Contact
Please get in touch. We will be pleased to assist you.
+49 89 68004 - 0
(Mon. to Fri., 8:00 am to 5:00 pm)
Service & Repair
+49 89 68004 - 666
Mon. to Thurs., 8:00 am to 5:00 pm
Fri., 8:00 am to 4:00 pm
Questions about software: software-support@pcs.com
Questions about hardware /
other questions:
support@pcs.com
Our partner
PCS works with approximately 100 software and system house partners from all over the world. They offer security solutions based on INTUS products and addressing all areas of production data collection and security technology.Career
We are constantly looking for new, committed colleagues to strengthen our team.
Contact
Andrea Scholz
Personalreferentin Recruiting
Access control ranges from "one family - one front door" to complex systems within an internationally positioned company. The smallest units are individual, decentralized identification readers. With increasingly complex systems, the question of decentralised intelligence, of intelligence on site, immediately arises. The reasons for this are, for example, security, system response times, organisational, topological and geographical boundaries. In short: What happens if the network is disrupted? Here, networked secure access control centres, each with several access readers, make all decisions autonomously with the help of the master data and criteria assigned to them. Data maintenance and updating is then carried out centrally and managed by the superordinate system.
Integrated mechatronic door terminals elegantly solve further decentralised tasks. For certain groups of people - e.g. temporary workers - access criteria such as dynamic access times are updated via the RFID card. The persons simply get the access rights on their employee card at special writing terminals.
Are there neuralgic points in the company? The large entrance area of a company? Video surveillance is only switched on when certain events occur, e.g. when several attempts to enter with a blocked RFID card are made.
Is there an intrusion alarm system in the company? Then the access control is coupled with it to suppress expensive false alarms.
Are there high-security areas in the company or do you want to do without access readers in certain departments? Biometric identification readers extend the access control system with tried and tested biometric components. Access control requires a wide variety of security components, preferably from a homogeneous, linkable product range.
Your PCS Contact
Caroline Elsner
Head of Marketing Communications
Phone.: +49 89 68004 - 0
Email: marketing@pcs.com