Search
Close this search box.
Access Control Systems

Access Control Systems

Throw away your keys and control access to your company or any building electronically. Try our IMAporter access control systems that are currently being used by the largest Czech companies, medical facilities, schools, universities, or even apartment buildings.

WHAT MAKES IMAPORTER ACCESS CONTROL SYSTEMS UNIQUE?
01

A solution that grows with you

IMAporter access control systems fully adapt to your evolving needs and requirements. You can start with a simple installation and gradually add more doors, objects, and connections to other systems.

02

Safety and reliability

Even when there is a power or Internet outage, our systems stay fully operational, nonetheless. Our readers support non-copyable identification media such as Mifare, DESFire, or Legic, and encrypted communication using the OSDP protocol.

03

Access by card, tag, or mobile phone

All our systems support traditional identification media as well as mobile identification via NFC or Bluetooth.

Combined ShapeCreated with Sketch.
04

Long-term support and service

Our systems are the product of more than 20 years of development and experience. We build long-term relationships with our customers and no installation is too big or small for us. We also carry out regular “preventative inspections” and provide our customers with a tailor-made service to suit their specific needs.

IMAporter: Which system to choose?

The main criteria for choosing:

01
Scope and complexity of installation.
02
Nature of systems you intend to connect the access control systems with.
03

Whether you are looking for a robust, tailor-made system that will be looked after by your IT department, or whether you will only have a single administrator.

IMAporter Basic

IMAporter Pro

Whichever system you choose, you can count on our  MobileAccess platform that allows you to use your mobile phone for entry.

How do our access control systems work?

Each of our access control systems consists of the basic components listed below. We can supply you with all the components of the system, and in the case of electronically operated locks, we can recommend proven manufacturers.

01

You use an identifier, such as a card or tag, at the entrance.

02

The terminal sends a query
to the control unit to verify whether
you are allowed to enter.

03

The control unit will check
your access rights and if everything is in order,
it will open the magnetic lock on the door.

04

The door opens,
and you are free to enter.

How is an access control system implemented in practice?

01

We will start by finding out what you require, what you expect, and what your budget is.

02

After that, we will check what other systems or applications you need to connect the access control system to.

03

We will conduct an on-site analysis.

04

Next, we will propose a solution and send you a price offer.

05

If you agree, we will get started: We will prepare all the necessary components.

06

We will install the access control system and bring it to life.

07

We will train your administrators and show them how to operate the system.

08

We will provide you with long-term service support.

FAQ

YES, in two ways.

  • First, you can use your mobile phone as an identifier, i.e. instead of a card, key fob, or remote control.
  • However, when it comes to smaller-scale installations, you can also use your mobile phone for system management, and you do not even need a PC.

YES, please, do write to us. We are happy to help you choose a system that will fit your specific needs.

Who are your access control systems suitable for?

We are confident that we cover the whole range of customers – from single-family homes through apartment buildings to multinational companies. See our references! It is just a matter of choosing the right option…

IMA systems are currently installed on a truly wide variety of door types. Basically, the door needs to be sufficiently functional and strong – that is all. If this requirement is met, the solution will be easy to find. All you need to do is reach out to us.

Due to open interfaces of third-party systems, we can integrate our systems into the customer’s environment virtually without any limitations. We can connect to HR systems, security systems, information systems at schools, or building management systems.

With us, service support during and even after warranty comes as standard.

Service contracts that keep the system in a state of never-ending warranty for several decades are also common.

More secure than traditional keys. There is end-to-end encrypted communication between the reader and the mobile phone. If the device is lost, access rights can be blocked remotely immediately.

Yes, they do. Our systems are installed together with backup power sources in case of power failure. The user database is stored and updated directly in the readers.

We can help you with your project

Or contact our specialist in this area directly.