Access to the Kingdom Must be Controlled
Whether you're a small business or a large enterprise, the consequences of any security breach can be catastrophic, entailing loss and the risk of liability or non-compliance. Successfully managing the physical access to high-value resources or sensitive information is one of the most proactive ways to safeguard today's corporations.
Access control is the mechanism by which a system grants or restricts the right to access facilities (physical access). Many large enterprises have already deployed technology for physical security. Employees with the appropriate clearances or permissions are provided with smart identification (ID) cards that verify their rights and privileges. Once presented, scanned or inserted into readers, these credentials permit access to secure areas of the workplace, which often include gates, parking garages and warehouse and manufacturing facilities.
Increased security risks are now driving the need for more sophisticated solutions including Electronic key control and Smart card and Biometric based access control systems.
- The keys to your business are one of its most important assets. Keys access your doors, filing cabinets, lockers and vehicles. Keys may even give access to your customer’s buildings and vehicles. Do you look after them? Do you know who is using them? Electronic key management systems provide the perfect access control solution. These systems will ensure that only your authorised staff are allowed the keys and that every key taken will be recorded automatically showing the user name, date and time.
You will also know how often the keys were used and for how long. In turn this gives you important information about the assets of your business, perhaps the total time a vehicle was used for or how frequently a room was accessed. Keys are not there just for security. They are often for control, perhaps to prevent untrained staff from using dangerous equipment and in today’s even more controlled society, occupational health and safety issues are of increased importance. And electronic key management systems can be integrated into the other access control systems, ensuring keys are returned before staff exit the building or facility.
- A smart card is a credit-card sized plastic card that includes an embedded computer chip. There are two general categories of smart cards: contact and contact-less smart cards. A contact smart card requires insertion into a smart card reader, while a contact-less card requires only close proximity to a reader. Smart cards can store large amounts of data, carry out on-card functions such as encryption and digital signatures, and interact intelligently with a smart card reader.
Since multiple access applications can be performed on a single smart card, employees can use one card to access both physical and logical resources without carrying multiple credentials. From the doorways to the desktops, one convenient solution provides the secure identity management, strong authentication and access control necessary to safeguard both physical and intellectual assets.
- Biometric authentication is the measuring of a user’s physiological or behavioral features to attempt to confirm his/her identity. Physiological aspects that are used include fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements. Behavioral aspects that are used include signature recognition, gait recognition, speaker recognition and typing pattern recognition. When a user registers with the system which he/she will attempt to access later, one or more of his/her physiological characteristics are obtained and processed by a numerical algorithm. This number is then entered into a database, and the features of the user attempting to match the stored features must match up to a certain error rate.
Biometrics manufacturers have come to recognize that they are selling a component that goes into a much larger security system and SET recognises that people want to integrate biometrics as a component into their access control system. Such integration provides for dual-factor authentication.
SET provides the technologies that unify physical access control functions. Our offerings also include design, development, integration, personalisation, issuance, test and post implementation services to all or individual functions as detailed above.