The ability to know when someone entered a facility tying directly to their credentials
Layers of Security
Knowledge based access
Possession based access
Limit access by setting time to accept credentials on your desired hours
Programmable at the door through the device.
Straying keys are no longer an issue, remove / add users with a click of a button.
Centralized / Distributed
Programmable through PC at the facility or Universal from anywhere through internet.
For Consultation on your next Access Control System, Contact US