It involves issuing access credentials (proximity cards, fobs, remotes, etc) to every person who is authorised to enter the premises. Proximity card readers and electronic locking devices are installed on all restricted access areas and the system is then programmed to define the entrances, times and rules of entry for each credential holder.
This information is then distributed to the various door, elevator and control panels to enable access to be granted to valid credential holders on presentation of their cards. Eclipse Security offers the very latest access control technology, including proximity readers, swipe card readers, Biometric readers (finger print recognition) and wireless systems.
See below for an explanation of just one of the different systems we install. For a tailored solution for your business please contact us.
M1 Access Control
- Total building integration security access control.
- Building Management 10,000+ Access Control Doors 50,000+ Users 32 Areas 1000+ Inputs
Up to four M1 systems can be networked and interface with the Ness IDTeck suite of powerful access control systems. The range includes everything from a stand alone single door controllers to networked systems up to 10,000+ doors.
There are many integrated security and access control features available such as denying access to a user if an M1 security area is armed and the user does not have security system disarm rights, regardless of the user's access control time schedule and access level. Once the area is disarmed, the user with the right access level will now be granted access.
The powerful and user friendly application software suites provides provide total solutions for access control and security management tool, time attendance, site management, lift control and centralised user management.
The standard software includes user management of both access control credentials as well as M1 security codes. It includes alarm graphics for quick identification of alarm points, access doors and security areas control both for alarm event identification as well as user control of these points.
It also includes comprehensive report generation of access control and security management events from IDTeck controllers and M1 system.