Background
Our esteemed client, a distinguished and autonomous Indian media conglomerate, was instituted in the year 2007. The organization has cultivated an extensive network of diverse channels and content production studios across India. Presently, it boasts a formidable workforce exceeding 2,500 professionals nationwide, steadfastly catering to the dynamic landscape of the media and entertainment industry with unwavering excellence.
Challenges
This client sought an advanced access control system for their office located in Lower Parel, Mumbai, encompassing 118 access points. They aimed for a seamless, high-tech solution with a one-time investment. Their goal was to limit visitor access to specific sections of the office.
As a prominent media organization, they required enhanced security measures and desired a system that could verify visitor credentials discreetly. The office featured multiple critical areas, each necessitating different levels of security.
Solution
• We mapped their entire office and divided them into zones based on their criticality.
• We then designed a solution with varied security levels that can be controlled by designated employees only.
• Based on the design, we implemented the most sophisticated and fool-proof face recognition system that is impervious to deception.
• We implemented multi-door controllers and standalone controller depending on the security zones within office premises.
• A robust and scalable access control software currently managing up to 5,000 users was installed and all readers and controllers were connected.
• Additionally, the access control software was integrated with the visitor management system via dedicated APIs, optimizing visitor access processes.
• For visitors, we provided an access control system with QR code scanner in our readers.
• This solved two problems for the clients:
- Reduced ongoing expenses and the operational burden of handling and replacing Visitor cards.
2. Unique QR code was autogenerated through the system and sent to the visitor’s email Id and mobile number thereby authenticating his/her contact details.
Outcome
• Only authorized employees were given access depending on the assigned security zones.
• They were able to map the movement of the employees and arrest attempt of tailgating and piggybacking.
• They managed to authenticate visitor’s data discreetly while impressing them with a sophisticated QR code based entry systems.
• They produced data on employee movement categorized by individual employees and controllers, and were also able to report on visitor movement within the premises, including the average duration of visitors’ stay.
• Furthermore, the system exhibits an inherent scalability, effortlessly accommodating the incorporation of additional requirements with utmost precision and efficiency.