Access Control

A boom gate, also known as a boom barrier, is a bar, or pole pivoted to allow the boom to block vehicular or pedestrian access through a controlled point.

[1] Typically the tip of a boom gate rises in a vertical arc to a near vertical position. Boom gates are often counterweighted, so the pole is easily tipped. Boom gates are often paired either end to end, or offset appropriately to block traffic in both directions. Some boom gates also have a second arm which hangs 300 to 400 mm below the upper arm when lowered, to increase approach visibility, and which hangs on links so it lies flat with the main boom as the barrier is raised. Some barriers also feature a pivot roughly half way, where as the barrier is raised, the outermost half remains horizontal, with the barrier resembling an upside-down L when raised.

Physical access control systems (PACS) are a type of physical security designed to restrict or allow access to a certain area or building. Often, PACS are installed in order to protect businesses and property from vandalism, theft, and trespassing, and are especially useful in facilities that require higher levels of security and protection. Unlike physical barriers like retaining walls, fences or strategic landscaping, physical access control procedures control who, how and when a person can gain entry. The following are the main components of a physical access control system:

Access point: The entrance point where the barrier is needed. Common physical access control examples of access points include security gates, turnstiles and door locks. A secure space can have a single access point, like an office inside a larger complex, or many access points.

Personal credentials: Most PACS require a user to have identifying credentials to enter a facility or access data. Physical access control examples of credentials include fobs and key card entry systems, encrypted badges, mobile credentials, PIN codes and passwords. Personal credentials tell the system who is trying to gain entry.

Readers and/or keypads: Stationed at the access point, readers send data from credentials to a control panel to authenticate the credential and request access authorization. If using a keypad or biometric reader (such a fingerprint scan, facial ID, or retina scan), users will enter their PIN or complete a scan prior to obtaining access.

Control panel: The PACS control panel receives the credential data from the reader and verifies if the credential is valid. If the credential data is approved, the control panel transmits authorization data to the access point via the access control server, and the door will unlock. If the credential data is not approved, the user will not be able to gain entry.

Access control server: The access control server stores user data, access privileges, and audit logs. Depending on your system, the server might be on-premises, or managed in the cloud. System maintenance and software updates should be performed regularly to protect the system from hacking and possible security breaches.

Showing all 7 results

Showing all 7 results