Call +31 (0)20 7 372 372

Kiyoh klantenbeoordelingen
VEB Erkend Beveiligingsbedrijf

Access Security

Access Security by Viscoo intercom and Conas controllers


Figure 1
- Access control via Viscoo intercom: Figure 2 - Access control via Conas controllers:

Viscoo intercom

Conas access control

Site-link a: Overview intercom components (check link via picture). Site-link b: Overview Conas components (check link via picture).


What is Access Security?

The term ‘Access Security’ generally refers to a system that can control, monitor and restrict the movement of people, assets or vehicles, in, out and around a building or site. The benefits of using an access security system include the prevention of loss or damage to capital assets and the reduced risk of personal injury to staff and visitors. Access security applications range from controlling a single entrance door to managing a large complex site.

Physical access control systems comprise three main components:

1. The Physical Barrier
The physical barrier prevents the entry of unauthorised personnel and has a means of granting access electrically. These may be; a door fitted with an electric locking device, a turnstile, a parking gate or a lift. For doors, a magnetic door sensor may be added to monitor the door position, so that an alarm can be raises if the door is left open or opened illegally. Because there is no means of ensuring that only one person passes through a door when it is unlocked, strict rules must be in place to deter authorised users from allowing unauthorised people access through the door.

2. The Access Controller and Reader
The physical barrier is electronically controlled by an access controller combined with some form of reader to identify people by their 'credentials'.  This may be a keypad, a card reader or a biometric reader. Together, the access controller and the reader provide the ability to identify an individual and authorise or deny entry to them.
Access controllers may either be ‘stand-alone’ or networked to a master PC-based (also known as ‘on-line’) access control system that manages the user database for all access points. The PC-based system software can update each controller with the details of each individual’s access rights. PC-based access control systems can offer many additional facilities such as user location, attendance and usage monitoring, visitor management and automatically unlocking doors during emergencies and assigned periods.

3. Credentials
The identity of an individual is determined by a ‘credential’, which may be a PIN code, an access card, key fob, or a unique human characteristic such as a fingerprint. In some cases, combinations of two or more of these credentials may be used to identify the person.

Please wait...

NOW IN CART NOW IN CART