Access Control and Identity management

What is Physical Access Control?

Physical access control system(PACS) are a type of physical security designed to restrict or allow access to a certain area or building.  Often, PACS are install in other to protect business and property from  trespassing, theft, vandalism, and especially useful in facilities that require higher level of security and protection. These system control who, how and when a person can gain entry in a facility. These integrated system are sophisticated in their design and setup in order to meet the security need of an organization or the facility

Component of Physical Access Control System

Access point: The entrance point where the barrier is needed. Common physical access control examples of access points will include security gate systems, turnstiles, and door locks. A secure space can be a single access point, an office inside a large office complex, or many access points.

Personal Credential: Most physical access control systems require a user to have to identify credentials or access data before they can get access to a facility. Examples of credentials include fobs and key card entry systems, encrypted badges, mobile credentials, PIN codes, and passwords. Personal credentials tell the system who is trying to get access.

Readers and/or Keypads: Stationed at the access point, readers send data from the credential to the control panel to authenticate the credential and request access authentication. Users will enter their PIN or scan before gaining access if using a keypad or biometric (such as face ID, retina scan, or fingerprint door lock).

Control Panel: The PACS control panel receives personal credential data from the reader and verifies if the credentials are valid. If the credential data are approved, the control panel transmits authorization data to the access point via the access control server, and the door will unlock. If the credential is not approved, the user cannot gain access.

Access control server: The access control server stores user data, access privileges, and audit logs. Depending on your system, the server may be on-premises or managed in the cloud. System maintenance and software updates should be perform regularly to prevent the system from hacking or possible security breaches.


Smart home and Building automation

Yazzatech design and install security systems in corporate, government, NGOs, Hospitals, Schools, etc. We are on a mission to provide our clients with the advice they need to make informed decisions for the access control needs of their facility. We will work with you to understand your needs and advise you on a cost-effective access control system. Yazzatech uses OEM products from industry leaders in our design and installations. Contact us to schedule a meeting.