Wilson Security has been designing, servicing, and installing Card Access Control Systems in Salina and the surrounding area for 10+ Years.
Whether you are protecting a single door or 150 doors, Wilson Security can design a system that will allow you to operate, control, and monitor system activity with ease. As Card Access technology progresses, the Access Control system becomes the center of System Control management. Technology advancements provide integration with Intrusion Alarms, CCTV Systems, and Life Safety Systems.
Wilson Security also offers Photo I.D. Badge Systems. These Badge Systems provide Business' the capability to create Employee Identification Badges which can be designed to include the company's logo, employee photo, and employee's ID number. I.D. Badges allow employees to positively identify visitors, contractors, or possible intruders.
We are able to provide all of our services on existing and new systems. We also provide system take over services to ensure you are getting the best service for your company moving forward.
Access control systems provide authorized individuals safe and secure access in and out of various parts of your business while keeping unauthorized people out. They can range from electronic keypads that secure a single door to large networked systems for multiple buildings. Access Systems also greatly simplify management of your facility: no need to replace lost keys, hunt down old keys from terminated employees, or wonder who has access to which areas.
Spend a couple minutes framing the following two questions; (1) What purpose will your door access control service serve? and (2) What size access system will your business need?
To start, sit down and determine the purpose the access control system will serve. The most basic role of an access control system is to keep out anyone who is not supposed to enter an area. This can be the front door, a parking garage, a server room, a personnel records room, or any other sensitive area. You may also want to use an access control system to track when employees come and go. Another point to consider: how secure do you need the system to be? A basic system usually features a keypad or swipe card. Higher security applications may require multiple means of authentication (a card and thumbprint, for example) and include more redundancy. Finally, consider what other systems need to connect to your access control system. Monitored alarm systems and CCTV systems are two good examples.
Next, once you understand the general role the access control system will serve, think about the number of doors you need to secure. Smaller installations may include just one: a server room with an electronic keypad lock is a common example of a very small access control system. Remember that not every door has to have access control; you can simply leave some locked and only give keys to appropriate personnel. If you plan ahead a little when purchasing your system, you should find it fairly easy to expand later. The smallest systems, designed for one or two doors, are not very expandable, but many four and eight door systems can be linked together when you need to expand. Once you know the number of doors you will be securing, gather information on each one: the physical makeup and use of your doors will impact the type of locks and entry systems you need. Here are some additional questions to help frame your thinking.
There are several components and multiple options to consider when building and designing a security access control system. However, if you keep in mind five basic ingredients, the process is fairly straight forward.
[A] First you need a way for authorized users to identify themselves and/or unlock the door from the secure side (in a free exit system)
[B] Second, you need a way for all users to have free egress from the interior out
[C] Third, you need a locking device to secure the door
[D] Fourth, you need a controller to manage the interaction between entry devices, egress devices and locking devices
[E] Fifth, you need to consider specific requirements for your system (audit tracking, time based opening or doors, battery back-up)
That's it. That is the basic model, for each point of entry or exit, ask yourself; [A] How will I get in?, [B] How will I get out?, [C] What locking device will secure the entry point?, [D] How will the system be controlled? and [E] What other functionality do I need? Applying these questions to each entry point is how the system design process works. Now, let's review some of the options related to each of the five questions.
In all locking systems, the secure lock needs to be released by a physical object (such as a stand-alone lock, Key, Combination or fingerprint) or a combination of any or all. Examples include; Proximity readers, Keyswitch, Digital Keypads, and biometric readers (fingerprints). These devices are mounted on the exterior (secured side) either on the casing of the door (mullion mount) or on the wall near the door (gang mount). Examples of Entry Device types follow. 'Clicking' on any of the device photos will open a new window with direct access to pricing, and product datasheets for further and more detailed reference.
|
|
|