Access Control

Access control is the ability to decide WHO, WHEN and WHERE someone can enter your premises. The online systems have the ability for you to view a report of where people have been.
Access control can be used on just one door or all entry points. Installing access control on your main entrance door allows staff to enter without the need for issuing keys.
There are Online access control systems which are connected to a computer that runs the system and there are Offline access control systems that do not require a computer.
The access control system will be connected to an electronic lock. The system will then tell the lock when to open. This may be when a valid card is presented or it may be all day between specified opening hours.
All tokens are individually coded. This means that cards can easily be deleted if lost without affecting any other cards.
A biometric reader will allow the system to identify a person without the need for a card or fob. This may be using a fingerprint or the iris recognition systems you now see at airports.
A hands-free access control system allows the system to register a person as they approach the door. This means it is not necessary to present a fob or a card to a reader as the reader can pick up the presence of a fob or a card in a pocket or inside a vehicle. This is particularly useful for people carrying items or vehicular traffic at gates.

CCTV

CCTV stands for Closed Circuit Television and refers to the cameras linked to a monitoring point.
CCTV is used for cameras to view an area for the use of Security, Safety or Monitoring.
The type of system should be designed with the purpose in mind along with environmental conditions. Our surveyors are trained to match the correct equipment to your systems needs.
This is a type of based Video Analytics. It is able to see movement within the scene and can execute an action; like increase the record rate or email a picture etc. Basic Video Motion is not suited to external use as objects such as trees will cause it to trigger.
Yes, most DVR's these days include remote viewing software. All you will need is a broadband line to which the DVR gets connected to.
Remote monitoring is the linking of your site to our Video Control room where they can see and control the CCTV whilst having the ability to issue warnings over a speaker system.
Every commercial CCTV system should be registered with the Data Protection Registrar and the rules and guidelines followed.

https://ico.org.uk/for-organisations/guide-to-data-protection/cctv/

Door Entry

A Door Entry System is used to allow you to talk to visitors at your premises without the need for you to open the door to them.
A Video Entry System has a monitor built onto the handset in the building that allows the image of your visitors to be viewed. This can be very useful as you can see how many people you are about to give access to your premises. You can also read the ID badges of the callers by asking them to hold their badge to the camera.
Yes, all systems have the ability to open doors and gates but they will need some type of electronic lock fitted to them.
There is no theoretical limit but some of the cheaper systems only allow one entrance to be connected.
You can have as many as you like; some of the cheaper systems only allow one entrance to be connected.
Yes, we can link to telephone systems and the video images to CCTV systems. We can also supply and install equipment compliant with the Disability Discrimination Act (DDA).

Asset Protection

Asset tagging (also known as electronic article surveillance or EAS) allows you to keep track of valuables. You will see EAS in use at department stores and Libraries to counter theft.
There are two types of tags, Active and Passive tags. These differ in price and use but the main difference is that active tags have their own power source (a battery) and Passive tags do not.
RFID means Radio Frequency Identification.
RFID tags can be read-only or read/write allows the tag information to be changed and stored.
Active tags have a much longer range and a number of receivers linked allow vast areas to be covered.
This varies between manufacturers and some tags have replaceable batteries. Generally a good design should last at least three years.
There is no internal power source so, in theory, these will last forever.

Commercial and Residential Gates

Decades of trouble free use, with cost effective routine maintenance.
By use of an entry link communications and control system. Hard wire, land line or GSM subject to choice and programming.
It is strongly recommended that all automatic gate systems be supported from box section steel support posts, we usually use 150mm box section bed 1m into strong foundation.
A Gate-A-Mation post is capped with a duct entry and inspection plates for hidden cable runs and installed to withstand an expected level of stress.
Some are far better than others but most can be. However the best automatic gates are designed and constructed to suit the system and environment they are expected to work within.
Not ideally. Every good design needs to be drawn from many site specific features that would be missed if a fully trained and experienced advisor is not employed. Safety warnings are given by the H&SE for this very reason.
Are you being told what you want to hear, or best advice? What is the long term motive behind the advice given and is there any supporting evidence that matches your project?
Automatic gates are used far more than manual ones and the wrong type of hinge would cause unnecessary issues as well as hinder the system performance. Security, reliability and safety are all important features when choosing the right hinge for each project.
All gate motors have a manual override that would allow use in case of a power cut or system malfunction. Some are far easier than others to use, some need a secure key and some can revert to manual use, automatically. Some are more reliable and last longer than others, all are very important! Gate-A-Mation Policy to recommend “Fail Release” where practical and on all Multi-user systems with ‘Fail Secure’ were requested, often around a security need