Logo alt

  • Home
  • Security
  • Surveillance
  • Contact

ACCESS CONTROL

Access Control Overview

Access control is a system that allows only specific people or personnel to enter a building or facility. Our product is accurate and reliable and allows you to take control of your property. We install and maintain access control systems to ensure that you will always have flawless control of your premises. Access control systems are custom designed to suit the needs of properties, businesses or buildings. The advantages to having Access system are:

  • Access control systems are accurate
  • Access control systems are reliable with a low rejection ratio
  • Access control does not take breaks, go on strike or make mistakes
  • Access control can make security checks faster
  • Records can be stored on the movements of people, when they enter and leave
  • Could be integrated with CCTV and Time Management (T&A)

Access control systems allow the user to determine the complete movement on the property by identifying key aspects of trafficking by means of:

  • Zone and group control
  • Anti pass-back
  • After hours and Public Holiday Lockout
  • Visitor/Security escorts
  • Induction/Medical inspection reminders
  • Time and attendance/payroll recording
  • Boycotts/strike lockouts


Biometric and unique identification

Biometric access control gives you 100% control over access, whilst eliminating the hassle of issuing cards or tags. Because it is not easy to fake someone's fingerprint or physical traits, biometric sensors ensure that only people with permission may enter. Lost key and buddy clocking will become a problem of the past with biometric access control.


All our solutions and products can be fully integrated to biometric readers to provide the best security for any environment. This includes, but is not limited to:


  • 1:many verifications. Where the fingerprint templates are downloaded to the biometric reader. Typcally for smaller sites with 5-3000 users.
  • 1:1 verification where the fingerprint template is encoded into a smart card. Typically for large sites with 3000-50000 users.
  • Database integration to the host fingerprint control system
  • Programming and configuration of biometric readers
  • Installation of biometric readers
  • Weather and element resistant solutions
  • Set up of user fingerprint enrollment desks
  • Training and training documentation
  • Ongoing support
Card readers and cards

Conventional Access control could be implemented by utilising a diversity of clocking methods. Most commonly used are tags. These tags are issued to employees or visitors with the proper group access to enter or move inside the facility. A variety of tags could also be fitted to equipment or vehicles to track their movement. These tags vary from:


  • Mifare cards
  • HID Cards
  • Smart cards
  • Mag-stripe cards
  • License Plate Tag
  • RFID Tags

Fibre Utility Networks can provide a full range of products and services related to card and tag technology:


  • Card Programming
  • Corporate 1000 deployment
  • Card layouts and printing
  • Programming of smart cards for additional information holding
  • Reader grouping and zoning
  • Mustering for emergency roll-call
Turnstiles and locks

The secure side of a facility and the non-secure side is maintained by some sort of physical barrier that can be controlled using the access control system. Through experience we have established the best methods and practices for implementing these technologies and offer the following services:


  • Installation of vehicle barriers with access control
  • Installation of single and double height turnstiles with access control
  • Civil works required to install vehicle barriers and turnstiles
  • Installation of electronic locks for fail safe and fail secure methods
  • Installation of magnetic locks and door closers on a variety of door types
  • Battery and AC mains protection for locking systems
  • Interlocking control and in-house software development of different locking scenarios
  • Visual verification of locking status and secure status
  • Remote opening of any locking mechanism, either through LAN or WAN connection
  • Warning and alerts systems for door and lock breaches
Fibre Utility Networks : 2017 : All rights reserved