Por Lucas Torres

24/05/2018

Uses and new features for installation of an intelligent access control system at your company

Access control systems go beyond just the opening and closing of doors. When applied in an intelligent way, the continual technological advances of this modality bring ease of operation and security to the environments they monitor.

 

“There are countless advantages to implementing an access control system. One of these is that they eliminate the need for changing door locks when keys are lost or when residents move in and out. Another is in the improved control of the movement of people through environments, for example, of a company employee from the gate of the parking area to his or her sector, giving the employee access only to those places that are related to his or her functions,” explains Andrey Gonçalves, product developer at Khomp.

 

Adding IP telephony for corporate scenarios to this creates an infinity of possibilities for access control, communication and security at your company.
To accomplish this, the first step is to conduct a study of all entrances/exits, including the specific needs of each location, in order to select the right equipment.

 

Intelligent access gates for vehicles

“In the case of gates for parking areas, for example, my recommendation is to install the IP Wall Kit which is the insides of an IP intercom for environments with pre-existing panels, which won’t interfere with their appearance. It works by connecting to a PBX IP as a SIP extension, and when its button is pressed it makes an Internet call to the person who can enable entrance,” he advises.

With the IP Wall Kit, it is possible to integrate an accessory called an RFID Reader. With this accessory, the gate can be opened automatically by anyone who has a tag or identification card that is registered in the system. This way, employees can pass their card by the reader installed with the IP Wall Kit and gain access to the parking area without having to make a voice call.

External and internal entrances with restricted access

For the main entrance to a company or even for internal doors with access restricted to certain personnel, the IP Wall is the most interesting choice. “This way, instead of passing out keys, the security manager has two choices: install a version of this solution that has a numeric keypad and give each employee his or her own password, or program employees RFID identification cards,” he explained.

With the reading of identification cards it is also possible to register the coming and going of each individual.

 

Emergency calls with the use of panic buttons

To increase the security in a scenario based on VoIP access control, it is possible to install a Panic Button that is also connected to the PBX IP. With this, when the button is pressed in emergency situations, the PBX IP emits an alarm from its SIP speakers that are distributed throughout the company at the same time that it makes a call to the company providing security services.

New features in access control for the IP Wall line

The Khomp line of electronic gatekeepers now offers optional resources integrated into the equipment, dispensing with the need for acquiring accessories to provide these functions. One of these is the integrated RFID reader for reading identification cards and tags. With it, the registration of tags is a standalone system, which means that the registers are stored in an SQL data bank located in the IP Wall itself, eliminating the risk of hacking of the IP network.

Another new optional resource for the IP Wall line is an integrated video camera in the line’s new models (301 and 312), while the others come with a license for an external video camera.

The outer part of the anti-vandalism models now come with a black piano front for installation of the options selected and the web interface has also been updated, making the process of configuration of the equipment and options more simple.

In regard to functions, it is now possible to establish communication between the IP Wall gatekeepers, even when they are in separate locations, such as at different branches.

 


Find out more about the Khomp Endpoints line of security and access control here.

Facebook Twitter Linkedin

Lea la política de privacidad de Khomp