Small business solutions with ­Access in a Box

July 2019 Editor's Choice, Access Control & Identity Management, Products & Solutions, Commercial (Industry)

A new access control solution targeting small to medium businesses has been launched by Impro Technologies. The new ‘Access in a Box’ is specifically designed for small businesses, or businesses with only a few entry points such as gyms, medical practices or retail stores.

The system meets the needs for a simple, yet secure, solution which replaces insecure keys. Mike Shipton, managing director of Impro Technologies, explained keys can be lost, stolen or copied. “Keys increase your security risk because if they’re lost you have to replace all the locks, as the risk is too high in South Africa to simply leave it. However, those same keys can be copied or lent to others and, should a security breach occur, will again require a full change of all locks – a big expense for smaller businesses.

“Access in a Box does away with the need for keys and brings the additional benefit of controlling who can access the premises and when. For example, should an employee no longer work for the business, access rights can be removed in just the click of a button.”

Another great feature of Access in a Box is the simplicity of installation – once the wiring is done, the software can easily be configured on a cellphone, there’s no need for a computer.

“We understand that smaller businesses may not have a dedicated computer for their access control system – so we’ve done away with the computer. You can configure and manage your system from a cellphone, as long as you have an Internet connection. This is great for the business owner, but also for the installer – as there’s no complicated system, special training or other hassles – just a quick and easy configuration in minutes,” said Shipton.

Access in a Box comes standard with all the equipment you need to set up a basic access control solution for two doors – this includes the controller, readers and ten credentials (tags).

However, unlike many competitor systems, Access in a Box is easily and quickly scalable, meaning it grows with your business. No rip and replace required. The controller provided with Access in a Box can scale up to manage up to 16 doors.

Features

• No computer necessary, can be configured from your cellphone.

• Provides basic reports, such as hours worked.

• Add or remove access rights in the click of a button.

• No software to install as it’s embedded free-of-charge on the controller.

• Manages two doors out the box, scalable to 16 doors with one controller.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.