L o a d i n g
shape
shape
shape
image image
icon FACES2

Access Control

Secure your facility, streamline building access, and monitor who goes where—all in one comprehensive system. Whether you need a simple keycard solution or advanced biometrics, we’ve got you covered.

Key Benefits

Enhanced Security

  • Control and monitor access to sensitive areas, preventing unauthorized entry.

Scalability

  • Easily add new doors or entry points as your organization expands.

Easy Management

  • Use a centralized dashboard to grant or revoke access credentials with just a few clicks.

Detailed Reporting

  • Track both visitor and employee movements for better operational insights and compliance.

System Features

Multiple Credential Types

  • Our readers accept keycards, fobs, and NFC/BLE mobile credentials.

Real-Time Alerts

  • Receive immediate notifications for unauthorized access attempts or forced entries.

Visitor Management

  • Issue temporary passes for guests, contractors, or deliveries—ensuring controlled, time-limited access.

Integration Ready

  • Connect seamlessly with alarms, surveillance, or building automation systems.
icon FACES2 Readers

Access Control Readers

Choose the reader that fits your environment without compromising security. Our lineup spans wired models for maximum credential flexibility, wireless units for quick, cable-free deployment, and full-featured video intercom stations that combine access control with visitor engagement. No matter which you select, each device integrates seamlessly with FACES2 for consistent management and real-time monitoring across your entire facility.

image

Wired

Wired

Supports a wide range of credentials, including PIN, QR code, smart card, smartwatch, and mobile phone. Features a weather sealed housing for indoor and outdoor operation.

image

Wireless

Wireless

Wire-free installation with long-life batteries. Authenticate via smart card, smartwatch, or mobile phone.

image

Intercom

Intercom

Includes every authentication option offered by our readers plus adds HD video calling, face-match verification with liveness check, and on-screen health questionnaires for seamless visitor screening.

icon FACES2 Readers

Authentication Methods

Flexibility is at the core of our access control platform. From biometrics to mobile credentials, you can mix and match the methods below to balance convenience with security, tailor authentication to each user group, and meet evolving compliance requirements, all managed through one unified system.

icon

Face ID

icon

PIN Code

icon

QR Code

icon

Smart Card

icon

Palm ID

icon

Plate ID

icon

Smart Watch

icon

Mobile Phone

icon FACES2

Controllers

Controller 1
F2 Controller

High-performance access controller for managing doors, readers, and system integration at enterprise scale.

Learn More
Controller 2
Mini Controller

Compact and efficient device for handling small-scale access control with full feature compatibility.

Learn More
Controller 3
8 & 16 Port RS-485 Hub

Expand your setup by connecting up to 16 RS-485 devices for streamlined control and communication.

Learn More
Controller 4
F2 Matter Repeater

Extend coverage and boost reliability for Matter devices across larger spaces with seamless and secure connectivity.

Learn More
icon FACES2 Access Cards

Smart Cards

Our platform supports multiple smart card options to match your security and compatibility needs, whether you’re reading the legacy credentials your staff already carry or deploying advanced NTAG DesFire and JCOP cards with strong encryption. Whatever you choose, each card type integrates seamlessly with FACES2 to deliver fast, reliable and secure authentication.

image

Legacy

Client Supplied Card

With our unique design and controller decryption, we can read most client legacy access cards, ensuring seamless integration with existing legacy systems.

image

NTAG/DesFire

NTAG/DesFire Card

Advanced security with AES-128 encryption, secure messaging, and rapid transaction speeds, ensuring robust data protection, reliability, and operational efficiency.

image

JCOP

JCOP Card

Dual interface Java cards with advanced cryptography, enhanced encryption, and robust anti-tampering mechanisms for secure data storage and communication.

image
icon faces2

Custom Solutions & API Integration

Every facility has distinct security requirements. We work alongside you to build a solution that fits precisely, whether you are protecting a single office door or deploying a large-scale, multi-site network. Choose on-premises, cloud, or hybrid hosting, and connect our platform to your existing applications through a fully documented API for seamless data exchange and centralized management.

shape
shape
GET IN TOUCH

We Take Care of Your
Technology

get A Quote