Installing or upgrading an IP Access Control system not only provides additional functionality within the system itself, but also allows for easier and more effective integration of the Access Control system with other security technologies.

 

With the increasing availability of reliable, high bandwidth and secure networks, there is usually no issue in operating an IP Access Control system over your existing network. Utilising the existing infrastructure provides potential cost savings through removing the requirement for a separate cable network to connect the access control interfaces.

 

In addition to the potential cost savings, the incorporation of IP based access control onto your network also provides opportunities to professionally integrate additional access control systems such as barriers and turnstiles, lift call management, time and attendance, payroll and even smart card solutions including cashless vending and resource management systems.

 

The increasing availability of remote access technologies and network integration has also seen the advent of truly networkable access control management solutions, whereby the access rights, time and attendance and resource management systems for an individual user can be created and managed by an administrator in one central location and can then be applicable across multiple sites around the Country or even worldwide.

 

Through increasing utilisation of standard computer terminals and existing network infrastructure, IP access control systems are often easier to operate, manage, interrogate and analyse than older, more established systems and are easily scalable.

 

The majority of IP readers are also PoE (Power over Ethernet) capable, making it easy to provide battery backed power to the entire system, including the locks; whilst the failure of one IP reader does not affect any other readers on the system.

 

The Thompson Group continue to work with many clients to utilise elements of their existing systems, creating hybrid security protection with additional functionality for a lower financial outlay.

 

Once a variety of security and communications systems have been connected to the same network the scale of the individual systems capabilities is raised exponentially, allowing the once disparate technologies to work in harmony, providing enhanced levels of functionality, personnel safety and system management.