SMB access control in a box

August 2018 Editor's Choice, Access Control & Identity Management

Local access control company, Impro Technologies, has launched a new solution for small- to medium-sized premises. Access in a Box provides all the components for an access control solution, in one neat package.

A key innovation of the solution is the inclusion of the software in the controller, which means no complicated servers or computers are necessary. Everything you need is embedded in the controller, free of charge.

The software is also easy to configure. No specialised training is necessary as the system auto-detects the installed hardware, and the simple-to-use interface means you can configure the system in just a few minutes, all from the convenience of your smartphone! Another benefit for installers is the use of three-core cable for the installation – guaranteeing an easier installation, no matter the skill level.

Especially designed for small to medium premises, this powerful solution provides enterprise-style features without the associated cost, such as:

• 24-hour access through your smartphone.

• Anti-cloning (copying) credentials to prevent unauthorised access.

• Anti-passback doors (APB.)

• Tamper protection on the housing, with automatic alerts.

• Built-in reports, like hours worked.

• Real-time ability to add or remove access rights.

What’s in the box?

Access in a Box comprises a secure lockable metal enclosure, prewired with a switchmode power supply, controller and module; along with 4 readers and 10 anti-cloning credential cards. Installers only need add the locking accessory and three-core cable and you’re done.

To find out more about Access in a Box, visit www.impro.net/box.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...