This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

Access Control – Things you need to know

trollMuch like the mythical trolls from our childhood fantasies, Access Control, limits access to only those whom are worthy.

Before you venture out and try to offer the world to your customer please be sure you listen to your customers needs and budget. Access control can be one of the easiest solutions to provide but also has a ton of different accessories that you must be aware of. Be sure you make a note of the small details as they could cause you a headache down the road.

 

 

Access Control -Thou Shalt Not Pass!

Access control pretty much boils down to just this…  How many doors does the customer want to restrict access to? Conventional wisdom will lead you to believe if the customer wants to restrict access to one door that you offer a 1 door solution. Lets throw that conventional wisdom out the door and lets start to think like the insane people who created  access control.  1 door has 2 sides in our normal world. This microcosm known as Access Control  will ruin that for you the moment you step foot into it. In their world each side of the door is considered 1 door. Both the front and the back of the door are their own separate entity.

Restricting Access – No soup for you!

Now that you know the amount of doors your customer wants to restrict access to, you need to find out how. Will you provide your customer a magnetic door lock? Will they be using a door strike? Will they be using mechanical locks of some kid?

Credentials – The cool kids club.

Your customer has told you how many doors they want to protect, and you figured out how you’re going to keep those doors shut. Now you need to now how you plan on taking the persons information to see if they are worthy or not.

The most common ways of taking a person credentials are the following

pin_padPin Pad -Pin pads are your most basic form of restricting access. For the most part you tend to install or sell these for an application that wants to restrict access to a single door. Users or codes can be given anywhere from 1 – 200 users (or more) depending on the unit used.  Down side to this is that any user that knows the code (or happens to see someone putting it in) can gain access to the building or location just by knowing the code.

 

pinprox

Pin / Prox Pad – Following the Pin Pad comes the Pin Pad with proximity sensor. These type of readers will accept a users pin code but will also require the use of a proximity card in order for it to grant access.

Please NOTE: Depending on how you program the unit they could be used as an either or unit or both must be used. That is to say you can use this just as a pin pad, just as a proximity reader, or you can use it as a reader that requires both before access is granted giving it that extra layer of security. 

 

proxProximity (Prox) – Proximity readers will read the contents of a card and or key tag. Based on the users access levels will determine if he or she is allowed to open the door.

 

 

 

morpho Biometric – Although there are various ways to get biometric readings  the easiest and most common is via the finger print. Biometric data is unique to each and every human begin. There is really no better way of limiting access to a location that requires the utmost security than using one of these readers. Finger print readers will take a few points of your finger and will store the data on its database. In order for you to prove you’re the same person you will have to always use the same finger and the points must match based on what was entered.

October 7th, 2016|Categories: Security, Uncategorized|Tags: , |0 Comments

Leave A Comment