Access Control

Control the flow of people through your business, with smart access management.

Benefit the most from your Access Controls by using it to enhance the flow of data to use for your business’ development.

Smiling member of the One2Call team

Access Control

If your name’s not down, you’re not coming in.

Access control systems allow every door to become a virtual security guard. They can stop people, perform checks, and let through only those on the list (your company policy). Except access control systems do it in a fraction of a second, and at a fraction of the cost.

Fobs, cards, fingerprints, facial recognition or QR codes allow people to flow easily through their allowed areas. Timesheets and roll calls can be automatically collated. Safe emergency access can be centrally enabled.

Hardware can be subtly integrated into door handles or intercoms units or made to stand out where preferred. Other systems can even be integrated to trigger using your chosen id method. Imagine computers or heavy machinery only allowing access once approved persons have entered the room.

Modern access control systems offer unrivalled security controls for your physical business spaces. But they can also do so much more.

Talk to us about securing your building.

By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

COVID – Secure Controls

Checkpoint Control

Checkpoint Control

Create a pre-entry COVID checkpoint from which to enforce health and safety guidance and protect user well-being.

Users must be validated before access is granted to other areas. An “air-lock” setup can be used to control numbers within checkpoint areas. Biometric door entry units can check body temperature and id simultaneously, allowing entry if both are passed. Alternatively, authorised personnel can manually authorise employees once checks are passed.

Checkpoint control can be applied from the access control software. No additional tech is needed.

Occupancy Management

Occupancy Management

Enforce social distancing measures by restricting the number of people allowed in each area.

Numbers in and out of each zone is automatically tracked by the access control system. When capacity is reached, no more people are allowed access until another person has left.

With the addition of integrated CCTV cameras, virtual zones can also be monitored. This is ideal for larger areas like warehouses and factory floors.

    Access Control Management

    The key to security is to always remain vigilant. This is why active management of your system and its users is critical.
    You need to be able to add and remove users quickly, apply policies easily and adopt new hardware without fuss.

    Fully Managed Service

    Fully Managed Service

     

    For many businesses, administering access control is not enough work for a fulltime role and too much work for others. That’s why we offer a managed service where we take care of it for you. Your teams can concentrate on their core work. New users, guests and changes will all be done by us. And we’ll keep your hardware and software in ship-shape fashion to boot.

    Software and Apps

    If you prefer to self-administer, our software and apps will make it simple. Powerful software gives granular control over doors and users to authorised personnel. Alerts and reports help you keep on top of what’s going on. And smartphone apps mean you can stay in control, wherever you are.

    Software and Apps
    Software and Apps

    Software and Apps

     

    If you prefer to self-administer, our software and apps will make it simple. Powerful software gives granular control over doors and users to authorised personnel. Alerts and reports help you keep on top of what’s going on. And smartphone apps mean you can stay in control, wherever you are.

    Fob Management

    Fob Management

     

    Provisioning new cards and fobs can be onerous and costly. Visual scanners, which can use faces, fingerprints or QR codes as id, remove the need for fobs altogether. But if you prefer fobs, we also offer a fob management service. This is a simplified version of our Fully-Managed service.

    Door Entry Controls

    Access control systems are built around the central control of access points, such as doors, gates and shutters.
    When it comes to door entry controls, the choice is vast. This section is a simple overview of the options.
    However, we strongly advise working with an Access Control specialist when specifying your hardware.
    The wrong choices can leave you believing your premises are secure when they are not.

    ID Readers

    ID Readers

    Readers are input devices that tell the access control system who you are.

    Proximity readers, such as fob and card readers, are the simplest form of reader. They detect the RFID chip in a fob or card when held closely.

    Visual readers use a camera to confirm identity. This can be done automatically via a QR Code, facial recognition or fingerprint (also known as biometrics). Or the video can be relayed to a monitor to enable an authorised person to confirm identity manually.

    Keypads use a system-defined security code to confirm a users’ identity.

    Readers can be separate and discreet panels placed wherever is most convenient or integrated into other units, like door handles and intercoms.

    Magnetic Locks (Maglocks)

    Maglocks are high-power electro-magnets used to electronically lock or unlock doors.

    They need to be connected to something else to trigger, such as a fob reader or push-to-exit, and will relock themselves after a set amount of time.

    Every maglock as a holding force which is expressed as a weight. It is important to ensure the maglock used has enough holding force for its use. Security features are also important to consider, such as double-magnets or monitoring.

    Maglocks are a cost-effective way to integrate internal or external doors and gates into your access control system.

    Magnetic Locks / Maglocks
    Magnetic Locks / Maglocks

    Magnetic Locks (Maglocks)

    Maglocks are high-power electro-magnets used to electronically lock or unlock doors.

    They need to be connected to something else to trigger, such as a fob reader or push-to-exit, and will relock themselves after a set amount of time.

    Every maglock as a holding force which is expressed as a weight. It is important to ensure the maglock used has enough holding force for its use. Security features are also important to consider, such as double-magnets or monitoring.

    Maglocks are a cost-effective way to integrate internal or external doors and gates into your access control system.

    Integrated Door Handles

    Integrated Door Handles

    Door handle units combine card or fob readers into a lockable door handle for a less obtrusive solution. They usually fit over the top of a standard mortice lock allowing the existing key to be used as a backup.

    Options include rating for emergency exit and fire door use, outdoor use and impact resistance. They usually connect wirelessly to the access control system but can also be wired. Wireless units are designed to be very low-powered and have external battery backup.

    Fast and easy to fit, door handle locks are the best option for discrete deployment.

    Exit and Emergency

    Where it is unnecessary to confirm identity on the way out of a building, a simple push-to-exit button can be used. This simply opens the door for a preset period of time upon being pressed.

    All access control systems are designed with safety in case of emergency in mind. Once an emergency is declared all doors are usually set to open automatically. Emergency break-glass units should be distributed at strategic and highly-visible points throughout premises to enable all staff to declare an emergency.

    Exit and Emergency
    Exit and Emergency

    Exit and Emergency

    Where it is unnecessary to confirm identity on the way out of a building, a simple push-to-exit button can be used. This simply opens the door for a preset period of time upon being pressed.

    All access control systems are designed with safety in case of emergency in mind. Once an emergency is declared all doors are usually set to open automatically. Emergency break-glass units should be distributed at strategic and highly-visible points throughout premises to enable all staff to declare an emergency.

    ID Verification Methods

    It’s important to choose the right method of verification for your access control system.
    Cost,
    security and data management are all important considerations.

    Cards and Fobs

    Cards and Fobs

    Cards and fobs are much more flexible than keys. The fob only confirms id to the central software, which decides on access. As such access rights can be changed in a matter of seconds. Fobs are small and easily carried on a key chain. Cards can contain additional identity information like a headshot and employee number.

    QR Codes

    QR codes are small bar codes which can be scanned by visual door entry terminals from a users’ smartphone. Money is saved over the purchase and deployment of physical fobs. Codes are generated from the admin software and can be sent to the user by email, text or social media. QR codes are ideal for businesses with lots of guests or temporary workers.

    QR Codes
    QR Codes

    QR Codes

    QR codes are small bar codes which can be scanned by visual door entry terminals from a users’ smartphone. Money is saved over the purchase and deployment of physical fobs. Codes are generated from the admin software and can be sent to the user by email, text or social media. QR codes are ideal for businesses with lots of guests or temporary workers.

    Fingerprint & Facial Recognition

    Fingerprint & Facial Recognition

    Fingerprint & facial recognition, known as biometrics, are by far the most secure form of ID. Unlike other forms of ID they cannot be lost, stolen or traded. Biometrics can be used as a sole form of ID or in combination with each other or other methods for added security.

    Access Control Software

    Software is the beating heart of your access control system. It is where all identities are confirmed, all programming is applied, and all actions start. It is important to consider not just the features you will use today. Access control systems are becoming central to linking the physical and virtual worlds.

    These are but a few examples of what access control software can do. To explore the options for your business, speak to one of our consultants.

    Event Reporting

    Event Reporting

    View access events in real-time via the portal or app. Review historical events via the full event log.

    Standard reports show you the most relevant access event data. Or build your own custom reports based on individuals, departments or doors

    Timesheets & Roll Call

    Use your access control system to clock workers in and out. Collate working hours and automatically compile timesheets. Note planned and unplanned leave. Export reports into HR applications.

    Use access data to produce a roll call in the event of an emergency. See quickly who has fobbed in and out, and those who have only fobbed in.

    Timesheets & Roll Call
    Timesheets & Roll Call

    Timesheets & Roll Call

     

    Use your access control system to clock workers in and out. Collate working hours and automatically compile timesheets. Note planned and unplanned leave. Export reports into HR applications.

    Use access data to produce a roll call in the event of an emergency. See quickly who has fobbed in and out, and those who have only fobbed in.

    Triggers, Actions & Automation

    Triggers, Actions & Automation

    Easily create rules based on access events. Trigger door actions or alerts via email and text.

    Build time-saving automation within other business systems using access control triggers. For example, trigger phone and email out of office once fobbed out, or block power to dangerous machinery unless a supervisor is on site.

    COVID-19 Controls

    Simple software features can help you fighting infectious disease.

    Create a Checkpoint Control whereby users must be verified as safe before being granted access. This can be done manually or automatically by human temperature detecting cameras.

    Occupancy Management tools count the number of people granted access to a given area. Deny further access once number limits reached. Allow access again once people leave.

    COVID-19 Controls
    COVID-19 Controls

    COVID-19 Controls

    Simple software features can help you fighting infectious disease.

    Create a Checkpoint Control whereby users must be verified as safe before being granted access. This can be done manually or automatically by human temperature detecting cameras.

    Occupancy Management tools count the number of people granted access to a given area. Deny further access once number limits reached. Allow access again once people leave.

    Integration & Intelligence

    Make all your security systems more intelligent by integrating them with your access control system.

    Fire Alarm Integration

    Fire Alarm Integration

     

    Default all doors to open when fire alarm is triggered. Automatically generate roll call data and send to fire wardens via email or app.

    Intruder Alarm Integration

    Set all doors and gates to lock when intruder alarm triggered. Send alerts to relevant staff. Trigger integrated CCTV to record.

    Intruder Alarm Integration
    Intruder Alarm Integration

    Intruder Alarm Integration

    Set all doors and gates to lock when intruder alarm triggered. Send alerts to relevant staff. Trigger integrated CCTV to record.

    CCTV Integration

    CCTV Integration

    Trigger recording or snapshot when door entry attempted. Report on failed attempts with attached video for id verification.

    Our Customers

    Contact Us

    By clicking "submit", you agree to One2Call’s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking “Unsubscribe” on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

    Testimonials

    Daniel, Motorfinity

    Our move and installation of new IT infrastructure and phone systems couldn’t have been any smoother. The advice we had and technical guidance and support meant we felt totally at ease. Would definitely recommend One2call!

    Dave, Kier

    Always willing to help/go the extra mile.

    LFP Financial Planning

    Excellent speedy service! Thank you for your help.