Extravision | Access Control

By: Extravision  09-12-2011

Extravision | Access Control

The access control function must generally meet two major requirements: allow only authorized persons to access or leave a location and prevent materials and substances from entering or exiting certain locations.

By creating access control systems based on 1) what a person owns (key, access card); 2) what a person knows (password, PIN); and 3) what a person is (biometric characteristics), Extravision can provide you with an access-control solution adapted to your situation. Furthermore, today’s access control technologies allow us to use common platforms to integrate all the functions of a physical protection system into a simple, yet sophisticated solution.

  • Electronic Access Control

    Lenel a UTC Fire & Security Company


    Honeywell Security

  • Access Control Accessories
  • Biometric Controls

    L1 Identiy Solutions


  • Doors, Gates, Turnstiles and Security Containers


    Automatic Systems

Contact Extravision

Email - none provided

Print this page

Other products and services from Extravision


Extravision | Communication

Whether the communication is “person to person,” “person to technology” or “technology to technology,” the result will always be the same: a solid physical protection system and strategy capable of handling threats to your operations. The common criterion for effective response is linked to the probability of the message being transmitted and received in a timely manner.


Extravision | Detection

Whether this function is provided through technologies designed to detect perimeter intrusions or materials and substances, we will integrate it into your risk management strategy so you can react in time. The detection function is a crucial element in a physical protection system because it is impossible to protect oneself against a threat that cannot be identified.


Extravision | Video Surveillance

Evidence gathering: To the extent where real-time supervision is not operationally possible, video surveillance technologies facilitate the gathering of evidence to be used in the investigation and judicial process. Proactive surveillance: A detection that is not associated with video surveillance can still be used for real-time, proactive surveillance of the critical areas.