lunes, 12 de junio de 2017
sábado, 27 de mayo de 2017
BENEFITS OF ACCESS CONTROL TECHNOLOGY. "N°4"
BENEFITS OF
ACCESS CONTROL TECHNOLOGY
Businesses
that want to keep their building secure should seriously consider an access
control system.
While
businesses with less than 10 employees might be able to get by on traditional lock and
key setups, a wide array of businesses and
industries find these systems extremely beneficial. Access
control can help mitigate security risks and allows a facilities department to
avoid headaches. Even most retail businesses have certain areas they want
restricted from customers.
1. Simplify
Employee Turnover: High
attrition businesses, apartment complexes, and college campuses can easily remove access to one individual keycard or replace a lost card without having
to issue new keys to everyone.
2. Restrict Specific Areas: In most
businesses, employees aren’t given full reign of every closet, office, and
floor. One group, like the HR Department, might have
sensitive documents and information that shouldn’t be available to all
employees. Access control keycards can be set up to restrict exactly who can go
where.
3. Save Energy and Money: Believe it or
not, access control systems can be integrated with other building systems like
lighting or even the heating and cooling system. The most advanced of these
systems can tell exactly what areas of a building need light or even
temperature adjustment at any given moment.
4. Protect Valuables: If your
business has valuables, especially items with street value, access
keycards can identify exactly who entered afterhours. This could help to catch
a culprit or potentially prevent items from going missing. With regular keys,
there’s no way of telling which employee unlocked the door afterhours.
5. Multi-Shift Work Environments: If you have a lot of employees constantly coming and going, managers
might not be able to recognize every employee. Access cards help identify
impostors and allow authorized employees to come and go without hassle.
6. Multi-Location Access: For
businesses with several locations or a campus of buildings, access control
can help ensure managers and workers can travel from building to building or
location to location with ease.
NETWORK ACCESS CONTROL (NAC)
network access
control (NAC)
Network access control (NAC), also called network
admission control, is a method of bolstering the security of a proprietary network by
restricting the availability of network resources to endpoint devices that
comply with a defined security policy.
A traditional network access server (NAS) is a server that
performs authentication and authorization functions
for potential users by verifying logon information.
In addition to these functions, NAC restricts the data that each particular
user can access, as well as implementing anti-threat applications such as firewalls, antivirus software and spyware-detection programs. NAC also regulates
and restricts the things individual subscribers can do once they are connected.
Several major networking and IT vendors have introduced NAC products.
NAC is ideal for corporations and
agencies where the user environment can be rigidly controlled. However, some
administrators have expressed doubt about the practicality of NAC deployment in
networks with large numbers of diverse users and devices, the nature of which
constantly change. An example is a network for a large university with multiple
departments, numerous access
point s and thousands of
users with various backgrounds and objectives.
CONTROL UNIT FOR AUTONOMOS
Control unit for autonomous access control system
Ejemplo de diversas conexiones
This control unit
can be used for building autonomous access control systems. As
identifications media can accommodate contactless RFID cards from various
producers as are Indala, EM R/O chips, touch memory Dallas or from different
producers on special order. We support data format 26,27,30 or 42 bit Wiegand.
ID keys memory has capacity 3 200 Ids. Memory for events - history has capacity
132 000 events.
Alfanumerical LCD
display can be operated from -20° C and case has protection IP55. The
unit has cover with security tamper switch contact and "card lock
function", so unit can be used also for outdoor installation.
There are two
inputs which can be used by wiegand RFIDs, ABA track or Dallas reading heads.
Using original NWK TECHNOLOGY proximity reader head, you achieve 4
reading head connection. You can also connect our PIN code reading proximity
head.
The unit can be
delivered with RS 232 , RS 485 or BlueTooth serial communication, see ordering
code instructions.
The highest
configuration is equipped by software for events and ID codes management.
The unit can be
delivered with additional 433,92 MHz receiver together with proximity card
function.
Specifications :
Power supply requirements:
|
9-25V DC / 200mA
|
Working temperature range:
|
-20° to +55° C
|
Protection:
|
IP55
|
Dimensions:
|
80 x 160 x 56 mm (H x W x D)
|
Inputs:
|
2, galvanically insulated
|
Inputs for reader heads:
|
2 ( or 4 proximity reading
heads NWK TECHNOLOGY)
|
Outputs:
|
4 Relays, closing contacts
48VDC/2A
|
Serial interface:
|
RS232 or RS485, BlueTooth
|
Display:
|
2 x 8 characters,
alfanumerical with backlight
|
CPU:
|
ARM 32 bit
|
ID memory capacity:
|
3200 ID, backed up
|
Events memory capacity:
|
132000 events, backed up
|
Suscribirse a:
Entradas (Atom)