Access Control Systems (ACS)

The system provides control over the entrance to the building through the turnstiles, gates and doors.

Entry and exit of employees using plastic access cards, biometric authentication, or dual control allows maintaining a database of users of thesystem and to delimitate employees by the levels of access.

It allows the operator of the system to open or close passages at will, monitor employees and keep track of their whereabouts. It automatically records and archives all the information. When natural disaster strikes, access control system automatically switches to emergency mode allowing employees to leave building without the use of access cards.

It is also possible to keep track of hours employees spend in the workplace, obtain information about the presence or absence of employees at a particular time of the day, and automate archive system so it could count the total time employees have worked in a certain period of time. The system also stores the data of the presence and/or absence of employees in the building during the day, or those who have left the building without logging out.

The system has the ability to form a multi-shift work schedule and create an individual schedule for each employee, taking into account various factors. It also automates browsing archives and preparation of reports for accountants.

Installed at the facilities of the national economy of the Republic of Tajikistan, access control is designed to monitor and control access to the building through the turnstiles, allowing employees to enter and exit strictly by the use of special plastic cards, allowing IT department to maintain the database of users of the system and to delimitate employees by their access levels. The system automatically archives the records of the entrances and alarming events. When natural disasters strikes (earthquake, fire, flood, etc.) access control system goes into emergency state, during which the building can be exited without the use of access cards. Access control systems (ACS) is designed to provide an authorized access to the premises, which are under the protection, control and prevent unauthorized access to the data room.

ACS allows you to organize the passage of employees on the protected objects using keypads, proximity cards, biometric readers (e.g. fingerprint readers) and organize their passage through the turnstiles, barriers and gates.

ACS eliminates the human factor in granting and restricting access to company premises i.e. it will only grant access to authorize personnel according to their level of security.

Compared to traditional security, ACS is always online and reacts rapidly in emergency situations. In case of any emergency situation it will sound the alarm. All the events, alarms, settings, disarmaments are fixed and permanently stored in the system.

ACS remotely controls equipment in real time. Floor plans of buildings can be loaded to the computer from any controller. From control room, the operator can force open, close and lock the doors, sound the hidden alarm and perform other actions.

The system allows the operator control entry dates and times of employees to the premises, perform time tracking, perform visual identification of employees that enter the building using access cards, monitor personnel on the restricted premises, provide protection against transferring access card to unauthorized personnel using re-entry control system.

ACS prevents employees to enter into the premises on holidays, weekends and after business hours, it also creates a database for each employee or visitor and display information on various emergency and alarm situations in real time.

ACS can be integrated with other security systems. Smart integration of ACS with CCTV allows you to fully control the situation at any facility. In case of emergency situation, this set of systems identifies the offender in no time. Due to the alarm inputs and outputs, ACS can be integrated with an alarm system which during breach of security will sound the alarm, turn on LED light and other components of alarm system. ACS also can be integrated with a fire alarm system which in the event of fire emergency evacuation can unlock doors, open gates and lower turnstiles.

Our organization offers a wide range of Access Control Systems, several implementation options, and ACS design, installation and maintenance.

Modern world imposes certain conditions to life, work and security of people, security of information, wealth and secrets. Competition demands company managements to take drastic measures in terms of sustainability, restriction and control access of information regarding to corporate secrets of organizations. Working conditions of workforces, qualification of specialists, business hierarchy – requires the introduction of systems that restricts access to certain rooms, territory, sectors from unauthorized personnel. Employees must abide by organization rules and regulations, for example, to come to workplace on time, have lunch at a predetermined times and so on. Implementation of ACS together with the tracking system of working hours is essential to monitor abidance of company rules and regulations. This important innovation makes it possible to discipline employees of companies and lead them towards company goals. Also, based on the data provided by ACS and the tracking system of working hours, company can save resources and make more accurate decisions regarding personnel management.

  • Security is the primary objective. ACS can be integrated with security and fire alarm systems, video surveillance and other electronic systems (allowing to keep the entire premise under full control);
  • Dividing the territory into smaller areas and assigning different level of security (e.g. entry to some areas of banks has different levels of accessibility that can only be accessed by, a bank customer, VIP customers, employees of the bank or the bank’s management);
  • Different sectors require different pass keys, access cards, passwords and biometrics including fingerprints, retinal scan and the like;
  • registering activities and movements of key cards (personnel movement is tracked by the location of access cards);
  • tracking the working hours of personnel (ACS determines at what time the employees came to work, how much time they spent on smoking and lunch breaks, what time they finished work and went home);
  • Timely processing and registration of visited guests (registration of a guest takes less than a minute, security registers the guest by entering their passport details into company database, and hands in a guest card which access control system uses to monitor guests);
  • Building a distributed access control network with a single point of control and management is a possibility, for example, at headquarters of an organization (useful for chains of restaurants, cafes, shops and the like. Ease of getting data on working hours of personnel from the monitoring system must not be underestimated. Generally, remoteness of branches from the central office leads to a lack of communication and deterioration of employees’ discipline (e.g. coming late to work, leaving work early, etc.);
  • Remote monitoring of facilities can also be accomplished via a local or global network (useful for heads of non-departmental security services; gives the ability to personally access the information of interest in the security system);
  • Ease of entering data into the database and accelerated process of registering new personnel (to add a new employee to the database and issue an ID card takes about 5 minutes, restricting access to certain areas is executed by adding the employee to a particular group);
  • ACS is always online (when an individual unit of access control system loses connection it starts working in offline mode, as in the event of power disruption from the rechargeable batteries and disconnected ACS unit goes online it sends all data to the ACS server);
  • ACS provides robust password protection from unauthorized access;

Creating a draft of ACS makes it easier to understand it. That’s because different services have a different understanding of ACS. Founders impose one claim; security services another claim and the human resources and operating departments yet another claim for ACS. To gain a clear understanding of how ACS is designed on large objects (where the number of managed regions exceeds 20 points) and coordination of this understanding has to be aimed to design ACS with all the stakeholders. It will accelerate the process of decision making that satisfies all the services and presents a solution that answers the question, “what should be access control system?”

The ability to integrate different security systems (access control system, video surveillance, fire alarm system, intelligent home, etc.) into a single control network and management of the entire object is also determined at the design stage.

Moreover, technical and technological complexity of ACS may become clear during the design phase that can be taken cared of right away. Consequently, solving complexities at the design stage will save time and money on future customization or alternation of the system resulting in on time deliverance of the project.

The presence of the project will also help to carry out a clear and comprehensible bid, similar to technical requirements of conditions of all the applicants for the implementation of the system. ACS project will quicken subsequent deployment of access control systems integrator that has won the contest.

The presence of the project after the implementation of ACS significantly simplifies the work of operating organization for the subsequent exploitation and preventative maintenance of the system. A well-ordered set of units of equipment and a clear set up of cable infrastructure is mandatory requirement for a normal civilized operating system.

ACS is a complex engineering system which is responsible for security, especially for the people who are located at the premises of where ACS is operating, and of course it is responsible for restricting access to unauthorized people to different areas, as well as the safety of the property. Therefore, installation of ACS best left to the company that has sufficient knowledge and experience in implementing these and other systems. It is no job for amateurs and inexperienced.

Real world experience shows that the introduction of ACS – qualification and professionalism of systems integrator pays for itself within the first year of operation of the security system. This is easily explained by the fact that skilled professionals are paying great attention to details during assembly and subsequent debugging of access control systems. For example, high quality engineered network of access control system by the highest requirements of SNIP and skillfully assembled system will improve fault tolerance of the whole system several times. The rich experience of our specialists in implementing ACS will save money by reducing the installation time.

Important aspects of installed ACS are software and system integration. For example, you own a well-fenced cottage with a gate entrance to the garden. From your cottage, you can cycle through the cameras of the surveillance system and easily identify approaching cars to your home. The data from the cameras are transmitted to the analysis software, which executes identification of the license plate of the vehicle and compares it with the stored ACS data in the database. The gates will open if the approached vehicle is registered in the systems and recognized by the ACS.

ACS works with a variety of biometric readers. It is necessary to understand that this advanced technology requires, on a mandatory basis, to be maintained by a certified specialist who has a rich experience and knowledge in the field of security systems. Note: Safety and reliability of a property is directly proportional to qualification of system integrator that implements ACS.

Trusting ACS installation to us, you will feel calm and confident in making the right choice from the first moment of communication. Considerate attitude of our managers will give you a sense of caring and seeing our assemblers in business you will be convinced of the project being completed thoroughly.

We will be happy to solve your problems in the field of system integration.

ACS allows the operator of the system to open or close passages at will, monitor employees and keep track of their whereabouts.

ACS also keeps track of hours employees spend in the workplace, obtains information about the presence or absence of employees at a particular time of the day, and automates archive system so it could count the total time employees have worked in a certain period of time.

The system also stores the data of the employees who skipped work for days and employees who have left the building without logging out.

The system has the ability to form a multi-shift work schedule and create an individual schedule for each employee, taking into account various factors. It also automates browsing archives and preparation of reports for accountants.

Access Control System (ACS) Assembly

ACS can include various components depending on specific purpose of administration and security services of a particular company.

Generally, any ACS consists of the following main components:

  • Managing controller of doors, turnstile or other devices;
  • Reader at the entrances and/or exits;
  • Release button (Exit button);
  • Locking and unlocking device (electromagnet, turnstiles, barriers, etc.);
  • Interface converter;
  • Status gauges of secured property (reed switch, laser motion sensors, volumetric sensors, etc.);
  • Uninterruptible power supply with the system of emergency power supply;
  • Installed server software.

Small size Access Control Systems (ACS)

  • Standalone ACS at one point of entry;
  • ACS Network at one point entry with the tracking system of working hours;
  • Standalone ACS for multiple points of entry;
  • ACS Network for multiple points of entry with the tracking system of working hours
  • ACS with a point of entry through turnstile and gate;
  • Monitoring and management system of entry/exit of vehicles. Executive devices: a gate or gates. Identifiers: magnetic and proxy-cards, Tach-Memory or vehicle Proximity-Tag keys;
  • ACS “Checkpoint Pass Office”, ACS with three points of entrance that performs all functions of Pass Office and Checkpoint;
  • ACS that controls central and other points of entry of remote location from the head office;
  • ACS with control of entry, alarm detectors and video surveillance
    Fully-featured, comprehensive ACS for small, medium and large enterprises.