This site uses cookies to improve your experience. They are safe and secure and never contain sensitive information. For more information click here.

Our Services

Access Control

The access...

Whether you need a simple, convenient key-code or a high security full retina scan, access control is key to a safe and comfortable environment. Below are some of the solutions available for granting access, all of which can be applied to a wide variety of locking and automated systems.

Keycode

A simple 4-6 digit code entered into a keypad at the point of access.

A cost effective solution but can become compromised if the code is shared. Can be administered in on-line or offline systems.

Proximity

One of the most popular methods of granting access. A system user will carry a proximity token in one of many different formats. Proximity tokens can be available as cards, keyfobs, wrist watches, mobile NFC and BLE. The system user will swipe/present their proximity token against a reader at the point of access.

A slightly higher cost solution than a keycode, but with improved security and administration features as a result of the ability to add and delete proximity tokens as and when required.

Biometric

Biometric systems can read a finger print, retina or even an individual's face. A system user will present either their eye, fingerprint or full face, to a reader mounted in a convenient location at the point of access.

A higher end solution ideal when unique identity tokens are essential. This system eliminates the need for numerous proximity tokens and is ideally suited to large organisations or high traffic areas.

Any of the above access methods, can be combined in any way required in an online solution, only keycode and proximity are supported in offline solutions.

The control...

The answer to this is related mainly to the complexity of the solution.

On-line systems allow the administration of the access through a PC, tablet, or mobile phone. This allows the system operator to control the different elements of the system. From the adding and deleting of key-code, proximity or bio tokens, to running payroll reports based on the movement of the system users. On-line systems are connected together through an IP network or dedicated RS485 line which we can provide. An Ideal solution for multiple access points and cross-site scenarios due to the intuitive, centralised control.

Offline systems are administered directly at each point of entry, the adding and deleting of access tokens is completed independently at each access point. Ideally suited to small installations with limited users and access points due to the programming limitations.

Get a free no obligation quote:

Interested in our access control? Simply fill out the form below and we will get back to you with your free no obligation quote.

  •  
  •  
  •  

Get in touch

If you are interested in our services or have any questions about what we can do for you and your business, then please to do not hesitate to get in touch.

0333 2000 665   |   info@j-secsecurity.co.uk
Dragon House, Bridgend
CF31 3AQ
Map
Soda
Owens
Castell Howell
Oil4Wales
Tai Canolbarth