our services
Badge access
Key pad Access
Key Fob Access
Access Control
identification
For access control to be effective, it must provide some way to identify an individual.
Authenticatoin
Identification requires authentication. This is the process of ensuring that the identity in use is authentic, that it's being used by the right person. Such as fingerprints, smartcards, and encryption keys.
Authorization
The set of actions allowed to a particular identity makes up the meat of authorization. On a computer, authorization typically takes the form of read, write, and execution permissions tied to a username.