How Software is used in Managing Door Access systems and Solutions
Use of biometric readers like finger print machines, palm vein readers, Mifare cards and smart cards resulted the full automation of door security access control management systems
The door access entry and exit devices are able to provide organizations with reports that can help business organize, control and monitor the users of the path ways. Complete automation helps business to be proactive when engaging with the topic of security within the organization. Our matrix Cosec software is designed to protect unauthorized entry and exit plus help in providing information to the management beyond acting as a simple access control device.
The system integration of hardware and software with a centralized system ensures optimum efficiency in the access control devices installed.
Who, When and Where are the three factors considered at the time of designing an access control solution specifically for every client as this three information will determine the level of security, the access points in an organization, the feasibility of our hardware and it will help Adax recommend the best possible access control solution for the client. The study of the above three criteria’s will determine the features that will need to be installed to the system to improve the access control system. Some of these additional features will be:
Access Control Modes are available at Adax’s disposal to meet clients’ demands. A variety of modules can be used ranging from biometric, RFID Cards, tags and so on. One or more of these identification methods can be used individually or integrated with other devices for an access point to increase the level of authorization.
First-In User/ Multiple Person Access is a system which works with the entry of access only if the authorized first entry person or two persons with authorization entry is present at a time of entering a particular area.
Man Trap is a system developed to regulate the flow of authorized individuals or to restrict the number of entry into premises at a given time period. This system is designed for a situation which consists of two or more doors that work as a complete system to create a secure access control system.
Guard Tour facilitates enforcing vigil patrol of security guards or such pre-fixed movement of other people. The guards have to show their credentials at defined checkpoints at specified time periods. Guard Tours can be programmed to cover all required locations in a specific sequence. Deviation can also trigger immediate notification or alarm.
Dead-Man Zone is a system of control that is essential to track the physical safety of an employee who is working in hazardous environments like railroads, mines, chemical labs, etc. Dead-Man Zone makes it compulsory for the employee to confirm his presence at pre-defined intervals. Failure to punch within the pre-defined duration may activate an alarm to draw attention. This feature can also be used to ensure guards remain awake during night shifts.
Anti-Pass Back is a system developed to prevent deceit in the use of an access control smart card. A smart card will be programed for a single entry and the exit system prevents a second entry into the premises with the use of the same card as the first entry, thereby, the element of passing an access control card is eliminated. This prevention method not only strengthens an accurate security solution system but also gives an exact head count of personnel in the premises.
• Global Anti-Pass Back works with an integration of the entire premises.
• Local Anti-Pass Back works individually within a particular given space.
Do Not Disturb (DND) is a function which restricts the entry of personnel until the access control is acknowledged by the people using the office space or level. This is ideal for conferences or within floors to adopt privacy within teams or groups in an organization. DND can be programed with an override rule which permits top management access.
Route Based Access control ensures that a specific route is followed by the user to restrict the use of unauthorized pathway in high security zones. This can be ideal for third party entry with a specific job in an allocated location in the premises. It prevents drifting from the instructed route.
Occupancy Control system is limiting the head count per allocated space. Entry of allotted users will trigger the system to block further entry. This access control feature best suits a scenario with limited space and high flow of personnel.
Smart Identification works in an environment that provides access to a group of individuals, ideally a work place which requires accurate information. The Smart card can be embedded with employee details that work along with the other credentials. The system can then use the access control information to be combined with confirming the identification process.
The Matrix Cosec is able to manage upto 65,000 devices in a network via centralized software supporting a million users at a given time. The system is able to provide specialized solutions for data center racks, vehicle management systems, multiple locations control requirements.