{"id":434,"date":"2014-12-30T23:59:03","date_gmt":"2014-12-31T05:59:03","guid":{"rendered":"http:\/\/65.61.43.34\/?page_id=434"},"modified":"2020-02-13T10:40:05","modified_gmt":"2020-02-13T16:40:05","slug":"managed-access","status":"publish","type":"page","link":"https:\/\/www.innersecurity.com\/?page_id=434","title":{"rendered":"Managed Access"},"content":{"rendered":"<p><span style=\"color: #000000; font-family: Oxygen; font-size: large;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-987 size-medium\" src=\"https:\/\/www.innersecurity.com\/wp-content\/uploads\/CardAccess-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.innersecurity.com\/wp-content\/uploads\/CardAccess-300x200.jpg 300w, https:\/\/www.innersecurity.com\/wp-content\/uploads\/CardAccess-150x100.jpg 150w, https:\/\/www.innersecurity.com\/wp-content\/uploads\/CardAccess-450x300.jpg 450w, https:\/\/www.innersecurity.com\/wp-content\/uploads\/CardAccess.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Take control of access to your facility with a comprehensive managed access system. At Inner Security Systems, Inc., we offer systems that allow you to control access to every building, room and entry\/exit point in your facility. From protecting data and equipment to monitoring traffic in and out of work spaces, we have the technologies and expertise to design simple to highly complex access systems. <\/span><\/p>\n<p><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Our Central Station Monitoring Center is staffed 24\/7 with industry veterans trained to recognize and react to any type of alarm or issue. We can install hardware anywhere in your facility, from a single entry point to card readers in every room. Hardware includes:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Keypads<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Card Readers<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Biometric Readers<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Electric Strikes<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Electromagnetic Locks<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Smart Card Technology<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">All of our systems are installed by licensed security industry professionals. Learn more about <a title=\"Know Your Contractor\" href=\"https:\/\/www.innersecurity.com\/?page_id=700\">what to look for<\/a> in a security systems contractor.<\/span><\/p>\n<p><span style=\"color: #000000; font-family: Oxygen; font-size: large;\">Contact us by <a title=\"Contact Us\" href=\"https:\/\/www.innersecurity.com\/?page_id=1940\">email<\/a> or call 630-554-7878 today for a free security assessment!<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Take control of access to your facility with a comprehensive managed access system. At Inner Security Systems, Inc., we offer systems that allow you to control access to every building, room and entry\/exit point in your facility. From protecting data and equipment to monitoring traffic in and out of work spaces, we have the technologies [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-434","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=434"}],"version-history":[{"count":22,"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/434\/revisions"}],"predecessor-version":[{"id":1972,"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/434\/revisions\/1972"}],"wp:attachment":[{"href":"https:\/\/www.innersecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}