Access Control
Control the flow of people through your business, with smart access management.
Benefit the most from your Access Controls by using it to enhance the flow of data to use for your business’ development.
Access Control
If your name’s not down, you’re not coming in.
Access control systems allow every door to become a virtual security guard. They can stop people, perform checks, and let through only those on the list (your company policy). Except access control systems do it in a fraction of a second, and at a fraction of the cost.
Fobs, cards, fingerprints, facial recognition or QR codes allow people to flow easily through their allowed areas. Timesheets and roll calls can be automatically collated. Safe emergency access can be centrally enabled.
Hardware can be subtly integrated into door handles or intercoms units or made to stand out where preferred. Other systems can even be integrated to trigger using your chosen id method. Imagine computers or heavy machinery only allowing access once approved persons have entered the room.
Modern access control systems offer unrivalled security controls for your physical business spaces. But they can also do so much more.
Talk to us about securing your building.
COVID – Secure Controls
Checkpoint Control
Create a pre-entry COVID checkpoint from which to enforce health and safety guidance and protect user well-being.
Users must be validated before access is granted to other areas. An “air-lock” setup can be used to control numbers within checkpoint areas. Biometric door entry units can check body temperature and id simultaneously, allowing entry if both are passed. Alternatively, authorised personnel can manually authorise employees once checks are passed.
Checkpoint control can be applied from the access control software. No additional tech is needed.
Occupancy Management
Enforce social distancing measures by restricting the number of people allowed in each area.
Numbers in and out of each zone is automatically tracked by the access control system. When capacity is reached, no more people are allowed access until another person has left.
With the addition of integrated CCTV cameras, virtual zones can also be monitored. This is ideal for larger areas like warehouses and factory floors.
Access Control Management
The key to security is to always remain vigilant. This is why active management of your system and its users is critical.
You need to be able to add and remove users quickly, apply policies easily and adopt new hardware without fuss.
Fully Managed Service
For many businesses, administering access control is not enough work for a full–time role and too much work for others. That’s why we offer a managed service where we take care of it for you. Your teams can concentrate on their core work. New users, guests and changes will all be done by us. And we’ll keep your hardware and software in ship-shape fashion to boot.
Software and Apps
If you prefer to self-administer, our software and apps will make it simple. Powerful software gives granular control over doors and users to authorised personnel. Alerts and reports help you keep on top of what’s going on. And smartphone apps mean you can stay in control, wherever you are.
Software and Apps
If you prefer to self-administer, our software and apps will make it simple. Powerful software gives granular control over doors and users to authorised personnel. Alerts and reports help you keep on top of what’s going on. And smartphone apps mean you can stay in control, wherever you are.
Fob Management
Provisioning new cards and fobs can be onerous and costly. Visual scanners, which can use faces, fingerprints or QR codes as id, remove the need for fobs altogether. But if you prefer fobs, we also offer a fob management service. This is a simplified version of our Fully-Managed service.
Door Entry Controls
Access control systems are built around the central control of access points, such as doors, gates and shutters.
When it comes to door entry controls, the choice is vast. This section is a simple overview of the options.
However, we strongly advise working with an Access Control specialist when specifying your hardware.
The wrong choices can leave you believing your premises are secure when they are not.
ID Readers
Readers are input devices that tell the access control system who you are.
Proximity readers, such as fob and card readers, are the simplest form of reader. They detect the RFID chip in a fob or card when held closely.
Visual readers use a camera to confirm identity. This can be done automatically via a QR Code, facial recognition or fingerprint (also known as biometrics). Or the video can be relayed to a monitor to enable an authorised person to confirm identity manually.
Keypads use a system-defined security code to confirm a users’ identity.
Readers can be separate and discreet panels placed wherever is most convenient or integrated into other units, like door handles and intercoms.
Magnetic Locks (Maglocks)
Maglocks are high-power electro-magnets used to electronically lock or unlock doors.
They need to be connected to something else to trigger, such as a fob reader or push-to-exit, and will relock themselves after a set amount of time.
Every maglock as a holding force which is expressed as a weight. It is important to ensure the maglock used has enough holding force for its use. Security features are also important to consider, such as double-magnets or monitoring.
Maglocks are a cost-effective way to integrate internal or external doors and gates into your access control system.
Magnetic Locks (Maglocks)
Maglocks are high-power electro-magnets used to electronically lock or unlock doors.
They need to be connected to something else to trigger, such as a fob reader or push-to-exit, and will relock themselves after a set amount of time.
Every maglock as a holding force which is expressed as a weight. It is important to ensure the maglock used has enough holding force for its use. Security features are also important to consider, such as double-magnets or monitoring.
Maglocks are a cost-effective way to integrate internal or external doors and gates into your access control system.
Integrated Door Handles
Door handle units combine card or fob readers into a lockable door handle for a less obtrusive solution. They usually fit over the top of a standard mortice lock allowing the existing key to be used as a backup.
Options include rating for emergency exit and fire door use, outdoor use and impact resistance. They usually connect wirelessly to the access control system but can also be wired. Wireless units are designed to be very low-powered and have external battery backup.
Fast and easy to fit, door handle locks are the best option for discrete deployment.
Exit and Emergency
Where it is unnecessary to confirm identity on the way out of a building, a simple push-to-exit button can be used. This simply opens the door for a preset period of time upon being pressed.
All access control systems are designed with safety in case of emergency in mind. Once an emergency is declared all doors are usually set to open automatically. Emergency break-glass units should be distributed at strategic and highly-visible points throughout premises to enable all staff to declare an emergency.
Exit and Emergency
Where it is unnecessary to confirm identity on the way out of a building, a simple push-to-exit button can be used. This simply opens the door for a preset period of time upon being pressed.
All access control systems are designed with safety in case of emergency in mind. Once an emergency is declared all doors are usually set to open automatically. Emergency break-glass units should be distributed at strategic and highly-visible points throughout premises to enable all staff to declare an emergency.
ID Verification Methods
It’s important to choose the right method of verification for your access control system.
Cost, security and data management are all important considerations.
Cards and Fobs
Cards and fobs are much more flexible than keys. The fob only confirms id to the central software, which decides on access. As such access rights can be changed in a matter of seconds. Fobs are small and easily carried on a key chain. Cards can contain additional identity information like a headshot and employee number.
QR Codes
QR codes are small bar codes which can be scanned by visual door entry terminals from a users’ smartphone. Money is saved over the purchase and deployment of physical fobs. Codes are generated from the admin software and can be sent to the user by email, text or social media. QR codes are ideal for businesses with lots of guests or temporary workers.
QR Codes
QR codes are small bar codes which can be scanned by visual door entry terminals from a users’ smartphone. Money is saved over the purchase and deployment of physical fobs. Codes are generated from the admin software and can be sent to the user by email, text or social media. QR codes are ideal for businesses with lots of guests or temporary workers.
Fingerprint & Facial Recognition
Fingerprint & facial recognition, known as biometrics, are by far the most secure form of ID. Unlike other forms of ID they cannot be lost, stolen or traded. Biometrics can be used as a sole form of ID or in combination with each other or other methods for added security.
Access Control Software
Software is the beating heart of your access control system. It is where all identities are confirmed, all programming is applied, and all actions start. It is important to consider not just the features you will use today. Access control systems are becoming central to linking the physical and virtual worlds.
These are but a few examples of what access control software can do. To explore the options for your business, speak to one of our consultants.
Event Reporting
View access events in real-time via the portal or app. Review historical events via the full event log.
Standard reports show you the most relevant access event data. Or build your own custom reports based on individuals, departments or doors
Timesheets & Roll Call
Use your access control system to clock workers in and out. Collate working hours and automatically compile timesheets. Note planned and unplanned leave. Export reports into HR applications.
Use access data to produce a roll call in the event of an emergency. See quickly who has fobbed in and out, and those who have only fobbed in.
Timesheets & Roll Call
Use your access control system to clock workers in and out. Collate working hours and automatically compile timesheets. Note planned and unplanned leave. Export reports into HR applications.
Use access data to produce a roll call in the event of an emergency. See quickly who has fobbed in and out, and those who have only fobbed in.
Triggers, Actions & Automation
Easily create rules based on access events. Trigger door actions or alerts via email and text.
Build time-saving automation within other business systems using access control triggers. For example, trigger phone and email out of office once fobbed out, or block power to dangerous machinery unless a supervisor is on site.
COVID-19 Controls
Simple software features can help you fighting infectious disease.
Create a Checkpoint Control whereby users must be verified as safe before being granted access. This can be done manually or automatically by human temperature detecting cameras.
Occupancy Management tools count the number of people granted access to a given area. Deny further access once number limits reached. Allow access again once people leave.
COVID-19 Controls
Simple software features can help you fighting infectious disease.
Create a Checkpoint Control whereby users must be verified as safe before being granted access. This can be done manually or automatically by human temperature detecting cameras.
Occupancy Management tools count the number of people granted access to a given area. Deny further access once number limits reached. Allow access again once people leave.
Integration & Intelligence
Make all your security systems more intelligent by integrating them with your access control system.
Fire Alarm Integration
Default all doors to open when fire alarm is triggered. Automatically generate roll call data and send to fire wardens via email or app.
Intruder Alarm Integration
Set all doors and gates to lock when intruder alarm triggered. Send alerts to relevant staff. Trigger integrated CCTV to record.
Intruder Alarm Integration
Set all doors and gates to lock when intruder alarm triggered. Send alerts to relevant staff. Trigger integrated CCTV to record.
CCTV Integration
Trigger recording or snapshot when door entry attempted. Report on failed attempts with attached video for id verification.
Our Customers
Contact Us
Testimonials
Kevin Wood, IT Consultant
The service from Jack has been 110% throughout in line with the excellent service I’ve received since discovering One2Call. Thanks Jack and all.
Tracy Lilley, Ecclesfield Primary School
Responsive, friendly service. Very customer focused, polite and eager to help. Would definitely recommend and will use again.
Danielle, Tremark Associates Ltd
Jordan dealt with both my issues quickly and were both sorted within the hour.