Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player


Home Perimeter Security Control Rooms Company Introduction Wieless Infrastructure Fibre Optics Vulnerability Assessment Access Control Integration CCTV Time & Attendance Contact Us

ACCESS CONTROL

Boomgates
Spike Barriers
Turnstiles
Ballards
Alcohol Testing
Diagram

I3S Security is the leading African provider of local Access Control Solutions for mining and industrial solutions. We pride ourselves with the supply, installation and support of a large range of local hardware and software solutions for the Access Control and Time & Attendance market that we can offer, due to us being a Firefly agent. Access control systems are accurate, reliable, does not take breaks and can Integrate with CCTV, Time Management (T&A), Safety systems and HR systems

The Firefly agency allows us to sell the products of Firefly to our clients at the same pricing that you would receive from Firefly, with the added bonus of receiving security expertise at no extra cost.

Access control is a system that allows only specific people or personnel to enter a building or facility. The Firefly product is accurate and reliable and allows you to take control of your site/property/factory or mine. We install and maintain the access control systems, to ensure that you will always have flawless control. Access control systems are custom designed to suit the needs of the client.

The advantages to having Access system are:

• Access control systems are accurate
• Access control systems are reliable with a low rejection ratio
• Access control does not take breaks, go on strike or make mistakes
• Access control can make security checks faster and control the flow of people
• Records can be stored on the movements of people, when they enter and leave
• The supply the client with various standard report, and they then have the option of customizing reports.
• Integrated with CCTV , Time Management (T&A) , Safety systems and HR systems


Access control systems allow the user to determine the complete movement on the property by identifying key aspects of trafficking by means of:

Access control systems allow the user to determine the complete movement on the property by identifying key aspects of trafficking. Conventional Access control could be implemented by utilizing a diversity of clocking methods. Most commonly used are tags. • Zone and group control
• Anti pass-back
• After hours and Public Holiday Lockout
• Visitor/Security escorts
• Non Shift Lockout from certain areas
• Induction/Medical inspection reminders and control
Time and attendance/payroll recording
• Boycotts/strike lockouts


Access Tags

Conventional Access control could be implemented by utilizing a diversity of clocking methods. Most commonly used are tags. These tags are issued to employees or visitors with the proper group access to enter or move inside the facility.

Biometrics is the most sophisticated access control system available. Biometrics systems are used all over the world, and is known to be precise and totally dependable.

Biometrics

Biometrics is the most sophisticated access control system available. Biometrics systems are used all over the world, and is known to be precise and totally dependable. Biometrics uses physical or physical characteristics of a person as a form of security access control.
This high technology access control system has a number of different sensors including:
• Fingerprint readers
• Eye readers
• Facial recognition

Biometric access control gives you 100% control over access, whilst eliminating the hassle of issuing cards or tags. Because it is not easy to fake someone's fingerprint or physical traits.
Biometric sensors ensure that only people with permission may enter. Lost key and buddy clocking will become a problem of the past with biometric access control. The Firefly fingerprint reader we deploy at mines scans the sub dermal layers of the fingerprint and regardless of how dirty the fingerprint grooves might be, still accurately reads the fingerprint. I3S Security however recommends using Access Control with a combination of TAG, Biometric readers and a Pin. Certain areas require superior control (e.g. Explosives magazines etc) or combinations of tags, access cards, biometrics and pin can be configured.