Access Control FAQ

Access Control Frequently Asked Questions

Frequently Asked Questions

  • Why install Paxton Access Control?

    Paxton Access Control is recognised as being one of the most reliable, user-friendly and comprehensive access control systems available. TI Security chose Paxton Access Control as one of our key technology providers in 1995; TI Security is a Paxton Gold installer (installer levels are Bronze, Silver and Gold). All of our security consultants and engineers have attended the Paxton training program and are experts in the design, installation, maintenance and repair of their systems. We carry significant stocks of Paxton Access Control equipment at our warehouse and can usually obtain any other parts the next working day.

    • Paxton Access Control gives you control over who gains entry to your car park, building or site perimeter
    • Once you’ve determined who you would like to grant access to your premises; the Paxton key fobs or cards can be distributed to your authorised users giving immediate control of your site security
    • Keys can be lost or stolen and locks damaged; as a result, this can incur significant cost and hassle to replace and re-distribute new keys. If a Paxton fob or card is lost or stolen; simply stop that particular proximity card or fob. All other cards and fobs will continue to provide access.
    • Simple and easy to use
  • Where can a Paxton system be used?

    • Keypads – for a coded access
    • Proximity fobs or cards – proximity readers provide ‘contactless’ access control
    • Biometrics – fingerprint or hand readers can be used as a means of identification to grant authorised access
    • Long range radio transmitters – ideal where you wish to grant access up to 20m away
    • Swipe card – magnetic readers are available, although where new systems are installed we would advise on a more robust technology

    For higher levels of security; a combination of the above devices can be provided/ For example: using biometric finger and proximity fob.

  • Are there different types of Paxton products?

    Compact – Paxton Compact gives access to single door applications and can be utilised on multiple doors within a single site. Proximity fobs/cards can be added and deleted at each door using simple to use programming cards. Paxton Compact is best suited to low-security applications; where the number of users is relatively small and infrequently changed.

    Switch – Paxton Switch offers all of the advantages of the Compact system, but for higher security applications where the card or fob reader is separated from the system memory. Long range readers can also be used with the Paxton Switch system.

    Net 2 – Paxton Net 2 offers the highest level of control, flexibility and scalability. Each controlled door, car park barrier, automatic gate, an automatic door is connected to a network and can be accessed and managed remotely. Paxton Net 2 can be used to manage your ID badge system, design badges and print via a card printer. We can install a range of card printers to suit all budgets or provide a managed card service.

  • What are the benefits of Paxton Net2?

    • Central Control – All doors, turnstiles, car park barriers and automatic sliding gates can be controlled from one or multiple locations
    • Reporting – An event is generated every time a proximity card is used to gain access. The event records the time and date of operation and the user name
    • Complete flexibility – Access can be granted to users according to time and place. Users can be added from your PC and given instant access to given doors, electric gates, barriers and turnstiles
    • Authorised Users – Paxton Net 2 can be installed on machinery and other powered equipment to allow only authorised and trained users to operate. Individual user rights can be altered and tailored. All changes made are instantly updated to all doors, electric gates and turnstiles.
    • Paxton Access Control can be interfaced with any existing electronic locking system; lifts, gates and barriers
    • If someone leaves without handing back their token or card; simply stop the user’s fob from the system
    • The software is extremely easy to navigate and use and utilises a familiar Window’s explorer style interface
    • Use the Paxton Net 2 integrated Site Graphics system to provide a visual representation of the site; complete with door locations and real-time door status’. Site Graphics alert the user of unauthorised access attempts and where they are occurring; allowing those monitoring to act swiftly to investigate.
    • Paxton can be integrated with an IP CCTV system to provide camera images and reader data to be combined
    • Anti-passback can be programmed to prevent codes, fobs and cards being passed to other users to allow entry
    • Link to your fire alarm system for automatic unlocking of designated fire doors
    • Use the ‘Triggers & Actions’ function to allow control of elevators, lighting, heating and much more
  • What is Paxton Net2 reporting?

    • The events screen allows you to view the ‘real time’ events as they’re happening
    • See ‘Who is in today?’ with a glance at your computer
    • See if unauthorised access has been attempted; either by forcing a door or by use of an invalid fob or card
    • Standard reports can show all events; in a set time frame or last known position of a user
    • Report wizard – Allows you to create custom reports; to give you the results you want
  • Am I limited to managing Net2 from one workstation?

    No. Control and management of the system can be accessed from multiple workstations; allowing different departments to set their own access rights and dispense their own fobs. Net 2 can be used to control access on remote sites using TCP/IP (Local or Wide Area Network connection LAN/WAN) and dial-up via modem. With remote access, you have all of the functionality of the Net 2 system allowing you to instantly grant access, add or void user fobs or cards.

  • What about emergency evacuation/roll call & muster reporting?

    The Paxton Net 2 App can be installed on your iPhone or Android device to send a report of all persons onsite to your phone or other electronic devices. Roll call and muster reporting can be used as a means of checking staff in at a safe central point; if there has been an alarm which requires the evacuation of the building. A reader can be located in a safe area of the site to log members of staff. Staff members present their fob or card at the muster point. The Net 2 report will update their status of ‘safe’ against the record of the holder. A Roll Call/Muster Report can be generated on the PC at a muster point to show who was in the building or an area at the time of an alarm. All Paxton Access Control systems can be programmed to automatically unlock doors, turnstiles and gates (if required).

  • Can I use Paxton Net2 for time & attendance & Payroll production?

    Absolutely. The Paxton Timesheet function can be incorporated into your system to record time and attendance. Paxton Net 2 can show the number of hours worked by each employee. Dedicated readers can be installed in multiple locations; dependant on the entry and exit points to your site. Set the number of days holiday per employee; Timesheet will show how many days holiday remains to be taken. Employees who work from home can log in over a network. Timesheet can be exported as a CSV file for use with other payroll applications.

  • I use a Proximity Fob to set and unset my Burglar Alarm - Can it be integrated with Paxton Net2?

    Yes! Paxton Net 2 can be interfaced with your existing alarm system to reduce the number of fobs; Paxton Access Control can even be used to disarm your burglar alarm. If a system user arrives onsite early but does not have the authority to deactivate the alarm system; they will be denied access. This can also reduce the number of false activations from your burglar alarm. Burglar alarm integration can simplify setting and un-setting your alarm; it also greatly reduces the risk of false alarms and unnecessary call-outs.

  • Paxton Net2 Access Control - What does 'complete flexibility' mean?

    You can allow or refuse access to different individuals or groups of people; to different doors within set time scales. Examples of this use include:

    • Giving authorised users access to certain rooms and areas whilst restricting other persons. This is ideal for restricting access to server rooms, part stores, Directors’ offices etc.
    • Giving cleaners access to your site at certain times and days of the week but restricting access outside the set times and days
    • Contractors and temporary staff can be given reduced access rights
    • You may wish factory staff to have access to offices in normal office hours.
    • Time zones can be created to give groups of people or individuals access at set times of the day
    • Public holidays or factory shutdowns can be programmed into the system to prevent access during these times
  • What is the purpose of a Biometric Access Control Fingerprint Reader?

    The fingerprint reader is able to correctly identify registered fingerprints with levels of certain substances present on the skin; as well as with some types of latex gloves worn by the user. The biometric reader is able to withstand greater levels of dust, dirt, oil, powder, cream, and liquid. Unlike most fingerprint readers, our unique access control system can be used externally in harsh environments including rain, freezing temperatures and snow. Specific features of our high-security fingerprint reader are:

    • unlocking of a door for users takes less than 4 seconds
    • up to 10,000 registered users
    • climate control heater within the reader head unit
    • easy to use and very quick
    • vandal resistant
    • differentiates live human fingerprints as opposed to false prints made from synthetic materials
    • can operate externally in temperatures down to -20 degrees
    • stores data within the master control unit which can be located in a secure location
    • can be connected to most existing access control systems.
    • IP65 rated (water jets and dust tight)
    • audio and LED indication to indicate the user that access is granted
    • no lost cards or staff swapping of cards
    • only high quality and highly reliable components. Many biometric and fingerprint readers have gained a bad reputation for failure to read or operate.
    • include desktop readers to allow remote enrolling to the access control system wherever it is easiest for you.
    • can be installed with optional battery backup.
  • What can a Biometric Fingerprint Reader read?

    • Wet fingers
    • Dry fingers
    • Dirty
    • Elderly (where the fingerprint appears to have worn away)
    • High levels of ambient light
  • Can a Biometric Access Control Fingerprint Reader be connected with anything else?

    • open access-controlled doors
    • raise and lower every make of automatic traffic barrier
    • unlock magnetic locks, maglocks, electric releases, solenoid bolts, and other electric locking systems
    • all electric sliding gates including cantilever and traditional type automatic gates
    • open automatic swing and automatic slide apart doors
    • full height turnstiles, half height turnstiles and speed gates
    • all automatic swing gates and high-speed bi-folding gates
    • lifts and elevators
    • will operate with many existing and new access control systems
  • When can Biometric Fingerprint Readers be used?

    • enable authorised use of dangerous machinery/equipment where specific training is required
    • construction sites where access to the site needs to be quick without compromising security. Know who’s on site at all times
    • nurseries and schools. Installed on entrances/exits to ensure that only those registered are able to gain access
    • restrict access to dangerous or sensitive areas
    • time and attendance, payroll and emergency evacuations
  • What about privacy and security of data retained by a Biometric Fingerprint Scanner?

    For those concerned with privacy or the possibility that their fingerprint could be copied and used for ulterior purposes; it should be noted that the biometric reader does not copy or retain the actual fingerprint, rather it identifies and acquires up to 100 unique reference points. It is these points that are used to identify the registered user. The reference points along with their relative positioning create a pattern which is as unique as the fingerprint itself. It is not possible from the unique references points to create a copied usable fingerprint. The set of numerical codes and patterns that are created by your fingerprint image are useless outside of granting you access. In this way, the pattern we store is unusable to police, potential hackers or thieves. You can rest assured that if someone tried to run the data through a criminal database it would not work.

Google Rating
5.0
Based on 131 reviews