Frequently Asked Questions
Why install Paxton Access Control?
Paxton Access Control is recognised as being one of the most reliable, user-friendly and comprehensive access control systems available. TI Security chose Paxton Access Control as one of our key technology providers in 1995; TI Security is a Paxton Gold installer (installer levels are Bronze, Silver and Gold). All of our security consultants and engineers have attended the Paxton training program and are experts in the design, installation, maintenance and repair of their systems. We carry significant stocks of Paxton Access Control equipment at our warehouse and can usually obtain any other parts the next working day.
Where can a Paxton system be used?
For higher levels of security; a combination of the above devices can be provided/ For example: using biometric finger and proximity fob.
Are there different types of Paxton products?
Compact – Paxton Compact gives access to single door applications and can be utilised on multiple doors within a single site. Proximity fobs/cards can be added and deleted at each door using simple to use programming cards. Paxton Compact is best suited to low-security applications; where the number of users is relatively small and infrequently changed.
Switch – Paxton Switch offers all of the advantages of the Compact system, but for higher security applications where the card or fob reader is separated from the system memory. Long range readers can also be used with the Paxton Switch system.
Net 2 – Paxton Net 2 offers the highest level of control, flexibility and scalability. Each controlled door, car park barrier, automatic gate, an automatic door is connected to a network and can be accessed and managed remotely. Paxton Net 2 can be used to manage your ID badge system, design badges and print via a card printer. We can install a range of card printers to suit all budgets or provide a managed card service.
What are the benefits of Paxton Net2?
What is Paxton Net2 reporting?
Am I limited to managing Net2 from one workstation?
No. Control and management of the system can be accessed from multiple workstations; allowing different departments to set their own access rights and dispense their own fobs. Net 2 can be used to control access on remote sites using TCP/IP (Local or Wide Area Network connection LAN/WAN) and dial-up via modem. With remote access, you have all of the functionality of the Net 2 system allowing you to instantly grant access, add or void user fobs or cards.
What about emergency evacuation/roll call & muster reporting?
The Paxton Net 2 App can be installed on your iPhone or Android device to send a report of all persons onsite to your phone or other electronic devices. Roll call and muster reporting can be used as a means of checking staff in at a safe central point; if there has been an alarm which requires the evacuation of the building. A reader can be located in a safe area of the site to log members of staff. Staff members present their fob or card at the muster point. The Net 2 report will update their status of ‘safe’ against the record of the holder. A Roll Call/Muster Report can be generated on the PC at a muster point to show who was in the building or an area at the time of an alarm. All Paxton Access Control systems can be programmed to automatically unlock doors, turnstiles and gates (if required).
Can I use Paxton Net2 for time & attendance & Payroll production?
Absolutely. The Paxton Timesheet function can be incorporated into your system to record time and attendance. Paxton Net 2 can show the number of hours worked by each employee. Dedicated readers can be installed in multiple locations; dependant on the entry and exit points to your site. Set the number of days holiday per employee; Timesheet will show how many days holiday remains to be taken. Employees who work from home can log in over a network. Timesheet can be exported as a CSV file for use with other payroll applications.
I use a Proximity Fob to set and unset my Burglar Alarm - Can it be integrated with Paxton Net2?
Yes! Paxton Net 2 can be interfaced with your existing alarm system to reduce the number of fobs; Paxton Access Control can even be used to disarm your burglar alarm. If a system user arrives onsite early but does not have the authority to deactivate the alarm system; they will be denied access. This can also reduce the number of false activations from your burglar alarm. Burglar alarm integration can simplify setting and un-setting your alarm; it also greatly reduces the risk of false alarms and unnecessary call-outs.
Paxton Net2 Access Control - What does 'complete flexibility' mean?
You can allow or refuse access to different individuals or groups of people; to different doors within set time scales. Examples of this use include:
What is the purpose of a Biometric Access Control Fingerprint Reader?
The fingerprint reader is able to correctly identify registered fingerprints with levels of certain substances present on the skin; as well as with some types of latex gloves worn by the user. The biometric reader is able to withstand greater levels of dust, dirt, oil, powder, cream, and liquid. Unlike most fingerprint readers, our unique access control system can be used externally in harsh environments including rain, freezing temperatures and snow. Specific features of our high-security fingerprint reader are:
What can a Biometric Fingerprint Reader read?
Can a Biometric Access Control Fingerprint Reader be connected with anything else?
When can Biometric Fingerprint Readers be used?
What about privacy and security of data retained by a Biometric Fingerprint Scanner?
For those concerned with privacy or the possibility that their fingerprint could be copied and used for ulterior purposes; it should be noted that the biometric reader does not copy or retain the actual fingerprint, rather it identifies and acquires up to 100 unique reference points. It is these points that are used to identify the registered user. The reference points along with their relative positioning create a pattern which is as unique as the fingerprint itself. It is not possible from the unique references points to create a copied usable fingerprint. The set of numerical codes and patterns that are created by your fingerprint image are useless outside of granting you access. In this way, the pattern we store is unusable to police, potential hackers or thieves. You can rest assured that if someone tried to run the data through a criminal database it would not work.