What J-Sec offer
J-Sec offers a variety of high-quality access control systems, designed to ensure the utmost protection and security for you and your business.
Security is our top priority, which is why in addition to the access we also provide the control. On-line systems allow the administration of the access through a PC, tablet, or mobile phone. Your business is in complete control, from the adding and deleting of key-code, proximity or bio tokens, to running payroll reports based on the movement of the system users.
Installing an access control system removes the hassle of having to change the locks following key loss or theft. Access control tokens can be easily removed or changed following a potential security breach.
Whether you need a simple, convenient key-code or a high-security full retina scan, access control is key to a safe and comfortable environment. Below are some of the solutions available for granting access, all of which can be applied to a wide variety of locking and automated systems.
Keycode access control
Keycode access control requires simple four or, six-digit code be entered into a keypad situated at the point of access. Following the installation of a key code access system, all doors controlled via the system will automatically lock after door closure, those without knowledge of the 4-6-digit pin will find themselves unable to enter.
This is a cost-effective access control solution; however, it does bear the risk of becoming compromised if the code is shared. This form of access control can be administered via an on-line or offline system.
Proximity access control
One of the most popular methods of granting access. A system user will be required to carry a proximity token in order to grant access. Proximity tokens are available as one of many different formats, these include cards, keyfobs, wristwatches, mobile NFC and BLE. The system user will swipe/present their proximity token against a reader at the point of access.
This is a slightly higher cost solution than keycode, however, the user benefits from improved security and administration features, for instance, the ability to add and delete proximity tokens as and when required. Online administration also allows for flexible access management, such as restricting access to specific areas, only accessible to those with the relevant authority.
A potential risk associated with this format of access control is that ‘keys’ can be all too easily lost or stolen. Should a lost or stolen proximity token be reported immediately the access rights can be withdrawn instantly. However, the security of your property or its assets is reliant upon how quickly the missing token is realised and reported.
Biometric access control
This form of access control is viewed as one of the most secure methods. Biometric access control systems can read a fingerprint, retina or even an individual's face. A system user will present either their eye, fingerprint or full face, to a reader mounted in a convenient location at the point of access.
This is a top of the range solution, ideal when unique identity tokens are essential. This system eliminates the need for numerous proximity tokens and is ideally suited to large organisations or high traffic areas.
Any of the above access methods can be combined in any way required in an online solution, only keycode and proximity are supported in offline solutions.
On-line systems allow the administration of the access through a PC, tablet, or mobile phone. This allows the system operator to control the different elements of the system. From the adding and deleting of key-code, proximity or bio tokens, to running payroll reports based on the movement of the system users. On-line systems are connected together through an IP network or dedicated RS485 line which we can provide. An ideal solution for multiple access points and cross-site scenarios due to the intuitive, centralised control.
Offline systems are administered directly at each point of entry, the adding and deleting of access tokens is completed independently at each access point. Ideally suited to small installations with limited users and access points due to the programming limitations.
Benefits of access control
Installing a relevant access control solution offers several considerable benefits:
• Restriction of specific areas – Users can assign access to specific areas only to the relevant personnel. This access can be further restricted during specific hours of the day.
• Difficult to replicate – A physical key can easily be replicated and used by unauthorised personnel. Whereas, in contrast, a keycode or biometric token cannot be lost/replicated, replicating a proximity token will present a challenge.
• Monitoring access – Operators are able to monitor the history of exit and entry through access-controlled doors, they are capable of recording identity, time and location.
• Protect assets – It should go without saying, implementation of an effective access control system is paramount to ensuring the protection of your assets.
• Settling disputes – In the unfortunate event of a crime, access control can provide significant evidence towards identifying the offender, as the token used to grant access to the building will have been recorded by the system.