Access Control Software

Easy to use Access Control Software

Access Control Software - Access Control WalesWinACnet creates alarm messages when predetermined actions take place, or if a forced entry occurs. These alarms are immediately emailed to a specified address.

Optionally a warning email can be sent if communications to the PC are lost. Free software upgrades to those with maintenance contracts means the system is always up to date.

Speech output is novel to the T3510, delivering clear English spoken alerts when pre-defined ‘flagged’ actions take place. For example, when a specific door is opened by a specific individual.

The T3510 continuously stores access transactions and alarm events in it’s non-volatile cyclic buffer memory. If communications with the PC or PC network is lost for any reason, the data is kept safe within this buffer and transmitted to the PC once communications is restored. Audible and visual warnings, alert the user if the memory buffer is nearly full, again ensuring a secure method of preventing data loss.

Our Access control software is the latest in our proven range of Windows™ based Access Control Products, from simple door and registration point control, through to a fully computerised global Networked Access Control System.

  • Access Control Profiles easily created or customised to suit your particular site, and can be varied minute-by-minute
  • Real Time (near) graphical display shows doors being opened / closed, those with alarm status set and forced entry
  • Doors may be configured to open automatically on fire alarms and lock automatically on burglar alarms
  • Anti Pass Back facility limits the same card being used by more than one person
  • CCTV Tracking (optional) of video clips showing "evidence quality" footage of forced entries, alarm events, users of Smart Cards gaining access or being denied
  • Door/Barrier Access can be limited depending on the persons' roll call status
  • Resilient System keeps running even when certain cables are cut or damaged or PC networks fail
  • Sensor Monitoring to detect forced entry
  • Audit Trail showing who gained access (or denied) at any location at any time
  • Biometric dermal fingerprint reading for maximum security and personnel authentication
  • Hardware Device Manager allows easy adding & editing of hardware device profiles

With our Access control software you can be assured that you will receive a simple to use, highly secure way of controlling access to areas or buildings, as well as monitoring who is present 24 hours a day.

Controlling Access

Access Control Software - Access Control WalesAccess Rights

When an employee attempts to pass through an Access control point, the clock will
compare the individuals security profile with the Access points profile. The security profiles used are based upon the day and time of day of the attempted access.

The person

The individuals security profile is based upon the persons Access Group. Each employee is assigned to an Access Group, either unique to them or common to their department. Access groups consist of separate rules for each day of the week and public holidays and shutdown days. These separate daily rules are known as Access Patterns. These Access patterns dictate what a person can do at different times through the day, that the pattern is applied to.

Access patterns

Dictate what a person can do at different times through a day that the pattern is applied to.

The Access point

The security status of each access point is controlled by the scanner settings of the card scanning equipment associated to that access point. These settings determine the locked status of the door throughout each day of the week.

Hardware Device Manager

Available with Tensor Access Enterprise Edition, this powerful, easy-to-use, multi-device editing tool, gives full control over adding and editing profile settings to all registered hardware equipment attached to a company network.

Network Access

The main stations are connected to a Main Server PC either via the PC's standard serial port or an Ethernet network adapter. The stations can be connected together either by a continuous cable or by being connected to your Ethernet network. When using direct cable connection, the furthest clock can be up to one kilometre (RS485 option only) from the computer.

Access Lite

This single user edition can operate a maximum of 4 clocking stations and record employee information for up to 250 people. This edition links to our time & attendance application software.One T8440 unit can support up to 12 door scanners.

As stated above, each Scanner Controller can support up to two access control points. Each access control point has the following connections available:

  • Output to door - This is the relay connection to the door lock
  • Door loop sensor - This is a link to a sensor that detects when the door opens
  • Alarm - This is a link to either a fire or burglar alarm
  • Momentary switch - This is a link to a switch that is only active when pressed
  • Timed switch - This is a link to a switch that is active for a specified time after it has been pressed
  • Tamper Input - This link will detect when the access control equipment has been opened
  • Override - This link will provide an override facility to the normal access security settings via an attached override button