Access Control, Intrusion and Duress systems are offered as individual stand alone or as turnkey solutions. Access Control systems can feature swipe or proximity cards, biometric (fingerprint or iris), latest technology “air” keys, pin pads and even a combination of all.DSS systems are capable of controlling just one and up to tens of thousands of doors, areas, groups and users in a single or in multiple building installations.

Intrusion or alarm devices such as Passive Infrared Detectors (PIR’s), door contacts, glass break detection, perimeter photo-optical beams, seismic (safe) sensors, duress, smoke detection and sirens can be interfaced into an Access Control system or installed as a separate stand alone system.Similar to Access Control, a standalone intrusion system can consist of one and upwards of thousands of devices. In accordance with AS2201 each device reports to a dedicated zone within the system so that its unique location can be identified immediately.

The purpose of an Access Control System includes the following:

favControl who enters your premises and when (and thereby deny entry to those whom are not welcome) 

favSecure a particular area of your business or site.

favObserve and record movement (and this system essentially saves on continuous monitoring as the system is activated only when and if there is movement)

favProtect the business, its assets, people and information

favReduce the costs of damage & loss (assets, property, people, information)

favBe scalable to accommodate future growth in the business, and within reason, future technological advancements

favReduce potential litigation against you and/or your business should your security systems be suspect and human injury (or worse) is sustained as a result

The DSS Access Control Systems provide an ability to tailor a solution based on your specific needs. We will analyse and discuss these needs with you first, and then design the ultimate solution based on those needs, your budget, but also bearing in mind scalability. The costs may be surprisingly low depending on the system, with the following impacting both price and complexity:

bulitSize of system (itself based on size or organisation, area/s occupied, number of employees, etc.)

bulitlevel of automation and sophistication

bulitMnumber of systems to be integrated

bulitdistance between sites (if more than one site)

bulitInternet access and speed required

You will note in the text above the use of several technological facilities, and we explain these below:


This refers to the science of verifying a person’s identity through automatic recognition means, measuring pre-determined characteristics of each person. Two of the most common tools (and you may have seen these used in movies) relate to a fingerprint scan, which recognises the fingerprint of the individual and the iris scan, where you look into the lens that will identify you by your iris. These are very effective systems and are not easily fooled so in almost all situations are regarded as full-proof

bulitAlarm Devices:

There are various levels of sophistication in relation to alarms, and in particular what triggers the alarm. DSS can incorporate several ‘triggers’ including movement (indoor and/or outdoor), (specific) door/s opening, (specific) window/s breaking, safe sensors, smoke detectors, etc. A fully integrated alarm system can incorporate some or all of the above into one system, all essentially controlling access to specified areas and reporting (via the alarm) when a security breach occurs.

bulitIntegrated Solutions:

What this means is that DSS has the capacity to merge all of your security and surveillance systems (as well as systems covering building maintenance – managing things like lighting, air-conditioning, heating, UPS, etc., within the office environment and being able to, for example, switch these on and off remotely) into one manageable solution, with varying degrees of reporting, recording and access. Some of these may be accessible via the web, enabling you to review at any time, while others are based on ‘reaction’ where the triggering of an alarm is the call to action (and where that ‘action’ must be defined and planned).