The access control systems used in O.P. Thor Security Group S.R.L. is one of the safest and most effective methods of protecting an objective, due to restricting the access of people or vehicles to the objective. Its functions offer a rigorous control of the access in the object, with the highlighting of the activity through detailed reports.
Depending on the type of communication, the access control equipment can operate independently or in a network.
Independent operation provides access based on pre-scheduled authorization, without registration or transfer of access events. This equipment offers a minimal set of functions being intended for areas with low or medium security.
Network operation allows the storage of access events in the local memory of the system and then the transfer to an administration computer (server). This allows the extension of the functionality with access in predefined time intervals and through certain doors based on profiles.
The complexity of the systems is determined by the four main components: Identification method, Electronic control equipment, Access blocking devices and Administration software.