{"id":9344,"date":"2012-03-23T16:54:00","date_gmt":"2012-03-23T14:54:00","guid":{"rendered":"http:\/\/www.centsys.co.za\/the-changing-face-of-access-control-2\/"},"modified":"2012-03-23T16:54:00","modified_gmt":"2012-03-23T14:54:00","slug":"the-changing-face-of-access-control-2","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/","title":{"rendered":"The Changing Face of Access Control"},"content":{"rendered":"<p><span style=\"font-family: Calibri;\"><em>There\u2019s no denying the fact that access control has come a long way since the days of punch cards and other, similarly archaic systems.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Like most things in this modern age, <strong>the trend in access control seems to lean towards the sleek and the compact<\/strong>, while still offering superior <strong>security, usability and functionality<\/strong>.<span style=\"mso-spacerun: yes;\">\u00a0\u00a0 <\/span>Modern access control systems also need to be <strong>multi-faceted<\/strong>, providing an all-encompassing topology that can be shaped to suit the unique requirements of different sites.<\/em><\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">However, <strong>security should still be at the core of an efficient access control infrastructure<\/strong> as this is an area where technology can truly be used to create a formidable barrier and can almost be viewed as a safety net, protecting people, information and assets.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>There have been remarkable advances in this ever-expanding field, with everything from <strong>network integration to data logging<\/strong> forming part of a very exciting microcosm the potential of which has yet to be fully exploited.<\/span><\/div>\n<p><span style=\"font-family: Calibri;\">In recent years, <strong>keypad access control<\/strong> has taken the world of security by storm \u2013 the obvious benefit being that authorised entrants don\u2019t have to carry anything with them that could potentially be lost or stolen \u2013 all the information they need to gain access is stored safely in their heads.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Some keypads, such as the CENTURION <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,24,SM\u0394RTGUARD\">SM\u0394RTGUARD<\/a> and its wireless sibling, the <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,24,SM\u0394RTGUARD\">SM\u0394RTGUARDair<\/a>, can be interfaced with a host of peripheral devices such as gate motors, electric locks and alarm panels for a <strong>fully comprehensive access control system<\/strong>.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Furthermore, introducing facilities such as free-exit and panic pushbuttons to keypad access control systems further enhances the overall security of the installation.<\/span><\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">While keypad access control is undeniably powerful, there is still much to be said for <strong>proximity readers<\/strong>; especially when it comes to <strong>functionality and expandability<\/strong>.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>The CENTURION <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,22,Lattice\">Lattice<\/a> proximity access system, for instance, can start out as a single reader and be seamlessly expanded to a networked system consisting of up to 32 readers.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>In addition, the system can be interfaced with a PC via a simple RS-458 connection and, using the unique LatticeWARE software, the user can upload transaction logs, selectively add and delete users as well as edit all functionality associated with particular readers.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This is one system that still packs a very powerful punch when it comes to <strong>expandable, user-friendly and fully comprehensive access control<\/strong>.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"line-height: 150%; margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">SM\u0394RTGUARD, SM\u0394RTGUARDair and Lattice are all available from Centurion Systems and leading security outlets. <\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s no denying the fact that access control has come a long way since the days of punch cards and other, similarly archaic systems.\u00a0 Like most things in this modern age, the trend in access control seems to lean towards the sleek and the compact, while still offering superior security, usability and functionality.\u00a0\u00a0 Modern access [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[5,29,154],"tags":[],"class_list":["post-9344","post","type-post","status-publish","format-standard","hentry","category-acces-control","category-centurion-access-control","category-keypad-access-control"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>The Changing Face of Access Control - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"The Changing Face of Access Control - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"There\u2019s no denying the fact that access control has come a long way since the days of punch cards and other, similarly archaic systems.\u00a0 Like most things in this modern age, the trend in access control seems to lean towards the sleek and the compact, while still offering superior security, usability and functionality.\u00a0\u00a0 Modern access [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2012-03-23T14:54:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"The Changing Face of Access Control\",\"datePublished\":\"2012-03-23T14:54:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/\"},\"wordCount\":409,\"commentCount\":0,\"articleSection\":[\"acces control\",\"centurion access control\",\"keypad access control\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/\",\"name\":\"The Changing Face of Access Control - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2012-03-23T14:54:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-changing-face-of-access-control-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Changing Face of Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Changing Face of Access Control - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/","og_locale":"en_US","og_type":"article","og_title":"The Changing Face of Access Control - Centurion Systems French","og_description":"There\u2019s no denying the fact that access control has come a long way since the days of punch cards and other, similarly archaic systems.\u00a0 Like most things in this modern age, the trend in access control seems to lean towards the sleek and the compact, while still offering superior security, usability and functionality.\u00a0\u00a0 Modern access [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/","og_site_name":"Centurion Systems French","article_published_time":"2012-03-23T14:54:00+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"The Changing Face of Access Control","datePublished":"2012-03-23T14:54:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/"},"wordCount":409,"commentCount":0,"articleSection":["acces control","centurion access control","keypad access control"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/","url":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/","name":"The Changing Face of Access Control - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2012-03-23T14:54:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"The Changing Face of Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=9344"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9344\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=9344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=9344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=9344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}