Access Control Integrated with Surveillance System
In terms of physical security, the purpose of any access control system is to prevent or at least reduce the risk of unauthorized access to areas around a building and the physical spaces within. Access control protects individuals and assets within the building and restricts access based on the concept of ‘who, where and when credentials.
An access control solution can be as simple as using electronic or magnetic swipe cards instead of keys to unlock a front door. This limited functionality still retains a considerable level of value. In most cases, businesses can limit which cards can access the door during specific times, thus allowing all employees to have keys to the shop without risking unwanted access to the premises out of hours. In addition, security managers benefit from checking or reporting on who attempted to enter the premises and at what time.
Advanced Access Control Features:
Matrix COSEC is a comprehensive Access Control solution with advanced features designed to meet diverse applications.
- Zone Specific Access
Users can enter only designated zones.
- Dead-man Zone
Registers the user's presence periodically to confirm the user is present and active. Ensures the safety of an employee working in a hazardous environment.
- Access Mode
Control entry with a single or a combination of user credentials.
- Access Level
Allow or restrict users based on their roles or levels.
- Anti-passback
Prevents a second entry for a user until the user has exited to eliminate multiple entries using one user's credentials.
- First-in User Rule
Typical users are allowed only after the designated first-in user has entered.
- Do Not Disturb (DND) Zone
Stops anyone entering a Do Not Disturb zone. Valid for private offices and meeting-conference rooms.
- 2-Person Rule
Stops one individual from entering a high-security area alone. Allows two people (from a predefined group) together if they join within a specified duration.
- Access Route
Forces users to follow the predefined path to reach their destination. Prevents loitering or jaywalking.
- Guard Tour
Requires security guards to show their credentials at sequential check-posts at specified periods.
- Smart Identification
Stores users' credentials on the smart card (RF). COSEC first reads the user's credentials from the card and then prompts the user to show credentials.
- Centralized Monitoring and Control
Live status of all the controllers, alarms, and input-output ports in one place. Also, control doors, warnings and user credentials from a central location.
An Access Control System Saudi Arabia also uses timestamps for events, which are recorded against the event records for the controlled doors. Where a credential is used to gain access, the timestamped event will also register the credential holder in addition to whether access was allowed or denied. If no certificate is presented to a keypad, card reader or biometric reader, i.e. a forced entry, then an alarm event is recorded.
Comments
Post a Comment