Access Control Systems

Our Solution:

Modular Access Control and Door Access Control Systems for Enhanced Business Security

Contact us for your FREE no obligation access control recommendations
We retain the information you supply to us solely in order to deal with your query. We do not share your data outside of Touchstar and we do not use it for marketing purposes.

Access Control
home > Access Control

Security and Safeguarding for the World Around You

Take control of your building’s security with TouchStar’ s leading Access Control Systems.

In today's rapidly evolving world, securing your business premises and assets has never been more critical. TouchStar’s Access Control Systems offer an end-to-end solution to meet all these security needs and more.

Our modular access control systems offers flexibility and scalability, making it suitable for both single-site and multi-site facilities. Whether you're a small business or a large organisation, we offer cost effective solutions that can adapt to your needs.

Evolution Access Control Software

Managing access rights and security has never been easier with our Evolution Access Control Software. Our integrated solution ensures that you remain in control, whether you're on-site or managing access remotely.

Evolution Access Control Software

Cutting-Edge Access Control Hardware

Our access control systems integrate seamlessly with cutting-edge physical security solutions, including door access control systems, turnstiles, gates, biometric readers, exit buttons, monitors, intercoms, and more. At TouchStar, we partner with leading security hardware providers including IEVO, Salto and Abloy so you can have full confidence in your system's reliability.

TouchStar Access Control Hardware
Door access systems
Gates
Turnstiles
Biometric readers
Exit buttons
Monitors
Intercoms

Hidden Access Control Systems

For a discreet approach to access control, consider our hidden access control technology. It includes PIR sensors, door detectors, speed gates, door pass-through systems, and access to CCTV analytics.

TouchStar Hidden Access Control Systems
Speed gates
Door pass-through systems
Pir sensor integrations
Optical turnstiles
Door detectors
CCTV integration

EvoLink Middleware

TouchStar EvoLink Middleware Logo

Our EvoLink middleware offers flexibility, scalability, and reliability. It facilitates data sourcing and processing from third-party systems like HR and payroll, streamlining your operations.

Middleware

Access Control Peripherals

Alongside our core access control systems, we provide a range of peripherals and accessories, including smart ID card printers, lanyards, and badge holders. These additional elements enhance your access control experience.

TouchStar Access Control peripherals

Comprehensive Controlled Access System Support – Find out more

From innovative system integrations to legacy system upgrades, we offer a complete end to end management service from specification through to project management, implementation, and post-sales support. Over our 30-year history we have built long term relationships with our users based around our end-to-end partnership led approach.

Find out how we can help. UK Based Access Control Systems Support   circle-arrow-right

What our customers say

Testimonials

The overall system upgrade has made a significant difference. The user friendliness of the system has increased efficiency and reduced the resource and overall costs required to manage the system. TouchStar worked closely with us throughout the whole upgrade process helping us overcome the challenges of exporting the data into the new system. The result was a smooth implementation and rollout of the new solution.

CUSHMAN AND WAKEFIELD

Access Control Systems - Frequently asked questions

  • WHAT ARE ACCESS CONTROL SYSTEMS AND HOW DO THEY ENHANCE SECURITY?
    ctrl-down

    Access Control is a measure that regulates secure access to your building, premises, or commercially sensitive areas of an operation. It allows you to restrict access based on time or individual permissions, effectively managing employee and visitor access across multiple sites.
  • How does Access Control work?
    ctrl-down

    Access Control Systems typically use a combination of hardware and software to control access rights. The hardware may include door locks, card readers, keypads, barriers and turnstiles. The software is used to manage access permissions and track who has entered or exited the building. It’s often a simple solution, but it performs the vital task of safely controlling entry to sensitive, restricted, or dangerous locations. Access Control can be used within many commercial settings such as manufacturing facilities, commercial buildings, schools, educational campuses, leisure stadiums, amusement parks, retail shopping outlets and many more. Each setting will have different security needs, so it is important to understand these and the key role that access control plays in addressing potential risks and vulnerabilities.

  • What are the benefits of Access Control?
    ctrl-down

    There are many benefits to using an Access Control System. These include:

    • Increased Security: Access Control Systems can help to prevent unauthorised access to your building or facility.
    • Improved Efficiency: Access Control Systems can help to streamline access to your building or facility, making it easier for employees and visitors to get where they need to go.
    • Improved Accountability: These systems keep a detailed record of who accessed specific areas and at what times. This creates an audit trail that can be useful for investigations, identifying security breaches, or monitoring employee attendance.
    • Flexibility and Scalability: Access Control Systems can be tailored to the specific needs of an organisation. They offer flexibility in managing different access levels for various areas and can easily accommodate changes in personnel or access requirements as the organisation grows or changes.
  • CAN ACCESS CONTROL SYSTEMS WORK WITH OTHER BUSINESS SYSTEMS?
    ctrl-down

    Yes, many access control systems can be integrated with other solutions such as cameras, time and attendance, visitor management, and more.

    TouchStar’s systems can be integrated both with other existing systems and are also supported by other third-party applications through HTTPS protocols or Virtual LANs.

  • What is biometric access control?
    ctrl-down

    Biometric access control is a developing technology that relies on human characteristics like fingerprint scanning and facial recognition to work alongside or replace, traditional means of access.

    The advantages of biometrics are pushing the technology forward rapidly. For example, with cards, codes or PINs you can never be completely certain of who has access to the card or who uses the code to gain entry. With biometrics you can be certain that only the intended user is given access, resulting in reduced loss and increased accountability.

    You can find out more about biometric access control here.

  • Can I use a smartphone for access control?
    ctrl-down

    Some access control systems do allow for mobile phones to be used for access control, using Bluetooth or NFC, and they work in the same way as other access control solutions by restricting access to specific areas.

  • Can existing cards be used on a new system?
    ctrl-down

    With existing cards, it often depends on who owns the system. This is because access cards can have either an open or closed protocol, which can limit accessibility. In most situations, there is no need to change or reissue your existing employee ID badges for workforce access.

    At TouchStar, we specialise in an open protocol because it gives our customers the power to buy their own cards. We can supply cards, but we don’t want our users to be forced to choose them purely because they are locked into our system. Our system is designed to let employees use the same badges for identification, time & attendance, access control, and other applications.

    If you’d like to find out if your existing cards are compatible with our readers, contact us for advice.

  • Does everything already in place need replacing?
    ctrl-down

    No. Anything on or around the access point can usually be kept in place. The main changes will be in the software and the controller. Some locks may need to be changed to comply with the latest BS EN standards which can be looked at separately.

  • Can an access control card be used for other applications?
    ctrl-down

    Yes, access cards can be used for other functions. The most common choice is to include the ability for the access control card to work with cashless vending solutions. But other options are available, such as using access cards to operate warehouse vehicles like forklift trucks.

    If you have a question about another application, please contact us for advice.

  • What happens if an access card is lost or stolen?
    ctrl-down

    The most important thing is that the cardholder reports the card lost. Once this has happened, the card can be rendered useless by having access revoked in the central database. The access control system will also be able to tell if and where the card has been used to attempt to gain access since it had been lost.

  • Can access cards be used at more than one location?
    ctrl-down

    Yes, they can. Many organisations work across several sites and this can lead to the unnecessary accumulation of access cards given to staff, who then have the job of carrying around a handful of cards. But with some smart planning, it is possible to have multiple locations on one access control system and access control card.

    This also cuts down on admin and removes confusion around card scanning, as when multiple cards are kept in one wallet and touched to an access point it can confuse the system and slow down access. Again, a single card solves this problem.

  • Can I create temporary/guest passes?
    ctrl-down

    Yes, it’s possible for some systems to create temporary passes and attach limits so, for example, the pass will expire after a certain amount of time or on a certain date, and only allow access to specific areas.

    Here at TouchStar, our solution gives you the flexibility to create temporary access as required by the business.

  • Can cards be personalised?
    ctrl-down

    Yes, cards are usually personalised with a photo of the user so that they double up as an ID badge. Visitors can also be assigned numbered badges to ensure they are visible and have the correct access for the right amount of time.

  • Can I manage/edit an access card’s details/privileges remotely? And will changes be instant?
    ctrl-down

    Yes, with the right software and network connection it’s possible to manage access remotely. If all parameters of the access control system are stored on a centrally managed database, they can be accessed from any computer – as long as it’s connected to the network.

    No matter the size of the organisation, TouchStar’s Microtrak software puts the power of control in the hands of the user with clear, simple to use screens that provide an intuitive understanding of the application.

    If you have specific requests, please contact us for more information.

  • Can I create regular usage reports?
    ctrl-down

    Yes, reports can be autogenerated and delivered at regular intervals.

  • What about article 8 of the human rights act?
    ctrl-down

    If you’re planning to use CCTV in conjunction with an access control system, you need to be aware of your responsibilities under the Human Rights Act 1998, and more specifically Article 8 – A right to privacy.

    You can find out more about Article 8 here or contact us for advice.

    If you’re unsure if Article 8 applies to you, you can take an online self-assessment and register your CCTV solution with the ICO here.

  • Do access control systems work when there is a power cut?
    ctrl-down

    Yes, if your site’s power goes out, your access control system will still operate provided it has a battery backup plan in place. However, if you do not have a backup power system, your access control solution will fail.

    As a National Security Inspectorate (NSI) Gold accredited company, here at TouchStar we ensure all of our security systems adhere to the strict UK standards, including ensuring your system is reliable during a power outage.

  • What sort of access control does my business need?
    ctrl-down

    Every business has a different set of needs from their access control, depending on their sector and business size. It’s important to do a full review of your needs before investing, and ensure any solution you choose is flexible and able to grow with your business.

    At TouchStar, our modular solution provides a complete and integrated solution that is designed to fit companies of all sizes and is scalable to grow with the company.

  • What is cloud-based access control?
    ctrl-down

    Cloud-based access control is the process of managing access to your system from anywhere as your data is hosted in an off-site data centre. It offers a high level of security and simplicity by reducing the workload on internal resources but it depends on the needs of the business if this is the best solution.

Quick Contact


We retain the information you supply to us solely in order to deal with your query. We do not share your data outside of TouchStar Technologies and we do not use it for marketing purposes.

Please confirm to continue…