Lenel BIO-007 - three-factor biometric access control reader
Lenel BIO-007 - three-factor biometric access control reader

Lenel's LNL-BIO-007 access reader is durable, dependable and competitively priced.  Designed for indoor or outdoor use, the reader combines three forms of authentication: proximity reader, PIN pad and fingerprint sensor.  The PIN and fingerprint authentication are standard; the proximity reader is optional.  All three reader modes can be configured to support timezone control.  The BIO-007 transmits a credential number to the Intelligent System Controller through a Wiegand interface.  The ISC then delivers the fingerprint template(s) to the BIO-007 through the LNL-500B Biometric Gateway and matching is performed within the BIO-007.  The results of the match are then returned to the Gateway for appropriate action and reporting to OnGuard. The indestructible keypad is based on BaranTec's patented Piezo Switch technology.  The power-driven Bioscrypt fingerprint sensor utilizes a powerful DSP processor.  Unlike other biometric products, this sensor is hidden until a valid credential and/or PIN is presented.  Then the fingerprint sensor door opens.  After verification occurs, the fingerprint sensor door closes into a secure vandal-resistant position. Features and functionality: 12 VDC power supply @ 1.8 amps Three factors of authentication: card, PIN, fingerprint Data output: Wiegand Data 1/Data 0 Biometric output: RS-485 Keypad interface: 8-bit burst Keypad layout: 4 across & 3 down Brushed aluminium finish, also available in other finishes Vandal-resistant design Weather-resistant housing Three LEDs for reader status Audible indicator buzzer 24-month warranty

Add to Compare

Access control readers - Expert commentary

Entrance control vs access control: similarities and differences
Entrance control vs access control: similarities and differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Making the shift from manufacturer to service provider
Making the shift from manufacturer to service provider

The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be  highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.

A secured entrance is the first defence against an active shooter
A secured entrance is the first defence against an active shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”

Latest LenelS2 news

How custom solutions meet customer needs for access control
How custom solutions meet customer needs for access control

The software-based technology running today’s access control systems is ideal for creating custom solutions for very specific end-user needs. Those needs may vary from delaying bar patrons’ access to a shooting range to reducing the risk of diamond miners pocketing precious stones. The ability to tightly integrate with and control video, intrusion, and other equipment puts access control at the heart of enterprise security. Often, off-the-shelf access systems provide most of the features an end user requires, but due to their type of business, facility or location, some organisations still have unaddressed needs. That’s where a custom solution can fulfill an essential task. Custom solutions are frequently requested by end users or the reseller to expand access control to meet those needs. Here’s a look at some custom solutions designed for end users. Area & time-based access control The owners of a popular shooting range also operate an onsite, full-service bar, and the owners wanted to delay entry to the shooting range once a customer had consumed alcoholic beverages at the bar. The custom solution works with the access cards customers use to enter the range. When a patron orders an alcoholic beverage, the bartender presents the patron’s credential to a reader at the cash register.  With each drink, the access control system puts an automatic delay on the card being used to enter the shooting range. An area and time-based control solution was created An area and time-based control solution was created for a major pharmaceutical manufacturer concerned with potential contamination between laboratories testing viral material and others designing new vaccines. If an employee uses a badge to enter a room with viral material, that employee can be denied access to a different area (typically a clean room in this case), for a customised period of time. This reduces the potential of cross contamination between ‘dirty’ and ‘clean’ rooms. The software can be customised by room combinations and times. Random screening A mine operator wanted to prevent easily portable precious stones from being taken by miners. The custom solution uses the access control system integrated with time and attendance software. As the miners clock in, the system randomly and secretly flags a user-defined percentage of them to be searched as their shifts end. Security guards monitor displays and pull selected employees aside.  A nice feature of this solution is that the random screening can be overridden at a moment’s notice. For example, if the process causes excessive delays, guards can override the system to enable pre-selected miners to pass until the bottleneck is relieved. The solution has also been adopted by a computer manufacturer looking to control theft by employees and vendors. Scheduler The system automatically unlocks and locks doors A custom solutions team integrated a university’s class scheduling and access control software to lock doors to classrooms that are not in use. With the custom solution in place, the system automatically unlocks and locks doors 15 minutes prior to and after a class. The doors remain unlocked if the room will be used again within the next 30 minutes. Readers mounted at each door enable faculty to enter rooms early for class setup or to work in a lab knowing students or others won’t be able to walk in. Event management This solution simplifies the visitor check-in process, especially for larger events with multiple guests. Efficiently moving people in and out of events booked at a working intelligent office building and conference center required integrating the access control system with a web-based solution storing the names, email addresses, and phone numbers of invited guests. Before an event, guests receive an email invitation that includes a link to a downloadable smartphone mobile credential. Upon arrival, guests present that credential to Bluetooth readers at the building’s gated parking garage. The same credential enables smaller groups (up to 50 guests) to enter the building through turnstile-mounted readers – also used throughout the day by hundreds of building employees. To avoid long lines for larger groups of visitors, the turnstiles are kept open with security guards using handheld readers to authenticate credentials as guests enter the lobby. Additionally, a third-party emergency notification system was added to this custom solution. Guests receive instructions on their smartphones should there be a need to shelter in place or evacuate during an event. The credentials and notifications are disabled as guests leave the building through the turnstiles. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution Similar custom solutions have been deployed at hospitals searching for a way to provide secure access to patients only expected to be staying a short time for surgery.  Patients are emailed a mobile credential to access both the hospital’s parking structure and surgical reception area. They can also designate family members and other visitors to receive emailed mobile credentials.  This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution for patients and visitors. Custom solutions are about problem solving. It’s finding answers to needs not specifically addressed by an access control system. The robust software of modern access control systems enables the design of custom solutions to efficiently enhance security, save time and reduce redundant tasks through automated processes.

Milestone Systems hosts the 2020 Milestone Integration Platform Symposium (MIPS), Texas
Milestone Systems hosts the 2020 Milestone Integration Platform Symposium (MIPS), Texas

Milestone Systems’ annual MIPS brings together a rich community of video, security, and technology solution partners focused on advancing innovation. Special guests including Milestone officers, industry leaders, renowned futurists, authors, and a popular TEDx speaker will share their inspirations. Milestone will also showcase three start-ups from its Kickstarter Contest with compelling technologies and businesses that comprehensively address pressing security and societal issues. Milestone Systems, a global provider of open platform video management software (VMS), is hosting the 2020 Milestone Integration Platform Symposium (MIPS) conference, in Dallas, Texas on February 17-19, 2020. Partners, customers and influencers are invited to register for the special two-day event. Applied innovation in video surveillance Milestone will feature a variety of speakers and topics, including TEDx speaker Anders Sorman-Nilsson, and one of the Top Ten Futurists in the world, Gerd Leonhard. The event will also include an exhibition pavilion featuring products and programs from partners including Axis Communications, Dell, Intel, Herta, Lenel S2, and Seneca Data and an innovation showcase with the three most promising ideas from Milestone’s incubator program, Kickstarter. We glimpse at the future through the ideas of our Kickstarter contestants" “MIPS is a one-stop destination for applied innovation in video surveillance,” notes Tim Palmquist, Vice President for the Americas at Milestone Systems. “Each year we hear from an array of speakers that challenge our thinking about today’s technology and the new frontiers of tomorrow. We see new products and programs from the most innovative companies in our industry. Together with XProtect, they serve the needs of our many customers. Finally, we glimpse at the future through the ideas of our Kickstarter contestants. MIPS is a hub for business, network connections and, above all, novel ideas!” Video analytics Leveraging the power of the open platform, the Milestone XProtect video management software (VMS) is compatible with more than 8,500 security and surveillance devices, and more than 450 software integrations from over 3,500 technology partners. Technology partners include providers of network video cameras, cloud solutions, DVRs and NVRs, servers and storage equipment, alarm and detection systems, video analytics, GPS technology, laser and radar scanners, emergency call boxes and more. “The open platform provides an opportunity to innovate freely as circumstances and opportunities dictate, not as a VMS provider dictates,” says Palmquist. “This freedom of innovation has already yielded some of the very best technologies and collaborations in the security industry. It has also resulted in scalable and future-proof systems in healthcare, education, city surveillance and other verticals where Milestone is the platform of choice and where professionals accept nothing less than freedom of choice to do their jobs at the best of their capacity.” Milestone Marketplace 2.0 Integrators will promote their installation experience and connect with technology partners on Marketplace Milestone will launch version 2.0 of the Milestone Marketplace on its website which will enable customers to find resellers and integrators that deliver video solutions based on their pain points or location. Integrators will promote their installation experience and connect with technology partners on Marketplace hereby allowing end-users to access information on the latest innovations. “By launching Milestone Marketplace 2.0, we are inviting customers to search for the latest and greatest technologies in our community. Milestone supports the co-creation of solutions, allowing our community to supply best-in-class technology for a variety of customer needs,” says chief sales and marketing officer at Milestone, Kenneth Hune Petersen. Integrated cloud-based solutions A large part of the MIPS 2020 Dallas event focuses on the many advantages of an open solution, with the Milestone XProtect VMS platform enabling reliable and efficient integrations with thousands of third-party hardware and software products. Detailed discussions of solution applications as well as previews of new integrations and partnerships help integrators, resellers and partners of all types to shape the future of their own businesses. Cloud-based services and integrations will soon take video management systems to a new level MIPS 2020 promises to usher in new integrated cloud-based solutions, which will greatly impact the future of how video systems are designed, deployed, and monetised. Cloud-based services and integrations will soon take video management systems to a new level, expanding how security professionals think about technology and their own business models. Open for startups Additionally, three finalists in Milestone's annual Kickstarter contest will demonstrate their visions. MIPS 2020 participants will have an opportunity to vote for their favourite software coder with the winner being announced during the gala dinner. Milestone believes in inspiring talent to make the world see through connecting new technology ideas, business strategy, and innovation. Three 2020 finalists will have a chance to showcase their visions directly to the Milestone Community of partners and customers at the MIPS2020 conference and beyond. They are: Benoit Koenig is the co-founder and COO at Veesion. Benoit was confronted with shop-lifting on a regular basis in his family-owned supermarkets. During his studies in Artificial Intelligence, he saw the great potential of deep learning applied on video data, which inspired him to start Veesion with two other engineers. Veesion are developing a gesture recognition technology to detect shoplifting in the retail industry. Commenting on Benoit’s idea and company, Palmquist noted, “Veesion is what MIPS is all about. This is an innovation that addresses a major commercial issue for retailers around the world but does so using technology in a respectful, considerate and intelligent manner. I am proud and encouraged that Veesion is enabled by the open platform.” Jennifer Ivens is the founder of Canscan, a technology company that provides automated container inspection services. It was impatience and ambition that prompted her to leave her position as a logistics analyst for an ocean carrier to go into this business for herself. Canscan’s idea is the next-level shipping container checking system, powered by artificial intelligence (AI) called Virtual Checker. “Jennifer and her team have come up with an innovation that addresses many social, economic, and criminal issues. It has the potential to avert some of the human tragedies we hear of and see on television across the globe each year,” Palmquist said. Zeljko Tepic has over 15 years of experience in the development of client/server and cloud architectures. He works on projects involving advanced algorithms, signal processing, Artificial Neural Networks, deep learning, generic algorithms, fuzzy logic, spectral analysis, and more. Venzo Secure’s idea is to provide seamless awareness of critical events by transparently displaying an intuitive “alert timeline” on top of the XProtect Smart Client camera views. The solution will give customers the option to dynamically arrange a view of the cameras in the Smart Client which are closest to the event at hand, and to handle any related events, alarms, analytics or metadata inside the Milestone XProtect video platform, including those from third parties. “Smart city managers, emergency responders, and police will benefit from this new technology enabling them to better respond during a crisis. This technology is poised to save lives, and I am proud that Milestone is supporting Venzo through our Kickstarter program,” commented Palmquist. Over 750 attendees are expected to attend MIPS 2020 at The Gaylord Texan Resort and Convention Centre on February 17-19, 2020 in Dallas, Texas.

LenelS2 introduces OnGuard Version 7.6 with extend cloud compatibility and cyber security
LenelS2 introduces OnGuard Version 7.6 with extend cloud compatibility and cyber security

LenelS2, a provider of advanced security systems, introduces OnGuard version 7.6, its latest enterprise security management system that offers rich feature and operability enhancements to its access control platform, while also extending its cloud compatibility, integration capabilities and convenience. LenelS2 is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. “With the technology enhancements in OnGuard 7.6, our valued-added resellers and growing customer base will be able to leverage operability improvements as well as enhanced cyber security, cloud and mobile features to experience a more scalable, accessible and cloud-compatible enterprise security platform,” said Jeff Stanek, president, LenelS2. “OnGuard 7.6 demonstrates our ongoing investment in the platform while continuing our progress in browser-based application usability.” Manage privacy or safety concerns OnGuard 7.6 browser-based client applications enable system administrators to more easily deploy and operate the system. End user customers who monitor alarms, manage visitors and approve access requests will appreciate the convenience of mobile browser-based clients as part of the standard installation process. In addition, an enhanced setting in OnGuard Surveillance and OnGuard Monitor browser clients enables role-based restrictions. OnGuard 7.6 also includes a dynamic new reader/alarm panel interface, the LNL-1324e An operator is able to view recorded video beyond a specified timeframe to manage privacy or safety concerns. Both clients feature new options that enhance video viewing and simplify navigation. Cyber security and compliance enhancements include use of the TLS 1.2 protocol to encrypt OnGuard 7.6 communications, including email and browser client use; elimination of default passwords for compliance; as well as an updated OnGuard Hardening Guide. Expanded cloud compatibility OnGuard 7.6 also includes a dynamic new reader/alarm panel interface, the LNL-1324e. This I/O module, with AES 256 encryption, enables doors to be conveniently connected to an OnGuard platform using either structured cabling or via the onboard Ethernet for easier installation. Additional OnGuard 7.6 enhancements include: OnGuard Visitor Management support of PDF417 barcode technology, providing greater scalability and reliability. Expanded cloud compatibility that leverages Amazon Web Services virtual machine images or Amazon Machine Images. A new BlueDiamond Active Credentials option that enables administrators to see the quantity of currently active mobile credentials to better plan their purchasing decisions. Updated integration with Bosch and Digital Monitoring Products (DMP) intrusion panels and improved integrations with Otis Elevator CompassPlus controllers.    

Related white papers

3 reasons to migrate to a new access control system

5 steps to finding the right access control system for you

OSDP is the strongest access control for your business