ContactPlease get in touch. We will be pleased to assist you.
+49 89 68004 - 0
(Mon. to Fri., 8:00 am to 5:00 pm)
Service & Repair
+49 89 68004 - 666
Mon. to Thurs., 8:00 am to 5:00 pm
Fri., 8:00 am to 4:00 pm
Questions concerning DEXICON: email@example.com
Questions concerning INTUS COM: firstname.lastname@example.org
Other questions: email@example.com
Our partnerPCS works with approximately 100 software and system house partners from all over the world. They offer security solutions based on INTUS products and addressing all areas of production data collection and security technology.
CareerWe are constantly looking for new, committed colleagues to strengthen our team.
THE DIFFERENT FACETS OF ACCESS CONTROL.
Access control ranges from "one family - one front door" to complex systems within an internationally positioned company. The smallest units are individual, decentralized identification readers. With increasingly complex systems, the question of decentralised intelligence, of intelligence on site, immediately arises. The reasons for this are, for example, security, system response times, organisational, topological and geographical boundaries. In short: What happens if the network is disrupted? Here, networked secure access control centres, each with several access readers, make all decisions autonomously with the help of the master data and criteria assigned to them. Data maintenance and updating is then carried out centrally and managed by the superordinate system.
Integrated mechatronic door terminals elegantly solve further decentralised tasks. For certain groups of people - e.g. temporary workers - access criteria such as dynamic access times are updated via the RFID card. The persons simply get the access rights on their employee card at special writing terminals.
Are there neuralgic points in the company? The large entrance area of a company? Video surveillance is only switched on when certain events occur, e.g. when several attempts to enter with a blocked RFID card are made.
Is there an intrusion alarm system in the company? Then the access control is coupled with it to suppress expensive false alarms.
Are there high-security areas in the company or do you want to do without access readers in certain departments? Biometric identification readers extend the access control system with tried and tested biometric components. Access control requires a wide variety of security components, preferably from a homogeneous, linkable product range.
Your PCS Contact
Head of Marketing Communications
Phone.: +49 89 68004 - 0
Fax.: Fax +49 89 68004 - 520