Lose Your Keys and Invest in a Proximity Card Reader

One of the security issues faced by all companies has to do with managing who can enter their facilities and when. In order for physical accessibility to be controlled, you first must take note of several details regarding who you would like to give permissions to, where they are allowed to go, and when they are permitted to do so.

Historically this task was partially accomplished through keys and locks. When a door is locked, only a key-holder can enter or allow access depending on the configuration. The main drawbacks to this method are the lack of restrictions involving dates and times, the ease of copying or transferring of keys to unauthorized individuals, as well as the inability to provide records of who accessed which doors and when. One of the most costly aspects of using a mechanical key is when a key is lost, stolen, or the key-holder is no longer authorized access, all the locks in question must be rekeyed. The solution to this issue is using a device known as a Proximity Card Reader.

These wall-mounted devices are usually no bigger than a cell phone and are impervious to "picking" or "bumping". The reader itself is linked up to a Building Access System consisting of a central computer that stores information regarding which user can access which doors and at what times they are allowed to do so. When you walk up to a door, in order to signal it to unlock, an access card must be passed within a specified range in order for the Reader to scan the information stored on the card.

When the device identifies the card, it then compares the information against a database of users and permissions. If the card-holder is authorized to enter, it signals the door to unlock. In the event that the card does not have proper authorizations, the door remains locked.

An added benefit of using a Proximity Card system is that every time a card is scanned against the database, an activity report can be saved. This serves as a record of who, or which card, had used the reader and when. This is effective in monitoring when and how often individuals use a particular door. You will also not have to worry about costly rekeying if a key-holder is no longer authorized, or if a card happens to go missing. With a simple update to the permissions, a card can have permissions removed or even removed from the system in a matter of seconds.

For those who hold building security in high regards, a Proximity Card Reader is a worthy addition to any business's infrastructure.

Related Pages Proximity Technology Integration Building Access Systems Building Access Systems puts YOU in Control

Get a Custom Application Diagram of Your Perfect-Fit Monitoring System

There is no other network on the planet that is exactly like yours. For that reason, you need to build a monitoring system that's the right fit for you.

"Buying more than you need" and "buying less than you need" are real risks. You also have to think about training, tech support, and upgrade availability.

Send me a quick online message about what you're trying to accomplish. I'll work with you to build a custom PDF application diagram that's a perfect fit for your network.

Make an Informed Decision

Your network isn't off-the-shelf.

Your monitoring system shouldn't be, either.

Customized monitoring application drawing

We'll walk you through this with a customized monitoring diagram.

Just tell us what you're trying to accomplish with remote monitoring.

Get a Custom Diagram