CCTV Surveillance Case Study

The Problem We were contacted by a body corporate with specific security needs. The corporation is located next to an open field which spans 3 of the perimeter borders. Although the perimeter is enclosed with electric fencing these 3 sides are still unprotected since the electrical fence is not a deterrent for thieves. The corporation does not have any perimeter lights which made the approach through the dark field an easy in for any thief. We identified the main obstacles as: • No perimeter illumination • No electricity for cameras at the perimeter • Installing electricity along the perimeter [...]

By |May 31st, 2019|Categories: CCTV|0 Comments

How does biometric access control work?

Biometrics is a method of establishing a person’s identity based on chemical, behavioral, or physical attributes of that person, and is relevant in large-scale identity management across a wide range of applications. One of the most common uses for biometrics is providing access control for restricted facilities, areas, or equipment. In addition, this technology can be implemented to regulate access among computer networks, financial transactions, or transportation systems. The main purpose of biometrics in these applications is to determine or verify someone’s identity in order to prevent unauthorized people from accessing protected resources. Unlike code- and password-based systems or [...]

By |May 28th, 2019|Categories: Access Control|0 Comments

What is Access Control?

Access control is the selective restriction of access to a particular place, building, room, resource or installation. To gain access to a restricted location an individual generally needs to have authorisation or to be given permission to enter by someone that already has authorisation. Most buildings contain assets that need to be kept safe, secure and protected from theft. Authorised access might be controlled using; doors, gates, turnstiles, secure installations such as safes, barriers, bollards, and so on. Installation of access control may be a requirement of insurance policies. Access control systems might be monitored or controlled by staff [...]

By |May 28th, 2019|Categories: Access Control|0 Comments