Access Control

An ACS is primarily a physical operation implemented within high security areas, such as data centers, government/military institutes and similar facilities. Typically, an ACS manages, monitors and controls human access to the protected equipment or facility. Most ACSs are designed to take a user provided credential as input, verify/authenticate privileges using the access control list (ACL) and grant/deny access based on the findings. For example, using biometric security, an ACS can be used to authorize only legitimate access to a data center facility. The individual must provide his or her thumb print, focal or vocal credentials to an ACS, which is then verified through comparison with its database, and grants access only with valid permission.

  • Each ID media can be equipped with different authorization for the access.
  • All of the events are stored in the system, including attempts of unauthorized access.
  • ON-LINE real-time monitoring and control of restricted areas can be carried out.
  • With graphical plug-in.
  • Such plug-in can also be used to monitor and signalize the status.
  • Of controlled entrance points.
  • Interconnection with EZS, EPS systems.
  1. stuart@woothemes.com
    5 out of 5

    :

    This will go great with my Hoodie that I ordered a few weeks ago.

  2. maria@woothemes.com
    5 out of 5

    :

    Love this shirt! The ninja near and dear to my heart.

Add a review

<

<

12345