Dicsan Technology

Linear Access Base cardholder creation

How to create a new cardholder in Linear Access base?

1. To Create New linear access base Cardholder first you need to open the Cardholder set of your location (1).

Click on the Create New Cardholder icon (2). The name of the linear access cardholder set (e.g., “Staff”) will appear above the boxes where the name is entered

Linear access control, Linear pro access, Linear access, base access,linear access base

3. Fill in the cardholder’s First name (3), Last name (4), etc. in the cardholder data fields. Assign Expiration date and fill in account holder access controller panel fields if needed.

4. In the credentials area (6), you may assign credentials to the base access cardholder. Credentials can be transmitters, cards, entry codes, or telephone linear access control directory codes. You may assign more than one credential type and more than one of each credential to a access control Miami cardholder. For example, a cardholder could have two entry codes and three cards.

4.1 In case you need to add a base access transmitter first go to the transmitter section (7), then click on assign new individual transmitter (8), Then enter the data for the individual transmitter (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.2 In case you need to add a linear access base card first go to the card section (7), then click on assign new individual card (8), Then enter the access control servers data for the individual card (9) and click ok to save it (10). 

Linear access control, Linear pro access, Linear access, base access,linear access base

4.3 In case you need to add an entry linear access code first go to the entry codes section (7), then enter the data for the entry code (8) and finally click on assign (9).

Linear access control, Linear pro access, Linear access, base access,linear access base

5. Click APPLY to save the linear access control cardholder. Now you need to send the changes to the intercom, first, you need to connect to the network.

How to connect to network?

1. Click on the On/Off-line with installation button:

2. When connecting to access control Miami network A the Connecting to [A] (YOUR INSTALLATION NAME) dialog box will appear:

3. Once the linear access base is connected, the SD & RD lights will flash indicating that AccessBase 2000 is polling the network and that the network is responding. Click on the next button to have base access 2000 automatically disconnect from the network upon completion of programming duties:

4. Then click on  this button to send the changes:

How to delete cardholder?

You may delete a linear access control cardholder by selecting the cardholder and clicking on:

Millenium operator levels steps creation:

Millennium operator levels steps installation:

Go to the Millenium operator system administration section, and then go to the operation level panel (2).

Millenium operator, Millennium security, full access, millennium management, millennium management data

Click on new to add a new operator level (2):

The next step is to name it (3) and selects all the permissions that this level will contain. In this case, for the Millenium operator manager level in the Common windows.

You need to exclude the full access to Add the next points:

New Site (4), Database Restore (5), Operator Defined Fields (5), Operator Event Filter (5), Operator (5), and Operator Level:

Millenium operator, Millennium security, full access, millennium management, millennium management data

Now in the DCD window of the Millennium access control, you only grant read access to Doors (7), Elevator Cards (7), and Floors (7):

Then in the Report window, you grant Millenium access controls to all the permissions (8, 9) and click on save (10) to finally add the Millenium operator level:

Once this step is done, you’ll need to create the following Millennium management data operator levels:

For the Frontdesk Millenium Operator Level:

The first step is to name it (1). Then, in the window you’ll need to grant full access only to Advanced Operator Commands (2), Operator Control (3):

Later in the DCD window, you only grant read Millennium access control to Doors (5), Elevator Cards (5), and Floors (5), finally, in the Report window, you will deny access to all reports as shown below (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

To work in the security operation level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to: Advanced Millenium Operator Commands (2), Operator Control (3), and Historical Log (3):

Later in the DCD window, you only grant read Millenium access control to Doors (5), Elevator Cards (5), and Floors (5),  Then in the Report window, you grant access to all the permissions (6, 7):

Millenium operator, Millennium security, full access, millennium management, millennium management data
Millenium operator, Millennium security, full access, millennium management, millennium management data

And the office data entry Millenium operator level:

The first step is to name it (1). Then, in the Common window you’ll need to grant full access only to:

Access Level, Advanced Operator Commands, Cardholder Batch Adding, Cardholder Custom Fields Setup, Cardholder, Cardholder Import, Cardholder Export, Cardholder Search, Historical Log, Holidays, Operator Control, and Time Periods of the Millenium access controls (2, 3, 4):

Later in the DCD window, you only grant read Millennium security access to Doors: (5), Elevator Cards (5), and Floors (5). Then, in the Report window, you grant access to all the permission (6, 7) .

Millenium operator, Millennium security, full access, millennium management, millennium management data

How to create a cardholders record

How to create a millennium access Cardholder´s record?

We want to show you these steps to create a new Cardholders record in your millennium access control system. To do this, please, read below:

First step:

To create a new millenium access control  Cardholder’s record, first, we need to access the Cardholder windows in the home menu as shown below (1,2):

Millenium access control access control card access systems

Second step:

Millenium access control access control card access systems

Once this step it’s done, you’ll see the following panel showing a list of all the existing cardholders in the millennium access control system. The only next step is going to the NEW option as shown below (3):

Thirt step:

Millenium access control access control card access systems

The following step is going to the identification panel of the millenium access controls (4) and typing the data fields as it’s shown in the next step. First, we complete the First Name (5), middle name (optional), and Last Name (6), and we can change the employee ID also (7 optional).

Fourth step:

Following this, we go to the Cards tab in your millennium access control systems software (8) and enter the data in the fields shown below. First, we enter the encoded Card No. (9), and we mark in the active (10). The Facility code (FC-1-256 Encoded Card: 0-65535) (11), we select in card Format the one that says Wiegand 26 FC 1 (12), and finally, to assign the access Level, we double left click in the box marked under access control Level as shown in the figure (13).

Fifth step:

And this opens the following menu in your millennium access control systems. We click on the drop-down menu marked in the following figure and select among the available ones assigned to the user (14) and then click ok to save (15).

 

Sixth step:

Finally, we click save (16), and you will see the new cardholder added to the access control solution system.

ZKaccess access level and Personnel

zkteco access control level and access personnel steps creation:

We want to show you the steps to optimally configure these two sections in zkteco access control. Please follow these steps so, that you have optimal performance:

First step:

To create a zk access control level, all we must do later is go to the zkteco access control Level panel in the access control windows (1).

zksoftware access control zkteco access control zk access control

Second step:

Before, remember, the access level mentions what the users with verification can unlock at a specific time door or a certain number of entries. In this step, Click on the add option (2) in the zkteco access control software:

zksoftware access control zkteco access control zk access control

Thirth step:

zksoftware access control zkteco access control zk access control

after that, we enter the data in the fields, starting with zkaccess software Name (3). Following this, select a Time Zone from the Time Zones List (4) and all the doors that we’ll open with this zk access control level from the Door Combination list (5), and finally click ok to save (6).

Fourth step:

Then, to create personnel in the ZKAccess software, we must go to the Personnel panel in the Personnel windows (1).

zksoftware access control zkteco access control zk access control

Sixth step:

So, click on the Add option (2) in the zk access software; this will take you to the register of parameters that we will have to fill in yet:

zksoftware access control zkteco access control zk access control

Seventh step

zksoftware access control zkteco access control zk access control

Once we the following section in zkaccess software, we must complete the fields, Personnel Number (3 whatever you desired), First Name (4), Last Name (5), Card Number (6), select Department (7), and select the zk access control Level from the list (8), and finally click ok to save (9).

Eighth step:

At last, to see the events all we must do is go to the Real-Time Monitoring panel in the zk access control windows (1,2). So, lets try, and see the final result.

zksoftware access control zkteco access control zk access control

How to configure time zones and holidays

zk access control time zone and holidays configuration:

This blog will show you the essential steps to configure time zone and holidays in zk access control. For a correct installation, please follow these steps:

First step

Some functions of time zones can be beneficial for you. One is to specify when doors can usually open or give access control to some levels in a limited time. We can determine which entries can be accessed or not, only for specified users. So, to create a new Time Zone First go to the zk access control windows (1).

zksoftware access control zkteco access control

Second step

Note that by default, the system has an access control time zone named, which cannot be deleted but can be modified. The user can create more than one. After considering this, please go to the Time Zone panel (2) in your zk access controller:

zksoftware access control zkteco access control zk access control

Third step

Once this step it’s done, we click on the Add option in your zkaccess software system ,as shown below (3).

zksoftware access control zkteco access control zk access control

Fourth step

zksoftware access control zkteco access control zk access control

After completing the previous step in your zkteco access control, We enter the data in the fields below. First-time zone name (4), second establish the intervals (5), third copy to all days (6), or we can copy to specific days also, and finally click ok to save in your zkteco access control (7). 

Fifth step

Remember, we have functions to add, modify and remove holiday access controls. To create holidays, we access to holidays panel in the zkteco access control windows, as shown below (1).

 

Sixth step

Click on the Add option (2) in zk access controller system:

zksoftware access control zkteco access control zk access control

Seventh step

Then we enter the data in the fields, starting with Name (3), Type (4), Start Date (5), End Date (6), Recurring (7), and finally, we click ok to save the information in the zk access software (8).

Types-of-Access-Control-System

5 different types of access control

Manual access control

For manual access control, people are used to securing specific access points, such as doormen, stewards, or customer service agents. They identify people who want to enter the premises and decide based on predefined criteria whether or not they can – for example, a person presenting a ticket before entering a concert venue. This is often practiced at highly frequented access points such as cinemas, theatres, zoos, and theme parks where it is difficult to get information from people beforehand and identification isn’t required.

Mechanical access control

For mechanical access control scenarios, mechanical technology is used to secure an access point. A common example of this would be a cylinder lock with a suitable key – so this would be used typically in homes or garages.

Electronic access systems

For buildings with advanced security requirements, electronic access control can be used to secure access points. For these types of access, a card, chip or other fobs with the correct credentials must be presented to a reader in order for a person to pass through. This will also keep a record of who has passed through the area and when.

There are two types of Electronic access systems:

Standalone systems

These are used for single access points. The access decision is made on the basis of access permissions locally in the standalone component. These systems are not wired, which means the installation requirements are less than wired controls, saving time-on-site, and allowing for easy retrofitting of components. Using standalone access components vs wired online access control, for sites where access control would traditionally not be possible due to location or existing site infrastructure, a standalone component can be used to implement an access control solution more effectively. Standalone components can also be integrated into a larger access control system with a combination of both online and standalone components. In addition, it is easy to integrate offsite access points and provides the possibility of integration into bigger systems. Examples of standalone components include Digital Cylinders, Mechatronic (Electronic and Mechanical combination) Cylinders, and Electronic Door Locks.

Online systems

Used for larger sites with high access rates, these are wired and connected to the host system’s access control software. High-security levels can be achieved with these systems due to the real-time message exchange between the components and the software. In addition, there are interfaces to many other systems that can be incorporated, such as an alarm system, elevator control, etc.

Mechatronic access control

A combination of electronic and mechanical can also be used to offer further security. In this instance, the electronic system first checks the card/code/other media used, and only after passing this can a key be used on the mechanical lock to open the door. This sort of combination is typically used in offices with high-security requirements, private residential buildings, and server rooms.

Physical access systems

Physical access systems play an important role in access control and security – no matter how high quality a lock or access control system is, if the door or physical access system can be overpassed then it is of little importance. Thus, the physical access system must be viewed holistically and in line with safety requirements. Examples of physical access systems include:

  • Sensor barriers
  • Half-height turnstiles
  • Full-height turnstiles
  • Tripod turnstiles
  • Revolving doors
  • Security interlocks

Whether residential or commercial, access control systems are vital to protect premises from unauthorized persons. It is important to take a broad look at the security required and consult with a leading manufacturer of access control solutions to ensure the safety of a place, its occupants, and the items inside.

structured cabling solutions, structured cabling systems, benefits of structured caling

Benefits of structured cabling systems for your business

Structured cabling is the design and installation of a cabling system that will support multiple hardware uses and be suitable for today’s needs and those of the future. With a correctly installed system, current and future requirements can be met, and hardware that is added in the future will be supported.

Structured cabling design and installation is governed by a set of standards that specify wiring data centers, offices, and apartment buildings for data or voice communications using various kinds of cable, most commonly category 5e (Cat 5e), category 6 (Cat 6), and fiber optic cabling and modular connectors. These standards define how to lay the cabling in various topologies in order to meet the needs of the customer, typically using a central patch panel (which is normally 19-inch rack-mounted), from where each modular connection can be used as needed. Each outlet is then patched into a network switch (normally also rack-mounted) for network use or into an IP or PBX (private branch exchange) telephone system patch panel.

The importance of organised cabling systems will vary dependoing on your business needs, it can ensure a highly reliable cost-effective network infrastructure. Here we are going to briefly explain five main beenefits that strucutred wiring solutions can bring to your business

1 Lowers the risk of downtime

In case you had a problem with your wiring structure it won’t be solved as easily just as if you had a structured system for your business and reducing downtime. You will notoriously spend more time identifying which cable has caused the problem when using multiple wiring infrastructure, therefore, your employees and business productivity will be affected.

2 Simplicity and easy to manage

By controling everything using one single system eliminates the complexity of having multiple wiring infrastructures in place. This will reduce downtime and less money in the long-term.

3 Enhanced flexibility

A structured wiring system solution holds a high level of flexibility due it can quickly accomodate new changes, any addition or moves. This ensures your business experiences improved performance which translates to increased business growth. It also reduces the time taken during installation as well as increases adaptability to network infrastructure changes, making it easy to relocate to a new office.

4 Adaptability

Structure cabling systems come with very high bandwidth. With high bandwidth, the system can support any future applications that may be introduced to your business, video conferencing or multimedia, without interruption of the current system. Therefore, you will always be assured that your cabling system won’t become outdated in the future.

5 Future proof investment

Having an adaptable IT team that is reliable and provides a quick response when it comes to facing industry changes is vital. Future proof investment is the most significant benefit an structured wiring system can provide you a good structure for supporting your business growth. With structured cabling, you can rest assured your network infrastructure won’t become outdated and will support all emerging applications as your business grows.

Look no forward and get a quote to get your structured cabling system solution for yous business with a reliable team that will fit for your needs in the area of Miami. Whether your staff can’t afford to lose time dealing with computers or you are in need of experienced advise, we are the company to call. We have implemented a proactive approach to free your business fast from unexpected downtimes and optimize responsiveness and perfomance with or without an internal IT staff. We offer services to support and maintain your systems 24/7 contact us at 786-622-2221.

Access control: affordable options have become a reality

Whether you are running a small business office, doctor’s office, coffee shop, or retail store, it is important to ensure that you protect staff and assets. While for some this may mean simply locking the front door at night with a key, the introduction of new technology at lower price points now means that every business can afford the cost of access control today. For example, in recent years manufacturers have introduced more technologies in support of the small access control market, with systems designed for the one to a four-door customer. This means that for property managers they can save both time and money by implementing access control.

With a card-based system, the small business can use a proximity card and reader system that allows them to issue an access control card to employees. This can be an ideal approach for a business with multiple locations where they want someone to have access to more than one location. Using a proximity card to access the building also cuts down on re-key costs when an employee leaves.

Another cost-effective option is to install a keypad system on the exterior of an office door. When an office manager enters his pin number, it can unlock the door for the day and also provide a report on the open and close times of that location. This information can be accessed remotely by the retail manager to lock and unlock the door, for example.

In addition, with a keypad-based system, the administrator of the system can issue multiple pin numbers to employees so that each person has a unique pin. That pin number can be easily deactivated if the employee no longer works at that location.

Whichever approach you decide to take there are many access control systems from which to choose from that are technologically advanced yet affordable. Installing an access control system is s an investment worth making in your business.

system-installation-planning

Access Control System Installation Considerations and Planning

Do you have a complete plan for your access control systems installation?


It is vital to plan for the unique characteristics of your building before you start buying access control components. Here are some important steps to take during this planning stage:

  • Analyze blueprints and site drawings:
    • A detailed review of your building’s blueprints and site drawings helps you plan for the components you need and where you’ll need to install them.
  • Confirm your requirements in writing:
    • When you’re dealing with a professional access control company, discuss every detail, and confirm the plan in writing. Don’t move forward with the install until you know exactly what you’re getting and how much it’s going to cost.
  • Get approval from local officials:
    • Always check with local fire officials and building code agencies to ensure your access control design complies with existing codes.

An expert access control provider should work closely with you to understand your access control needs and the requirements of your building. Your provider should also check to ensure that your plan complies with local building requirements.

Do you want any additional access control features?

Beyond the basic features of your access control solution, it’s important to consider the different add-ons you may want. Here are some examples of common add-ons:

  • Integration with video surveillance and the grounds around your building
  • Higher-level security features like facial recognition or fingerprint scanning technology
  • Smartphone-based access control
  • Internet-connected access control that uses standard wiring. This makes for simple plug-and-play installation, plus easier setup and maintenance.
  • Cloud-based server
  • Parking access control
  • Integration with fire alarm and burglar alarm systems

Can your access control solution grow with your company?

As your company continues to grow and expand, is your access control solution capable of expanding with your firm? Here are two things to consider in this regard:

  • Will it be easy to add new doors, offices, and office buildings to the access control solution you’ve designed

Dicsan’s Cutting-Edge Access Control for Modern Businesses


We actively use and seek out the latest technology solutions to provide our clients with the best services and solutions available today. Our certified, highly experienced technicians can help secure your business with a comprehensive and powerful access control systems. Access control systems can also be integrated with video surveillance camera systems, allowing for greater control across your security platform.

turnstile

How digital technology is changing the moderns turnstile through biometrics

Where computing and access meet

Security, by nature, has a tendency to slow down any channel it functions in. A locked office might be safer, but it’s also slower to gain access to and even slower to create keys for. That’s an area modern access control is trying to solve, and it’s computing that’s swooping to the rescue. PC-managed electronic turnstiles can adjust zone control on an hour-to-hour basis, allowing explicit access to precise control frameworks without requiring keys that can be lost and copied. Windows-based systems can be used to control zones and add access points in mere moments. Workers can travel between security zones without stopping, let alone slowing down. That means productivity, and the profits it produces, no longer need to be affected.

The mechanics of electronic entry points

Once upon a time, the only thing automatic turnstiles could do was channel crowds to prevent accidents and time-consuming incidents. Their goal was to restrict access to one person at a time. Today, the readers integrate with biometrics, software, and cards. That gives them a starring role in payroll reporting. Human resources teams can check attendance in mere moments, and their records are delivered in precisely the format they need, negating much of the data capturing work they usually have to do manually. No matter how inventive access control software has become, entryways still rely on mechanics and design, though.

The modern business isn’t just looking for a barrier, but an attractive barrier that serves their brand identity and the architecture that communicates it. Laser cutting and robotic bending have allowed manufacturers to craft sleeker products that are easy to customize. Programmable logic controllers are then added to simplify installation and allow for easy digital integration. That means that everything from prestige half-height products to full-height industrial options can interface with any digital access tools required. Flow systems have never been this convenient.

Smart cards and tokens

Contactless technology has filtered into the access control industry, bringing next-generation systems the encoding capabilities they’ve always needed. Now automatic entry points can integrate into a potent built-in reader that moves access management into the cloud. Web-based software is as slick and elegant as the contactless cards that rely on it. Operators can grant permissions configured by time, date, and zone, none of which need to be permanent. With standard cryptography, ethernet interfaces, and secure key management technology, an ordinary access point becomes a sophisticated tool that locks up your building tighter than Fort Knox—with no loss of access speed. Workers can enter your building without creating a potential viral hotspot. It’s considerably faster to tap a card than to swipe it but, more importantly, it’s safer. As the world marches beyond its first coronavirus vaccine, it will remain ever aware of the need for hygienic access control.

The power of biometrics is changing

Biometrics has pushed businesses into a new era of digital authentication. You can’t fake biological data, so fingerprint scanners and the like keep data on file while granting access through registration. Retina scanning has gone mainstream, too, replacing keycards that can be lost and passwords that can be guessed. Today’s facial screening technologies can even screen temperatures before granting access, keeping your offices COVID-free. Old-fashioned entry points have not been replaced, just empowered by better screening technology. That has unique impacts on different industries:

  • The public sector can now offer different clearances without exposing private information to data theft.
  • The healthcare industry can restrict hospital access and confine contagious patients.
  • General businesses can shut off filing and document rooms while restricting unwanted visitors.
  • Law enforcement stations and centers can keep the public safer by preventing prisoners from breaking out.


Access Control Strategy

Access control isn’t just a technical field. It’s a strategic one as well. With software access dominating the field, security personnel now need to come up with fast, efficient ways to grant access. There are four broad approaches:

  • Discretionary: The business owner decides who to grant access to. This time-consuming method provides more end-user control than alternatives, so it’s only needed by businesses with high- security needs. With only one administrative role, however, malware can be catastrophic.
  • Mandatory: Custodians manage access so that data confidentiality is tightly managed.
  • Role-Based: Rule-based access control is one of the fastest strategies to execute. Here, access is granted to roles and job responsibilities rather than individuals. Security managers are usually put in charge of administration.

Rule-based access control is the simplest to automate for obvious reasons. It also lets management create stiff security roles for security teams to implement. There is, however, no reason for any business to use just one strategic approach. Each part of your building can have its own approach.