Access control is a way of physically limiting access to a building or property. Through the use of both software and hardware, not only can the owner restrict access by date and time, they have a complete audit trail of all transactions occurring at the property. At SAF Technologies Inc. we offer a wide range of access control products to fit both the individual’s needs and budgets of our customers. These products include both on premise and cloud solutions.
Asset tracking, sometimes referred to as asset management, is the method used to track your physical assets, whether you scan barcode labels attached to them or you use GPS or RFID tags that broadcast their location. Asset tracking systems can be put in place to monitor and track items like paintings, computers, vehicles and products as well as audio visual equipment. Not only will asset tracking help you prevent theft of valuable equipment, it will save countless hours trying to track down valuable equipment such as IV pumps, crash carts, endoscopes and ECG monitors in large hospitals. Whatever your asset tracking needs are, SAF Technologies Inc. can help you find the right solution.
In construction, low voltage electronic security products are considered division 28. This would include products like access control, video management and intrusion systems. The commercial doors and hardware industry is considered division 8 and would include products like doors, door frames, door hardware and glass. It is not unusual to find several different vendors working on a single door during construction. Multiple vendors can be a challenge for the general contractor during construction and a challenge for the end-user once they take ownership of the building. If the door stops working and you had three or four vendors working on that door, who do you call for service? Since 2011, SAF has been providing not only low voltage and commercial doors and hardware services, but we also provide the keying/locksmithing services as well. This makes it extremely easy for customers to make just one call when there is an issue.
We rolled out our embedded technician program in 2015 by placing three embedded locksmiths at one of our major clients. There was a need for full-time locksmiths to provide typical institutional key, lock, and repair services, but we additionally provided trade professionals with project management experience to help create and fulfill keying schedules. Our team has also helped these clients develop much-needed key control and physical security standards and policies. This team regularly inspects and reports on the performance of the hardware products and overall door assembly designs, as well as provide daily break-fix services. This helps the construction design teams build better functionality and durability into the security openings for their facilities. This service is unique in this industry. It was not long until we also began embedding full-time service technicians at our client sites on the security integration side of our business. Our customers find a tremendous value in having the same service technician(s) reporting to their site every day. Service calls are handled immediately, and they have the technicians available for so many other responsibilities, including system design and administration. This is an excellent option when you cannot get approval for another FTE on your staff.
Gates and barriers are often installed to keep unwanted vehicles out of certain areas. A barrier gate is often controlled by a mechanical device called the gate operator, which is a device that is mechanical, and is used to open and close a gate, such as those located or installed on driveways. Many of these gates are integrated into the access control system. We can provide a variety of gates and barrier types. Another type of barrier is a bollard. A bollard is a short post used to create a protective or architectural perimeter. Bollards can also be constructed to physically block vehicle incursion, protecting people and property. These security bollards may have decorative elements or be chosen to complement the landscape, but their primary consideration is resistance to impact forces. There are retractable bollards that neatly telescope down into in-ground receivers when unlocked, sitting flush with the ground, so they are neither a tripping hazard nor an obstruction.
An intercom is a stand-alone voice communications system for use within a building, or small collection of buildings, functioning independently of the public telephone. Intercoms can be integrated to the access control systems as well. Not only do they provide two way voice communications, but they can provide video as well. In a security application, they are primarily used to authenticate a visitor and to grant access to a facility. There are also intercoms that are part of emergency call stations in parking lots and parking garages. They are generally tied into some type of strobe light and/or sounder. There are both wired and wireless systems available.
An intrusion detection system (IDS) is a type of security technology that is designed to automatically alert administrators and/or security personnel when someone it trying to compromise a physical security system which is designed to protect assets such as buildings and property. The intrusion system can be part of an access control system or could be a standalone system to include such technology as barrier mounted (fence protection), ground based (buried cable or sensors) and free standing (microwave and radar based).
Private canine services offer concerned parents, school administrators, business owners, public venues, and event security professionals the same tools that are available to law enforcement. These professionally trained canines specialize in drug detection, firearm detection as well as explosive detection. Our partner has the only canines certified in Vapor Wake detections in NC. Vapor Wake canines consistently and effectively do what others cannot: follow an explosive target to its source in real time, while the target is in motion. Additionally, Vapor Wake dogs have been socially and environmentally raised to work in high-flow pedestrian areas. Because of this, they can accurately screen hundreds of people passing through an entry point in a nonintrusive way.
The most sophisticated electronic security system will not truly control access to your building if you do not have control over your mechanical keys. Too often we see customers invest money in access control but do nothing to change the key control policy and protocols within their facilities. Our industry experts will help you navigate the key control process and help you develop a key control strategy for your organization. After we complete an audit of your key control policy and processes, we then make recommendations for greater key control within your facility. With actual access control in place, you can now limit the mechanical keys issued. This will reduce the security risks involve with staff turnover and lost or stolen keys.
A mass notification system is a method of facilitating the one-way dissemination or broadcast of messages to one or many groups of people. The system can alert them to a pending or existing emergency. In today’s environment, the need to implement mass notification systems is on the rise. We offer a variety of solutions to address this need. Solutions range from a mobile application, that resides on the phones of employees or students, to the installation of broadcast systems that are installed throughout the workplace or educational facility. We also provide technology that bridges the gap between private corporations, law enforcement, first responders and other emergency response agencies when it comes to real time radio or cell phone communications. We are constantly researching and vetting new technology that will improve communications when it comes to mass notification.
A metal detector is an electronic device for detecting the presence of metal objects. A portable sweeping unit could be used or placed at an entrance to a facility or sporting event to detect concealed weapons, explosives, etc. The walkthrough metal detectors are used for the initial screening. If further screening is needed, most likely the screening will take place with a handheld wand by a trained operator. Today we are seeing more and more hospitals deploying metal detectors especially in their emergency rooms. It is important to note that although the cost of the equipment is relatively inexpensive, the cost to staff the metal detectors can be extremely high. We have seen a tremendous amount of success identifying both guns and knives with some of our recent installations. We have also seen that the mere presence of a metal detector is a great deterrence.
Preventative maintenance is maintenance that is regularly performed on a piece of equipment to lessen the likelihood of it failing. It is performed while the equipment is still working so that it does not break down unexpectedly. It has been demonstrated that a regular preventative maintenance program can save you thousands of dollars. At SAF Technologies Inc. we offer a variety of flexible programs to fit both the client’s needs and budgets. These could include monthly, quarterly, annual or even on-demand preventative maintenance visits. The goal is to maximize the “uptime” of your security systems so they are there when you really need them.
Generally speaking, a service contract is a legal document between a vendor and a customer requiring the vendor to maintain the customer’s equipment for a specific period of time for a determined amount of money. Some people look at a service contract as an insurance policy. At SAF Technologies Inc. we provide many different options to our customers. The agreements can be for labor only, and the customer pays for parts as needed. It could be an agreement that covers all parts and labor. We may include preventative maintenance visits, software upgrades and even 24 hour coverage. We will even provide full-time embedded service technicians on site as part of the service contracts. Our goal is to be very flexible and develop custom service contracts that meet our customer’s specific needs.
Organizations in every industry around the globe are deploying turnstiles to mitigate tailgating. Security professionals are seeing the benefits of using different turnstile models in multiple areas of their buildings as part of an effective overall physical security plan. Here are four reasons that turnstiles are being installed: 1) They take pressure off our staff. 2) They are a visual deterrent. 3) They work well in conjunction with security officers and receptionists. 4) They integrate with virtually any access control device. SAF works with the top turnstile manufacturers in the industry. Our turnstiles are made in America, and some come with a lifetime warranty and no required service contract. We can provide both traditional barrier turnstiles as well as optical turnstiles.
Video management systems consist of both software and hardware to manage your video recordings. The video management software is an essential part of the surveillance system. VMS software allows you to manage camera and recording settings, view multiple camera feeds, and set alerts for tampering and motion detection. Video management software also provides advanced analytics, which is very beneficial when analyzing your recorded video, providing you with beneficial information. When integrating your video management system with access control, it is extremely beneficial if you can make it part of a “unified platform”. With a unified platform you will use the same software to operate and manage both your access control and video management systems.
A Visitor Management System tracks visitors to a private or public facility. By gathering increasing amounts of information, a Visitor Management System can record the usage of the facilities by specific visitors and provide documentation of visitor’s whereabouts. Although these can be stand-alone systems, they can also be integrated into an access control system. Today many of the access control manufacturers are developing their own Visitor Management Systems that are part of their own software. Some of these systems cannot only scan a driver’s license into their database, but they can run a criminal background check at the same time. Many companies are installing self-service Visitor Management Kiosks in their lobbies which reduces the workload of the security officers or receptionists.