{"id":1617,"date":"2020-05-04T15:51:15","date_gmt":"2020-05-04T15:51:15","guid":{"rendered":"http:\/\/www.codedecomedia.com\/KNS\/?page_id=1617"},"modified":"2020-05-05T13:33:59","modified_gmt":"2020-05-05T13:33:59","slug":"access-control","status":"publish","type":"page","link":"http:\/\/www.codedecomedia.com\/KNS\/access-control\/","title":{"rendered":"Access Control"},"content":{"rendered":"<p>[vc_row][vc_column icons_position=&#8221;left&#8221;][vc_column_text]<\/p>\n<h3><span style=\"font-weight: 400;\">Access Control Site Assessment<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">At BC Tech Group, we begin the process of access control installation by performing a comprehensive site assessment of your facility. We evaluate your building footprint, floor layout and existing entry and exit points. And we take the time to get to know you and your operation, to gain a better understanding of your business needs and how an access control system can best serve you, your employees and your customers. We also take your budget into consideration, to develop the optimal access control solution for your needs. Our experienced team has worked with budgets of every size, and can identify the access control system that fits both your business needs and your budget constraints.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"color: #1d1d1d; font-family: Montserrat, sans-serif; font-size: 2.3571em; letter-spacing: -0.3px;\">Access Control Plan<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After performing your site assessment, BC Tech Group technicians will create a customized proposal for your access control system, tailored to meet your individual needs. What\u2019s unique about our access control system solutions is that each one is designed from scratch for each customer. We don\u2019t offer a \u201ccookie-cutter\u201d solution. Instead, we design a system that addresses your business needs, budget, staffing, employee and visitor safety, theft prevention, information security, ingress\/egress, foot traffic patterns, after hours access, user permissions, and your anticipated plans for future growth.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our technicians will then meet with your team to review your access control proposal. We will walk you through every step of the installation process, ensuring that you are informed every step of the way. We will also provide you with our recommendations for hardware and software; we source our access control equipment only from industry leading suppliers. More than anything else, we value our relationships with our clients in the Princeton, IL area. Our goal is to be completely transparent with our customers \u2013 and we will do our best to ensure that you have complete understanding and buy-in before moving forward with any part of your access control\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">installation project.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Installation Process<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">After we\u2019ve finalized your access control solution plan and selected your equipment, our team of technicians will promptly get to work on your installation. Our technicians understand that as a business operating in Princeton, IL, you can\u2019t afford to interrupt your business or inconvenience your customers. We\u2019ll do our best to minimize our presence on site, so that your customers are unaware of the new security system you\u2019re installing, and work quickly to minimize any impact on your business operations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Once your installation is complete, we will provide you and your key team members w ith in-depth training on your new access control system. And if you like, our technicians can assist with onboarding as well. Nothing frustrates us more than when we hear of a security company disengaging with its customer as soon as they have installed a new system, with the client being left to figure out on their own how the new system works. At BC Tech Group, we make absolutely sure that you are comfortable using your access control system \u2013 and we\u2019re always available whenever you have questions or need assistance.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Documentation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">After all work has been completed and you are satisfied with the installation, our technicians will provide you with a breakdown of the work we have performed. The documentation will include your installation plans and a rundown of which equipment was installed and how it was configured. This documentation is crucial in case you ever have questions or want to expand your access control system. It could also prove to be beneficial for your insurance coverage, should you ever experience an unauthorized access event. Having proof that you have a professional access control system in place to protect your business\u2019 security can be very beneficial for investigative purposes and insurance claims.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Support<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">At BC Tech Group, we understand that should you ever have an issue with your access control system, the associated downtime could cost you valuable time and money. When you work with BC Tech Group, you\u2019ll have access to real-time technical support for your access control solution. Unlike other security companies, we don\u2019t consider our job to be complete after your installation. Instead, we work to continue to grow our customer relationships, which is why we are here for you long after we install your system. Whether you are struggling to understand how a particular feature works, or you have a technical issue with a component of your access control system, our experienced technicians are here for you. Just give us a call, and we\u2019ll walk you through your issue to get to the solution in a timely fashion. And if necessary, our local Princeton, IL technicians will visit your place of business for prompt troubleshooting and repair.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Network Cabling<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cabling is incredibly important to ensure that you get the most out of your access control system and ensure efficient system operation. At BC Tech Group, we use only high-performance cabling that minimizes dB loss, which greatly reduces instances of networking issues. Plus, our structured cabling solution featuring high-performance fiber optic cable is designed to reduce bulk, look cleaner, and be much easier to manage than traditional \u201cspaghetti\u201d cabling.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Configuration of Remote Workstations<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As your Princeton, IL business grows, you may need to address the issue of how to keep your data secure once your employees begin to work remotely. Unfortunately, passwords are not safe in today\u2019s world. It\u2019s too easy for hackers to phish password information from your employees, leaving your data vulnerable to attack. We can enact security protocols so that when anyone on your team works remotely, your data remains secure. If you were ever to lose a company laptop or other device, hackers would not be able to access the information stored on it.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Additionally, integrating remote workstations into your access control system allows you to monitor employees\u2019 activity. Configuring remote workstations can enable you to block individual websites or monitor online activity, to ensure that your employees are not engaging in risky behavior while logged onto a work device.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Access Control System Technology<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">At BC Tech Group, we install only the best in access control system technology to meet your security goals. Our access control systems utilize IP-based technology that uses significantly less cabling per door compared to a typical installation, which brings tremendous cost savings along with scalability, flexibility and power.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Leveraging Power over Ethernet (PoE), our door controllers only require a single network cable running to each door \u2013 not miles of cable running to a dusty server closet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our IP-based access control systems feature a single ethernet connection from each door to a PoE switch, devices powered by the controller, failover protection, system health monitoring and alerts, easy permissions and schedule management, and unlimited door licensing.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Smart Card (RFID) Readers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">With a smart card reader, employees carry a personalized identification card on them. To enter a building or section of a building, employees swipe or hold their card against a reader that scans their data and determines if the employee has permissions to access that particular area. Permissions are easy to establish and change at any time, ensuring convenience for your security staff.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">RFID stands for radio frequency identification. It relies on electromagnetic fields to track tags that are attached to specific objects, like an employee access card. These RFID tags contain information that has been stored electronically, such as whether an employee is allowed access through a particular entryway.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Door Controllers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Our integrated door controllers are compact and powerful, engineered to effectively and efficiently provide secure electronic access control \u2013 from a single door installation to thousands of doors at one or multiple locations.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Access Software<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Our access software kit delivers all the essentials needed in an intuitive interface, including IP-based access control, browser-based user interface, unlimited schedules, holiday schedules, multiple security roles, live muster, built-in standard reports, customizable SQL reports, iPhone, iPad and Android support, virtual machine support, elevator control, and a standard rules engine<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"[vc_row][vc_column icons_position=&#8221;left&#8221;][vc_column_text] Access Control Site Assessment At BC Tech Group, we begin the process of access control installation by performing a comprehensive site assessment of your facility. We evaluate your building footprint, floor layout and existing entry and exit points. And we take the time to get to know you and your operation, to gain&#8230;","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/pages\/1617"}],"collection":[{"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/comments?post=1617"}],"version-history":[{"count":3,"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/pages\/1617\/revisions"}],"predecessor-version":[{"id":1634,"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/pages\/1617\/revisions\/1634"}],"wp:attachment":[{"href":"http:\/\/www.codedecomedia.com\/KNS\/wp-json\/wp\/v2\/media?parent=1617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}