Access Control Software
Access Control Software
Access control software that meets your needs!
Access control is a complex system that unites a system of electronic authentication and mechanical systems to limit the passage or access.
Depending on the level of security to be achieved, the electronic authorization is usually based on the the card or biometric devices.
For biometric authentication are commonly used systems for the fingerprint recognition. Their ease of use, high degree of accuracy and high resistance to external influences ensure their primacy in the field of biometric systems. The product that we offer and has proven its quality is uTouch.
The second part of a complete system of access control are mechanical devices for limiting the passage such as electric lock, tripods and walking swivel barriers, pedestrian ramp, security doors.
BoneID NET
FingerLAN
-
BoneID NET
BoneID NET is the central application that automatically processes the data of the applications on the device and allows the administrator to manage the whole system from monitoring transactions to the creation and organization of organizational units and employees, and defining the basic operating parameters.
Configuring and using BoneID Net application is simple and intuitive. The amount of data is reduced to those the user really need. Since this is a multi-user program, it is possible to define the name of each user and his access rights to certain functions of the system. It is a very powerful software that provides accurate information on reporting and management reporting permits.
BoneIDNet application enables to load data from your device on remote locations (either via a modem or a local area network) and their processing. -
FingerLAN
Fingerlan IV is the latest edition of the application for physical access control PeopleKey company, which allows you to safely and effectively control, limit and monitor physical access to any passage secured by FingerScan V70i ™ device.
This application also provides a scalable solution customized to your needs, and is ideal for network environments or organizations that need optimally controlled access to multiple entrances.