What is 3Access

It is becoming more overriding the need to control and manage the movement of people and / or vehicles that enter and exit certain facilities. A Management and Access Control System is in charge of enable users for admission to various areas, establishing groups of permissions that define the degrees of restriction that each user has.

A door is a very basic way to control access, and brings complications at the time that keys is lost (or stolen) without being no record of users which raffled it.

So was born 3Access, a system of access control, which allows the configuration of rights of access and its management and compliance through different step control devices adaptable to the needs of the campus.

3Access architecture

access-control

Access Methods pedestrian and vehicular

3Access establishes groups of permissions that define people in terms of level of accessibility, ie as access to which each user is enabled and the timetable (days, times, etc.) for the application of permits.

This requires the user to hold a key to unlock access barriers and allow its passage. This access control system offers different methods as required for each installation, focused on its pedestrian use and / or vehicle.

The fact that the 3Access perform management and access control system does not rule out the need for security personnel, who can detect alarm conditions generated by the system and act accordingly.

Mobile app

Pedestrian / Vehicular
The user installs in the mobile a specific app, with which will identify and access the facility via Bluetooth.

icon-rfid-c

RFID card

Pedestrian / Vehicular
A proximity card, previously delivered to the user, which allows to unlock the door closer approximating it near the RFID reader.

icon-mifare-c

MIFARE card

Pedestrian / Vehicular
MIFARE is a special type of proximity card, and works at the same way as an RFID card.

icon-interphone-c

Intercom

Pedestrian / Vehicular
Installing an intercom access, the user can communicate with the control point, which will unlock the door.

icon-finger-c

Digital fingerprint

Pedestrian
The user places his finger on the fingerprint reader installed on the door and unlocked it if detects that the fingerprint is registered in the system.

icon-interphone-c

License plate

Vehicular
The bollards, installed in the road of a vehicular access, will read vehicle license plate, opening the barrier if it has permission to access.

icon-tag-c

Long range TAG

Vehicular
A remote antenna recognize the TAG device placed in the customer’s vehicle and opening the barrier.

icon-tagbt-c

Bluetooth TAG

Vehicular
The operation is the same as the long-range Tag, changing the Bluetooth technology.

Access elements Control doors

The access control system has different obstacles to enter and leave a facility. All of them are connected to the system, allowing to monitor their status, any irregularities, etc.

Turnstile

We have different turnsitle depending on the installation, with a range spanning from compact and economical ones with great security, with folding blades to variable height turnstile.

tornos-de-acceso

Full-Height Turnstile

3Access offers three row full-height turnstiles for facilities that require a high degree of safety and high mechanical strength. We offer double full height-turnstile for installations where space is limited.

molinetes-de-acceso

Automatic wicket gate

Different motorized access wickets designed to channel the people flow, shopping areas and commercial establishments. There are unidirectional, bidirectional, for disabled persons and optical gateways models.

Vehicular access

We have barriers, TAG readers, license plate  readers, among others, for access control to vehicles.

acceso-vehicular

Software access control

3access system is a powerful software designed to carry out the administration and access control, focused on the simplicity of operation for the user and in a wide range of functionalities.

software-control-de-accesos

Interface

From 3Access software the system admin can control users and their permissions, to register new people, linking access methods and be informed of the possible events and incidents that may arise.

People

The software allows full control of the people who will access the facilities.

Through it you can deregister, register or modify the data of a person, and later assign an access method and establish a temporary (allow access to certain hours or days.)

control-de-accesos-a-personas
control-accesos-software

Access means

Control all access means to the facility and associate one to a particular person who has been registered previously in the system.

In addition, you can introduce an expiration date to it.

[printfriendly]

Top