

Sales@TacticalProtection.info
Call us at (330) 565-9055
Monday-Friday 10am-6pm
With today’s fast-paced operations and need for security your business can benefit from utilizing our products. These systems ensure your company will never have to track or duplicate keys, rekey locks or replace standard locking hardware again, ultimately saving you time. Click “Plan Your Job” after reviewing the information below to provide answers to some basic questions and schedule a free, no obligation estimate.
- Most common reasons our customers choose these systems:
- Logs every attempted access at all entry points.
- Does not require physical keys.
- Lost RFID fobs can be deactivated immediately.
- User permissions can be modified or removed immediately.
- Facial recognition effortlessly adds security benefits.
- Allows communication with visitors without granting access.
- Reliable automatic operation = Peace of mind.
- Systems are capable of supporting hundreds of users.
- Entry points can be set to lock and unlock automatically.
- Control user access at specific doors, on specific dates, at specific times.
Basic Operation-Controller
Access control systems that use a controller can have up to 4 doors on one system or can daisy chain controllers for larger systems.
- A user possesses one or a combination of the following: an RFID device and/or PIN code which are programmed into the system.
- Hardware is installed at each entry point to read the RFID device and/or manually enter the assigned PIN code.
- One of three types of locks are installed at each entry point. These are surface mounted strikes, internal strikes, or magnetic locks. (Up to 4 doors per controller)
- A computer is used to program the system with user data, schedule data, and individual permissions.
- When a user attempts to enter a location the data read is checked against the access list. If the user is authorized, the door is unlocked granting access. If not, the entry point remains secure denying access.
- The system keeps a log of every action of every user allowing the administrator(s) to search history and print reports.

Basic Operation-Intercom
Access control systems that use a standard intercom or a facial recognition intercom control the door where the device itself is installed. There is no limit on the number of systems in a location but each system controls one (1) door.
- A user possesses one or a combination of the following: an RFID device, PIN code, and/or biometric data (picture) which are programmed into the system.
- One of the three (3) types of locking hardware and the Intercom device is installed at each entry point to be controlled. The intercom is capable of reading an RFID device, PIN input, and if you choose the option biometric data.
- The system is capable of 2-way audio communication with visitors via your voice over IP phone system, an installed indoor station, assigned computer, or mobile devices.
- A computer is used to program the system with user data, schedule data, and individual permissions.
- As with the other types of systems programmed user data is used by the system to determine access permissions, however, the Intercoms allow for communication with your staff and grant access by the press of a button.
- The intercom systems keep a log of every action of each user and visitor allowing the administrator(s) to search history and print reports.

Support
© 2021 Tactical Protection & Surveillance, LLC.