The DSS Access Control Systems provide an ability to tailor a solution based on your specific needs. We will analyse and discuss these needs with you first, and then design the ultimate solution based on those needs, your budget, but also bearing in mind scalability. The costs may be surprisingly low depending on the system, with the following impacting both price and complexity:
Size of system (itself based on size or organisation, area/s occupied, number of employees, etc.)
level of automation and sophistication
Mnumber of systems to be integrated
distance between sites (if more than one site)
Internet access and speed required
You will note in the text above the use of several technological facilities, and we explain these below:
Biometrics:
This refers to the science of verifying a person’s identity through automatic recognition means, measuring pre-determined characteristics of each person. Two of the most common tools (and you may have seen these used in movies) relate to a fingerprint scan, which recognises the fingerprint of the individual and the iris scan, where you look into the lens that will identify you by your iris. These are very effective systems and are not easily fooled so in almost all situations are regarded as full-proof
Alarm Devices:
There are various levels of sophistication in relation to alarms, and in particular what triggers the alarm. DSS can incorporate several ‘triggers’ including movement (indoor and/or outdoor), (specific) door/s opening, (specific) window/s breaking, safe sensors, smoke detectors, etc. A fully integrated alarm system can incorporate some or all of the above into one system, all essentially controlling access to specified areas and reporting (via the alarm) when a security breach occurs.
Integrated Solutions:
What this means is that DSS has the capacity to merge all of your security and surveillance systems (as well as systems covering building maintenance – managing things like lighting, air-conditioning, heating, UPS, etc., within the office environment and being able to, for example, switch these on and off remotely) into one manageable solution, with varying degrees of reporting, recording and access. Some of these may be accessible via the web, enabling you to review at any time, while others are based on ‘reaction’ where the triggering of an alarm is the call to action (and where that ‘action’ must be defined and planned).