Contact 01 60 13 81 81

Contrôle d’accès

Le contrôle d’accès permet de déterminer qui, quand et où un individu est autorisé à entrer dans une zone ou non. L’objectif principal est de protéger les personnes, les biens et les données de l’entreprise des intrusions et actes de malveillance.

Home / Expertises / Electronic security / Access control

Access control: the key to security

Controlling entry and exit

An access control system limits entry to a site (physical control) or an IT system (logical control) to a certain number of identified people.

This filtering is possible both at the entrance and exit of a building and in the different areas of the site. It can be based on the identity of the person (employees, visitors, suppliers, etc.) and other criteria such as the time of day (all the time, at certain times of the day and/or night), etc.

  • Protect employees from malicious intrusion
  • Protect property and production tools (theft, fire)
  • Restrict access to sensitive or restricted premises
  • Know in real time all the people present on site to generate a list in the event of a fire or accident
  • Control time and movements for statistical purposes and security audits

* Whatever the purpose of access control, this system enables you to locate and identify a danger so you can react as quickly as possible and make the best decisions.

Need an access control system? Discover DEF Sûreté solutions

Contact us

How does an access control system work

There are currently four categories of access control system: compulsory (applies to everyone), discretionary (certain people have specific authorisations at the administrator’s discretion), based on people’s roles and based on rules defined by the administrator.

If we are thinking more specifically of keys, badges or even security guards to screen passers-by, there are several possible technologies:

  • Badge
  • Code keypad
  • Magnetic key
  • Biometric reader
  • Video doorphone/intercom
  • Opening by QR code
  • Use of smartphone
  • Opening system via Bluetooth
  • RFID chip (radio frequency identification)
  • Rising barriers
  • Turnstiles

3 control stages for opening doors

An access control system has three stages:

  • Authentication: when a user presents their badge (or any other form of identification), the system compares the proof of identity with its database.
  • Authorisation: the system checks whether the person has the necessary rights to access the requested area and, if so, grants entry authorisation.
  • Traceability: as each access request is recorded, the system can track people’s movements within the company.

Obligations et normes

Access control obligations and standard

Installing an access control system is compulsory for Operators of Vital Importance (OIV) and the agri-food sector (subject to the IFS Food standard). For other sectors, the installation of access control is a matter for the head of the establishment to decide.

In all cases, access control is one of the most important security measures in a building. It is recommended in sensitive areas such as education, finance and banking, energy, data centres, healthcare, etc.

The law and regulation

Access control systems are governed by a number of legal texts…

  • Code du Travail (Articles L 120-2, L121-8 and L 432-2-1- and Code Civil (article 9)
  • Through the European RGPD text, the CNIL provides a framework for the main data processing and retention rules.

… but also guidelines for use…

… as well as standards.

Access control for your home in 5 steps

When it comes to access control systems, there are as many solutions as there are requirements. Because every situation is different, depending on the sector, regulatory requirements and customer expectations, the system is installed in 5 stages, allowing for tailor-made solutions.

Diagnosis and risk analysis

  • Description of requirements, risk analysis and definition of intrusion scenarios, zoning, prioritisation of actions, definition of resources to be implemented.

Technical study and quotation

  • Drawing up specifications. Choice of equipment best suited to needs and budget. Proposal of a quotation.

Declaration to the CNIL

  • Before any implementation, a commitment to project compliance must be signed and a favourable opinion obtained from the CNIL.In the case of biometric access control, a data protection impact analysis (PIA) and a specific request for authorisation are required.

Installation

  • Design of the solution in the workshop. Installation of equipment and commissioning. User training.

Maintenance

  • Preventive and corrective maintenance by a qualified and certified service provider. Remote or on-site troubleshooting.

DEF Sûreté, your DEF Network access control exper

DEF Sûreté has been specialising in the installation and maintenance of electronic security systems for over 30 years. We can support you with a simple access control system (single-site) or a complex centralised system (multi-site).

DEF Sûreté masters the solutions of the main manufacturers on the market and the most widespread reading technologies (MIFARE, DESFire, SEOS, etc.). Thanks to this multi-brand approach and our proven expertise in locksmithing, we can offer comprehensive solutions tailored to everyone’s needs and problems.


To find out more about this expertise in other countries, click here.

Multi-expertise solutions from the DEF Network A global vision of fire safety for your project

More information