Remote management of access points

Issue 3 2022 Access Control & Identity Management

SALTO BLUEnet Wireless has been developed to meet the demands of security and ease-of-use. This access control system is networked through Bluetooth RF and designed for doors where real-time control is required. SALTO BLUEnet can be installed as an independent system or can complement SALTO Virtual Network (SVN) in areas of a hotel where real-time control is required.

Control and management of all access points can be done remotely from one or more administrator front-desk workstations. The SALTO BLUEnet Wireless engine allows the operator to monitor live access control events and provides the ability to unlock doors, change opening mode, activate a lockdown, monitor live door status or change physical access rules in the access plan, all wirelessly and in real-time.

Real-time door and guest management:

• Control and management of all access points remotely and in real-time from one or more administrator workstations.

• With a single click of the mouse, the network can be configured and changes made in real-time.

o Change the staff and guest’s access plan in real-time.

o Ability to open doors remotely.

o Emergency remote opening/locking.

o Change the opening function mode in real-time.

o Room status monitoring.

• Get live updates of room status by sending the information from the door lock to the front desk. The hotel front desk staff has the function of real-time door monitoring, which shows which room door is opened at which time.

• SALTO wireless solutions transfer the battery status from the lock to the user card and from the lock to the system administrator as a maintenance notification.

When a guest is not satisfied with their room, there can be a direct room change made in real-time. SALTO BLUEnet Wireless real-time includes functionalities such as real-time re-rooming and real-time extended stay. It also has the ability to cancel the key instantly after notice of loss, increasing staff and guest security and peace of mind. Each key is cancelled directly after every check out.

Wireless network architecture

One gateway can communicate with seven nodes. Each node can operate up to 16 doors, with a maximum distance of 5 m between the lock and the node. All using one IP address. Other features include:

• Advanced security with standard encrypted communications.

• Escutcheons and cylinders receive blacklist information and remove cancelled keys from the system in real-time.

• Receive audit trail information in real-time and view door access without having to visit the door.

• Real-time door control: This includes door alarm, intrusion alarm, single lockdown and remote door opening.

• Real-time battery control enables maintenance to view electronic lock power status in real-time.

• If radio frequency is interrupted or breaks down, the access system will continue to work, as the virtual network of the battery-operated locks remains operative through SALTO SVN.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...