Why Paxton Access Control?

About Paxton 

Paxton Access Control is recognised as being one of the most reliable, user friendly and comprehensive access control systems available. JNCS Beyond Security chose Paxton Access Control as one of our key technology providers in 2013, and we’ve successfully worked with them on over 40 projects so far.

Paxton Access ControlAll of our security consultants and engineers have attended the Paxton training program and are experts in the design, installation, maintenance and repair of their systems.

We carry significant stocks of Paxton Access Control equipment and can usually obtain any other parts the next working day.

JNCS Beyond Security is able to offer professional advice, technical expertise and engineer attendance across the Southern Africa

Why Install Paxton Access Control?

Choosing an access control system is an important financial decision for most companies. The cost is of course important, but the system also needs to match your requirements and be completely reliable.

Paxton Access specialise in access control solutions. Their development team is focused on designing systems that are fit for their purpose, containing the important features that are necessary for well-run organisations. Their commitment has resulted in our products winning a reputation for reliability and ease of use.


Access control systems

All businesses, whether small, medium or large, have assets that need to be protected from theft. There is also the issue of protecting staff and their property. It is common in buildings that are secured by locks and keys for doors to be left unlocked all day. This opens up the possibility of opportunistic theft and malicious damage.

Electronic access control provides the most efficient and convenient way of securing your building and assets. Installing an access control system means that you will never have to change a lock again. Tokens are issued to allow access through the controlled doors, and are easily barred from the system if they are lost, stolen or just not returned by someone who leaves your company. Barred tokens will not allow access through the controlled doors.

Why use PC based access control?

  1. Central control - all doors can be controlled from one place.
  2. Reporting - an event is generated every time a token is used to gain access.
  3. Complete flexibility - access can be granted to users according to time and place.

Access control solutions south africa

What are the advantages of central control ?

  1. Full control of the system from your desk.
  2. Users are added and instantly have the access rights that you permit.
  3. Individual access rights can be altered, changes instantly update at the doors.
  4. Tokens voided - someone leaves without handing back their token, simply bar that user token from the system.
  5. Explorer style software makes all tasks quick and easy to perform.

Picture32Methods of Access with a Paxton System

  1. Keypads – For coded access with Tag.
  2. Proximity fobs or Cards – For contactless access control.
  3. Biometrics – Fingerprint readers can be used as a means of identification and the grant authorised access.
  4. Long range readers – Ideal where you wish to grant access up to 20m away.


Picture33 Picture34 Picture35 Picture36

Picture37 Picture38 Picture39

What does “complete flexibility” mean?

Using time zones means you can allow or refuse access to different individuals or groups of people, to different doors within set time scales.

Why? You may for example only wish factory staff to have access to offices in standard office hours. The factory staff may be set to allow access from 6am to 6pm, the office door may be set up to only allow access between 8am and 5.30pm for this group of users.

Time zones can be created to give groups of people or individuals access at set times of day.

Public holidays may be entered - and permissions set against these to allow or not allow access to staff.

Issuing cards is simplified. If a department is set up with a time zone of 9am-5.30pm on the office door, a token issued to a member of that department automatically only allows them through the door between 8am and 5.30pm.



What does reporting give me?

The events screen allows you to view the “real time” events as they are happening.

See "who is in today” with a glance at your computer.

You can see if unauthorised access has been attempted, either by forcing a door, or use of an invalid token.

Default reports are available from the software.

Standard reports can show all events, all events in a set time frame, last known position of a user and much more.

Report wizard - allows you to create custom reports.

Picture7   Picture8


Multiple Workstations

Net2 provides the opportunity for more than one PC to be able to view events and control the system.

In the example above, three departments are able to access the system.

Engineering - The supervisor is able to issue and void tokens, he uses the reports screen to see who is in or out.

Sales - The sales manager is able to issue and void tokens. He can use the report screen to check who is in or out.

Administration - Issues temporary one day cards to visitors. Changes access levels for different staff and departments as needed. An alarm will generate on the events screen if unauthorised access is attempted.


  Timesheet for Time and Attendance

  1. Timesheet is used for recording simple time and attendance.
  2. Shows the number of hours worked by each employee.
  3. Dedicated readers (independent of the door readers) need to be used for time and attendance.
  4. Check at a glance, who is in, who is out, who is working out of the office, who is on holiday.
  5. Set the number of days holiday per employee - Timesheet will show how many days remain to be taken.
  6. Employees who work from home can log in over a network.
  7. Timesheet information can be exported as a CSV file for use with payroll applications.


Roll Call and muster reporting

Roll call and muster reporting is a means of checking staff in at a central point if there has been an alarm which requires the evacuation of a building.

A reader is located on a safe area of the site - for example a gate house.

A roll call/muster report is generated on the PC at the muster point to show who was in the building at the time of the alarm.

Staff members present their token to the reader at the muster point.

The Net2 report will update to a status of “safe” against the record of the token holder.

At a glance you can check who has registered at the muster point - and who is still missing.

Remote sites

Net2 can be used to control access on remote sites using dial-up via modem or TCP/IP (Local or Wide Area Network connection LAN/WAN).

This provides many advantages:

If premises are remote from the main office and are not permanently staffed then access can be controlled from head office via the connection.

You can bar a user from a remote site - effective immediately.

You can issue cards for a remote site - effective immediately.

Site Manager software allows control of several remote sites.

You can issue cards for a remote site in exactly the same way as at your head office.


Intruder Alarm Integration

As well as controlling access into your building, Net2 can also disarm your intruder alarm if required.

Those users with permission to unset the alarm are flagged using the Net2 software.

If a system user arrives early and does not have permission to unset the alarm, they will simply be denied access to the building. No drama, no fuss!

On leaving the building the intruder alarm can be set by simply presenting a valid token to a dedicated reader.

Net2 will integrate with the majority of intruder alarm systems. Intruder alarm integration greatly reduces the risk of false alarms and unnecessary call outs.


Site Graphics

The ‘Site Graphics’ feature allows operators to monitor events around their site at a glance.

Site Graphics provides a visual representation of the site, complete with door locations and real-time door status information.

Site Graphics alerts the user to door forced events or unauthorised access attempts and where they are occurring, allowing those monitoring to act swiftly to investigate the event.


Net2 - features we haven’t mentioned

IP camera integration - view real-time images from around your site

Integration with 3rd party readers - Biometric, hands-free and smart card

Anti-pass back - global, logical and timedPicture22

Link to fire alarm system - automatically unlocks any doors designated as fire doors in the event of a fire alarm

Triggers/Actions feature allows control of elevators, lighting, heating and much more

Picture23 Picture24 Picture25 Picture26