Technology and security systems are constantly updated, modernised and improved. Years ago, access control wasn’t available. Simple alarm systems were all that was available to those wanting to secure their homes and businesses.
Nowadays, however, security systems are a lot more comprehensive. They let you not only grant access but also restrict access. These security systems can, for example, restrict access to server rooms or finance divisions where petty cash is kept. They can also restrict certain personnel from entering an office building during the weekends.
At SCG Systems we have taken your security to heart , and offer the sale and installation of:
- Biometric systems
- Time attendance systems
- Electronic Locks
Involves the use of fingerprints to grant or reject access to a building or a property . Very secure as we each have unique fingerprints. The more advanced use facial and voice recognition.
Involves the use of a code to grant access to a building or property . Not so secure anyone with knowledge of the code can gain entry.
Involves the use of a special tag that would be programmed onto a card, allowing the card holder entry to a building or property . This is not very secure if the card is lost or stolen, the new card holder can gain entry
For companies with a lot of employees , and different shifts it is difficult to keep track of employee arrival times and what time they leave . Time attendance machines solve this issue . The more advanced machines can link up to payroll software and make sorting out wages at the end of the month a lot simpler .
An electronic lock (or electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. More often electric locks are connected to an access control system.
The advantages of an electric lock connected to an access control system include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded.