Small business solutions with ­Access in a Box

July 2019 Editor's Choice, Access Control & Identity Management, Products & Solutions, Commercial (Industry)

A new access control solution targeting small to medium businesses has been launched by Impro Technologies. The new ‘Access in a Box’ is specifically designed for small businesses, or businesses with only a few entry points such as gyms, medical practices or retail stores.

The system meets the needs for a simple, yet secure, solution which replaces insecure keys. Mike Shipton, managing director of Impro Technologies, explained keys can be lost, stolen or copied. “Keys increase your security risk because if they’re lost you have to replace all the locks, as the risk is too high in South Africa to simply leave it. However, those same keys can be copied or lent to others and, should a security breach occur, will again require a full change of all locks – a big expense for smaller businesses.

“Access in a Box does away with the need for keys and brings the additional benefit of controlling who can access the premises and when. For example, should an employee no longer work for the business, access rights can be removed in just the click of a button.”

Another great feature of Access in a Box is the simplicity of installation – once the wiring is done, the software can easily be configured on a cellphone, there’s no need for a computer.

“We understand that smaller businesses may not have a dedicated computer for their access control system – so we’ve done away with the computer. You can configure and manage your system from a cellphone, as long as you have an Internet connection. This is great for the business owner, but also for the installer – as there’s no complicated system, special training or other hassles – just a quick and easy configuration in minutes,” said Shipton.

Access in a Box comes standard with all the equipment you need to set up a basic access control solution for two doors – this includes the controller, readers and ten credentials (tags).

However, unlike many competitor systems, Access in a Box is easily and quickly scalable, meaning it grows with your business. No rip and replace required. The controller provided with Access in a Box can scale up to manage up to 16 doors.

Features

• No computer necessary, can be configured from your cellphone.

• Provides basic reports, such as hours worked.

• Add or remove access rights in the click of a button.

• No software to install as it’s embedded free-of-charge on the controller.

• Manages two doors out the box, scalable to 16 doors with one controller.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...