TESA Security

~/link/d4d4ac58f3d042f9b53083c5308fa020.jpg

When it comes to security, solidity can save many lives. With TESA’s range, we bring you the best in mechanical and electronic security.

1. Key protection
Unlike other manufacturers, TESA systems feature patents not only in their cylinders but also in the keys. On the one hand, security and protection are provided by the fact that it is very difficult to duplicate a key of which no original, unmonitored copy exists in the market; on the other hand, by the technical complexity derived from reproducing the patented mobile devices that come with TESA’s maximum security keys.

2. Resistance of the cylinder
Very often, it is wrongly assumed that a higher number of pins in the cylinder equals higher security. While this actually provides a higher combinatory ability, which is particularly useful for complex masterkeyings, protection against the most frequent ways of tampering (drill, breakage, extraction) is only achieved by reinforcing the internal structure of the cylinder.
The security escutcheon is a vital component for the protection of the cylinder against direct attacks.

3. The cylinder’s combinatory ability
Combinatory ability is particularly useful when attempting to masterkey the cylinder (masterkeying: the arranging of doors and users in order to manage who is able to access where). The more the combinations, the higher the theoretical masterkeying ability will be. This is not the only way to measure this ability; other factors that must be taken into account are the number of users, doors and hierarchies, as well as the masterkeying’s degree of complexity.

4. Electronic access control
In a mechanical environment, the masterkeying of cylinders provides door and user management in order to decide who is able to access where. Electronics add the time factor: Control. Who is able to access where temporally. Authorizations are granted with higher detail: who, where, when an individual is able to access. This masterkeying is more flexible than the mechanical one because permissions, denials and modifications of access rights can be performed without changing neither cylinders nor credentials (keys, cards, etc.).
Depending on the required degree of security, you can choose anything from a standalone system to an online system that provides information wirelessly, by means of a virtual network, allowing you to instantly modify the status of each access.