Access Control
Industry & Business Solutions
Cusztomized Access Control

Access control is a system, which enables you to control authority of who has access to certain areas to your building. Within the field of physical security, an access control system in the physical structure of security is normally seen as the second layer. Every business and organization in the world has assets and information that require protection. Another key issue is the protection of business' staff and property. A lock on a car door or a PIN on an ATM system is various forms of access control. The inconvenience and expense of changing locks if keys get lost means a waste of time and money.

This can also create even more security risks as keys can be copied very easily. Locks secure many buildings and keys, which mean that doors are left, unlocked for most of the day. This can lead to possible theft or crime and the cause of malicious damage, but with the use of an access control system, these theft possibilities can be restricted and will also provide a safer working environment.

It provides the most efficient way of securing your building and assets. The use of tokens, cards or fobs will enable a business to give access to staff through controlled doors. If a token, card or fob is lost, stolen, or not returned, and then these can all be barred therefore maintaining the level of security. The access control system will automatically lock all the doors controlled by the system, once the system has been installed.

Only people with a PIN or token will be able to enter through controlled doors within the access control system. Flexible control over users' access rights is a method of restricting access to staff that doesn't require access to certain areas of the building. Also, access may be restricted by time, only allowing access to particular users at certain times of day or night. This is also useful for contractors as an expiry date can be set so that the fob will not work after a certain time period.

Types of Access Control
Standalone Access Control

A stand-alone system may be used for controlling access on one or many individual doors in a building. People can gain access of these doors by using a numeric code, a PIN with a keypad, biometric reader or by presenting a proximity or magistrate token. This will depend on which type of reader has been fitted. Each door will have a programmed system to enable the door to be controlled by the access control system. Some systems such as Paxton have easy to use programming tokens to ensure the individual in charge of controlling the manual database has a simple task when issuing and barring fobs.

Online Access Control

Online Access Control is sometimes known as PC Based Access Control or Networked Access Control. This type of access control system can control one or many doors within a building. People can gain access of these doors by using a numeric code, a PIN with a keypad, by presenting a proximity or magstripe token, a hands free token or by using biometrics. This will depend on which type of reader has been fitted. Online access control offers central control via a network. Any commands that are given are sent to each door within the access control system. Any token can be barred from all of the doors in an instance. Flexible control is a benefit of online access control, as it enables you to create different permissions for any individuals or groups of users. This type of system can generate reports to see which individuals went where within the building, and also reports the time these events happened. This type of system via an existing LAN/WAN can control additional buildings. Other services within buildings, for example fire doors, are increasingly being controlled by networked systems.

Readers & Tokens
Proximity Readers

The proximity reader works by the user presenting a token and holding it within close proximity to the reader. The control unit looks up the access permissions of that user once the token has been read. If access is granted, normally a green LED will flash to inform the user access has been granted. If access is denied, normally a red LED will flash to inform the user access has been denied.

Magstripe Readers

The magstripe reader works by the user swiping their card through the reader. The control unit looks up the access permissions of that user once the card has been read. If access is granted, normally a green LED will flash to inform the user access has been granted. If access is denied, normally a red LED will flash to inform the user access has been denied.

Coded Lock Readers

The coded lock reader works by the user entering a code using the keypad. The validity of the code is checked by the control unit, which if is valid then normally a green LED will flash to inform the user access has been granted. If not valid, normally a red LED will flash to inform the user access has been denied.

Biometrics Readers

There are two main types of biometric readers, which are the fingerprint reader and the iris recognition. A biometric reader eliminates the requirements for PINs, keys, or cards to gain access to secure areas. The fingerprint reader works by the user placing their finger on the reader. The reader will check the database of authorized fingerprints, where it will grant or deny access based on this database. The iris recognition reader works by the user placing their eye in front of the scanner, where it will capture an image of the iris. With pre-memorized records, the reader checks the image of the iris against these records and generates a signal to open the door if a match is found.

Cards

There are two types of cards used as tokens for a user to present when looking to gain access in a secure area. The proximity cards will be required where there is a proximity reader. The user presents the proximity card and holds it within close proximity to gain access. The magstripe cards will be require where there is a magstripe reader. The user swipes the magstripe card through the reader to gain access.

Fobs

Fobs can be used when there are proximity readers within the access control system. The user presents the proximity fob and holds it within close proximity to gain access.

Hands Free Token

These tokens are particularly useful for loading doors and where disabled or elderly people require access. The user doesn't require to get the token out as the reader reads the token from a certain range, normally between 0.85 and 2.5mts, or even up to 5mts with longer range readers available.

Software

The software used in access control systems is designed to feel familiar to any Windows user. Access control privileges and reports on users are some of the features that the access control software offer. Different permission levels are available to select to restrict access to certain areas. A login and password must be entered to be able to use the software to manage the access control. Access control software is designed to be intuitive to use and all but the most complex functions can be performed easily and without training.

Installation / Maintenance


VTG has built a proud reputation as dependable and progressive security technology specialists. Since it was forming founded in 2005, we have established ourselves as one of Ontario’s leading provider due to our ability to deliver state- of- the art, first-class security technology solutions and friendly, personalized service with top of the line brands in the business.
Integrated Solutions


CCTV Video Surveillance
VTG offers a full line of video surveillance products to help you monitor activity, day or night
Intrusion Alarm Systems
Intrusion alarm system forms the backbone of commercial and industrial security strategy.
Access Control Systems
Enables you to control authority of who has access to certain areas to your building.
Point Of Sale, POS System
The ability to process transactions and tender cash efficiently in any business enterprise.
Business Phone Systems
VTG experts will help you to decide the best system that will benefit your business.
Digital/ Dynamic Signage
Communicate messages to staff, students, guests and customers in common areas.
Audio & Video Intercom
Makes it easy to connect with people anywhere in the world to feels more personal.
Structured Cabling
We install varying quality products with a full choice of features and tailored specifications.
Integrated Solutions


CCTV Video Surveillance
VTG offers a full line of video surveillance products to help you monitor activity, day or night
Intrusion Alarm Systems
Intrusion alarm system forms the backbone of commercial and industrial security strategy.
Access Control Systems
Enables you to control authority of who has access to certain areas to your building.
Point Of Sale, POS System
The ability to process transactions and tender cash efficiently in any business enterprise.
Business Phone Systems
VTG experts will help you to decide the best system that will benefit your business.
Digital/ Dynamic Signage
Communicate messages to staff, students, guests and customers in common areas.
Audio & Video Intercom
Makes it easy to connect with people anywhere in the world to feels more personal.
Structured Cabling
We install varying quality products with a full choice of features and tailored specifications.
REQUEST A QUOTE
We’d love to learn more about your business and discuss how we can help. Please get in touch and we’ll be happy to provide you with a proposal, once we understand your unique requirements.
GET A QUOTE
We’d love to learn more about your business and discuss how we can help. Please get in touch and we’ll be happy to provide you with a proposal, once we understand your unique requirements.
mrsub.pngyrcc.pngdell.pnggeo.pngave.pngacg.pngpetsociallogo.jpgnorttol.pngdelmar.pngfertility.pngcountry-style.pngmeat-depot.pnginn-harbor.pnghalendas.pnglyons.pngburittos.pnglecos.pnghagen.pngdaystar.png