Purchasing an access control system?

May 2014 Access Control & Identity Management, Residential Estate (Industry)

Comb Communications exhibited at the Cape Town Residential Estate breakfast. MD Graham Wild was happy with the event, noting that a focused event allowed the company to present its solutions to a focused audience.

Instead of having people from various verticals to network with, Wild says the event addressed what people in the residential market wanted from their security systems and providers. The event allowed Comb to speak to people outside of the security industry, but who were concerned about specific security issues in their gated communities.

On the topic of what issues to consider when looking for an access control system, the company said one needs to know the amount of units which will be catered for.

“It is important to ensure that the system you are looking at can cater for the total number of units in a complex. Most intercom systems are able to handle only a limited number of units since only a limited number of telephone numbers and remotes can be programmed on the system,” says Comb’s marketing manager Corlia Mocke.

It is important to establish upfront whether fixed line or GSM will be used. “Fixed line systems are not only more prone to lightning strikes, but the cost on a fixed line system is also higher because most residents today have cellular phones and charges from fixed line to cell are more expensive. It is also important to know if the system works with a SIM card or a SIM chip because SIM cards can be stolen, whereas a SIM chip cannot because they are embedded, which means that should something happen to the SIM chip, the entire board needs to be replaced,” she adds.

It is important that your system can be programmed remotely via a secure Web application. If the intercom does not have this feature, your installer will need to go out to the site every time a resident in the complex changes or someone loses a remote.

“The Web application or software should be user friendly and easy to manage; there is nothing as frustrating as taking an hour to do a simple action like changing a remote or an entry key,” Mocke says.

Surge protection is especially important in Gauteng and other high lightning strike areas, because outdoor electronic devices are a perfect target for lightning. On that note it might be a good idea to insure your intercom under your buildings policy. Finally, you need to make sure that the parts for the intercom system will be available for the immediate future, because an intercom system is an expensive item and you will not be able to replace the entire system every time something goes wrong.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Intrusion detection for wide areas
OPTEX Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry)
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments. The key to safeguarding these spaces is dependent on choosing the right intrusion detection technology.

Read more...
Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...
New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...