Access Control

Access management

by Mark Rowe

Businesses need their property, assets, staff, service providers and customers to operate in a safe and secure environment, backed up by a robust and traceable access control solution. The next generation of security devices must therefore reach ever-higher standards of system intelligence, flexibility and security, while also delivering value for money. Nick Dooley, pictured, managing director of LOCKEN UK, a developer of key-centric access control products, explains the importance of having software at the heart of the solution, to provide security and efficiency.

Based on unique technology, key-centric access management is built with the user in mind, it is based around three elements, a smart key, electronic cylinders and a unique software suite, providing robust and traceable access control. Each smart key is unique, impossible to duplicate and reprogrammable, enabling it to open one or all access points and in the event of loss or theft it can quickly be disabled. An electronic access control solution holds authorisation information for any number of sites, including approval based on time, date and location.

The most surprising thing about this solution is that no cables are needed, giving it unrivalled reliability. The lock (also known as the cylinder) does not require electrical power or batteries, much less a connection to send information, which means that it can be installed on any door as you would a mechanical lock without maintenance requirements. The secret is in the key, with permissions stored within it. If you have authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by the key will be recorded.

Why is traceability important?

With high volumes of people entering and exiting different areas of a public building, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by business owners or managers for audits, improvements or compliance.

How does it work?

Security managers can update permissions from a computer or, even more conveniently, using an app on a mobile phone at the time of access, which will update a key’s permissions via Bluetooth. This delivers increased flexibility and higher levels of security.

Access rights can be set at any time and on any day, and can allow access on just one specific occasion. The rules for granting permissions are infinite and easily customisable, and the system is very efficient when they are applied; as a result, the system is highly flexible and adapted to suit any number of different business models and infrastructures, not just public spaces.

What makes this solution really smart, is what’s behind all of this, the software that manages access. It can be used from a powerful, but simple web-based access manager or through personalised software that is integrated within a company’s existing software solution, to automatically include information. In some businesses, the access management system will help to further improve service levels by integrating it with the customer information system, allowing to link it for instance with alarm or intrusion managers.

This solution secures over one million access points worldwide and we take great pride in offering a robust and reliable access control solution to industries that are vulnerable to risks.

Related News

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing