Security issues corresponding to controlling access, is perceived as prime concern and a strenuous challenge in various sectors like corporate office, manufacturing units, BFSI, healthcare and hotels. These arduous challenges require meticulously planned access control strategies. Implementation of such strategies can be employed at exit/entry doors and at data centers. Along with the conventional approach, it is being enhanced with advanced features, to control access and improve security with elevators.

Matrix offers Elevator based Access Control, which allows access and entry in the elevator using biometric or RFID card credential, only to authorised personnel, at allotted time and assigned floors.

Key Features:

  • Controlled access for 32 floors in one elevator
  • Multiple credential based identification
  • Time, user and floor based access control
  • Seamless third party hardware integration
  • QR code based identification
  • Secured end to end communication
  • Multiple communication interface 
Download PDF version Download PDF version

In case you missed it

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

What are the benefits, and drawbacks, of AI in security?
What are the benefits, and drawbacks, of AI in security?

Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthrou...

ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety
ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety

Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is...