Access Control


Key Features



Regulate which doors a cardholder may pass through on a particular day. Every combination of access permissions in operation at your premises will need a corresponding Access Pattern. Later these patterns will be combined into the Site Access Group. The Access Pattern is limited to the door releases found in a single site. Access to each door release can be granted or denied. Additional permissions, such as the requirement for a PIN number or biometric verification can be applied separately to each door. Security permissions may be varied throughout the day. To facilitate the configuration of access patterns, selected “generic” patterns can be used as templates for new patterns with additional required doors being added to those contained in the template pattern.


Control doors, gates, barriers and turnstiles, using GGC's advanced contactless Smart Cards, Biometrics and Automatic Number Plate Recognition. The security status of each access point is controlled by the Smart Card scanner settings associated to that particular access point. These settings determine the locked status of the door, minute-by-minute, 24 hours a day, 7 days a week throughout the year.


All events occurring at the T8526 Intelligent IP Access Controller can be reported upon. Reports are based upon an easy wizard design tool, helping you explore a variety of different reporting options. Reports may be printed, saved to a variety of file formats or emailed to recipients. Each report can be fully customised and professionally designed using the ‘Report Designer Module’, which allows you to alter every aspect of the report layout. This feature allows you to design your reports with your own company logos, fonts and colours, giving your reports a real personalised look.


When a person attempts to pass through an access point, the T8526 Access Controller compares the individual’s security profile with that of the access point. Security profiles are based upon the day, time of day, and the security threat level of the attempted access.


Displays access control activity in real-time through a graphical interface. Access viewer animations show this activity on a floor plan of your site that is created using the Access Viewer Designer module. Pop-ups provide cardholder details such as the person’s photo, name and access event.


Door monitoring is a key component of the Access Control system. The door sensors detect when a door has been left open beyond configured parameters. In this situation a local alarm can be sounded until the door is closed or alert notifications emailed to named recipients. Alarms and alerts are also triggered if a door is forced open or an anti-tamper sensor contact is broken by unauthorised equipment removal.


Alert notifications are highlighted for further investigation. Doors can also be remotely opened from the Access Viewer console.


Cardholder access can be further controlled by the “limit by status” facility. Limit by status will only grant access if the cardholder satisfies the status requirement (i.e. an employee cannot clock into work if they have not scanned the entrance barrier to arrive on site). In addition, PC access can be linked to the Access Control system via a Single Sign On module to inhibit PC access if a user has not scanned their smart card to gain access to the building.


As well as contactless Access control, GGC offer mechanical access control equipment. Either simple but strong push buttons or secure, monitored emergency break glasses. These products can be integrated with contactless Access Control or work stand-alone.


In addition, GGC can also provide Badge Designing software, which gives you an easy way to professionally produce your own printed ID cards.


Video clips, retrieved from CCTV cameras, associated with access control activity are available when CCTV is integrated with the .NET. Cameras are allocated to location entries created in .NET. Locations are then linked to smart card scanners or push buttons in the Hardware Manager. Multiple cameras can be allocated to the same location, or multiple locations can be assigned to the same camera. Lock sensors are connected directly to the CCTV’s DVR. As a lock is released, an alarm event triggers the recording of video footage for the event. This footage is then available for playback in the .NET, either by location or as a link in an access control report. Screen displays are provided to report upon access events, including links to play the related video clip.


The appearance of .NET Access is highly customisable. 20 different desktop themes are provided to allow colour-coding of the application. System information is displayed on tabbed pages; these may be dragged and docked to form a wide variety of screen formats. This is useful when comparing several sets of information. Each user’s customisations are saved separately under different login details.


For safety reasons, exit access points can be set to use an “exit all areas” rule. In this situation, presenting a valid card will open a door, regardless of the cardholder’s specific permissions.


GGC’s gates, barriers, and turnstiles fully integrate with our Smart Card and biometric Access Control systems giving you full jurisdiction over movement and access of personnel and vehicles in and around your site.

The key role of gates and barriers is to prevent unauthorised access whilst providing minimum inconvenience to those who do have authorised access to your site.

A GGC system allows rapid communication when any delay occurs, such as when unauthorised personnel attempt to access a restricted area. Peak period congestion is thus avoided ensuring maximum flow capacity.

A GGC system can stop vehicles or personnel at the relevant barrier and prevent entry or exit, until they identify themselves via their Smart Card, biometric fingerprint or facial template.. The system gives full control over who is allowed access through any controlled point at any time of the day.


The T8526 can control up to two printers for evacuation reporting purposes. On activation of a fire alarm panel, automatic roll-call reports are printed listing the names and departments of cardholders who remain on-site. In addition, doors can be configured to open automatically on fire alarm activation and lock automatically once the fire alarm activation condition has ceased.

Reports can be grouped by a cardholder’s default resident fire point or by the fire point that they are currently booked on to. Printers are connected either via a direct cable connection or by direct IP and can be limited to reporting upon specific zones or fire points. Muster points can also be installed where cardholders scan upon arrival at a Muster point. In real-time, .NET Access removes the cardholder from the fire roll-call report to provide a real-time roll call of any cardholders who remain in the building.


Modifications and program enhancements are quickly downloaded to the T8526 Intelligent IP Door Controllers and the smart card readers, as flash file upgrades.


All user activity, whilst logged in to .NET Access, is recorded for audit purposes; records are saved to show the information both before and after changes.


Installed access control equipment is displayed in a graphical hierarchy. New components can be easily added and configured using wizards.


To facilitate the entry of cardholder information, new starters can be imported into .NET Access directly from your company’s Microsoft Active Directory™ or 3rd party system.


  • Easy install: Magnetic locks are generally easier to install than other locks since there are no interconnecting parts.
  • Quick Magnetic locks unlock instantly when the power is cut, allowing for quick release in comparison to other locks.
  • Sturdy: Magnetic locks may also suffer less damage from multiple blows than do conventional locks. If a magnetic lock is forced open with a crowbar, it will often do little or no damage to the door or lock.


Module can be used with .NET Access, to allow a company’s visitors to use cards to gain access to secured areas. MCVS allows you to book appointments for visitors and contractors, who on arrival can be provided with a physical access card. Visitors are assigned their access permissions as part of the book in process, which are automatically downloaded to all relevant T8526s. When a visitor is booked off site, their permissions are removed and the card is made available for the next visitor.


Company groups, parent companies and company sites allow for a lifelike representation of your company structure. Default access rules can be applied to the site, department and section organisational groupings; cardholders assigned to these groupings inherit the default rules automatically.


Access control permissions Defined in access patterns. Base pattern templates are a quick way of creating variants of a core pattern. The daily patterns are used to form groups (either Single or Multi-Site) and can be assigned to any individual in the business. Each daily pattern allows the administrator to control any door, at any time of the day. To allow the system to accommodate rapid changes, temporary access groups can be easily assigned to cardholders for specific periods.


An individual’s security profile is based upon their access group. People are assigned to an access group, either unique to them or common to their department or status. Access groups consist of separate rules for time of day, each day of the week, public holidays and shutdown days. These separate daily rules are known as access patterns. Access patterns dictate which areas a person can access at different times throughout the day. Employees who require access to different sites are assigned to “global” access groups that combine all site-specific permissions. Template rules simplify the creation of access rights for each person.


Using RF technology allows our contactless Smart Cards to be read through walls or glass. This means your security equipment can be hidden from view. This allows for unprecedented security and protects against vandalism and weather.

Should a card be lost or stolen, the card’s ID can be removed from the system. Email notifications can warn system administrators or security staff when access is attempted using a lost card. Unlike a key based system where locks would need to be replaced.

Alarms can be directly connected to the T8526 Access Controller. In the event of a fire alarm, all fail-safe doors will be automatically released for the duration of the emergency. Inhibitor alarms, such as gas or intruder alarms can be connected as well. When the inhibit alarm is activated, all doors are restricted to normal cardholders.

The Access Control system makes use of a lock’s sensors to detect when a door has been left open beyond a specified duration. The T8526 Access Controller unit will also detect when a door is forced open. Either of these circumstances can trigger a local alarm, connected to, and controlled by, the T8526. Additionally email alerts can be sent to any number of named recipients.

Anti tamper circuitry protects the integrity of the Access Controller, smart card scanners and break glasses. Any attempt to open or tamper with these devices will trigger a local alarm and notification email alerts.


Access to information within .NET Access is strictly controlled. System users are limited to only the menu options they are granted in their assigned role. System security permissions assigned to each user, also control which cardholders are visible in .NET to the logged in user. Depending upon these permissions, a person may be limited to “view only” access of a limited sub set of employees.



Our contactless Smart Cards could not be simpler to use. Just wave the card in front of the scanner. The RF technology allows the card to be read through a wallet, purse or handbag. Cards can be programmed to allow personnel or visitors different access rights. This negates the need for large bunches of keys.


For extra security, GGC has designed biometric fingerprint readers. Using this equipment is simple and only requires a user to scan a card, or place their finger on a sensor for verification. Combined with photo ID Smart Cards, this equipment provides high level security at an affordable price.


As an alternate to identity authentication by fingerprint, facial recognition verifies a person’s complete face before granting or denying access.


An Access Control system is modular and can adapt and grow as your company does. Installing new scanners and access points is simple. Whether you need scanners for a new supply store, barriers for a new car park, or turnstiles at a new site entrance.


Contactless Smart Cards are used to operate your Time & Attendance, Access Control and Visitor Monitoring Systems.

All Smart Cards and key fobs use the same well-proven and reliable RF (Radio Frequency) reading technology. This gives a consistent read range which is unaffected by most external conditions.

  • No battery, thus infinite life, and can be read an infinite number of times.
  • Unique Factory encoded ID code.
  • Adhesive labels for photo and company logo.
  • 34 billion different combinations of ID number.
  • Size of a standard credit card.
  • Unique printed and programmed ID number on each card.
  • RF Technology allows cards to work through wallet, purse or handbag.
  • Reads MiFare, iClass, DesFire & EM Smart Cards.


Each Smart Card reader transmits a 125 KHz frequency field (the electromagnetic field), which is picked up by an aerial in the Smart Card. The reader has two read bands within this field; an inner and outer band, and these are controlled and rapidly oscillated by the readers on-board microprocessor.

The Smart Card microchip is a passive device that holds a unique factory encoded ID number that cannot be duplicated, making it very secure indeed. As a Smart Card enters the reader’s electromagnetic field, it is automatically activated by the field’s energy.


To accommodate mislaid or forgotten cards, a temporary card facility is incorporated within .NET Access. Dedicated, temporary cards can be issued to any cardholder; these are “live” within two minutes of issue and inherit the person’s original permissions. Temporary cards expire after a set time, after which they are rejected at any access control point.


Cardholders can enter a special code to warn system administrators that access has been granted under duress. There is no difference to the reader response when the duress key is pressed but silent alarms and emails are triggered to warn of the entry under duress. Access is granted in the normal manner.