Access Control systems provide a mostly automated permission based access capability to secure rooms, areas or even entire buildings, often containing valuable items and / or personal or commercially sensitive information.

 

Access is granted through presentation or use of the users ‘credentials’, which can be in the form of a PIN code, password, proximity fobs or cards; which are all proven, effective and reliable methods – although there is always the possibility that cards or fobs could be lost or stolen and PIN codes or passwords can be forgotten, or; if they are not changed regularly; acquired or persistently used by individuals who should not have access to the protected area.

 

A reliable, unforgettable and cost effective solution is the incorporation of biometric access control readers into the access control system. These systems can include fingerprint, facial or iris recognition, retinal scan, or hand geometry readers.

 

Modern biometric readers have been rigorously tried and tested in a wide range of conditions, as well as being cost effective as the development of this technology continually advances and the cost of systems therefore comes down.

 

Through creation and maintenance of a transaction log on the access control systems central database, the reliable use of biometric readers can also be utilised as a form of time and attendance monitoring and can create alerts or demonstrate patterns which can be used by appropriate management personnel to identify where operational improvements can be made.

 

For more information on Biometric Access Control systems and related technologies, their benefits and where they have been used you can find details via the main Access Control page, the Case Studies or Product Focus pages on the Thompson Group website.

 

Key benefits include:

  • No ongoing cost of additional cards / fobs
  • Removes the potential for forgetting passwords
  • Can only be the authorised individual who obtains access
  • Fully networkable
  • Potential for integration with legacy systems