Larco adds Guardian II access control system to product line

Featured Image

by Shane Henson — September 28, 2011—Facilities managers seeking to make their buildings and property more secure may find that Larco’s new Guardian II access control system helps to meet their needs. Larco, a supplier of safety, security and activation solutions, created Guardian II to allow users to easily control, update and know who has access to secure areas.

The Guardian II system is a stand-alone, non-networked solution that does not require connection to a central controller. Instead, the Guardian II controllers, located at each controlled access point, independently determine whether a user is authorized to enter. The system uses rugged, electronic memory keys to program controllers, identify users and retrieve audit-trail information. It consists of controllers installed at each access point, electronic user keys, admin keys and export keys, and an administrator kit.

Organizations can use the Guardian II system to control as few as one door or gate. Controllers are available in four models, each designed for a particular mounting type. The non-networked controllers only require a 9-12 volt power source—there are no communications cables to pull. FMs may find that this simplifies installation and reduces installation costs, especially in remote or challenging locations. The non-networked design also makes it easy to add additional controllers in the future.

In addition, fully encrypted user keys offer better security and more access control options than mechanical lock-and-key systems. Access to secure areas can be regulated by user ID, user group, access point, day, time and many other variables. Lost or stolen keys can be easily blocked using the administrative software, eliminating the cost of re-keying locks.

Just as important, the easy-to-use software allows for simple management and more flexibility than most other access control systems. Administrators can manage multiple controllers and locations from a single computer. In addition to providing control over access to secure areas, the software offers the ability to generate detailed reports from extensive audit-trail information stored on each controller and user key, giving administrators complete information regarding access and usage.