Contact

Please get in touch. We will be pleased to assist you.

Go to contact form

Newsletter

+49 89 68004 - 0
(Monday to Friday, 8:00 am to 5:00 pm)

kontakt@pcs.com

PCS Locations

Service & Repair

Device Repair Order Form

+49 89 68004 - 666
(Monday to Friday, 8:00 am to 5:00 pm)

Questions concerning DEXICON: dexicon@pcs.com

Questions concerning INTUS COM: intuscom@pcs.com

Other questions: support@pcs.com

Solution partner

PCS works with approximately 100 software and system house partners from all over Europe. They offer security solutions based on INTUS products and addressing all areas of production data collection and security technology.

Go to Partner Finder

Automatically open barriers and gates with license plate recognition via video or RFID long range readers.

THE DIFFERENT FACETS OF ACCESS CONTROL.

Access control ranges from "one family - one front door" to complex systems within an internationally positioned company. The smallest units are individual, decentralized identification readers. With increasingly complex systems, the question of decentralised intelligence, of intelligence on site, immediately arises. The reasons for this are, for example, security, system response times, organisational, topological and geographical boundaries. In short: What happens if the network is disrupted? Here, networked secure access control centres, each with several access readers, make all decisions autonomously with the help of the master data and criteria assigned to them. Data maintenance and updating is then carried out centrally and managed by the superordinate system.

Integrated mechatronic door terminals elegantly solve further decentralised tasks. For certain groups of people - e.g. temporary workers - access criteria such as dynamic access times are updated via the RFID card. The persons simply get the access rights on their employee card at special writing terminals.

Are there neuralgic points in the company? The large entrance area of a company? Video surveillance is only switched on when certain events occur, e.g. when several attempts to enter with a blocked RFID card are made.

Is there an intrusion alarm system in the company? Then the access control is coupled with it to suppress expensive false alarms.

Are there high-security areas in the company or do you want to do without access readers in certain departments? Biometric identification readers extend the access control system with tried and tested biometric components. Access control requires a wide variety of security components, preferably from a homogeneous, linkable product range.

 

Back to overview

Your PCS Contact

Walter Elsner
CEO

Go to contact form