and restricted areas within the premises. This integration enhances overall security and simplifies access management across the entire facility.

What are my requirements for Security levels?2025-03-04T15:11:13+00:00

According to the British Security Industry Association guidelines, access control points are classified based on the type of business and the associated security risks. Each grade is assigned to specific protected areas rather than the overall system, allowing for a mix of grades within a single premises. For example, you might have Grade 1 access points in certain areas while other locations may require Grade 4 protection, depending on the specific security needs of your building.

The assigned grade for your access points serves as a valuable indicator of the necessary security level and the recommended technology for each area. This classification helps business owners, installers, and designers effectively address the security requirements while staying within budget.

How does access control work?2025-03-04T15:10:44+00:00

Access control is a security measure that regulates who can enter specific areas at any given time. Advanced access control systems ensure that only authorised users are permitted entry, verifying the identity of individuals as they enter or exit monitored spaces.
These systems employ various methods for controlling access, including Radio Frequency Identification (RFID) locks, biometric scanners, electromagnetic locks, keycards, and smartphone applications.

When an individual attempts to access a restricted area, their credentials are authenticated. This could involve anything from a fingerprint scan to a security card read, which is then sent via the Access Control software. This software program determines whether the user should be granted access.

The Access Control software checks if the user has permission to enter the specific area by conducting a series of digital validations, including:

– Ensuring the correct type of credential is used for that area
– Verifying that access is attempted within an authorised timeframe
– Confirming the use of an appropriate trigger type

If the user successfully meets all these criteria’s, access is granted, and the security device is unlocked. The unlocking mechanism varies depending on the type of device in use. For instance, with an electromagnetic lock, the power supply is temporarily interrupted to release the lock, while for door strikes, the power is activated to unlock the door for a few seconds.

In the case of wireless locks, the latch engages only when an approved credential is presented, remaining disengaged at all other times. This setup allows for free exit from the area while preventing unauthorised entry.

Go to Top