Access Control Systems

Control and regulate who has door access to a building

We have the expertise and experience to design and install an access control system that allows people get to where they are needed at the right times, while also preventing unauthorised access to restricted areas.

As a security and fire service provider, we have a vast range of state-of-the-art access control systems from door intercoms, card and proximity tokens to biometric and facial recognition from leading manufacturers.

What is Access Control?

 Access control copy copy

Access Control, in its simplest form, refers to the practice of permitting or restricting individuals’ physical access to a site, building or even to specific areas and rooms.

Access control systems have a wide array of features and functions.  At the bottom end of the market, you have basic keypad systems requiring users to enter a PIN number and swipe card systems where you swipe a plastic card with a barcode through a reader.  This is considered old technology and these systems have largely been replaced by proximity systems where you present a card or tag at a reader without needing to touch it.  Also becoming more popular and more affordable are biometric systems, which are mostly based around fingerprint and eye scanning.  The choice of access control technology will be partly dependent on the level of security needed, the environment in which they will be working, and cost.  

Access control systems can be applied to any physically contained points, such as doors, gates, barriers, fences, turnstiles and even elevators.  They can be simple stand-alone systems with one system controlling one or two doors or they can be networked to cover an entire building, or even multiple buildings across different continents.

How does access control work?

 Unlock copy

As the name implies, an access control system controls who enters a site/building and specific areas within those premises and at what time.  it should not impede the flow of authorised people but must keep unauthorised people out.

A typical access control system consists of:

  • Electric door lock hardware to physically lock the door
  • A magnetic door switch for monitoring door position
  • Readers, fitted close to doors, that will release the door lock if the correct data is presented.
  • Access controller and software
  • Cabling
  • Power Supply Unit
  • A Request to Exit unit which enables visitors to leave the area without the need for a fob (for convenience and safety)

Why is access control important?

 Biometric Iris copy

Preventing unauthorised access to a site helps protect premises and the people and assets within them, mostly from damage or theft.  At the same time, it may also act as a safety measure, preventing people from going near a potentially dangerous area or equipment.

Types of access control systems

 Biometric fingerprintAccess control systems can be applied to any physically contained points, such as:

  • Controlled entrance/exit - doors, gates and barriers
  • Restricted access
  • Turnstile (baffle gate or automated gate)
  • Fences
  • Elevators

They can be simple stand-alone systems with one system controlling one or two doors or they can be networked to cover an entire building, or even multiple buildings across different continents.

Access control systems consist of either:
  • Swipe card door lock system, FOB and RFID Readers
  • Touch screens or keypads
  • Remote access or smart locks 
You can combine technologies within the management systems for increased reliability and convenience.

SPEAK TO OUR TEAM OF EXPERTS

Why does your business need access control?

Your business needs access control if you have employees, suppliers or other visitors and you want to control the entrant’s access a certain location, room, area or site or limit that access to certain times or days.

With an access control system, authorised people may enter a site or building and a specific area at defined times. Unauthorised people have restricted access. Most importantly, an access control system should not prevent the flow of authorised personnel but restrict unauthorised people from entering and assist to secure your premises.

standalone access

Which access control system is right for your business?

There are several different types of access control systems, depending on your business needs and security goals.

Basic or standalone access control system?

A basic or standalone access control system is a simple way to control one or two doors and is not connected to any other systems. This consists of a physical server and connected computer on the business premises with all the required software and information to control access to the different business areas and the access rights that individuals can have. Smaller businesses or specific locations with no need to connect to other sites would typically require a basic or standalone access control system.

Networked access control system

A networked access control system can be two or more systems networked over a building, several sites, across the country or between continents. Businesses with many offices or sites requiring access control may need a networked access control solution. The networked access control system is managed from a central location with a data server and networked computers.

Local cloud-based Access Control System

A local cloud-based access control system enables basic features so that the system can be accessed remotely through a web browser via a smartphone or tablet. The data is held in an on-site server and accessed via a portal website. The system is accessed through the cloud from anywhere, and the key card readers and other physical access hardware are on-site. A local cloud-based access control system is ideal for smaller companies requiring a basic access control solution.

Cloud-hosted access control system

A cloud-hosted access control system moves the access control server to an off-site data centre, with the physical access control such as key card readers still in place on-site in the business premises. Cloud-hosted access control would be required by businesses that prefer to outsource the management and maintenance of a networked access control system or need the flexibility to manage many remote sites.

Fully managed cloud access control

A fully managed cloud access control involves a monitoring centre providing real-time building access and fully managing your access control remotely. This solution is entirely cloud-based and enables a remote security company to manage the complete system for you.

Access Control Proximity Systems

 access pass3

Need help understanding your 'Access Control' needs for your business?

SPEAK TO OUR EXPERTS

Card Access Control Systems - STANLEY Security
Contactless access control technology

What are access control proximity systems?

A proximity system is a fob, card or other device which uses encrypted RFID technology.  When the device is presented to the reader, the reader passes the device’s code to the access controller.  The controller compares the data being presented with that held in the systems database and then permits or denies access accordingly.  The data can be very specific, only permitting access to that door to that person at a set date/time. 

The card reader brands we install include:

  • STANLEY readers
  • HID prox readers

They are robust, affordable, and seamlessly integrate with access control systems. 

Our standard offering is a KeyPAC reader that provides a fast, convenient and reliable solution using either credit card sized cards, either pre-printed or printable, or heavy-duty fobs that can be attached to the employee's key ring. The KeyPAC cards can be presented to the reader whilst still inside the employee's wallet. 

BOOK A FREE SECURITY AUDIT
Bluetooth access control
Access control with smart ID

RFID, NFC and Bluetooth access control system

The STANLEY Security Architect range of RFID, NFC & Bluetooth™ readers turn your smart phone into your access control ID.

It offers the perfect blend of high security, modular scalability and vandal-proof all-in-one product. 

The software works alongside, extend or replace traditional RFID access credentials. The smart solution includes a FREE app, the latest generation of multi-technologies Architect® Blue readers, offline and online tools.

Access control without constraint

WATCH VIDEO LEARN MORE
Access control
System integration

Integrated access control system (ACS)

Our access control and door entry solutions are designed for a wide range of applications, ranging from small businesses that require complete plug-and-play systems, to extremely demanding, complex environments requiring seamless and effective 3rd-party integrations.

Our expert skillled engineers can integrate your access control into one system for all security including:

CASE STUDY: ACCESS CONTROL SPEAK TO OUR TEAM OF EXPERTS
Biometric Access Control - STANLEY Security
Door access control system

Access control biometric and facial recognition systems

Also becoming more popular – and more affordable - are access control biometric systems, which are mostly based around fingerprint and facial recognition eye scanning.  The choice of door access control system technology will be partly dependent on the level of security needed, the environment in which they will be working, and cost.  

If you’re not familiar with what a biometric security system is, then it is a method of security authentication that uses the unique characteristics of a person, such as fingerprint patterns, voice patterns, facial recognition, or the iris or retina pattern of the eye.

How you can benefit from biometric readers:

  • Provide only registered users/or users with appropriate permissions the ability to enter certain levels, rooms etc
  • Invaluable for timekeeping and workforce management
  • Boosts security to your building and, subsequently, staff safety
  • Cut costs on producing, maintaining and assigning key cards
  • No pin number – no fear of being observed and codes copied.

Multispectral Imaging is a technology that has a proven track record involving millions of users. Using multiple spectrums of light and advanced polarization techniques, the readers simultaneously capture an image of both the surface and subsurface ‘internal fingerprint’ to capture clear, clean images every time. Even when surface features are absent or hard to distinguish due to age, dirt, finger pressure and skin or environmental conditions. The sensor is also able to identify whether the fingerprint is genuine or a fake/spoof. The reader can be mounted externally without needing a case or weather shield to withstand inclement weather conditions, accidental damage or physical attack.  

DOWNLOAD BROCHURE
PAC
Higher level of access control security

PAC Access controllers and management sofware

The NEW PAC portfolio has been redesigned to provide an even higher level of access control security with pioneering features, improved energy efficiency and greater scalability, all at a highly competitive price point.

Available in stand alone, analogue networkable and IP networkable models, the new controllers are scalable from 1-2000 doors and support up to 75,000 unique identification devices via Access Central – PAC’s new management software. 

The controllers come with two inputs and two outputs, and a host of new functions including event to action (where inputs and outputs can be configured and used to deliver rules based responses to an event), local anti-passback, muster reports for fire evacuation, lift call and alarm point control; all without the need for ancillary equipment, providing significant cost savings, reduced power usage and a smaller installation footprint. 

LEARN MORE
Cloud Access Control 
Integrating a cloud infrastructure

Cloud Access Control 

Cloud access control enables businesses to remotely manage processes, such as adding or disabling user access, without requiring any hardware. This is especially critical during situations in which organisations must quickly and efficiently update access privileges to ensure only authorised employees are able to access a facility.

This offers many benefits – including extreme scalability, operational efficiencies and cost-effectiveness – but perhaps one of the greatest benefits is the increased data security.

Mobile credentials continue to play a key role in cloud access control, as organisations seek to implement contactless solutions that are not only easier to manage but also help to reduce the spread of germs.

Additionally, mobile credentials – which are equivalent to access control cards but are digitally stored in individuals’ phones – can be integrated with fingerprint and facial recognition capabilities, allowing for an even more secure solution.

 

GET IN TOUCH BLOG: ADVANTAGES OF CLOUD ACCESS CONTROL
Touchless access control 
Facial recognition technology

Touchless Access Control 

The latest access touch-free systems now incorporate facial recognition technology in place of keypads, swipe cards or tags.  They incorporate temperature measurement and even facemask detection, denying entry to those who have an elevated temperature or are not wearing a mask where they are required to do so. 

Some solutions are even available with a customer flow-limiting feature and/or can be readily integrated into people counting and visitor management software, providing even wider scope for protection now and in the future.

Post COVID-19, many will want to maintain the ability to check the temperatures of visitors and staff as it's good practice for health and safety.

Benefits include:

  • Contactless - non-contact temperature detection
  • High Accuracy - temperature monitoring accuracy 
  • Quick Response - fast face recognition time
  • Easy Installation - easy to install and deploy
  • Good Compatibility - can be integrated with third-party devices

 

DOWNLOAD BROCHURE REQUEST A QUOTE

What our customers say…

STANLEY really knows their security and has really helped us out.
Mr Byrne, Hodge Clough School
Thank you for sorting all the fire servicing at Falmer and now looks on trackfor easy servicing in future.
Southern Water
Great work by you and the team. From a business perspective there was minimal disruption 
and migration has finished way ahead of timescale (and budget). Well done and thank you!
Stansted Airport

Blog

  • 27 October 2020

    Considerations when choosing an access control system

    When implementing a new access control system there are several factors to consider that will affect the complexity and cost of the solution. The questions below will help you to think about what you may need, and our access control team will be happ...
  • 21 October 2020

    Manned guarding at a fraction of the cost - remote security monitoring

    STANLEY Security, one of the UK’s leading security providers, has extended its range of remote services with the introduction of Remote Guard.  Remote Guard uses a clever combination of CCTV, access control, intercoms and remote monitoring to ta...
  • 14 October 2020

    Maker Month - supporting the Security technicians of tomorrow

    STANLEY Security announces security technician scholarships as part of October’s Stanley Black & Decker’s ‘Maker Month’ STANLEY Security, one of the UK’s leading security providers, is pleased to be part of Stanley Black & Decker annual ‘Make...

Stanley Interactive Login


Remember My Login