MFLEX Access Control is a computer managed networked door access control system for up to 128 doors and 4000 card or key-tag holders. MFLEX Access Control can be managed and monitored using free management software application loaded on one computer only. Administration is through a choice of Windows Desktop Console App or/and through one's favoured Web Browser anywhere in the world. The latter method permits the use of local or remote computers, tablets and smart phone devices.

Utilising ultra-compact low cost single door intelligent control units, installation is simple and modular from 1 to 128 doors. Local or remote doors and entrances can be interconnected by IP or USB socket means. Easy to install and operate software is installed on a computer to control and manage the system for online or full offline operation. All included features are easy to use with minimum knowledge and training.

Door Control Units can be networked together simply by RS485 5-wire cabling through LAN / WAN IP or USB interface connections for some or all of the system doors

Using standard Smart Proximity Door Readers and associated Smart Cards & Key-tags one can combat the growing security risk of card duplication and cloning!

Key features of door access control

  • Modular low cost door access control for 1 to 128 doors
  • Capacity for over 4000 card or key-tag holders
  • Smart door readers combat the growing security risk of card duplication and cloning!
  • Dual Technology Media will permit common card/tag use across intruder alarm systems such as Texecom or Pyronix etc.
  • Card only or Card + PIN operation
  • Extensive access control, location and roll call reporting
  • Time In Attendance reports with web and door clocking
  • Windows Desktop App and/or Web Browser local or remote administration
  • Doors and entrances operate autonomously on or offline
  • Email of important alarms and event notifications

Distributed intelligence system

The MFLEX Access Control Desktop Software Suite is only ever installed on one local machine for maximum security, reliability and simplicity

MFLEX Access Control is a fully distributed intelligence system, meaning that all changes and system configurations made are stored locally at the door or entrance control unit giving full door access control online or offline. Each single door or entrance may have 1 or 2 card readers. The secured doors are connected by a low cost dedicated cable network, the length of which can be up to 1200M.

Each door or entrance is controlled by a local Door Control Unit (DCU) which allows the connection of all the door facilities such as readers, local power supply, exit request button, magnetic door contact, fire release and electric locking. Door Control Units can be networked together simply by RS485 5-wire cabling through LAN / WAN IP or USB interface connections for some or all of the system doors. With the correct LAN / WAN IP infrastructure, parts of the system can be in other buildings or geographic locations.

MFLEX Access Control Desktop Software Suite

MFLEX Access Control installation can be easily, securely and flexibly managed from a single local point or multiple points on the network or even over the Internet. The MFLEX Access Control Desktop Software Suite is only ever installed on one local machine for maximum security, reliability and simplicity. Multiple Workstations can connect locally or remotely by virtue of the built-in 'Private Cloud' web server. Remote workstations can then simply connect using their favoured Internet Browser, Mobile Smart Phone or Tablet Device with no additional software or application installation needed. All administrative functions are protected by secure credentials.

Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture

Private cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture. Unlike public clouds, which deliver services to multiple organisations, a private cloud is dedicated to a single organisation. Access to your Private Cloud is through any Web Browser enabled device with multiple client connections allowed simultaneously.  All day-to-day administrative and monitoring facilities are available through Private Cloud.

Reporting of historical events

MFLEX Access Control has powerful features for producing in-depth reporting to screen, print or export. Reports can be generated from the powerful built-in SQL database based on access control activity and time clocking historical events. Available reports and information are:

  • Door access control events reporting
  • Time In Attendance clocking reporting
  • Door alarms and physical security risk reporting
  • Roll call (who's on-site) reporting
  • Individual location reporting
  • Operator activity reporting
  • Guard patrol audit reporting

All reports can be produced simply from the secure extensive SQL database. Report data can be viewed, printed and even exported for further transmission or for post processing in third-party applications such as Word or Excel.

MFLEX compact Door Control Unit

The Door Control maintains its own clock and calendar and has the capacity to store hundreds of past events locally if the door is taken offline for any reason

The Local Door Control Unit (DCU) acts as a junction point for all the door facilities and allows the dedicated network to be passed on to the next door or entrance. The management PC is connected to this door network from a single USB port or over a LAN/WAN IP socket. If the management PC belongs to a network, others can manage the system and if connected to the Internet, make changes and monitor activity from a PC or Smart Appliance anywhere in the world.

The compact Door Control Unit housing is only 122mm x 156mm x 32mm, so fitting this locally to the door or inside a metal PSU case is simplicity itself. Do not let the small size fool you however, as each Door Control Unit has the capability of managing two door readers, exit request button, door monitor contact, electric locking device, local door alarm and up to 4000 card or key- tag holders at each secured door or entrance.

Operable in four security modes

The Door Control also maintains its own clock and calendar and has the capacity to store hundreds of past events locally if the door is taken offline for any reason. Each door or entrance can actively operate in one of four security modes, No Access, Card Access, Card + PIN Access and Open Free Access. The security mode of any door can change actively hour-by-hour, day-by-day by use of programmable Security Time Schedules that operate online or offline.

DCU key features

  • 4000 users
  • 1100 offline event storage
  • 2 industry standard open format Wiegand door reader inputs
  • Card only or/and Card + PIN operation
  • RS485 & IP interconnection
  • Multiple Time Schedules and Real Time Clock/Calendar
  • Exit request button and door monitor contact inputs

MPROX Smart Proximity Door Readers

The MPROX reader range have bright bi-colour LEDs and a built-in beeper for positive feedback plus fully potted electronics for internal or external use

One can connect individual or segments of DCU Door Control Units over LAN/WAN IP or USB connections by the use of MTECC Networking Adapters. Each DCU is equipped with a multi-drop RS485 interface allowing the connection of 1 to 128 units from a single USB port. Additionally, one may use LAN-IP-485 Adapter to connect a door or segment of doors even in different locations by IP addressing. One can have as many LAN-IP Adapters as they wish.

The MPROX Smart Proximity Door Readers connect directly to the local Door Control Unit and have industry standard Wiegand interfaces making them compatible with many third-party access control solutions available today. The MPROX reader range have bright bi-colour LEDs and a built-in beeper for positive feedback plus fully potted electronics for internal or external use.

Combating security risk of card duplication

For added flexibility, the standard MPROX Smart Proximity Readers feature a recess in the front faceplate for a custom identity label of your choice. Using standard Smart Proximity Door Readers and associated Smart Cards & Key-tags, one can combat the growing security risk of card duplication and cloning!

With fully potted electronics and pig-tail wire connections, these units are robust and fully sealed to IP68. When increased entry security is required one can install the optional Proximity + PIN reader on those all-important points of entry. Access security is increased by the requirement to enter a 4-digit PIN after a valid card or key-tag has been presented. For ease of use, there is also an optional USB Desktop Reader for simple and efficient card enrolment and secure automated system logon.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

How intelligent video surveillance supports smart mobility
How intelligent video surveillance supports smart mobility

The ease of getting from point A to point B, the effective movement of goods and services, and the flexibility and integration of various modes of transportation are key aspects of mobility today. Smart Mobility has been a key theme in the transportation industry for a while. The idea is to keep traffic flowing and help people to get where they need to be, in a smarter way. To this end, industry players are now innovating and introducing advanced technologies and solutions. Examples include intelligent traffic management systems, free-flow tolls, autonomous driving, smart location solutions, and more. At the same time, traffic congestion, aging infrastructure, rapid urbanisation, and increasing sustainability demands are also intensifying the need for smart mobility solutions. One way to overcome these obstacles is to use intelligent video surveillance technology for improved traffic management, making the roads safer and more efficient for every user, while also reducing emissions. Perceptive intersections Relying on intelligent video analytics, traffic video cameras identify traffic build ups at intersections by counting numbers of vehicles crossing an intersection and detecting their speed, while also counting the number of vehicles queueing in real-time. Aggregated data informs the system when to switch traffic lights to red or green. Intelligent optimisation for traffic signals ensures more effective traffic flow.Aggregated data informs the system when to switch traffic lights to red or green The benefits? Improved safety on the roadways; intersection reconstruction can be avoided; drivers can be advised about the speed of their route, forecasted by traffic signals; reduced wait times and stress for commuters; reduction of harmful emissions; and positive impact on public satisfaction. Road safety Traffic incidents can be disastrous, not merely for causing congestion on the roads but sometimes far worse – resulting in injuries and even fatalities. These incidents have many causes, not the least of which is drivers willfully violating traffic laws. Video technology can aid in detecting all kinds of events – for example, illegal parking, running a red light, wrong-way driving, speeding, and making illegal U-turns can all be detected by smart camera technology. By using deep learning technology, cameras can recognise these events and traffic authorities can be immediately notified and take necessary actions even before traffic incidents occur. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally. Furthermore, ticketing systems can be incorporated to further regulate driving behaviors. Benefits here include incident prevention, better driver performance, and increased safety on the roads and streets, to name just a few. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally Public information Sharing information is key to keeping city drivers and travelers informed. Intelligent communication about warnings and updates helps everyone save time, avoid frustration, and simplify everyday mobility. This can be done via traffic guidance screens displayed at highly visible locationsThis can be done via traffic guidance screens displayed at highly visible locations, such as congested areas, transportation hubs, shopping malls, and city plazas – or even at your fingertips on your favorite mobile apps! Traffic video cameras generate real-time data of traffic flow and incidents, sending it to a central platform to further fuse with data from third-party systems such as radar and GPS systems. They also disseminate traffic information, including traffic status, warning and advisory notices, as well as parking status.  The benefits are improved public awareness of traffic information, improved travel convenience, overall enhancement of mobility in the city, and more. The Hikvision practice Hikvision has accumulated sophisticated experience in traffic management both at home and abroad. Product lines offer versatile solutions to resolve multitudes of problems in urban traffic management, traffic incident management, highway management, and more. Going deeper, it’s essential to note that efficient signal control management is dependent on the quality of traffic data, system algorithms, and the hardware devices in use; it is also closely related to the mobile environment, such as road conditions, historical traffic conditions, and urban infrastructure. Because of this, no single solution solves traffic congestion everywhere. Hikvision believes that only by working closely with city authorities, public safety organisations, consultants, even academia and other relevant stakeholders, can applications and operational processes be developed to achieve the best possible outcomes. The possibilities for traffic video data are endless, especially now that it can employ artificial intelligence for advanced functionality. Harnessing its power will make all the difference, but the ultimate goal remains the same: safe and smooth traffic, smart mobility, and improved quality of human life.

What impact are data analytics having on security?
What impact are data analytics having on security?

We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyse that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?

Embracing digital transformation in the security industry
Embracing digital transformation in the security industry

Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.