The OSC in Facility A may decide that input control is best performed using biometric technology, while the OSC in Facility B may decide that inbound control can be performed using card key technology. In installation A, the biometric choice may be fingerprints rather than the retinal pattern, and in facility B, the choice of card key may be proximity rather than the magnetic stripe. The security needs and preferences of civil society organisations are very different, so diversity is a common theme. The IP-based Exchange Management Console also provides connectivity to a single management tool interface that can be accessed from anywhere on the IP network.
For example, you might only want to allow automatic access to employees. While you want visitors and contractors to report to the front desk on arrival. Its main purpose is to grant and restrict access to restricted areas based on a set of authorization rules. While the TSA secures the terminals and thus prevents criminal activity on an aircraft, there are still many airport vulnerabilities. For example, vehicle drop-off and pick-up locations are often not safe. Access control systems can ensure that these vehicles do not enter restricted areas.
The latest card technologies use 125 KHz Proximity, MiFare and contactless smart card RFID. The most basic concept of access control is the idea of access control credentials. A credential is a method of proving identity and proving authority, Control System Integration status, rights, and right to privilege. In its original form, a credential was used by war messengers and by anyone who needed access to the king or general. This practice was first recorded more than 3000 years ago in Egyptian history.
TouchStar ATC provides end-to-end access control systems for your assets and facilities. These systems are used for larger sites with high access rates and are wired and connected to the host system’s access control software. With these systems, you can achieve a high level of security up to real-time message exchange between components and software. Because credentials are required before a door is unlocked, only people with approved credentials can participate.
Different access control systems can be integrated with different software/hardware solutions, and it can be difficult to cover all the different use cases. However, we can talk about the key use cases for access control integrations and how they increase the level of security of your facility. When a locally hosted Access Control server is used, there is typically a dedicated computer running the access software. Because dealing with multiple on-premises servers can be complicated to manage multiple installations, cloud-based servers are becoming increasingly important in this area. In addition to cameras, access control can be integrated into a burglar alarm system that triggers a lock in the event of a security breach. This can help protect your employees as well as any valuable assets and equipment stored in your facility.