Access Control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Locks and login credentials are two analogous mechanisms of access control.

Geographical access control may be enforced by personnel (e.g., border guardbouncerticket checker), or with a device such as a turnstile. There may be fences to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence.

Access control system components

Components of an access control system include:

  • An access control panel (also known as a controller)
  • An access-controlled entry, such as a door, turnstile, parking gate, elevator, or other physical barrier
  • A reader installed near the entry. (In cases where the exit is also controlled, a second reader is used on the opposite side of the entry.)
  • Locking hardware, such as electric door strikes and electromagnetic locks
  • A magnetic door switch for monitoring door position

Access control system topologies

1. Serial controllers.

2. Serial main and sub-controllers.

3. Serial main controllers & intelligent readers.

4. Serial controllers with terminal servers.

5. Network-enabled main controllers. 

6. IP controllers.

7. IP readers. 


CEM Access Control Management System


AC2000 is an enterprise access control and integrated security management system that has been successfully installed at some of the largest facilities around the world where security is paramount.

AC2000 is highly flexible to meet unique project needs for integration.  Acting as the Security Management System (SMS), AC2000 provides one powerful command and control front-end for alarm management of multiple systems including access control, video, intrusion, fire and perimeter detection.


Powerful, fully integrated security management system

AC2000 Lite

Integrated security management system - supports up to 128 doors

AC2000 Airport

Industry leading aviation-specific access control solution

AC2000 Enterprise

AC2000 Enterprise; the connected way to manage multiple sites anywhere in the world

AC2000 Software Modules

The powerful CEM AC2000 software suite offers a highly comprehensive range of client and web-based modules that enhance both site security and operations.

CEM Card Reader

Intelligent Readers

CEM consistently leads the industry in the development of its Intelligent IP card readers: Industry firsts include Portable hand-held card readers, Ethernet based IP card readers, Fully integrated biometric readers and Intelligent card readers with internal database.

Biometric Readers

CEM fingerprint card readers provide a fully integrated biometric and access control solution. Fingerprint templates are captured via the AC2000 software at the same time cardholder details are enrolled. CEM biometric readers include the revolutionary emerald TS300f fingerprint touch screen terminal and the S610f fingerprint reader.

Portable Readers

CEM was the first in the industry to develop a portable access control reader.  The S3050 is a lightweight hand-held portable card reader that can be used for ID card validation at temporary entrances or remote sites which have no power.  It can also be used as a mobile device for random checks within pre-defined zones.

Card technology

AC2000 access control works with a range of card technologies to ensure your security requirements are fully met.

Gallagher Command Centre

Command Centre is the powerful software at the heart of Gallagher’s integrated security solutions, a centralized platform that gives you unparalleled control of every aspect of your site.

Enhanced security monitoring and response

Site hardware and system components can be configured using Command Centre.

Fully configurable to meet the unique needs of your site, Command Centre offers centralized site visibility and monitoring to enhance situational awareness on both local and remote sites. Everything that happens on site is relayed to your Command Centre operators in real-time, enabling a quick and accurate response to security threats.

Operational efficiencies

Seamless integration with complimentary security and site management solutions creates smarter, more cost-effective ways to operate. Flexible, advanced auditing and reporting allows you to retrieve data and make operational decisions with greater precision.

With you all the way 

Fully scalable and supported by continuous investment in research and development, Command Centre will always be ready to support your future growth and changing security requirements.

From perimeter solutions, intelligent access control and building management, right through to critical sites with some of today’s highest security requirements, Command Centre is designed with your people, site, business and building management in mind.

Gallagher Card Reader

Gallagher's T-Series Reader range provides contactless proximity card readers for access control management.

The T-Series range of smartcard and multi-technology readers, T10, T11, T12, T15 and T20, are designed to withstand both the rigours of daily use and adverse environmental conditions.

  • Potted and tested to high environmental tolerances.
  • Durable and robust design. 
  • Extensive range of reader mounting and protection accessories.

Features across the range

  • High speed RS485 protocol, HBUS, offers a fast access decision response time.
  • Unparalleled reader security through IT grade authentication and encryption between the reader and controller with HBUS.
  • Heartbeat monitoring ensures reader status can be monitored in real time. An alarm is raised at the Command Centre workstation if the reader stops communicating with the field controller. 
  • Support for multiple card technologies including: MIFARE DESFire EV1/EV2®, MIFARE Plus®, MIFARE Classic® and 125 kHz proximity. MIFARE DESFire EV1/EV2® format implements AES 128* bit data encryption to ensure robust data security. Support for Mobile Connect.
  • Custom site keys are supported when used with MIFARE Plus® and MIFARE DESFire EV1/EV2® cards.
  • MIFARE enhanced security options are available to counter card-cloning attempts. 
  • Access card reading is protected by Cardax IV data format with only licensed individuals able to create cards for sites. Issue levels are also supported. 
  • Gallaghers facility code management delivers unique facility code issues worldwide.
  • Encoding of issue level and region code in addition to facility code and card number, providing unique card data across global card databases.
  • Eight bit error detection protocol, ensuring that the reader correctly identifies the card being presented.
  • Unrivalled reader durability and water/dust protection.
  • Environmentally friendly - RoHS compliant and designed for minimal power consumption.
  • Backwards compatibility - the readers are compatible with Cardax IV enabled Gallagher Controller and GBUS URI hardware.

HIK Face Recognition Terminals

For quick and reliable ID verification – even under difficult lighting conditions – Hikvision does it all! Hikvision’s deep-learning-empowered face recognition terminals set a new standard in access control. With face recognition technology, user authorizations are more secure and reliable, granting access only to verified personnel and eliminating possible fraudulent activities. Equipped with event linkage, spoofing detection, CCTV integration, and zero-light recognition functions, this face recognition terminal works in virtually any scenario that requires strict access control management. 


hik 1.PNG

hik 2.PNG

HIK Turnstiles

Hikvision Turnstiles integrate not only with face recognition terminals. They also offer users advanced access control functions and multiple combinations of authentication methods.


hik 3.PNG


hik 4.PNG