Access Control
Always Know Who Is Accessing Your Property
Locking a door is about more than just keeping the ‘bad guy’ out. It’s also about limiting access to areas, equipment, and information. Security Safe’s access control system eliminates the need for key management by providing digital access control. With card, code, and biometric capabilities available, you’ll always know who has access and when.
Lock, Limit, and Secure Access
Security Safe’s commercial Access Control packages are custom designed to fit your needs regardless of how big or how small your application. Whether you need to to control access for a single door or thousands of doors, we can build the right solution for you. With an access control system, you can limit almost any conceivable situation depending on the type of system that best fits your needs:
- Each lock with different access levels and privileges.
- Limit access by person, day, time of day and event.
- Multiple access methods to include code, card and biometrics.
- A wide array of lock types to include magnetic, surface, bolt, hatch and more.
- Each person can have an individual single means of access that works in all the areas and times they are allowed.
- All programming and setup managed from a single location
- The availability of full reports, who accessed an area and at what time.
- Access can be combined with surveillance cameras marking each access with video verification
- Notice can be given when doors are left or propped open.
- Alarms when doors are opened outside of their scheduled times.
- Alerts when unauthorized access is attempted at a location.
The list of benefits is practically endless, but the operation is simple and precise.
Why Every Business Needs Access Control
Conventional access limitation involves keying doors differently and distributing keys to the people with access in the given area. Sometimes it is even more primitive with a “Do Not Enter” sign stuck to a door. These methods provide no assurance that your security expectations are being followed, and employees have to function all day with a heavy ring full of keys.
Equally challenging is multi-unit housing which combines the difficulties of key management with the fact that people transition. New tenants will not want a previous tenant to have a key to their new home, so owners must rekey the door and distribute a new set of keys.
Reliable access control is important for many reasons, from keeping unauthorized people away from important equipment and assets to ensuring the safety and protection of your personnel. Whether you have one door or thousands, access control simplifies your security protocols so you never have to worry about who has access.
Expert Installation for Commercial and Industrial Applications
A state-of-the-art access control system from Security Safe not only starts providing benefits immediately, but the system will pay for itself in saved time and enhanced security. All of our components are site specific, and you can easily build onto your current system as you expand. Systems can combine different types of access (such as systems that use both card and code) depending on the location, or they can be integrated for high security access locations that require both a card and a code. Systems can also integrate biometric devices including fingerprint, palm, and iris detection, and we can match the type of door, the color, and the swing.
Our commercial access control systems expand to monitor multiple locations and doors remotely through internet access, cellular or microwave technology. This allows you to monitor and control access to all your locations and all your doors from a single central station location. You can also add video surveillance to your remote locations for enhanced security.
Solutions for Small Businesses
Do you own a small business with just one or two doors? Your access control system is just as important to us! We believe the heartbeat of America is the small business owner, and we’re here to remove the burden of key management from your plate so you can focus on the many other things that demand your attention.
Security Safe offers multiple systems that are specifically designed for single, two, and four door configurations. We have equipment configurations designed for smaller applications, and our professional technicians will approach your project with the highest quality and service. Our access control solutions give you peace of mind in knowing that your business is protected, and you can check in and control your system from anywhere with our mobile app.
Meeting All Your Access Control Needs.
Do you have questions about our access control systems? Schedule a visit from one of our Security Safe representatives and get clarity on how the system works, which solution is right for you, and what your next steps should be.
Types of Access Control
Which type of access control is right for your application? There are four primary types of access control functionality. Each type is based on the level of security you may want for your location.
- Mandatory Access Control (MAC) – MAC forces the system to act according to specific functionality. In the initial programming stages (which can be changed at any time) the system is laid out according to desired parameters, and points of access are specific and limited by user. This is considered the most secure in that there is no variance and no means of end users bypassing or altering the methods of operation
- Role Based Access Control (RBAC) – RBAC is used for ease of programming and adaptation to personnel changes. Access is based on what group or classification an individual is assigned. For example, there may be areas that are available only to your sales personnel. An individual assigned to that group would have access to all areas the group is allowed. If a person is promoted or moves to another group, only the group assignment has to be changed.
- Rule Based Access Control – This type is similar to RBAC, but it assigns or denies access to users based on limitations or rules defined by the owner rather than roles. Rule Based Access can be based on a series of other circumstances such as days of the week, time of day, emergency criteria, single use access, or access for a specific period of time.
- Discretionary Access Control – This is the least restrictive, requiring only a code or card for access. There is no additional questioning or confirmation, and access is granted to anyone with the correct code or card. Discretionary access works well when the level of access control is simply to lock an area and keep from having to distribute keys to everyone with access.
Frequently Asked Questions
Questions? We want you to be 100% satisfied! Here are answers to some of the most common questions we receive.
What is access control?
Access control is the ability to monitor, secure and limit access to locations and areas using automated locking equipment. Administrators can assign entry levels for employees, contractors, guests and more.
Can access control work with other systems?
Linking to other systems is software dependent, but the answer is usually yes. Access control systems can be linked to time clock features, software activation, camera system and visitor management. Integration to an access control system would be dependent on third-party software.
Can I manage access control with my smartphone?
Most of our systems offer app integration. This allows administrators to monitor status and user reports from their mobile devices in most cases, just like being at a computer. Some systems can also connect with mobile phones via Bluetooth or NFC linkage.
I only need a small system. Will Security Safe handle my project?
Yes! Your one or two door system is just as important to us and will receive equal quality and focus by our professional team of technicians. We understand that removing and easing the burden of key management gives small business owners and managers more time for all the other things that depend on your attention. Security Safe offers multiple systems that are specifically designed for single, two and four door configurations. Our smaller systems offer features like remote control and status of your system through our mobile apps.
What type of access control should I implement?
There are four primary types of access control functionality. Each type is based on the level of security you may want for your location:
- Mandatory Access Control (MAC) – MAC forces the system to act according to specific functionality. In the initial programming stages (yes, can be changed at any time) the system is laid out according to desired parameters. This is the most secure in that there is no variance and no means of end users bypassing or altering the methods of operation. Points of access by users are specific and limited.
- Role Based Access Control (RBAC) – RBAC offers ease of programming and adaptation to personnel changes. Access is based on a person’s role or classification. For example, there may be areas that are available only to your sales personnel. An individual would be assigned to that group and would then have access to all areas authorized for the group. If a person is promoted or moves to another group, only the group assignment has to be changed.
- Rule Based Access Control – This type of access is similar to RBAC but assigns or denies access to users based on limitations or rules defined by the owner. Rule Based Access can be based on a series of other circumstances such as days of the week, time of day, emergency criteria, single use access or access for a specific period of time.
Discretionary Access Control – This is the least restrictive and provides access through a code or card. There is no additional questioning or confirmation, simply that the code or card is presented regardless of who may be using it. This type works well when the level of access control is simply to lock an area and keep from having to distribute keys to everyone with access.
How is access controlled with the system?
Most access control systems will have one or more controllers or processors. The larger the system, the more controllers will be needed. We will help you consider how the components will be integrated and where control equipment should be located. For example, it may be feasible to use multiple controllers to limit the amount of wiring to each field access location. Controllers should be placed in a secure location that is not publicly accessible.
What type of locking hardware do you use?
The type of locking hardware that best fits your application will depend on the area that needs to be locked and what type of access is needed. For example, should the opening be locked from both sides or just one? Should there be a physical exit device like a button on a wall, or free egress like a motion detector unlocking the door when anyone approaches? These questions and others will help us select the best locking hardware for you.
How is access authorized?
You can choose a variety of access authorization methods, depending on the type and level of security you need. Reader types can involve an insert or swipe card, card with required code, code only, proximity device, or biometrics.
What happens if the power goes out?
Access controllers are normally installed with backup power sources that would keep the controller and locking mechanisms working during a power outage. Since these are battery storage, extended or long-term power outages could result in equipment not operating. Since most installs do not change out typical hardware, the backup at that time would be the knob locking mechanism.
Can my system grow as my business expands?
Yes, you can expand to a larger application. However, it helps to consider the potential for expansion from the very beginning. A system can be as simple as a single controlled location initially, but if you plan to expand to a larger application, it’s wise to choose a controller type system that has the capability to expand to your desired level. This will avoid the need to re-invest in control equipment as time passes and the system grows.
System controllers can be interlinked and will all work in unison as a single system. The most important part is to have the initial preparation in place for the expanded system. In some circumstances where the growth may be gradual, there are systems that have expandable software. The initial license may be for a smaller number of access points, but when software can be expanded to grow the system even more.
Can I merge my current access control with a new system?
In most cases, the hardware for locking systems is interchangeable, as well as the locks themselves and many types of card readers. Since all access systems are software based, the integration of software is always the deciding factor. Readers and access cards can often be used across systems with correct programming.
Does My Access Control System Have To Be Managed All The Time?
Most systems run automatically with no physical input needed once the system is programmed except for changes. Unless your system needs to have someone observing every access point, access control systems function independently based on the level of rules put into place in the beginning. In some cases, Security Safe can make arrangements to do your programming changes remotely.
What if an access card is lost or stolen?
As with any security system, the reporting of lost, stolen or even compromised codes is essential. The benefit of an access control system is that the missing or violated code can be easily removed from the system. There is no need to change locks, replace hardware, or reprogram any other user’s information.
If you have any further questions about our commercial access control services, please contact us and we would be happy to assist you.