breitenbach

ZKS

Access Control System

Content Request informations

Access control / visitor management: For the most modern security requirements

You can use the ZKS - Access Control System to secure buildings, rooms, areas, persons, goods, important data and company know-how, as well as to monitor and control various building facilities.

With ZKS, you can solve your security and organisational tasks economically, conveniently and reliably; without much extra effort. A wide variety of control mechanisms can be combined with each other, thus allowing you flexible extensions.

Efficient, modular, reliable and individual

You can use the ZKS - Access Control System to secure buildings, rooms, areas, persons, goods, important data and company know-how as well as to monitor and control various building facilities.

With ZKS, you can solve your security and organisational tasks economically, conveniently and reliably; without much extra effort. A wide variety of control mechanisms can be combined with each other, thus allowing you flexible extensions.

From the integration of your alarm system to the setting of time-limited access times: The ZKS offers individual possibilities.

ZKS - Visitor management

Especially in medium-sized and large companies that receive a large number of guests every day, Breitenbach's visitor management system is an indispensable tool for optimising processes.

Each visitor is registered via the system. This includes name, company, date of visit, etc.. In addition, the contact person as the person visited and the guest's access authorisations are always entered in the system to guarantee the company a high level of security.

From badge design to visitor data storage: Your options at a click.


Lift control system for building security on all floors

Wherever a large number of people enter and leave the building, it is important to ensure a safe process. Secure multi-storey buildings or entire floors against unauthorised access with the lift control system. As with a room zone, employees can be assigned access authorisations for specific floors. With the ZKS - Access Control System, you determine at what time a person is granted access, regardless of whether it is a door, a lock, a barrier or a lift.


Advantages of ZKS at a glance:

  • Creation of authorisation profiles
  • Monitoring and control of doors, turnstiles, barriers and lifts
  • Extensive visitor management
  • Support of common reading methods for transponders, key fobs or badges
  • Combination with biometric terminals
  • System security in case of power failure through automatic switchover to offline status
  • Access control at the PC workstation through the Breitenbach PC authentication system

Contents of the product description:

  • Offline access control systems
  • The system adapts to your changes
  • Offline Stand Alone
  • NetworkOnCard
  • Validation Online / Offline
  • NFC – Near Field Communication
  • Mobile Key
  • Electronic fittings
  • Door Handle - electronic door handle
  • Electronic locking cylinder
  • Cabinet Lock
  • Offline wall reader
  • Authorisation terminal

Frequently Asked Questions (FAQ)

We answer the most important questions about our software solutions.

 

What functions and modules does the access control system provide?

The basic functions of the ZKS include

The ZKS - Access Control System can be used to secure buildings, rooms, areas, persons, goods, important data and company know-how as well as to monitor and control various building facilities.

With Breitenbach's visitor management system, every visitor including name, company, date of visit, etc. is registered via the system. In addition, the contact person as the person visited and the guest's access authorisations are always entered in the system to guarantee the company a high level of security.

What technologies are used for access control, such as RFID cards, biometric systems or access codes?

Technologies

Breitenbach offers a wide range of electronic and mechatronic access components based on the latest RFID technology. Security systems must be able to be flexibly adapted to new situations, staff change, keys are lost or structural changes must be taken into account. Everywhere, whether you are responsible for the security of a clinic, university building, airport, office or industrial building, you need to secure one or a thousand doors, at one or more locations. With the flexible access control systems from PegaSys, paired with the intelligent software solution from Breitenbach, we offer you cost-effective, flexible and modularly expandable solutions that meet your requirements.

 

Is the software flexibly adaptable to accommodate different shift models, working time arrangements and individual preferences?

Customizing - fine tuning according to your preferences

Yes, we can show you how to optimise and simplify your processes with the help of software. Within the scope of customising, our flexible programs are adapted to your individual requirements. Through targeted parameterisation (e.g. for databases, input masks or forms), our standard products become your customised software solution.

 

How will the system be implemented and how long will it take?

Breitenbach Services

Benefit from our implementation experience from over 4,000 projects. You receive comprehensive project management and consulting services for your Breitenbach software solution, customised to your requirements.

The required implementation time and schedule are determined by the individual requirements profile and size of the company of the respective customer.

How is employee training for the system organised and executed?

Breitenbach training courses

In order to be able to use your systems optimally and to make the work of your employees as efficient as possible, regular training and qualifications are essential.

With in-house training courses, online training courses and Möhnesee training courses, you and your employees can keep up to date with us in a targeted manner and deepen your competence with pinpoint accuracy.

How is the system integrated into our existing HR systems?

Integration management

Due to the open interface architecture, the individual software modules can be linked to each other and to external products in almost any way. This flexibility and compatibility offers you all the freedom you need for current or future platforms and systems. Our products are therefore a guarantee for high investment security.

 

How is the support and maintenance of the system organised?

Hotline support

Our hotline support consists exclusively of qualified IT consultants who have a high level of technical and product-specific know-how. Our internal call tracking system means that we are always up to date with the latest information on your enquiries. This special and personal support guarantees you and your employees optimal support and fast solution proposals.

Within the scope of software maintenance, the customer is entitled to the current software release statuses and use of the hotline.

How is data protection and the security of employee data ensured?

Data protection and the security

A sophisticated role system with various authorisation systems not only ensures data protection regulations, but also only authorises those persons or employees who have been specified by their respective administrator or the responsible employee.

 


Request informations

Please fill out the following form so that we can process your request.

Would you like advice on the subject by telephone?

 Further supplementary software modules

Contact

+49 2924 9700 0 verwaltung@bb-sw.de