Security and convenience are usually delicately balanced. If something is secure it isn't convenient and vice versa. It's convenient to leave your keys in the ignition, but it isn't secure. Keyless access products offer both aspects in an attractive package.
MECHANICAL KEYLESS LOCKS
· All pushbutton locks use a code instead of a key to unlock the door. Older mechanical pushbutton locks work, but they are limited to one working code at a time.
ELECTRONIC KEYLESS LOCKS
· MULTIPLE USERS These keyless locks offer the ability to have dozens or hundreds of individual user codes. Each user can be added or deleted without affecting others.
· SETTING CODES Adding, deleting or changing user codes is quick and easy. Basic models are programmable at the keypad. You can manage large groups of user codes with software on a laptop or PDA.
· AUDIT TRAIL AND TIME ZONES Some models will keep an audit trail of who used or attempted to use the lock and when they used it. Time zones can be set up that tell the lock who is authorized to enter and when they are authorized. Time zones can be set up for specific hours of specific days, shifts, opening and closing times, or to exclude weekends or holidays.
· USE EXISTING CREDENTIALS Some units can be equipped to accept various credentials such as swipe cards, proximity cards or fobs, even your own credit card. This allows the integration of Stand Alone Keyless products into existing access control systems, without the expense of changing existing credentials, or added separate credentials for only that lock. This feature can also allow the use of dual credentials for high security applications.
· WIRELESS Most stand-alone keyless access units operate on four standard AA batteries, eliminating the need for costly additional wiring and bulky external power supplies to activate the unit. However some can optionally be hardwired when battery power is not practical.
· EASY RETROFIT Keyless access products are designed to quickly replace existing lock hardware. The existing holes in the door are re-used and lock designs and finishes complement the existing commercial hardware in your facility.
· COMPATIBILITY Keyless locks are made for use with most brands of exit devices, mortise locks, knob/lever locks, deadbolts, etc. Most units allow for emergency key override. This feature can be utilized with a restricted (or high security) key or keyed to match your existing master key system.
· I/C PREP The popularity of interchangeable core locking systems (BEST-type) fits right in with these locks. Use your existing control keys and cores to maintain system integrity.
· GRADE 1 DEPENDABILITY Heavy-duty commercial locks are rated as Grade 1. Keyless access products in the market today allow you to meet Weatherproof, Grade 1, ADA and Fire Life-Safety requirements. Others are rated Grade 2 for use in standard-duty hardware applications.
Contact your local Locksmith or other Security Professional for complete information.
Jim Newell
Please visit http://www.SecureYourStuff.com for links to manufacturers sites and crime prevention sites, many of which have additional security tips.
Jim Newell a Security Professional and Consultant for over 35 years, operates a web site who's mission is to bring you information about security systems , security devices and security hardware. To help you to make informed and educated decisions about securing your personal property, your home and your business property. Visit http://www.secureYourStuff.com for more info.
article_text... Read More
article_text... Read More
article_text... Read More
article_text... Read More
article_text... Read More
article_text... Read More
article_text... Read More
Over the last 22 years that I have been involved in the security alarm industry, I have seen quite an evolution... Read More
What do alarm systems and automobile tires have in common? This may sound like a strange question to the untrained ear, but lend me yours and I will make sense of it... Read More
The alarm control is the brain of your security system... Read More
"An ounce of prevention is worth a pound of cure" that saying is as true for crime, as it is for health... Read More
When one considers the historical nature of security applications and programs of any type, i... Read More
Why do I need a "safe room? I really don't need one; I'm not that high profile"... Read More
Someone Spying? So are the Teddy Bear and the Potted PlantSee the cuddly teddy bear over on the shelf? Well, it sees you too... Read More