Facial, eye, fingerprint, key, or token knowledge are some of the technologies that our access systems allow to manage, increasing the security of users and with access to databases to check schedules, such as peak hours, employee entry and exit and so on. 100% accuracy in intrusion alarms that can be programmed to be combined with the camera system and make the intrusion detection system more efficient and secure.