Access control / visitor management: For the most modern security requirements
You can use the ZKS - Access Control System to secure buildings, rooms, areas, persons, goods, important data and company know-how, as well as to monitor and control various building facilities.
With ZKS, you can solve your security and organisational tasks economically, conveniently and reliably; without much extra effort. A wide variety of control mechanisms can be combined with each other, thus allowing you flexible extensions.
Advantages of ZKS at a glance:
- Creation of authorisation profiles
- Monitoring and control of doors, turnstiles, barriers and lifts
- Extensive visitor management
- Support of common reading methods for transponders, key fobs or badges
- Combination with biometric terminals
- System security in case of power failure through automatic switchover to offline status
- Access control at the PC workstation through the Breitenbach PC authentication system
Contents of the product description:
- Offline access control systems
- The system adapts to your changes
- Offline Stand Alone
- NetworkOnCard
- Validation Online / Offline
- NFC – Near Field Communication
- Mobile Key
- Electronic fittings
- Door Handle - electronic door handle
- Electronic locking cylinder
- Cabinet Lock
- Offline wall reader
- Authorisation terminal

Frequently Asked Questions (FAQ)
We answer the most important questions about our software solutions.
What functions and modules does the access control system provide?
The basic functions of the ZKS include
The ZKS - Access Control System can be used to secure buildings, rooms, areas, persons, goods, important data and company know-how as well as to monitor and control various building facilities.
With Breitenbach's visitor management system, every visitor including name, company, date of visit, etc. is registered via the system. In addition, the contact person as the person visited and the guest's access authorisations are always entered in the system to guarantee the company a high level of security.
What technologies are used for access control, such as RFID cards, biometric systems or access codes?
Technologies
Breitenbach offers a wide range of electronic and mechatronic access components based on the latest RFID technology. Security systems must be able to be flexibly adapted to new situations, staff change, keys are lost or structural changes must be taken into account. Everywhere, whether you are responsible for the security of a clinic, university building, airport, office or industrial building, you need to secure one or a thousand doors, at one or more locations. With the flexible access control systems from PegaSys, paired with the intelligent software solution from Breitenbach, we offer you cost-effective, flexible and modularly expandable solutions that meet your requirements.
Is the software flexibly adaptable to accommodate different shift models, working time arrangements and individual preferences?
Customizing - fine tuning according to your preferences
Yes, we can show you how to optimise and simplify your processes with the help of software. Within the scope of customising, our flexible programs are adapted to your individual requirements. Through targeted parameterisation (e.g. for databases, input masks or forms), our standard products become your customised software solution.
How will the system be implemented and how long will it take?
Breitenbach Services
Benefit from our implementation experience from over 4,000 projects. You receive comprehensive project management and consulting services for your Breitenbach software solution, customised to your requirements.
The required implementation time and schedule are determined by the individual requirements profile and size of the company of the respective customer.
How is employee training for the system organised and executed?
Breitenbach training courses
In order to be able to use your systems optimally and to make the work of your employees as efficient as possible, regular training and qualifications are essential.
With in-house training courses, online training courses and Möhnesee training courses, you and your employees can keep up to date with us in a targeted manner and deepen your competence with pinpoint accuracy.
How is the system integrated into our existing HR systems?
Integration management
Due to the open interface architecture, the individual software modules can be linked to each other and to external products in almost any way. This flexibility and compatibility offers you all the freedom you need for current or future platforms and systems. Our products are therefore a guarantee for high investment security.
How is the support and maintenance of the system organised?
Hotline support
Our hotline support consists exclusively of qualified IT consultants who have a high level of technical and product-specific know-how. Our internal call tracking system means that we are always up to date with the latest information on your enquiries. This special and personal support guarantees you and your employees optimal support and fast solution proposals.
Within the scope of software maintenance, the customer is entitled to the current software release statuses and use of the hotline.
How is data protection and the security of employee data ensured?
Data protection and the security
A sophisticated role system with various authorisation systems not only ensures data protection regulations, but also only authorises those persons or employees who have been specified by their respective administrator or the responsible employee.