November 2020

acusense-cameras.jpg

AcuSense Security Cameras

What is Hikvision AcuSense technology?

Hikvision AcuSense technology provides accurate sensing in security hardware. AcuSense technology protects and distinguishes people from vehicles and other moving objects. The most common concerns in perimeter protection are trespassing and vehicle break-ins. AcuSense technology helps you to focus on human and vehicle events in two ways: the device will only trigger an alarm when the preset intrusion type takes place, and videos related to alarm events are sorted into human and vehicle categories for easier footage searches.

AcuSense technology and its useful functions

3.jpg

Accurate alarms for humans and vehicles

Users can focus on alarms triggered by humans and vehicles while false alarms triggered by small animals or other irrelevant objects are vastly reduced.

2.jpg

Visual and auditory warning

Using visual and customizable auditory warnings adds another layer of protection.

3.jpg

Search targets quickly by type

AcuSense cameras search targets quickly by type object classification vastly improves search efficiency.

Improved alarm accuracy

Hikvision AcuSense with a deep learning algorithm, which analyzes and labels them as “human”, “vehicle”, or “other events”. The result is a striking reduction in false alarms now with an accuracy of approaching 98%. In this way, security personnel can focus on genuine security issues and take action. In addition, related videos are automatically sorted by categories for easier search.

Motion detection with human/vehicle classification

Hikvision designed AcuSense products to integrate human and vehicle classifications with motion detection. When motion is detected, the system analyzes whether or not is associated with a human or a vehicle, and whether an alarm should be triggered.

Flashing light and two-way voice conversation

As soon as an alarm is triggered the built-in light flashes. Security personnel can communicate with the person who triggered the alarm to confirm the authorization, thanks to the built-in speaker and microphone in the camera.

Better performance in low-light environments

AcuSense camera lenses are equipped with an aperture. This technology allows more light to enter the lens, for optimized image brightness, and better performance in low-light environments.

Larger detection area

Compared with previous AcuSense cameras, this generation of cameras extends target classification distances from 10, 15, or 22 meters to 20, 25, or 30 meters, depending on the model.

cuadro.png

Access control: affordable options have become a reality

Whether you are running a small business office, doctor’s office, coffee shop, or retail store, it is important to ensure that you protect staff and assets. While for some this may mean simply locking the front door at night with a key, the introduction of new technology at lower price points now means that every business can afford the cost of access control today. For example, in recent years manufacturers have introduced more technologies in support of the small access control market, with systems designed for the one to a four-door customer. This means that for property managers they can save both time and money by implementing access control.

With a card-based system, the small business can use a proximity card and reader system that allows them to issue an access control card to employees. This can be an ideal approach for a business with multiple locations where they want someone to have access to more than one location. Using a proximity card to access the building also cuts down on re-key costs when an employee leaves.

Another cost-effective option is to install a keypad system on the exterior of an office door. When an office manager enters his pin number, it can unlock the door for the day and also provide a report on the open and close times of that location. This information can be accessed remotely by the retail manager to lock and unlock the door, for example.

In addition, with a keypad-based system, the administrator of the system can issue multiple pin numbers to employees so that each person has a unique pin. That pin number can be easily deactivated if the employee no longer works at that location.

Whichever approach you decide to take there are many access control systems from which to choose from that are technologically advanced yet affordable. Installing an access control system is s an investment worth making in your business.

system-installation-planning

Access Control System Installation Considerations and Planning

Do you have a complete plan for your access control systems installation?


It is vital to plan for the unique characteristics of your building before you start buying access control components. Here are some important steps to take during this planning stage:

  • Analyze blueprints and site drawings:
    • A detailed review of your building’s blueprints and site drawings helps you plan for the components you need and where you’ll need to install them.
  • Confirm your requirements in writing:
    • When you’re dealing with a professional access control company, discuss every detail, and confirm the plan in writing. Don’t move forward with the install until you know exactly what you’re getting and how much it’s going to cost.
  • Get approval from local officials:
    • Always check with local fire officials and building code agencies to ensure your access control design complies with existing codes.

An expert access control provider should work closely with you to understand your access control needs and the requirements of your building. Your provider should also check to ensure that your plan complies with local building requirements.

Do you want any additional access control features?

Beyond the basic features of your access control solution, it’s important to consider the different add-ons you may want. Here are some examples of common add-ons:

  • Integration with video surveillance and the grounds around your building
  • Higher-level security features like facial recognition or fingerprint scanning technology
  • Smartphone-based access control
  • Internet-connected access control that uses standard wiring. This makes for simple plug-and-play installation, plus easier setup and maintenance.
  • Cloud-based server
  • Parking access control
  • Integration with fire alarm and burglar alarm systems

Can your access control solution grow with your company?

As your company continues to grow and expand, is your access control solution capable of expanding with your firm? Here are two things to consider in this regard:

  • Will it be easy to add new doors, offices, and office buildings to the access control solution you’ve designed

Dicsan’s Cutting-Edge Access Control for Modern Businesses


We actively use and seek out the latest technology solutions to provide our clients with the best services and solutions available today. Our certified, highly experienced technicians can help secure your business with a comprehensive and powerful access control systems. Access control systems can also be integrated with video surveillance camera systems, allowing for greater control across your security platform.

access-control-dicsan.jpg

Which access control is right for your building?

When we talk about access control we are referring to an electronic security system. Access control is used to identify an individual and authorize it to enter certain areas. The person entering may be an employee, a contractor, or a visitor. Access control systems mostly come in three variations: discretionary access control, mandatory access control, and role-based access control.

How access control works

Access control readers are installed to provide access to the building based on established credentials. These credentials can be key cards, key fobs, biometrics, among others. The card readers are connected to a network that allows individuals to get in with one of the credentials mentioned before and the system recognizes that they are authorized to be in the building. An appropriate access control software that fits your needs is essential. The software will track and keep who enters and exits the building and will allow supervisors, owners, etc. to keep track of it in case of a break-in.

If you’d like to get installed access control for your business and you’re still not sure of what’s the criteria for choosing the right company to take care of it. You can read our Access Control System Installation Considerations and Planning article.

Discretionary access control

Discretionary Access Control is a type of access control system that holds the business owner responsible for deciding which people are allowed in a specific location, physically or digitally. DAC is the least restrictive compared to the other systems, as it essentially allows individual complete control over any objects they own, as well as the programs associated with those objects. The drawback to Discretionary Access Control is the fact that it gives the end-user complete control to set security level settings for other users and the permissions given to the end-user are inherited into other programs they use which could potentially lead to malware being executed without the end-user being aware of it.

DAC.jpg
access control,access control security, hid access control, network access control, door access control, door access control, cloud access control, managed access control, access control support, access control support miami.

Mandatory access control

Mandatory Access Control is more commonly utilized in organizations that require an elevated emphasis on the confidentiality and classification of data (ie. military institutions). MAC doesn’t permit owners to have a say in the entities having access to a unit or facility, instead, only the owner and custodian have the management of the access controls. MAC will typically classify all end-users and provide them with labels that permit them to gain access through security with established security guidelines.

MAC.jpg
access control,access control security, hid access control, network access control, door access control, door access control, cloud access control, managed access control, access control support, access control support miami.

Role-based access control

Also known as Rule-Based Access Control, RBAC is the most demanded in regard to access control systems. Not only is it in high demand among households, RBAC has also become highly sought-after in the business world. In RBAC systems, access is assigned by the system administrator and is stringently based on the subject’s role within the household or organization and most privileges are based on the limitations defined by their job responsibilities. So, rather than assigning an individual as a security manager, the security manager position already has access control permissions assigned to it.

RBAC.jpg
access control,access control security, hid access control, network access control, door access control, door access control, cloud access control, managed access control, access control support, access control support miami.