With the expansion of the range of potential threats, much attention is paid to ensuring and maintaining security at facilities - from educational institutions or offices to large business centers or enterprises. Together with the usual full-time security officers who perform these functions, technical means and systems are actively used that significantly improve the capabilities of the security service.
Now the market has a large selection of such devices, both Russian and foreign production. The Security Technologies forums that were regularly held before the coronavirus pandemic brought together representatives of dozens of Western brands and hundreds of domestic manufacturers on one site. Among the variety of products, choosing the optimal device is quite difficult. The ratings presented in the review will help you navigate among the range of models.
Recommended article about The best biometric access control systems.
Content
Access control and management system (ACS) - a set of compatible technical devices and hardware and software to ensure access to the facility.
It is intended for limiting and fixing the entrance (exit) through the equipped sections of the passage with the operational control of employees, as well as the time of their stay in the restricted area.
It is an integral part of the overall security system.
Based on the comparison of various identification features of a person or vehicle with the parameters in the ACS memory. Everyone has a personal identifier - a code or password. Biometrics can also be used - face image, fingerprints, hand geometry, signature dynamics.
Devices for entering data or reading information are installed near the entrance to the closed area. Then the material is transferred to the access controllers for analysis and the appropriate reaction - to open or block the door, turn on the alarm or register the employee's presence there.
ACS installation locations:
1. The first is limited functionality.
Autonomous systems with the simplest set of functions for small objects without the need to combine controlled objects into a single complex with centralized control. The complete set includes an executive element, the reader and the controller. An example is budget locks with electronic key carrier readers or built-in code dialers. It is possible to connect exit buttons, opening reed switches, IR sensors.
2. The second is advanced features.
Inexpensive complexes based on several controllers with an increase in the amount of processed information and the number of users, as well as the obligatory use of a computer for programming all controllers, collecting and analyzing information, compiling reports and summaries, and effectively monitoring the situation at the facility.
3. The third one is multifunctional systems.
The best multi-level network complexes for a large number of users with controllers connected in local networks, which are offered by the best manufacturers. They are used when it is necessary to control the passage time using complex electronic identifiers.
Technical structures for a physical barrier against unauthorized entry into the facility.
one.Turnstiles - to organize the identification of any person entering the facility. Structurally, there are:
2. Doors - for passage to a room or territory. Equipped with actuators:
3. Sluice cabins - for blocking with additional confirmation of identity.
4. Gate - for the passage of standard vehicles.
5. Barriers - for the passage of overall vehicles.
6. Bollards - rising structures to block entry.
Devices for storing data that determine the owner's rights for access. They differ in the use of recording technology. Access methods:
Identification code receivers for translation into the decision block. Work with certain identifiers, reading is performed:
An electronic unit for analyzing the received data and generating a command for the action of actuators. According to the method of management, there are varieties:
Provides development of control algorithms for all ACS components. Installed on a computer or a separate server of the central console, depending on the capacity of the package.
If necessary, a security system with video surveillance, fire alarms, door opening sensors, elevators, breathalyzers, uninterruptible power supplies, etc. are additionally connected.
Each system is designed with the following factors in mind:
Experts advise - what to look for in order to avoid mistakes when choosing:
Many foreign and Russian manufacturers compete fiercely with each other in the market. Leading those who offer a full range of equipment for the installation of ACS.
The determining factors are the price and quality of software and controllers.
According to Yandex search queries, the list of popular manufacturers includes:
On the page in the online store, you can order online new items and popular models. Description, specifications, features, photos, connection instructions are available there.
ACS installation is carried out by specialized companies that are able to implement a full cycle from design to delivery of the entire architecture at the facility. At the same time, experts will give useful advice and recommendations - what are the access control systems, which company's devices are better to choose, how to choose, which component is better to buy, how much it costs.
The rating of high-quality ACS components is based on reviews on the manufacturers' pages. The popularity of models, according to buyers, was determined by reliability, ease of installation and maintenance, durability, workmanship and price.
The review presents rankings among the best standalone and network type controllers.
Brand - AccordTec (Russia).
Country of origin - Russia.
A compact Russian development for controlling 12/24V electric drives and controlling access at one point of passage to industrial or administrative premises, building entrances. Can be installed separately or inside actuators. Manufactured on a board placed in a compact plastic case. Installed informative indication and door position sensor.
With the reader iButton provides nine modes of operation. The set mode is stored in memory with automatic transition to it when the power is turned off and then on again. With proximity card readers supporting Wiegand protocols, provides four modes. The kit includes a jumper for programming the device.
The average price is 960 rubles.
Brand - Smartec (Russia).
Country of origin - Russia.
An autonomous model of domestic production for creating an independent access control system at remote sites without the need to organize additional communication channels with the central console. It is used together with an external reader. Security is increased by mounting the device inside the protected object. It is programmed by a master card or an infrared remote control. You can delete / add one card or a whole group, incl. in case of loss. Readers with Wiegand26/34 and keypad are supported.
Sold at a price of 1365 rubles.
Brand - "Alice" (Russia).
Country of origin - Russia.
Universal Russian-made development for controlling access actuators. Installed both separately and in the castle. You can rearrange the memory chip. Designed for 1216 keys. It is usually used for access to office, industrial or warehouse premises, as well as entrances to residential buildings.
Can be found for 580 rubles.
Brand - IronLogic (Russia).
Country of origin - Russia.
Miniature model with power relay output for control of lock, opening button, card readers or contactors, external control of buzzer or reader LED, door position sensor. Suitable for installation in the castle or separately.
Operating modes:
The price range is from 767 to 860 rubles.
Video review of the controller:
AT-K1000 UR Box | Smartec ST-SC010 | Alice K-1 relay | Z-5R (mod. Relay Wiegand) | |
---|---|---|---|---|
Number of keys | 1320 | 500 | 1216 | 1364 |
Interface with reader | iButton, Wiegand 26 | Wiegand 26, 34 | iButtonTM, Wiegand 26, 34, 37, 40, 42 | DallasTM (iButton), Wiegand 26, 34, 37, 40, 42 |
Opening time, s | 0-255 | 1-99 | 1-255 | 0-220 |
Supply voltage, V | 12 | 12 | 10-14 | 9-24 |
Switching current, A | 4 | 2 | 4.5 | 3 |
Dimensions, cm | 6.5x3.8x2.2 | 6.5x5.4x1.9 | 5.5x2.55x1.6 | 6.5x6.5x2.0 |
Weight, g | 16 | 40 | 20 | 53 |
Warranty, months | 12 | 12 | 12 | 12 |
Brand - ProxWay (Russia).
Country of origin - Russia.
A universal model for controlling and managing access to industrial and residential premises, taking into account events and passage time. It is used as an element of the general access control system of a small office or a checkpoint of a large enterprise.Allows you to organize a passage to one object with control of entry / exit or to two different objects, as well as a burglar alarm.
Ability to identify up to 32 thousand keys. The memory stores up to 47 thousand events, 250 time zones and weekly schedules. It is produced in the form of a board without a case for embedded equipment when operating at low temperatures up to -40⁰С.
The manufacturer offers for 13,700 rubles.
Brand - Parsec (Russia).
Country of origin - Russia.
The basic model for use in ParsecNET when equipping an access point and an associated guard signaling. Controls any executive device for restricting passage (turnstile, lock) and alarm operation.
The database stores information on eight thousand keys. The memory contains 16 thousand events, time profiles (64) and holidays (32). Communication with a computer via Ethernet or Rs-485 channels.
The operation of the device, electric locks and other devices is provided by a built-in power source. It comes in a durable plastic case with space for a backup battery.
On sale for 22,250 rubles.
Video instruction for connecting NC-8000 to RS-485 line:
Brand - Gate (Russia).
Country of origin - Russia.
A universal basic model for use as the main element of the Gate CUD system when controlling access to industrial or residential premises, as well as accounting for the time of events and passage to the office. It is used when equipping access points - one double-sided or two single-sided. Support is provided for all common readers with the control of various actuators. Additional inputs allow you to connect fire and security sensors.
The non-volatile memory can store 16,000 keys, 8,000 events, and 7 schedules. Primary adjustment and programming are carried out using a computer or autonomously with the ability to add / remove keys, change the relay operation time. Combining into a line via RS-422 (RS-485) interface in network mode up to 254 controllers for connection to a control computer.
The average price is 4,780 rubles.
Gate basics:
Brand - IronLogic (Russia).
Country of origin - Russia.
Compact model for stand-alone or networked CUD systems, including in a hotel or enterprise.Controls locks with electromechanical and electromagnetic drives. The turnstile requires two of these devices or an Extended model. The ability to identify 2024 keys, remembers 2048 events. Two inputs for readers with Dallas TM protocol support. The maximum distance of the communication line is 1.2 km. Five modes - Free Pass, Normal, Block, Trigger and Accept. Programming can be done via PC using an adapter
Sold for 2280 rubles.
Video discussion of the capabilities of the X-5R Net controller:
Brand - "Era of New Technologies" (Russia).
Country of origin - Russia.
Network model for installation in medium-sized facilities, in a hotel or small office with up to two thousand employees. The device is easily connected via Ethernet to the existing local network at the facility. Memory stores information about 60 thousand events. Serves two TouchMemory access points or one Wiegand4-64. Manages various executive devices - from locks and turnstiles to gateways and barriers. Electronic keys can be limited by the number of seats in the zone, the number of passes, time or time schedule.
The plastic housing contains two boards, one of which has a remote bar with terminals for connections to simplify installation and reduce the risk of human error. It is possible to reset to the installation settings.
The price from the manufacturer is 12,625 rubles.
PW-400 v.2 | NC-8000 | Gate-8000 | Z-5R Net | ERA-2000 v2 | |
---|---|---|---|---|---|
Number of electronic keys | 32000 | 8000 | 8167/16334 | 2024 | 2000 |
Number of readers | 2 | 2 | 2 | 2 | 4 |
Number of alarm inputs | 8 | 0 | 4 | 0 | 2 |
Event memory size | 47000 | 16000 | 8192 | 2048 | 60000 |
PC interface | USB, Ethernet 100 | Ethernet, RS-485 | ethernet | ethernet | Ethernet (IEEE802.3) |
Supply voltage, V | 12 | 12 | 11,4-15 | 9-18 | 12-24 |
Dimensions, cm | 12.5x10.0x2.5 | 29.0x23.0x8.5 | 20.0x15.5x4.0 | 6.5x6.5x1.8 | 11.2x12.5x3.3 |
Weight, g | 1000 | 1400 | 1050 | 80 | 200 |
Frame | plastic | plastic | plastic | plastic | plastic |
Warranty, months | 12 | 12 | 12 | 12 | 60 |
Place for battery | No | there is | No | No | No |
To assemble a simple system with your own hands, you will need step-by-step instructions for actions and components:
The components are connected by a cable, the number of cores of which is determined by the installation diagram. Usually a six or eight core signal cable is used. When installing a lock on a door, a door transition is used for mechanical protection. The controller and power supply are mounted indoors on the wall in places with low traffic in a special case. The terminals are fastened according to the color instructions.
The program is configured after connecting all the elements. To create a database, you need to place the card next to the reader while the buzzer is sounding - the data will be automatically recorded and the signals will stop. Activate other cards in the same way.
As a result, the installed access control system should become a reliable protection for the facility.
Enjoy the shopping. Take care of yourself and your loved ones!