Contact Us Today 416-256-6666 
Share On:
  • 1
  • 1

Access Control

  • Today, with over 76% of Canadians carrying smartphones with them wherever they go, smartphones present a great opportunity to make your access control system more convenient and more secure. Smartphones can now be used to replace your traditional key card or fob access control credentials -- so your users never need to worry about carrying around their card or fob. Mobile Access Credentials SmallWith mobile credentials, it's also easier than ever to manage your user setup, tracking, and guest registration for your access control system -- whether it's ICT Protege, C-CURE 9000, or another access control system.

    The technology itself is equally or, in some cases, more secure than top-of-the-line encrypted key fobs and cards. But, users are often less likely to lose their smartphone than their key fob -- and if they do, mobile credentials are protected by a PIN -- keeping your building more secure.

    For many access control systems, it's simple to start rolling out mobile credentials while simultaneously continuing to use key fobs and cards.

    Please Contact us for more information or if you are interested in discussing a solution for your business' security.


  • In business for 39 years, Bond Securcom has provided innovative security products and services to a wide range of organizations in need of effective solutions to ever-changing security needs. We'd like to keep you up to date with current industry trends and issues.

    copyable access control fobs1

    Recently, people have discovered ways of copying some access control key fobs and cards. This presents a problem for businesses who aim to control access to their building for individuals, especially for shared areas such as parking lots and condominium amenities.

    As it becomes increasingly easier to duplicate these cards, it's important to understand which access control systems are affected, and what you can do about it. The vulnerability lies in cards that are unencrypted and/or where patents have expired. If you use these credentials, and you are concerned about this issue, the simplest solution is to upgrade to encrypted formats.

    Please Contact us for more information or if you are interested in discussing a solution for your business.


  • Electronic Cylinder with SALTO Card Reader for Access Control System

    As RFID and networking technologies develop, Bond Securcom can equip you with a world class, keyless and future-proof access control system that delivers substantial benefits: SALTO virtual networks and the data-on-card system provide a great opportunity to make access control systems more secure, affordable, efficient, and easy to manage.

    For customers with existing access control systems, SALTO can secure access points that were previously very difficult and costly to secure. A padlock on a gate or shed? A remote location with no security room? An equipment cabinet with a key-lock?
    SALTO's wireless, battery-powered card readers can replace the existing cylinder of any keyed door-lock to enable access control with your central access control system-- with no new wiring required!

    SALTO gives you the ability to control all your access needs and secure all your doors without the need for complex and expensive wiring, providing total control over who is able to access what, where and when at all times. 

    Salto Locks and Card Readers Showcase for SALTO access control system - padlock, cylinder, standardThe SALTO Virtual Network (SVN) provides the flexibility for an access control system to grow from to any number of doors and users as required - for half the price of other solutions, in half the time. It allows stand-alone locks to read, receive and write information via an encrypted and secure data-on-card system -- so updating software and user permission databases is much less time-consuming for security managers.

    SALTO access control solutions work based on the integration of both wired and wireless card readers. When an update is applied remotely by a security manager, it is automatically updated on wired readers located at major through-points such as elevators, stairwells, entrances, and amenities. Then, when users tap their card or fob at these wired readers, they download the updated information from the reader. When they later tap a wireless reader, they upload the update to the reader. In this way, information travels to and from wireless readers dynamically and effortlessly. These smartcards also store and transport other data -- such as an audit trail of events for each reader, battery status reports for wireless readers, and user calendars or shifts.

    Bond Securcom can provide you with the right data-on-card access control solution for your business -- or many other high-end products including SALTO, ICT Protégé, C-CURE 9000, or Avigilon access control systems. Please give us a call if you are interested in discussing a solution for your business.

  • Video analytics, or video content analysis, is the capability of automatically analyzing video through the use of software to detect and determine events, while providing information related to the events taking place in real time.

    Avigilon Video Analytics

    Bond Securcom has selected products by Avigilon, a leading manufacturer of preventative protection technology, when the solution calls for high quality HD CCTV cameras and video analytics at a customer site. Whether it be a high-rise residential, commercial, industrial, or retail site, the applications can be implemented across a wide array of environments.

    "So how does it work?", you may ask. It’s just as simple as selecting an individual, item, or event, just by clicking on it like you would on a website link and say, “Show me all the instances of that event across all my camersidential, commercial, industrial, or retail site, the applications can be implemented across a wide array of environments.

     Securing multi-site areas with guards is expensive, and security personnel can’t be everywhere all the time. Video analytics solutions can monitor an area 24/7/365 - and will not look the wrong way or even blink, so you can get peace of mind with your existing system knowing you're covered all the distributed over my site.”

    Through the use of high definition video analytics, pattern-based analytics algorithms and teach by example capabilities. The amount of time and resources required to investigate will be reduced. By that very nature, you don’t have to review events after the fact, and you can be proactive.

    Contact us if you would like more information or would like to speak with a consultant to help protect your site using video analytics.