[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2011/09/06 14:42:16

Technical specifications on the ACS

If you professional integrator of security systems, then only a matter of time when you for the first time hear one of the most pleasant requests in your life: "We need completely new control system of access, and we want that you developed and implemented it". But this trust loads with serious responsibility.

The directory of ACS systems and projects is available on TAdviser

Content

The task can seem frightening, especially if a new system is much more large-scale than old. But if you approach its solution methodically, then will be able to secure yourself against errors and to guarantee that the client will receive that system which is required to it in accuracy. System approach can be reflected in the list of necessary actions which will help you to satisfy and even to exceed client requirements and expectations.

Listen to your client

Let's begin our list with obligatory inclusion of time in it for close, attentive communication with the customer. If you are the active and interested listener, then learn from him almost everything that it is necessary for you. And your dialog will lay the foundation for true working partnership.

  • What he sees the security system in the short-term, medium and long term? Whether she relies on open standards it seems 802.11b/g or 802.3af what makes infrastructure more available? Whether enough it is scaled to cope with possible merges and absorption?
  • What types of certificates in it are used? How many will it be issued ID cards? Whether there are preferences on their technology format? What quantity of accounts can be required in the remote perspective? Whether existence of means against duplication of certificates is supposed?
  • What investments were already made? Whether there is an opportunity to upgrade the current solution?
  • What the client has assets requiring protection? What their value, including rather operational processes? Here it should be taken into account assets of different types: from an equipment (for example, computers) to the database of clients, out-patient cards of patients and personal records of employees.
  • Whether some transactions with assets were made for increase in their level of security? Perhaps, it is necessary to replace a key system also.

Look narrowly at your client

You need to learn more about the corporate culture accepted on an object of your customer. It can be open, hospitable organization or the regime building with strictly regulated access. Always there will be a conflict between convenience and security. The difficulty is in setting such rules and procedures which would reflect reasonable balance between these mutually exclusive aspirations.

  • Did you notice the employees holding doors for each other open? If yes, that as employees can confirm the status of the current employment in the organization?
  • Whether they opened doors for the people bearing big packets? If whether yes, that identifiers of persons were checked?
  • Whether visitors on a special rack were registered? Whether identification badges were issued to them? * Whether their staff representatives accompanied?
  • If this hostel whether is not present at students of a habit to leave the rooms not locked? What responsibility is born by administration of educational institution at cases of theft and at rejection of measures for fight against thefts?

What is the ACS

SKD — a complex of the technical means and organizational actions directed to the solution of a problem of control and access control to certain premises. SKD allows to control movements of people in the territory of the protected object.

The control system of access has different solutions which choice depends on tasks of your enterprise or organization. We can set as local SKD (on one door), and the network system expected a large number of premises and checkpoints.

Why it is necessary?

SKD easily allows to prevent penetration on the protected area that will save your material values and information and also will ensure safety of visitors and personnel. You will be able to hold doors constantly closed, and it will not interfere with daily affairs of employees.

Basic functions and advantages of SKD

  •       Access control. Control of right of access of the employee in the set premises. Remote control of blocking devices (locks, tourniquets). A possibility of prohibition or address enable in certain days.
  •       Access by the personal ID card. At pass it is possible to set function of display on the screen of the monitor of the photo of the employee and information on it.
  •       Statistical data. Possibility of fixing of access for employees to these or those premises. Information on attempts of penetration into the prohibited premises, time of an input and an exit from the premises.
  •       Fixing of working time. SKD registers the exact time of arrival and departure of the employee from work. The report on the amount of time which is carried out by the employee in a workplace.
  •       A system works independently.
  •       A system can be controlled far off.
  •       Protection of an object in real time. Installation of protection on the premises or its removal if necessary. Obtaining information on force majeur situations (the notification of responsible persons) in real time.
  •       The SKD system can be integrated with other security systems (a video surveillance system, the security fire warning).