Site access control is the backbone of your enterprise security system. The main task of access control tools, which are successfully used and installed at a variety of objects (banks, offices, industrial enterprises, administrations, and others), is to restrict unauthorized entry of unnecessary people into the protected area.
The specialists at Magnum will design and deliver access control systems at objects of any complexity, with subsequent warranty and post-warranty service.
Therefore, the identification of individuals is the first premise to determine whether or not they are authorized, either through a card system, key ring, password, their own fingerprint, biometric points of the face etc.
Access Control System
Access control is a high-tech system of software and technical means, the main function of which is serious and effective provision of access for people and transport to the territory of the entrusted object. With the help of the access control system, the following is carried out:
- Protection of the entire territory;
- Personnel accounting;
- Accounting of employees’ working time;
- The entrance to the established premises is limited;
- A base of personnel and visitors is maintained;
- Video surveillance and security systems are combined;
- Control over the entrance and exit, the movement of employees and visitors.
Types of access controls depending on your form of identification
The access control system organized accumulates information, which is subsequently used to optimize the efficiency of other systems, since the basis here is the full use of the facility’s infrastructure.
For example, information on the number of employees in a room can subsequently be used in the organization of a ventilation system, lighting, or the prompt determination of a free office for negotiations.
Magnum Telesystem personally select the most suitable system, taking into account the numerous parameters and features of the controlled object.
A secure access control system is one that is encrypted from end to end. This is achieved, firstly, with an identification technology (biometric or card) that guarantees that it is not duplicable or can be cloned; then with the communication between the reader and the control panel, which must be encrypted and monitored.
To call a system ‘modern’, it is first necessary to guarantee that each of these elements that compose it are safe and that its operation is proven in the market.
To ensure this reliability, you must opt for technologies that establish, verify and manage identities; that is, they guarantee complete credential management throughout the identification life cycle: from the moment reliability is established to the retirement of a credential.
A modern system must have strong multi-factor authentication that does not disrupt the workflow and productivity of users.
To increase the level of security, modern systems implement various authentication factors at access points, combining ‘what I have’ with ‘what I know’ and ‘what I am’.
The authentication factors can be divided into:
- What I know: the knowledge that the person has, can be a PIN, a password or a pattern.
- What I have: the identification that an individual has to certify that it is him, as a physical or virtual credential.
- What I am: The unique bodily features of the person that are used to verify identity (biometrics).