A high-quality building access system will enhance the security of your sites.
This guide to will show you how to ensure the safety of your revenue-generating equipment.
1-800-693-0351
Have a specific question? Ask our team of expert engineers and get a specific answer!
Sign up for the next DPS Factory Training!
Whether you're new to our equipment or you've used it for years, DPS factory training is the best way to get more from your monitoring.
Reserve Your Seat TodayOne of the security issues faced by all companies has to do with managing who can enter their facilities and when. In order for physical accessibility to be controlled, you first must take note of several details regarding who you would like to give permissions to, where they are allowed to go, and when they are permitted to do so.
Historically this task was partially accomplished through keys and locks. When a door is locked, only a key-holder can enter or allow access depending on the configuration. The main drawbacks to this method are the lack of restrictions involving dates and times, the ease of copying or transferring of keys to unauthorized individuals, as well as the inability to provide records of who accessed which doors and when. One of the most costly aspects of using a mechanical key is when a key is lost, stolen, or the key-holder is no longer authorized access, all the locks in question must be rekeyed. The solution to this issue is using a device known as a Proximity Card Reader.
These wall-mounted devices are usually no bigger than a cell phone and are impervious to "picking" or "bumping". The reader itself is linked up to a Building Access System consisting of a central computer that stores information regarding which user can access which doors and at what times they are allowed to do so. When you walk up to a door, in order to signal it to unlock, an access card must be passed within a specified range in order for the Reader to scan the information stored on the card.
When the device identifies the card, it then compares the information against a database of users and permissions. If the card-holder is authorized to enter, it signals the door to unlock. In the event that the card does not have proper authorizations, the door remains locked.
An added benefit of using a Proximity Card system is that every time a card is scanned against the database, an activity report can be saved. This serves as a record of who, or which card, had used the reader and when. This is effective in monitoring when and how often individuals use a particular door. You will also not have to worry about costly rekeying if a key-holder is no longer authorized, or if a card happens to go missing. With a simple update to the permissions, a card can have permissions removed or even removed from the system in a matter of seconds.
For those who hold building security in high regards, a Proximity Card Reader is a worthy addition to any business's infrastructure.
Related Pages Proximity Technology Integration Building Access Systems Building Access Systems puts YOU in Control