Access Control

  •  

    • Access control is one of  the principal focus of Horizon’s business. providing state-of-the-art access control to organizations valuing human and physical assets. Depending on the level of security required, it may serve as the access control point for an entire facility, or it may be deployed in a particularly sensitive area of company operations.

      Iris recognition technology is finding its way into the government sector - not just for security but for other applications as well. 

      Iris ID biometric devices are one of the most effective solutions for time and attendance, workforce management, and access control. The devices eliminate the potential errors associated with manually calculating employee hours. These readers also eliminate costly “buddy punching” because biometrics identify a person based on their unique physical characteristics of the iris. For the most demanding applications, Iris ID has a solution that will fit the needs. Iris ID can be used in environments where workers have difficulty providing other biometrics.

      Video Management Systems

      Our approach to integration is revolutionary for the industry. Until recently access control systems were viewed as the primary command and control for an integrated video management systems and access control. Our integrated solutions provide users with a single, powerful interface for controlling doors and managing alarms and events. The single interface allows for a quick adoption because training is much quicker and simpler since we integrate into the software employees are already trained to use.

      In order to help you track employee attendance and hours automatically, we enable your system to interface with a variety of time accounting systems commonly available.

      Bluetooth and the Future of Access Control Security

      As in anything 2013, the Smart phone is making inroads into access control. Bluetooth readers such as those used by EcKey, allow card holders to ditch their cards and use their smartphones instead. Two applications are offered. •   In facilities with high security concerns, and an existing access control system, a blue tooth adapter can be added to each reader, and once the employee or resident syncs his phone to it, the phone becomes his credential.