Unmanned building and premises are vulnerable to not only from strangers but more importantly from people that familiar with your premise such as employees, ex-employees, and outside contractors Basic security feature is not going to do the job. To effectively manage your sites, access should be restricted to authorized personnel only and security system must possess user-level access control complete with a log of every entry and exit.
Monitoring is another important element within a building access system and this can be achieved by installing surveillance cameras into the surrounding areas as well as sensors inside door access system for detection of abnormal door activities i.e. door left opened, door forced open and etc. By connecting the building access system to a cloud server through the Internet, administration can thus be done from anywhere at anytime. Furthermore, incorporation with smartphone application also eases the building access system in dispatching alerts/notifications to the person in charge, thereby supporting a more efficient form of monitoring work.
01. Centralized Management |
Centralized management is where your building access system is manageable from a central terminal. With this, you can watch over and control your access points from a single monitoring platform, which also can be accessed remotely. This increases overall system effectiveness and reduces staffing requirements. |
02. Biometrics/Proximity Reader Support |
Proximity card readers or biometrics readers offer a variety of advantages over traditional keypads. Keycards cannot be shared with others as codes can be, and keycards are much better for use in hostile climates. A good access system should support a selection of user input devices, including proximity readers and keypads. |
03. Detailed Logging |
Your access system should log every entry to your sites. Knowing exactly who accessed your sites, and when they did so, is crucial the event of vandalism or theft. |
04. Compatibility with Site Power |
Your building access system should operate on site power, either battery or commercial. By using protected power, your system will still work during a commercial power failure. |
05. Sufficient Size for Your Network |
If you are going to incorporate an access system into a large network, it should support for at least 1,000 user codes/biometrics templates or keycards at each site, with support for at least 50,000 total codes or cards throughout the enterprise. |
06. Access Scheduling |
You should be able to define a weekly schedule for site access. This ensures that your sites can only be accessed when they should be. |
07. Multiple Transport Options |
Your building access system should support multiple paths for upstream communication. LAN and serial should be available. |
08. Fault-Tolerance |
A good system has a redundant user database. Individual sites must be able to operate independently of the master if communication is lost. The goal is to make the decision of access locally, then report to the master. By alleviating the reliance on the master, you can get fast access, even in the event of a communication failure. |
09. Independent Door Control |
Look for an access system that gives you the power to control each door at your facility independently. You might want to give many users access through the front door, but restrict access to a central area to just a handful of key staff. To do this, you must be able to control exactly which personnel can enter which doors. |
10. Video Surveillance |
A complete network alarm management system requires more than just environmental and equipment monitoring. Security and personnel issues are also part of the complete picture. Video surveillance is especially useful when used in conjunction with a building access system. This will allow you to visually watch over your site. |
11. Smartphones as Personal Access Controller |
Installing access control mobile app into individual’s smartphone to turn it becomes personal access controller. The access rules downloads into individual’s smartphone to process, and user signs into mobile app to review his/her accessibilities at the mean time. The device installs at the door is no longer storing users’ credentials nor access rules. It works to receive door open command from individual’s mobile app. |
12. Smartphones as Monitoring Tool |
Admin can configure the types of emergency/failure events with appropriate persons in the system. These person in charge receives push notification at their smartphones whenever system detected the emergency/failure event. The person in charge can monitor the access control system anytime from anywhere, and response at the soonest in case of emergency/failure. |
Perusahaan
|
kebijakan
|
Zona pelanggan
|
Links populer
|