{"id":139,"date":"2020-11-01T18:44:58","date_gmt":"2020-11-01T18:44:58","guid":{"rendered":"https:\/\/www.jadealarm.com\/blog\/?p=139"},"modified":"2020-11-01T20:32:55","modified_gmt":"2020-11-01T20:32:55","slug":"access-control","status":"publish","type":"post","link":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/","title":{"rendered":"SECURITY ACCESS CONTROL"},"content":{"rendered":"\n<p>Jade Alarm provides several different access control system types. Systems can be simple combination keypad or even a fully integrated system. Choose a system  you administer, or have us remotely administer the system (*which 85% of our customers prefer us to provide this function). This includes the database from our secured Central Station Facility. Our 24&#215;7 facility can immediately make requested changes such as unlocking a door or deleting someone. Each person has their own combination, FOB, or Bio-metric identification. Thus, any action can be easily identified for tracking purposes.<\/p>\n\n\n\n<p>A simple access security system will just unlock a door each time the combination or FOB (electronic key) is used. An integrated system has the ability to include automatically unlocking the door or doors at a certain time and certain day-of-week. The schedule takes into accounts holiday schedules for revising the unlock &#8211; lock schedule. <\/p>\n\n\n\n<p>The history of each time a combination or FOB was used is a critical function. Our generated reports assist in reducing internal theft or &#8216;shrinkage&#8217;.  The <em><strong>1st manager in<\/strong> <\/em>function &#8211; in the event of a weather emergency, the front door that normally unlocks at 07:00 in the morning would not do so. Having a manager utilizing their FOB would normally unlock the door for the day. This prevents abnormal conditions blindly unlocking the door when the premises is actually closed during an emergency. <\/p>\n\n\n\n<p>Systems utilize the following methods to unlock a door: Combination, Proximity FOBs or Cards that are &#8216;waved&#8217; in front of the reader and even Bio-metric touchless hand readers. Each has its own area of use.<\/p>\n\n\n\n<p>Another critical part of the system is the power supply. Each Jade Alarm Security Access Control system includes both a main and a backup rechargeable power supply. In the event of a main power outage, the system will continue to operate as normal. If our customer wishes for an extended backup power, we are happy to provide this as well!<\/p>\n\n\n\n<p>AND, all of our system controllers are <strong>proudly<\/strong> made in either Springfield Missouri or Dallas Texas! see www.dsxinc.com or https:\/\/dmp.com\/AccessControl <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jade Alarm provides several different access control system types. Systems can be simple combination keypad or even a fully integrated system. Choose a system you administer, or have us remotely administer the system (*which 85% of our customers prefer us to provide this function). This includes the database from our secured Central Station Facility. Our [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":141,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v18.1 (Yoast SEO v18.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SECURITY ACCESS CONTROL - Jade Alarm<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SECURITY ACCESS CONTROL\" \/>\n<meta property=\"og:description\" content=\"Jade Alarm provides several different access control system types. Systems can be simple combination keypad or even a fully integrated system. Choose a system you administer, or have us remotely administer the system (*which 85% of our customers prefer us to provide this function). This includes the database from our secured Central Station Facility. Our [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Jade Alarm\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-01T18:44:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-01T20:32:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2020\/11\/ganz-biometric.png\" \/>\n\t<meta property=\"og:image:width\" content=\"841\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmp@jadealarm.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#website\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/\",\"name\":\"Jade Alarm\",\"description\":\"Informative Advice from Security Professionals\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.jadealarm.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2020\/11\/ganz-biometric.png\",\"contentUrl\":\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2020\/11\/ganz-biometric.png\",\"width\":841,\"height\":725,\"caption\":\"Bio-metric hand reader\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#webpage\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/\",\"name\":\"SECURITY ACCESS CONTROL - Jade Alarm\",\"isPartOf\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#primaryimage\"},\"datePublished\":\"2020-11-01T18:44:58+00:00\",\"dateModified\":\"2020-11-01T20:32:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.jadealarm.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY ACCESS CONTROL\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0\",\"name\":\"jmp@jadealarm.com\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g\",\"caption\":\"jmp@jadealarm.com\"},\"sameAs\":[\"https:\/\/www.jadealarm.com\/blog\"],\"url\":\"https:\/\/www.jadealarm.com\/blog\/author\/jmpjadealarm-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SECURITY ACCESS CONTROL - Jade Alarm","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/","og_locale":"en_US","og_type":"article","og_title":"SECURITY ACCESS CONTROL","og_description":"Jade Alarm provides several different access control system types. Systems can be simple combination keypad or even a fully integrated system. Choose a system you administer, or have us remotely administer the system (*which 85% of our customers prefer us to provide this function). This includes the database from our secured Central Station Facility. Our [&hellip;]","og_url":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/","og_site_name":"Jade Alarm","article_published_time":"2020-11-01T18:44:58+00:00","article_modified_time":"2020-11-01T20:32:55+00:00","og_image":[{"width":841,"height":725,"url":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2020\/11\/ganz-biometric.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmp@jadealarm.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.jadealarm.com\/blog\/#website","url":"https:\/\/www.jadealarm.com\/blog\/","name":"Jade Alarm","description":"Informative Advice from Security Professionals","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jadealarm.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2020\/11\/ganz-biometric.png","contentUrl":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2020\/11\/ganz-biometric.png","width":841,"height":725,"caption":"Bio-metric hand reader"},{"@type":"WebPage","@id":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#webpage","url":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/","name":"SECURITY ACCESS CONTROL - Jade Alarm","isPartOf":{"@id":"https:\/\/www.jadealarm.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#primaryimage"},"datePublished":"2020-11-01T18:44:58+00:00","dateModified":"2020-11-01T20:32:55+00:00","author":{"@id":"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0"},"breadcrumb":{"@id":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.jadealarm.com\/blog\/2020\/11\/01\/access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jadealarm.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SECURITY ACCESS CONTROL"}]},{"@type":"Person","@id":"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0","name":"jmp@jadealarm.com","image":{"@type":"ImageObject","@id":"https:\/\/www.jadealarm.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g","caption":"jmp@jadealarm.com"},"sameAs":["https:\/\/www.jadealarm.com\/blog"],"url":"https:\/\/www.jadealarm.com\/blog\/author\/jmpjadealarm-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/139"}],"collection":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":10,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions"}],"predecessor-version":[{"id":153,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions\/153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/media\/141"}],"wp:attachment":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/media?parent=139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/categories?post=139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/tags?post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}