Take the first step: 1.866.746.1122

vision_banner_commercial_solutions_and_services

Access Control/Security

Vision Technologies (Vision) provides cost-effective turnkey Access Control Systems designed to meet your specific requirements for enabling authority to control access to areas and resources in a given physical facility or computer-based information system.  Managed Access Control can provide personnel tracking, image verification, employee information, and event documentation.  These systems can also be used to enforce policies, limiting users to specifically authorized actions and data.  Virtually any door can be retrofitted with a locking system specific to an end users requirements.  

From Traditional Access Systems to Smart Access Systems, Vision can provide Access Control, Alarm Monitoring, Digital Video, Intrusion Detection, Asset Tracking, Information, Security Integration, Credential Production, and Employee and Visitor Management functionality. Individual application modules are available as standalone systems or can be deployed in any combination to deliver a single, seamlessly integrated solution.  

Vision can help you assess your facilities utilizing Risk Management Consulting and assist you in determining the level of Security your facility requires.  This process helps to enable you to achieve an Access Control System right for your company and within your budget.  

Our Approach & Benefits

Access Control/Security Approach and BenefitsVision’s security management integrates access control, video surveillance and alarm monitoring with information technology to provide you with peace of mind. We offer systems to meet requirements of businesses of all sizes, from simple systems for just a few doors to systems with enterprise requirements. All of our systems are designed to meet your needs to:

  • Protect your assets with high-level building and property security
  • Protect your employees from unwelcome intruders
  • Restrict unauthorized access to the places and during the times you specify
  • Provide an audit trail of who is accessing your facility and when 
  • Eliminate problems with mechanical key and lock systems through electronic access

drop-arrow   Visitor Management

Through Visitor Management services, Vision is able to accurately, effectively, and surreptitiously track the usage of a public building or site. In many organizations, visitors entering a ‘secure’ building, facility or campus are able to gain access by simply writing their name in a visitor log book. With today’s security concerns, this outdated practice lacks security and yields data that is incomplete, often difficult to read, and always impossible to analyze.  Moreover, confidential information about recent visitors is readily available to all who flip through the pages.

In contrast, a visitor management system can gather increasing amounts of information and record facility usage by specific visitor and provide documentation of the visitor’s whereabouts. Because a visitor management system provides a record of building use, these systems are frequently used to complement building security and access control systems.

Computer Visitor Management Systems
Basic electronic visitor management systems use a computer network to monitor and record visitor information.  More sophisticated systems add photo ID capability, database searching, automatic door access and other functions.

An electronic visitor management system elevates visitor tracking and eliminates the problems associated with unsecure guest books.  Visitor ID can be checked against national and local databases, as well as in-house databases for potential security problems.  Many visitor management systems feature searchable visitor information databases.  Photo ID cards can be custom printed for one-time only or continuing use.  Swipe cards speed the security screening process.

Visitor Management Software
Several desktop-based visitor management software applications are available.  These applications typically consist of three fundamental components: visitor registration, visitor badge printing, and reporting functionality.  Some applications are capable of automatically capturing visitor information directly from a visitor's driver license, passport or other government issued identification document.

drop-arrow   Card Access

In physical security, access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons.  Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological methods such as access control systems like the access control vestibule.

Physical access control is a matter of who, where, and when.  An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit.  Traditionally, access was restricted through keys and locks.  However, mechanical locks and keys do not restrict the key holder to entry at specific times or dates or record the key used on any specific door. Additionally, keys can be easily duplicated or transferred to an unauthorized person.  When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be rekeyed.

Electronic access control eliminates the limitations of mechanical locks and keys through use of three types of authenticating information:

  • Keypads using a password or a code
  • Access Card such as smart card or a proximity card 
  • Biometrics such as a fingerprint or iris recognition, verified by biometric measurement

When the proper authenticating information is presented, the electronic access control system grants access; doors will unlock for a predetermined period, and the transaction will be recorded.  When access is denied, the door will remain locked and the attempted access will be recorded.  The system also monitors the door and alarm should the door be forced open or remain open too long after authorized access.

 

Commercial Services

Commercial Highlights

T-Mobile - Vision provided site survey, installation, and documentation of a cellular reinforcement solution rolled out to over 700 locations in the United States. The hardware deployed included Cisco routers and store cabling.

SAIC - As a SAIC valued services provider for the ICE Program, Vision provides survey, design, implementation, and documentation services on an on-going basis within the 50 states and Puerto Rico.

W.W. Grainger - For a 410 site rollout, Vision provided comprehensive site survey, installation, and cut-over services for cabling infrastructure, access point and router equipment. We successfully managed over 1500 client visits, delivering on-time for the VOIP engagement.

Federal Deposit Insurance Corporation (FDIC) - Vision provides managed services for 110 FDIC offices nationally for the past six years (including two awards via re-compete) for audio-visual, in-building cellular systems, and structured cabling.

Merrill Lynch - For six years, Vision provided trouble call and resolution services supporting 630 branches in the United States and Puerto Rico, with a contract requiring a four-hour response SLA and intense communications requirements.

Click to view Commercial Clients

What's New at Vision

HTNG 2014 North American Conference on 3/3 in San Diego, CA - Read More

Government Procurement Vendor Fair  on 3/12 in Memphis, TN - Read More

Vision Technologies Installs the First Private Commercial Building Public Safety Distributed Antenna System in Arlington, Virginia - Read More

Vision Technologies Manages Communication Networks for Fifth Largest School District in the U.S. - Read More

#InBuildingWireless event 10/3 in NYC for #cabling companies. Partner with us for value-added services & #DAS. http://t.co/nIkH6BStXb