<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Useful Info &#8211; Vigilance Fingerprint Time Attendance System</title>
	<atom:link href="http://www.vigilance.com.my/category/useful-info/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vigilance.com.my</link>
	<description>Security at your fingertips</description>
	<lastBuildDate>Thu, 27 Aug 2020 01:44:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.15</generator>
<site xmlns="com-wordpress:feed-additions:1">99953358</site>	<item>
		<title>6 Reasons Your Facility Needs a Barrier Gate System</title>
		<link>http://www.vigilance.com.my/reasons-your-facility-needs-a-barrier-gate-system/</link>
		<pubDate>Thu, 27 Aug 2020 01:44:16 +0000</pubDate>
		<dc:creator><![CDATA[haiza]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>
		<category><![CDATA[barrier gate]]></category>
		<category><![CDATA[barrier gate system]]></category>
		<category><![CDATA[boom gate]]></category>
		<category><![CDATA[flap barrier gate]]></category>
		<category><![CDATA[gate access system]]></category>
		<category><![CDATA[metal detector]]></category>
		<category><![CDATA[security system]]></category>
		<category><![CDATA[turnstile gate]]></category>

		<guid isPermaLink="false">http://www.vigilance.com.my/?p=12078</guid>
		<description><![CDATA[<p>6 Benefits of a Barrier Gate System A barrier gate can do wonders for your facility&#8217;s security There are many types of security systems but a barrier gate acts as your first line of protection. So if you have your own premises to take care of, you will definitely need an entrance gate system for [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/reasons-your-facility-needs-a-barrier-gate-system/">6 Reasons Your Facility Needs a Barrier Gate System</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2>6 Benefits of a Barrier Gate System</h2>
<blockquote><p><span style="font-size: 14pt;">A barrier gate can do wonders for your facility&#8217;s security</span></p></blockquote>
<p>There are many types of <strong>security systems</strong> but a barrier gate acts as your first line of protection.</p>
<p>So if you have your own premises to take care of, you will definitely need an<strong> entrance gate system</strong> for maximum security.</p>
<p>If you&#8217;re not convinced, here is a list of the <strong>benefits of a barrier gate system</strong> for your property. <span id="more-12078"></span></p>
<h2>What is barrier gate system?</h2>
<p>A <strong>barrier gate system</strong> is a system that grants security access for either vehicles and people before entering the premises. They can enhance security and privacy by automated monitoring of access.</p>
<p>Moreover, <strong>barrier gate systems</strong> can reduce the possibility of human errors with the help of a controlled system. A security barrier gate is highly suitable for residential areas, car parks, shopping centers and office buildings.</p>
<h2>6 Reasons Your Facility Needs a Barrier Gate System</h2>
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01.jpg"><img data-attachment-id="12094" data-permalink="http://www.vigilance.com.my/reasons-your-facility-needs-a-barrier-gate-system/subheader-6-reasons-your-facility-needs-a-barrier-gate-system_01/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01.jpg" class="alignnone size-full wp-image-12094" src="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01.jpg" alt="6-reasons-your-facility-needs-a-barrier-gate-system" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_01-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2>Keeps your premises secure</h2>
<p>Usually, office buildings and residential areas have restricted access where only staff or authorized people can enter. Hence, you will need a<strong> gate barrier system</strong> to prevent any trespassers from accessing the building.</p>
<p>In the event that someone needs temporary access, they will have to provide relevant details to the security guard before given access. Thus, your premises will be safe and secure from any unauthorized entry before they come near your building.</p>
<hr />
<h2>An entrance gate can reduce traffic</h2>
<p>A <strong>gate access control system</strong> can help control traffic. This is because a <strong>gate barrier system</strong> allows a specific time interval between each vehicle or person. Thus, every entry and exit is more organized and controlled which can greatly help to save time and prevent possible disputes.</p>
<p>Shopping centers greatly benefit from an <strong>auto barrier gate system</strong> because you can integrate it into an entry/exit system. This can let people know the number of available parkings. So, they won&#8217;t have to drive around in circles which will create more traffic inside the parking area.</p>
<p><iframe src="https://www.youtube.com/embed/_1vJIHHNmrA" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<hr />
<h2>Barrier gate systems are cost-efficient</h2>
<p>Facilities without an <strong>entrance system</strong> such as a <a href="http://www.vigilance.com.my/shop/barrier-gate/straight-arm-barrier-gate-br-630/" target="_blank" rel="noopener">straight arm barrier gate </a>or a <a href="http://www.vigilance.com.my/shop/barrier-gate/semi-automatic-tripod-turnstile-tts351l-series/" target="_blank" rel="noopener">turnstile gate</a> will generally spend more on security. This is due to the monthly salaries for the security guards for 24/7 work.</p>
<p>Therefore, by purchasing a <strong>gate barrier system</strong>, you can considerably cut security costs with a one-time payment and infrequent maintenance. Now you can safely reduce the manpower for your security by applying an <strong>automated barrier gate system</strong>.</p>
<p>Suggested read: <a href="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/" target="_blank" rel="noopener">8 Types of Door Access Control Systems for Top Security</a></p>
<hr />
<h2>An adaptable security system</h2>
<p>Because of its automated features, a <strong>gate access control system</strong> is adaptable regardless of facility. They are easily programmed to suit every individual and vehicle.</p>
<p>All you need to do is to enter the required details in the system. Also, you can easily remove any person or vehicle from accessing the premises with a click of a button.</p>
<hr />
<h2>Reduce human errors with a barrier gate</h2>
<p>Since a <strong>gate barrier system</strong> is automated, you can significantly reduce any human errors that can happen accidentally. You can prevent forgetting to lock the gates, giving access to the wrong people or even neglect.</p>
<p>For example, in high-security areas, guards won&#8217;t have to pat down search every individual if they have a metal detector in place. This will not only protect their private space but also guards can detect any dangerous items from entering the premises.</p>
<hr />
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02.jpg"><img data-attachment-id="12095" data-permalink="http://www.vigilance.com.my/reasons-your-facility-needs-a-barrier-gate-system/subheader-6-reasons-your-facility-needs-a-barrier-gate-system_02/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02.jpg" class="alignnone size-full wp-image-12095" src="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02.jpg" alt="6-reasons-your-facility-needs-a-barrier-gate-system" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/08/Subheader-6-Reasons-Your-Facility-Needs-a-Barrier-Gate-System_02-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2>A system that enhances a facility&#8217;s prestige</h2>
<p>When you see a building with a <strong>barrier gate system</strong>, you feel that they are an esteemed establishment that prioritizes security. Without a <strong>gate access control system</strong>, people can come and go as they please.</p>
<p>Premises with an <strong>auto gate system</strong> such as a <a href="http://www.vigilance.com.my/shop/barrier-gate/flap-barrier-gate-flb-130/" target="_blank" rel="noopener">flap barrier gate</a> or a <a href="http://www.vigilance.com.my/shop/barrier-gate/straight-arm-barrier-gate-br660/" target="_blank" rel="noopener">boom gate</a> are safe from security breeches. This is because potential criminals would not dare to enter with the added security.</p>
<p>Suggested read: <a href="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/" target="_blank" rel="noopener">10 Reasons Your Business Needs CCTV Cameras in 2020</a></p>
<hr />
<h2>Choose from the best barrier gate supplier</h2>
<p>Now that you know the advantages of an <strong>entrance gate system</strong>, you need to consider purchasing this security system if you value your facility.</p>
<p>Nevertheless, it is best to focus on quality so choose a <strong>certified barrier gate supplier</strong> that can meet your needs with cost-effective solutions.</p>
<p>Still looking for the best choice? Stop searching and let Vigilance Security keep your premises safe and secure.</p>
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong>Click the button below to schedule a FREE Product Demo with our system consultant.</strong></span></p>
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"> <a class="fusion-button button-3d button-round button-xlarge button-default button-1 fusion-animated" style="visibility: visible; animation-duration: 1s;" href="contact-us" target="_self" data-animationduration="1" data-animationtype="1InUp"><span class="fusion-button-text">Claim your FREE Demo Now!</span></a></span></p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/reasons-your-facility-needs-a-barrier-gate-system/">6 Reasons Your Facility Needs a Barrier Gate System</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">12078</post-id>	</item>
		<item>
		<title>10 Reasons Your Business Needs CCTV Cameras in 2020</title>
		<link>http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/</link>
		<pubDate>Thu, 13 Aug 2020 01:23:33 +0000</pubDate>
		<dc:creator><![CDATA[haiza]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>
		<category><![CDATA[cctv]]></category>
		<category><![CDATA[cctv camera]]></category>
		<category><![CDATA[cctv systems]]></category>
		<category><![CDATA[security system]]></category>
		<category><![CDATA[surveillance system]]></category>
		<category><![CDATA[video surveillance]]></category>

		<guid isPermaLink="false">http://www.vigilance.com.my/?p=12056</guid>
		<description><![CDATA[<p>Why every business needs CCTV cameras Never underestimate the importance of a video surveillance system CCTV cameras have been an essential security system all over the world. Apart from home security, they are the primary security systems for business.  This is because CCTV systems help monitor the surroundings with no hassle. Thus, workers can go about their [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/">10 Reasons Your Business Needs CCTV Cameras in 2020</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2><span style="font-family: helvetica, arial, sans-serif;"><strong>Why every business needs CCTV cameras</strong></span></h2>
<blockquote>
<h3><span style="font-family: helvetica, arial, sans-serif;"><em>Never underestimate the importance of a video surveillance system</em></span></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;"><strong>CCTV cameras </strong>have been an essential <strong>security system</strong> all over the world. Apart from home security, they are the <strong>primary security systems for business. </strong></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This is because <strong>CCTV systems</strong> help monitor the surroundings with no hassle. Thus, workers can go about their day peacefully. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Other than fingerprint time attendance and attendance systems, a video surveillance system reliably provides <strong>quality and seamless monitoring</strong>. This gives you some peace of mind as you go about your daily operations.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Furthermore, a <strong>quality CCTV camera system </strong>can also enhance the efficiency and productivity of your business. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span id="more-12056"></span></span></p>
<h2><span style="font-family: helvetica, arial, sans-serif;">What is CCTV and how does it work?</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">A Closed Circuit Television (CCTV) is a closed-circuit system. This means its signal transmission is closed to transmit footage to a chosen monitor. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Particularly, a CCTV works as a <strong>video surveillance system</strong> that can record real-time images and videos. Whether for business properties, homes or even roads, a CCTV camera provides <strong>video surveillance</strong> in both private and public property. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Moreover, <strong>CCTV systems</strong> can monitor premises around the clock 24/7. The <strong>CCTV device</strong> is mainly designed with a camera, recorder, lens and monitor that can constantly record the area. Then, the captured recordings will be sent and saved to different monitors for data. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">What are the benefits of CCTV cameras?</span></h2>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">Fully protects whole premises</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Prevents potential crimes</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Used as evidence and proof</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Monitors high-risk areas</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Provides real-time video surveillance</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Enhances the productivity of employees</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Reduce potential unwanted incidences</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Used to settle conflicts</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Improves the experience of customers</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Reduces security costs</span></li>
</ol>
<hr />
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01.jpg"><img data-attachment-id="12069" data-permalink="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/subheader-your-business-needs-cctv-cameras-in-2020_01/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="subheader-your-business-needs-cctv-cameras-in-2020_01" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01.jpg" class="alignnone size-full wp-image-12069" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01.jpg" alt="reasons-your-business-needs-cctv-cameras-in-2020" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_01-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2><span style="font-family: helvetica, arial, sans-serif;">1. CCTV camera fully protects your business</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">It is unsettling when you don&#8217;t have complete knowledge of what goes around your business. That&#8217;s why you need CCTV systems to fully monitor operations whenever you need it.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Furthermore, with<strong> quality video surveillance</strong>, business owners can keep an eye on all operations and whether everything is following set regulations.  </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Equally important, human errors and mistakes such as unlocked doors can be known through a <strong>complete security system</strong> and resolved accordingly. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Browse through<strong> <a href="http://www.vigilance.com.my/product-category/vigilance-cctv/" target="_blank" rel="noopener">Vigilance CCTV cameras</a>.</strong></span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">2. Video surveillance protects against crime</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">The most common reason why every business needs a CCTV camera system is to prevent crimes, especially theft.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">If strategically placed at all points of entry, you can safely detect any break-ins, vandalism and other crimes. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Not only that, if you don&#8217;t have a biometric attendance system, your employees can easily enter and commit property theft right under your noses. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">So, a <strong>CCTV camera system</strong> is important to keep potential crimes at bay and your business safe. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">3. A CCTV camera recording is evidence</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Although a CCTV can prevent crimes from happening, it may still happen. But, in the event of a crime, <strong>everything is recorded</strong> and can be used as proof. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Therefore, serious crimes can be used by the higher authorities to hunt down criminals effectively. On the other hand, if the CCTV camera caught one of your employees stealing from you, as the boss, you can take matters in your own hands. </span></p>
<hr />
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03.jpg"><img data-attachment-id="12071" data-permalink="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/subheader-your-business-needs-cctv-cameras-in-2020_03/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="subheader-your-business-needs-cctv-cameras-in-2020_03" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03.jpg" class="alignnone size-full wp-image-12071" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03.jpg" alt="your-business-needs-cctv-cameras-in-2020" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_03-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2><span style="font-family: helvetica, arial, sans-serif;">4. High-risk areas can be monitored</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">If your business keeps expensive products and property or confidential information on the property, they are considered as high-risk areas.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Thus, by installing a <strong>system security management</strong> like CCTV surveillance, it is much easier to keep those areas safe and secure.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">On the contrary, say you&#8217;re working in the industrial sector such as manufacturing or construction. There must be areas that have heavy equipment and potential hazards.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Therefore, by directing video surveillance towards those particular areas, any incidents that happen to your employees or clients can be monitored.</span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">5. Monitor in real-time with video surveillance</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Most people need a <strong>CCTV camera</strong> to surveil their premises in real-time. This is because the <strong>recordings are easily accessible</strong> through a connected monitor.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Thus, businesses that don&#8217;t prefer hiring security guards can opt to install a <strong>video surveillance system</strong>. This will help avoid any human errors and every inch of your business can be monitored safely.</span></p>
<hr />
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04.jpg"><img data-attachment-id="12072" data-permalink="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/subheader-your-business-needs-cctv-cameras-in-2020_04/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="subheader-your-business-needs-cctv-cameras-in-2020_04" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04.jpg" class="alignnone size-full wp-image-12072" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04.jpg" alt="your-business-needs-cctv-cameras-in-2020" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_04-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2><span style="font-family: helvetica, arial, sans-serif;">6. A security system that enhances employee productivity</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">A lot of the time, people are cautious about what they do when they are being watched. This is why a CCTV system is needed.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This will prove beneficial to keep an eye on your employees. If that is the case, your employees will certainly work better if they know they are being monitored throughout their shift.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">As opposed to idleness and time-wasting, a better work ethic will be practiced and before long, your business will be booming.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Suggested read: <strong><a href="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/" target="_blank" rel="noopener">8 Types of Door Access Control Systems for Top Security</a></strong></span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">7. CCTV systems can reduce harassments</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Time and time again there have been countless cases of harassment and assaults at the workplace. Testimony by the victim may not always work since there are two sides to the story.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Thus, a CCTV camera system can help detect any type of assault whether sexual or physical. Moreover, potential offenders are made aware of CCTVs so they are discouraged to act on their negative feelings.</span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">8. Video surveillance can help settle conflicts</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Be it between employees, superiors or clients, conflicts are bound to happen at some point. When they do happen, finding the cause of it all can help solve the problem.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">However, word-of-mouth isn&#8217;t always trustworthy. So,<strong> CCTV surveillance</strong> can help determine the exact root of the problem.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Thus, combined with sufficient proof and good decision-making, conflicts can be solved easily without fear of favoritism or bias.</span></p>
<hr />
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02.jpg"><img data-attachment-id="12070" data-permalink="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/subheader-your-business-needs-cctv-cameras-in-2020_02/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="subheader-your-business-needs-cctv-cameras-in-2020_02" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02.jpg" class="alignnone size-full wp-image-12070" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02.jpg" alt="your-business-needs-cctv-cameras-in-2020" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/subheader-your-business-needs-cctv-cameras-in-2020_02-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2><span style="font-family: helvetica, arial, sans-serif;">9. CCTV cameras enhance customer experience</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">If you work with clients coming into your business whether for purchasing or meetings, they need to know they are in a safe space.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">With an<strong> installed video surveillance system</strong>, your customers will feel protected against any incidences. This will let them know that you value and care for their safety.</span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">10. The security system that reduces security costs</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">A security machine like a CCTV camera can really cut down your security expenses. One of the reasons being you can <strong>reduce the number of security staff</strong> that are responsible to guard your premises.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Additionally, there are a lot of<strong> advanced CCTV systems</strong> on the market that are reliable and extremely functional. Likewise, they are <strong>low maintenance</strong> so you can opt to purchase several for your business with a lower cost of maintenance.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Suggested read: <strong><a href="http://www.vigilance.com.my/reasons-you-need-a-biometric-attendance-system-in-malaysia/" target="_blank" rel="noopener">7 Reasons Why You Need a Biometric Attendance System in Malaysia</a></strong></span></p>
<hr />
<h3><span style="font-family: helvetica, arial, sans-serif;"><strong><span style="font-size: 18pt;">Protect your business with CCTV cameras</span></strong></span></h3>
<blockquote>
<h3><span style="font-family: helvetica, arial, sans-serif;"><em>Your business will do better when you install video surveillance</em></span></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;">In conclusion, <strong>security system manufacturers</strong> are well aware of the security your business demands. All that&#8217;s left is for you to acknowledge it. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Yet, you must do your research before purchasing a <strong>security system in Malaysia</strong>. Because something as technical as a <strong>CCTV cameras</strong> is a major decision a business owner needs to make. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">That&#8217;s why <strong>Vigilance Security Malaysia</strong> is prepared to answer all your questions about it. From the security device to the <strong>CCTV systems</strong>, we can help you make the right choice to protect your business. </span></p>
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong>Click the button below to schedule a FREE Product Demo with our system consultant.</strong></span></p>
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"> <a class="fusion-button button-3d button-round button-xlarge button-default button-1 fusion-animated" style="visibility: visible; animation-duration: 1s;" href="contact-us" target="_self" data-animationduration="1" data-animationtype="1InUp"><span class="fusion-button-text">Claim your FREE Demo Now!</span></a></span></p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/why-your-business-needs-cctv-cameras/">10 Reasons Your Business Needs CCTV Cameras in 2020</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">12056</post-id>	</item>
		<item>
		<title>7 Reasons Why You Need a Biometric Attendance System in Malaysia</title>
		<link>http://www.vigilance.com.my/reasons-you-need-a-biometric-attendance-system-in-malaysia/</link>
		<pubDate>Tue, 14 Jul 2020 06:57:28 +0000</pubDate>
		<dc:creator><![CDATA[haiza]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>
		<category><![CDATA[biometric attendance system]]></category>
		<category><![CDATA[biometric system]]></category>
		<category><![CDATA[biometric time attendance]]></category>
		<category><![CDATA[face recognition]]></category>
		<category><![CDATA[fingerprint scanner]]></category>
		<category><![CDATA[thumbprint scanner]]></category>

		<guid isPermaLink="false">http://www.vigilance.com.my/?p=12027</guid>
		<description><![CDATA[<p>Why every facility needs a biometric attendance system A biometric attendance system can easily scan and collect data in a blink of an eye A biometric attendance system is quickly becoming an essential electronic security system for door access control.  Not only does it provide instant verification, but Human Resources can also use the time [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/reasons-you-need-a-biometric-attendance-system-in-malaysia/">7 Reasons Why You Need a Biometric Attendance System in Malaysia</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2><span style="font-family: helvetica, arial, sans-serif;"><strong>Why every facility needs a biometric attendance system</strong></span></h2>
<blockquote>
<h3><span style="font-family: helvetica, arial, sans-serif;"><em>A biometric attendance system can easily scan and collect data in a blink of an eye</em></span></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;">A <strong>biometric attendance system</strong> is quickly becoming an essential <strong>electronic security system</strong> for <strong>door access control</strong>. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Not only does it provide instant verification, but Human Resources can also use the <strong>time attendance system</strong> to audit logs and analysis for staff payrolls.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Although the <strong>biometric access control system</strong> is becoming more critical and complex, some facilities are still not aware of its importance for their <strong>building access control system</strong>. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Here&#8217;s why your facility really needs to integrate your security system with <strong>biometric access control</strong>.<span id="more-12027"></span></span></p>
<h2><span style="color: #ff0000; font-family: helvetica, arial, sans-serif;"><span style="color: #000000;">1. Biometric Systems Increases</span> Employee Safety</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Anything can happen nowadays, especially with the rising advancement of technology. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Identity fraud has risen as well considering the rapid progression of cybersecurity. Hence, the need to apply a cloud time attendance system for your building. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Moreover, you can easily grant access to those who are verified to enter. With a <strong>biometric attendance system</strong> like the <strong>Vigilance attendance management system </strong>will ensure your employees are safe. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #ff0000;"><span style="color: #000000;">2.</span> Customize Access with a</span> Biometric System</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">If you&#8217;re still using a conventional <strong>access control security system</strong> such as a traditional key and lock, you should definitely consider upgrading your access system. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">By using a <strong>certified biometric access control system</strong>, you can customize your door entry systems for certain people at certain times. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">For example, you can deny access before or after working hours or give access to your admin staff 24/7. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">That&#8217;s why a <strong>time attendance device</strong> sold by a verified security solutions company is more costly than third party online shops due to its customization advantage. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">3. Access Control Systems <span style="color: #ff0000;">Prevent Trespassers </span></span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Facilities with a <strong>biometric attendance  system</strong> such as <strong>fingerprint time attendance</strong>, <strong>thumbprint attendance</strong> (mesin thumbprint), and <strong>facial recognition</strong> experience no intruders.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Because of its smart tech, <strong>door access control</strong> only works on pre-registered users with biometric access. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">So, not only your employees are safe, but your building is also safely protected from intruders with the use of <strong>door entry systems</strong> along with <strong>security cameras. </strong></span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">4. <span style="color: #ff0000;">Fast Reports Using</span> Cloud-Based Time Attendance</span></h2>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02.jpg"><img data-attachment-id="12050" data-permalink="http://www.vigilance.com.my/reasons-you-need-a-biometric-attendance-system-in-malaysia/subheader-reasons-why-you-need-a-biometric-attendance-system_02/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-reasons-why-you-need-a-biometric-attendance-system_02" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02.jpg" class="alignnone size-full wp-image-12050" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02.jpg" alt="reasons-why-you-need-a-biometric-attendance-system" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_02-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Installing a cloud-based <strong>biometric access control system </strong>will definitely benefit your HR management.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Particularly, a <strong>cloud time attendance system </strong>can easily generate your building&#8217;s traffic<strong>. </strong>Additionally, a report of any user&#8217;s entry points and access can be generated by using the <strong>wireless access control</strong>. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Not only does this ease the reports by Human Resources, but it can also be used to track whoever accessed the building at a specific period of time for whenever an incident occurs. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #ff0000;"><span style="color: #000000;">5.</span> Avoid Duplication with a</span> Biometric System</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Buildings who use a lock and key or a card reader run the risk of certain users who decide to duplicate them at their nearest and cheapest hardware store. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Some workers can even replicate their badges for buddy punching a badge reader. To prevent this from ever happening, you need a <strong>time attendance system</strong> using <strong>biometrics</strong>. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Surely, a fingerprint, face, or iris can&#8217;t ever be duplicated or lost and misused by the wrong people. Throw away those physical keys and upgrade to a better <strong>security system</strong> today. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;">6. Attendance Systems <span style="color: #ff0000;">Protect Sensitive Data</span></span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Do you keep confidential information in your office? Is there any customer data stored inside? Or are you keeping valuable items in your facility? </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">If your answer is yes, you desperately need an <strong>electronic security system</strong>. Keep all your sensitive data safe with an additional layer of security. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Not only are they protected from the grimy hands of intruders but also safe from your own employees if you choose to customize your <strong>biometric access control device</strong>. Talk about top security. </span></p>
<hr />
<h2><span style="font-family: helvetica, arial, sans-serif;"><strong>7. <span style="color: #ff0000;">Integrate your</span> Biometric Attendance System</strong></span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">A lot of the time most people ask us &#8216;Why is your Biometric Attendance System so expensive?&#8217;. If you search for a <strong>biometric access control device</strong> online, you&#8217;ll find they are way cheaper but that&#8217;s just because they only provide the device. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">You need an <strong>all-inclusive access control system</strong>. Vigilance provides <strong>modern attendance systems</strong> that can integrate with your company&#8217;s HR record software and after-sales service to help you. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This way, it is so much easier to update new recruits or discontinue access for those no longer working with you. </span></p>
<hr />
<h3><span style="font-family: helvetica, arial, sans-serif;"><strong><span style="font-size: 18pt;">Keep your facility safe</span></strong></span></h3>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01.jpg"><img data-attachment-id="12049" data-permalink="http://www.vigilance.com.my/reasons-you-need-a-biometric-attendance-system-in-malaysia/subheader-reasons-why-you-need-a-biometric-attendance-system_01/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-reasons-why-you-need-a-biometric-attendance-system_01" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01.jpg" class="alignnone size-full wp-image-12049" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01.jpg" alt="reasons-why-you-need-a-biometric-attendance-system" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-reasons-why-you-need-a-biometric-attendance-system_01-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></p>
<blockquote>
<h3><span style="font-family: helvetica, arial, sans-serif;"><em>Your building is in dire need of an electronic access system for better security </em></span></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;">In conclusion, biometric access control is the ideal option for facilities and buildings that need a higher level of security. If you value your business assets and staff, it should be on top of your priority list. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">That&#8217;s why Vigilance has a wide selection of options available that are highly technical and incredibly reliable. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">We at Vigilance Security are constantly fine-tuning our services and systems to prepare for the future together with you.</span></p>
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong>Click the button below to schedule a FREE Product Demo with our system consultant.</strong></span></p>
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"> <a class="fusion-button button-3d button-round button-xlarge button-default button-1 fusion-animated" style="visibility: visible; animation-duration: 1s;" href="contact-us" target="_self" data-animationtype="1InUp" data-animationduration="1"><span class="fusion-button-text">Claim your FREE Demo Now!</span></a></span></p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/reasons-you-need-a-biometric-attendance-system-in-malaysia/">7 Reasons Why You Need a Biometric Attendance System in Malaysia</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">12027</post-id>	</item>
		<item>
		<title>13 Most Common FAQs on Biometric Time Attendance</title>
		<link>http://www.vigilance.com.my/13-most-common-faqs-on-biometric-time-attendance/</link>
		<pubDate>Thu, 09 Jul 2020 00:45:55 +0000</pubDate>
		<dc:creator><![CDATA[haiza]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>

		<guid isPermaLink="false">http://www.vigilance.com.my/?p=12011</guid>
		<description><![CDATA[<p>Top Most Asked Questions on Time Attendance Systems Whether you&#8217;re looking for a time and attendance device or upgrading your current biometric time attendance system, there are a lot of aspects to consider. Ask your chosen time attendance machine supplier for a specific explanation on what you&#8217;re interested in. However, we&#8217;ve decided to compile all [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/13-most-common-faqs-on-biometric-time-attendance/">13 Most Common FAQs on Biometric Time Attendance</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2>Top Most Asked Questions on Time Attendance Systems</h2>
<p>Whether you&#8217;re looking for a <strong>time and attendance device</strong> or upgrading your current <strong>biometric time attendance system</strong>, there are a lot of aspects to consider.</p>
<p>Ask your chosen <strong>time attendance machine supplier </strong>for a specific explanation on what you&#8217;re interested in.</p>
<p>However, we&#8217;ve decided to compile all the common asked questions to better help you understand. So note these down to guide your next purchase.</p>
<p><span id="more-12011"></span></p>
<h2>1. How many fingers can a person register in a biometric time attendance machine?</h2>
<p>Answer: Each person can enroll up to 10 fingers. Normally, 2 fingerprints can be registered which is the left and right index finger.</p>
<h2>2. Why are some fingers difficult to scan?</h2>
<p>Answer:</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Finger was not properly registered</li>
<li>Finger is too dry, oily or dirty</li>
<li>Fingerprint is too callused, cut or scabbed</li>
<li>Finger is not at the correct position</li>
<li>Finger has not been registered</li>
<li>The optical scanner is dirty, under direct sunshine or strong light</li>
</ul>
</li>
</ul>
<h2>3. What will happen to the access control system if there is a power failure?</h2>
<p>Answer:</p>
<p>For <strong>door access systems</strong>, there will be a backup battery in the power supply which will last for about 8 hours.</p>
<p>For <strong>time attendance readers</strong>, users are advised to purchase the miniUPS that will continue to supply power for about 4 hours during a power failure.</p>
<h2>4. What does anti-passback means?</h2>
<p>Answer: Anti-passback is a standard term in <strong>security door access.</strong> It means a user must have a check-in record before he or she can check out from the room. This is to prevent any illegal entrances into a high security location.</p>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003.jpg"><img data-attachment-id="12040" data-permalink="http://www.vigilance.com.my/13-most-common-faqs-on-biometric-time-attendance/subheader-13-most-common-faqs-on-biometric-time-attendance_003/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-13-most-common-faqs-on-biometric-time-attendance_003" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003.jpg" class="alignnone wp-image-12040 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003.jpg" alt="biometric-time-attendance" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_003-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></p>
<h2>5. Can an injured, cut or dirty finger be scanned?</h2>
<p>Answer: Vigilance Fingerprint OPTICAL (Glass/Prism) Scanner is equipped with <strong>LED light</strong> to boost the clarity of registered fingers. We recommend our customers to enroll at least 2 fingers or up to 10 fingers for each user as back-up if the <strong>biometric fingerprint reader</strong> fails to scan.</p>
<h2>6. What to do if the fingerprint scanner cannot<span style="font-size: 16px;"> </span>scan?</h2>
<p>Answer: Besides the ability to scan fingerprints, <strong>Proximity Cards</strong> and <strong>ID Number with </strong><strong>Password </strong>comes with our <strong>access control devices</strong> if the fingerprint scanner cannot detect a fingerprint. A <strong>Vigilance security device</strong> will scan a user&#8217;s fingerprint 3 times before fully rejecting the user&#8217;s fingerprint and preventing access.</p>
<h2>7. When will I need to do maintenance on the biometric device?</h2>
<p>Answer: A <strong>safety security device</strong> has <strong>100,000 transactions storage capacity</strong>. The device will capture a fingerprint in its record whenever a finger is scanned. Then, the <strong>fingerprint scanning device</strong> will prompt a message “FULL” as a notification to download all transactions from the device. Then, delete all the old transactions on the device for better house-keeping.</p>
<p>However, no maintenance is required for the OPTICAL scanner (reinforced Glass). But, to prolong the device life-time, it is best to place it indoors, avoid exposure to direct sunlight, rain or hazardous environments.</p>
<p>Suggested read: <strong><a href="http://www.vigilance.com.my/how-is-a-biometric-time-attendance-system-installed/">How is a Biometric Time Attendance System Installed?</a></strong></p>
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002.jpg"><img data-attachment-id="12041" data-permalink="http://www.vigilance.com.my/13-most-common-faqs-on-biometric-time-attendance/subheader-13-most-common-faqs-on-biometric-time-attendance_002/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-13-most-common-faqs-on-biometric-time-attendance_002" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002.jpg" class="alignnone wp-image-12041 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002.jpg" alt="biometric-time-attendance" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_002-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2>8. Is a biometric device expensive?</h2>
<p>Answer: In comparison to a conventional <strong>Mechanical Paper Card Punch Clock,</strong> a <strong>biometric time attendance device</strong> costs only 50% more. If you think it isn&#8217;t worth it, a biometric scanning device has a faster Return Of Investment (ROI), simultaneously increases accuracies, discipline and punctuality.</p>
<p>A <strong>fingerprint reader device</strong> can effectively prevent “Buddy Punching” (helping other users to clock in). Additionally, it provides an accurate time and reporting which will benefit an organization immensely where “TIME is MONEY”.</p>
<h2>9. What is a time attendance software?</h2>
<p>Answer: Generally, a <strong>time attendance software</strong> is used to download data from the hardware and generates attendance reports. Moreover, the software is also used to synchronize users’ information between hardware and software. You can easily download<br />
the fingerprint template from the reader to the software or upload the employee name from the security software to the reader.</p>
<h2>10. How many attendance software does Vigilance has?</h2>
<p>Answer: Basically, Vigilance has two software namely VAMS and VTMS. Fundamentally, VAMS is a<strong> basic attendance software</strong> bundle that comes with any hardware purchased whereas VTMS is a <strong>comprehensive time management software</strong> which has additional charges.</p>
<h2>11. What should I do when the biometric system cannot connect?</h2>
<p>Answer:</p>
<ol>
<li>Check the network cable and connectors. Unplug and plug it in again.</li>
<li>Make sure you have switched on the router.</li>
<li>Ensure that the IP address in the hardware and software are the same. To check the IP address in the security system hardware, press MENU &gt; 2 Option &gt; 3 Comm Opt &gt; 1 IP Addr.</li>
<li>Ensure the IP address in the computer is a Fixed IP.</li>
</ol>
<h2>12. Where can I access the time attendance reports?</h2>
<p>Answer: Once entering the employee and shift data (refer to software user guide or video), choose report icon, enter the department and date range and click calculate. Then, select the report you wish to print from the report list.</p>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001.jpg"><img data-attachment-id="12042" data-permalink="http://www.vigilance.com.my/13-most-common-faqs-on-biometric-time-attendance/subheader-13-most-common-faqs-on-biometric-time-attendance_001/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-13-most-common-faqs-on-biometric-time-attendance_001" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001.jpg" class="alignnone wp-image-12042 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001.jpg" alt="biometric-time-attendance" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/07/Subheader-13-most-common-faqs-on-biometric-time-attendance_001-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></p>
<h2>13. How can I monitor multiple time and attendance readers?</h2>
<p>The <strong>time attendance software</strong> can connect and monitor up to <strong>256 readers</strong> at local or remote offices. Use “Add Device” to connect the readers using different IP address.</p>
<hr />
<h2>Choose the Best Time Attendance Device for Your Facility</h2>
<p>All in all, we hope that the answers above have helped clear your confusion about <strong>biometric scanning hardware and software. </strong></p>
<p>However, we are also readily prepared for any inquiry you have. We at Vigilance believe your security is important as much as ours.</p>
<p style="text-align: center;"><strong><span style="font-family: helvetica, arial, sans-serif;">Click the button below to schedule a FREE Product Demo with our system consultant.</span></strong></p>
<p style="text-align: center;"> <a class="fusion-button button-3d button-round button-xlarge button-default button-1 fusion-animated" style="visibility: visible; animation-duration: 1s;" href="contact-us" target="_self" data-animationtype="1InUp" data-animationduration="1"><span class="fusion-button-text">Claim your FREE Demo Now !</span></a></p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/13-most-common-faqs-on-biometric-time-attendance/">13 Most Common FAQs on Biometric Time Attendance</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">12011</post-id>	</item>
		<item>
		<title>8 Types of Door Access Control Systems for Top Security</title>
		<link>http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/</link>
		<pubDate>Fri, 19 Jun 2020 03:27:50 +0000</pubDate>
		<dc:creator><![CDATA[haiza]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>
		<category><![CDATA[access control system]]></category>
		<category><![CDATA[biometric device]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fingerprint scanner]]></category>
		<category><![CDATA[masked face recognition]]></category>
		<category><![CDATA[RFID reader]]></category>
		<category><![CDATA[temperature scanner]]></category>

		<guid isPermaLink="false">http://www.vigilance.com.my/?p=11986</guid>
		<description><![CDATA[<p>What are the types of door access control systems? Equip your business with an access control system for maximum security and safety Having a access control system throughout a building has benefits not just to guard from non-personnel. Not only functional as a time attendance system, it can also protect your employees, patrons, information, equipment [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/">8 Types of Door Access Control Systems for Top Security</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2><strong><span style="font-family: helvetica, arial, sans-serif;">What are the types of door access control systems?</span></strong></h2>
<blockquote>
<h3><span style="font-family: helvetica, arial, sans-serif;"><em>Equip your business with an access control system for maximum security and safety</em></span></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;">Having a access control system throughout a building has benefits not just to guard from non-personnel. Not only functional as a <strong>time attendance system</strong>, it can also protect your employees, patrons, information, equipment and other assets.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">To be more secure, using a<strong> biometric system</strong> rather than a <strong>conventional passcode system</strong> is much more reliable. A <strong>biometric system</strong> includes devices that can instantly scan a fingerprint, face, retina or even voice.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">So, it is in your best interest to install the<strong> best security system</strong> for your own good. Here&#8217;s a list of the<strong> top door access control systems</strong> that will better protect your property.<span id="more-11986"></span></span></p>
<h2><span style="font-family: helvetica, arial, sans-serif;">1. Fingerprint Door Access Control Reader</span></h2>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader.jpg"><img data-attachment-id="11993" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/fingerprint-door-access-control-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader.jpg" data-orig-size="300,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="fingerprint-door-access-control-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader.jpg" class="aligncenter wp-image-11993 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader.jpg" alt="fingerprint door access control reader" width="300" height="300" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader-250x250.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-control-reader-100x100.jpg 100w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The innovative <strong>biometric fingerprint reader</strong> uses an advanced algorithm for unparalleled performance ensuring precision, reliability and astounding biometric matching speed.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The model TA818 device can be installed on its own or with a third party panel that supports 260bit Wiegand. Equipped with top performance <strong>optical fingerprint sensor</strong>, all operations are made possible on the TFT-LCD. The user can simply place their finger on the fingerprint image on the screen before having access to enter the premises.</span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of fingerprint scanner</strong></span></p>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">Durable and highly accurate sensor</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Stores 1,500 templates, 5,000 cards and 30,000 transactions</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Built-in Serial and Ethernet ports</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Optional integrated smart card reader</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Tamper-proof switch and alarm outputs</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Request-to-exit and alarm contacts</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Audio-Visual indications for acceptance and rejection of valid/invalid scans</span></li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">2. Fingerprint Door Access Exit Reader</span></h2>
<p style="text-align: center;"><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader.jpg"><img data-attachment-id="11994" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/fingerprint-door-access-exit-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader.jpg" data-orig-size="300,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="fingerprint-door-access-exit-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader.jpg" class="alignnone wp-image-11994 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader.jpg" alt="fingerprint door access exit reader" width="300" height="300" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader-250x250.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-exit-reader-100x100.jpg 100w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Another<strong> electronic security system</strong> is the <strong>fingerprint exit reader</strong> ER1200. It has a RS485 communication interface for <strong>biometic access controllers</strong> and fingerprint standalone access control. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The ER1200 captures and transfers the fingerprint samples to the control panel inside the premises for recognition before exiting. With its IP65 rated rugged structure, this <strong>access control system</strong> offers extra durability suitable for all weather conditions. </span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of fingerprint exit reader</strong></span></p>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">High speed performance</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">IP65 rated structure</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Fingerprint recognition</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">RFID verification</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Weather-proof</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Professional design</span></li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">3. Fingerprint Door Access Reader</span></h2>
<p style="text-align: center;"><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader.jpg"><img data-attachment-id="11995" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/fingerprint-door-access-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader.jpg" data-orig-size="250,250" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="fingerprint-door-access-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader.jpg" class="alignnone wp-image-11995 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader.jpg" alt="fingerprint door access reader" width="250" height="250" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/fingerprint-door-access-reader-100x100.jpg 100w" sizes="(max-width: 250px) 100vw, 250px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Another<strong> fingerprint access control device</strong> is the  VA300. Its slim and elegant design makes it specifically suitable for offices, retail outlets and residential areas whilst promising utmost security.</span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of fingerprint door access reader</strong></span></p>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">No optical coating (less maintenance required)</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">2.8&#8243; TFT-LCD color screen</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Built-in door access controller</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Reads fingerprints, RFID card and PIN number</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Small and simple design</span></li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">4. Face &amp; Fingerprint Identification Reader</span></h2>
<p style="text-align: center;"><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader.jpg"><img data-attachment-id="11991" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/face-fingerprint-identification-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader.jpg" data-orig-size="250,250" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="face-fingerprint-identification-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader.jpg" class="alignnone wp-image-11991 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader.jpg" alt="face &amp; fingerprint identification reader" width="250" height="250" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-identification-reader-100x100.jpg 100w" sizes="(max-width: 250px) 100vw, 250px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">If you&#8217;re looking for more than a fingerprint scanner, VF700 is the <strong>new generation biometric device</strong> for you. It is the ideal solution for <strong>time attendance </strong>and <strong>access control</strong>. With an ability to store 1,500 faces and 2,000 fingerprint templates, it is highly suitable for premises such as factories and offices that require flexible verification modes. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The <strong>smart facial recognition</strong> feature is based on relative positions, size and shape of user’s eyes, nose, cheekbones and jaw features. This can significantly avoid the act of buddy punching among users. Combined with fingerprint, PIN and RFID readers, it can securely perform up to 20 verification methods accustomed to your needs.</span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of face &amp; fingerprint identification reader</strong></span></p>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">Multiple verification modes</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">3.0″ TFT touch screen</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Fast and accurate identification algorithm</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Able to function in dark environments</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Full access control features</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Easy installation and Connectivity</span></li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">5. Face &amp; Fingerprint Reader</span></h2>
<p style="text-align: center;"><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader.jpg"><img data-attachment-id="11992" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/face-fingerprint-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader.jpg" data-orig-size="300,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="face-fingerprint-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader.jpg" class="alignnone wp-image-11992 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader.jpg" alt="face &amp; fingerprint reader" width="300" height="300" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader-250x250.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/face-fingerprint-reader-100x100.jpg 100w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Another popular<strong> facial and fingerprint identification device</strong> is the VF460 complete with RFID and PIN recognition as well. It supports up to 1,500 face templates and 2,000 templates without dividing groups. Moreover, the time to verify a user&#8217;s identification takes less than a second!</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Apart from its elegant and compact design fit for office environments, the VF460 can be easily operated through a 2.8 inch TFT touch screen for a no-nonsense<strong> security solution.  </strong></span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of face &amp; fingerprint reader</strong></span></p>
<ol>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Professional facial &amp; fingerprint identification</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">2.8″ TFT touch screen</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">RFID or PIN verification enabled</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Infra-red optical system</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Supports USB downloading</span></div>
</li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">6. Visible Light Face Recognition &amp; Fingerprint Reader</span></h2>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader.jpg"><img data-attachment-id="11998" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/visible-light-face-fingerprint-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader.jpg" data-orig-size="300,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="visible-light-face-fingerprint-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader.jpg" class="aligncenter wp-image-11998 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader.jpg" alt="visible light face &amp; fingerprint reader" width="300" height="300" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader-250x250.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/visible-light-face-fingerprint-reader-100x100.jpg 100w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Equipped with the latest <strong>facial recognition algorithm</strong> and streamlined technology, the VF500 can connect with a third party electric lock, door sensor, exit buttons and more. This<strong> multi-biometric time and attendance system</strong> can support up to 3,000 faces and 3,000 fingerprints without dividing groups. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">By communicating through TCP/IP and a USB host, the VF500 <strong>access control device</strong> ensures a smooth connection and data transfer. Apart from its refined design, it is popularly used for its remarkable verification speed and intuitive operation making it the ideal option for an <strong>office security system.</strong></span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of face &amp; fingerprint reader</strong></span></p>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">Visible light face recognition</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">5″ touch screen</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Dual cameras for real-time face detection</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">0.3 – 3m recognition distance</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">TCP/IP. WiFi Communication</span></li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">7. [Hot Selling] Masked Face Recognition with Thermal Scanner</span></h2>
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner.jpg"><img data-attachment-id="11996" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/masked-face-recognition-with-thermal-scanner/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner.jpg" data-orig-size="250,250" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="masked-face-recognition-with-thermal-scanner" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner.jpg" class="aligncenter wp-image-11996 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner.jpg" alt="masked face recognition with thermal scanner" width="250" height="250" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/masked-face-recognition-with-thermal-scanner-100x100.jpg 100w" sizes="(max-width: 250px) 100vw, 250px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">For a more <strong>advanced security system</strong>, the <strong>VF800 Masked Face Recognition with Thermal Scanner</strong> is the ultimate time and attendance system. Engineered with the latest facial recognition algorithm and streamlined technology, a whopping 6,000 faces and 6,000 fingerprints plus 3,000 palms can be stored. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This <strong>access control device</strong> is perfect for wear masks especially in the pandemic situation. It can successfully recognize employees wearing masks and their body temperature for extra safety and hygiene to avoid any viral infections. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The VF800 is able to communicate via TCP/IP and a USB host for a smooth connection and data transfer along with instant verification and intuitive process. </span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The VF800 is  very suitable for hospital, governmental, learning institutions, factories and offices where a large number of users require <strong>verification  for door access.</strong></span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of masked face and temperature scanner </strong></span></p>
<ol>
<li><span style="font-family: helvetica, arial, sans-serif;">Masked face recognition</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">Equipped with thermal sensor </span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">5″ touch screen</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">0.3 – 3m recognition distance</span></li>
<li><span style="font-family: helvetica, arial, sans-serif;">TCP/IP. WiFi Communication</span></li>
</ol>
</div>
<h2><span style="font-family: helvetica, arial, sans-serif;">8. RFID Card Reader</span></h2>
<p style="text-align: center;"><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader.jpg"><img data-attachment-id="11997" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/rfid-card-reader/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader.jpg" data-orig-size="250,250" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="rfid-card-reader" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader.jpg" class="alignnone wp-image-11997 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader.jpg" alt="rfid card reader" width="250" height="250" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader-150x150.jpg 150w, http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader-66x66.jpg 66w, http://www.vigilance.com.my/wp-content/uploads/2020/06/rfid-card-reader-100x100.jpg 100w" sizes="(max-width: 250px) 100vw, 250px" /></a></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Looking for a<strong> basic non-biometric door access system</strong>? The TP103 can meet your requirements as a standalone proximity card reader able to be installed in a lone or networked environment. Other than its ability to prevent foreign entries, it includes a fast verification method equipped with an easy enrollment process. </span></p>
<div style="width: 100%; align: centre; padding: 1rem; margin: 2rem 0; background-color: #3944bc; color: #ffffff;">
<p style="text-align: center;"><span style="font-family: helvetica, arial, sans-serif;"><strong style="color: #ffffff;">Features of masked face and temperature scanner </strong></span></p>
<ol>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Captures fingerprint logs for both entry and exit</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Anti-passback option to prevent illegal entries</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Function as door access &amp; time attendance</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">No optical coating (less maintenance required)</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Transaction logs can be transferred via USB thumb drive</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">Multiple reading methods (fingerprint, RFID card or PIN number)</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">6 function keys (heck-in, check-out, OT-in, OT-out, break-in, break-out)</span></div>
</li>
<li class="fusion-li-item">
<div class="fusion-li-item-content"><span style="font-family: helvetica, arial, sans-serif;">3 forwarding ports (remote access via dynamic IP address)</span></div>
</li>
</ol>
</div>
<h2><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001.jpg"><img data-attachment-id="12044" data-permalink="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/subheader-door-access-control-systems-for-top-security_001/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Subheader-Door-Access-Control-Systems-for-Top-Security_001" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001.jpg" class="alignnone wp-image-12044 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001.jpg" alt="door-access-control-systems-for-top-security" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Subheader-Door-Access-Control-Systems-for-Top-Security_001-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h2>
<h2><span style="font-family: helvetica, arial, sans-serif;">How to Choose the Best Access Control System for Your Organization</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">There are many factors to consider when choosing the <strong>type of door access control system</strong> for your property. Whether its due to the nature of your organization, security procedures or the number of users, the right security system should not be taken lightly.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">If some of the <strong>access control devices</strong> seem too complicated for you, we at Vigilance Security are constantly at your disposal to prepare for the future together with you.</span></p>
<p style="text-align: center;"><strong><span style="font-family: helvetica, arial, sans-serif;">Click the button below to schedule a FREE Product Demo with our system consultant.</span></strong></p>
<p style="text-align: center;"> <a class="fusion-button button-3d button-round button-xlarge button-default button-1 fusion-animated" style="visibility: visible; animation-duration: 1s;" href="contact-us" target="_self" data-animationtype="1InUp" data-animationduration="1"><span class="fusion-button-text">Claim your FREE Demo Now !</span></a></p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/8-types-of-door-access-control-systems-for-top-security/">8 Types of Door Access Control Systems for Top Security</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">11986</post-id>	</item>
		<item>
		<title>How is a Biometric Time Attendance System Installed?</title>
		<link>http://www.vigilance.com.my/how-is-a-biometric-time-attendance-system-installed/</link>
		<pubDate>Tue, 02 Jun 2020 01:30:23 +0000</pubDate>
		<dc:creator><![CDATA[haiza]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>
		<category><![CDATA[biometric system]]></category>
		<category><![CDATA[biometric time attendance]]></category>
		<category><![CDATA[face recognition]]></category>
		<category><![CDATA[fingerprint scanner]]></category>
		<category><![CDATA[system support]]></category>
		<category><![CDATA[time attendance]]></category>
		<category><![CDATA[time attendance device]]></category>
		<category><![CDATA[time attendance software]]></category>

		<guid isPermaLink="false">http://www.vigilance.com.my/?p=11935</guid>
		<description><![CDATA[<p>Biometric Time Attendance Device Installed? A biometric time attendance system enables easier data collection for any management. A biometric time attendance system is used to generate, calculate and analyze the attendance and door access’ data for a better assessment of movement. An attendance system includes but is not limited to fingerprint, machine learning facial recognition, [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/how-is-a-biometric-time-attendance-system-installed/">How is a Biometric Time Attendance System Installed?</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h2><strong><span style="font-family: helvetica, arial, sans-serif;">Biometric Time Attendance Device Installed?</span></strong></h2>
<blockquote>
<h3><em><span style="font-family: helvetica, arial, sans-serif;">A biometric time attendance system enables easier data collection for any management.</span></em></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;">A biometric time attendance system is used to generate, calculate and analyze the attendance and door access’ data for a better assessment of movement.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">An attendance system includes but is not limited to fingerprint, machine learning facial recognition, iris recognition, retinal scan and voice recognition.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This payroll problem-solver promises efficiency like no other. Interested to have it? Here’s what you need to know about how it is installed.</span></p>
<p><span id="more-11935"></span></p>
<h2><strong><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #ff0000;">Consultation</span> on Time Attendance Systems</span></strong></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">First of all, schedule a consultation session with your security systems supplier about installing the staff attendance system.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This is when you’ll be able to browse through the different scanners and all your questions regarding them will be answered.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The supplier will then recommend the most efficient <strong><a href="http://www.vigilance.com.my/product-category/time-attendance-finger-print-reader/">biometric readers</a> </strong>for your business along with the best placement it should be installed.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Further information about Time and attendance, you may refer to <a href="https://en.wikipedia.org/wiki/Time_and_attendance" target="_blank" rel="noopener">https://en.wikipedia.org/wiki/Time_and_attendance</a></span></p>
<hr />
<h2><strong><span style="font-family: helvetica, arial, sans-serif;">Installing the <span style="color: #ff0000;">Biometric Time Attendance Device</span></span></strong></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Once you have decided on your attendance tracking security system, a date will be set for the electrical installation.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">However, you can also request only a delivery and remote support if you already have a non contact time attendance system technician who can install the system.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Eitherway, installing a time and attendance system will require electric equipment such as the device and power buffer supply, and wires such as power cords and LAN wires.</span></p>
<hr />
<p><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001.jpg"><img data-attachment-id="12046" data-permalink="http://www.vigilance.com.my/how-is-a-biometric-time-attendance-system-installed/biometric-time-attendance-system-installed_001/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Biometric-Time-Attendance-System-Installed_001" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001.jpg" class="alignnone wp-image-12046 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001.jpg" alt="biometric-time-attendance-system-installed" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_001-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></p>
<h2><strong><span style="font-family: helvetica, arial, sans-serif;">Installing the <span style="color: #ff0000;">Time Attendance Software</span></span></strong></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">After the electrical installation, the technical team will then install the <strong><a href="http://www.vigilance.com.my/product-category/attendance-software/">worker attendance software</a></strong> on your computer and server.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This will configure your <strong><a href="http://www.vigilance.com.my/shop/time-attendance-finger-print-reader/vf400-hybrid-facial-fingerprint-terminal/">fingerprint scanner software</a></strong> or<strong> <a href="http://www.vigilance.com.my/shop/time-attendance-finger-print-reader/vf400-hybrid-facial-fingerprint-terminal/">face recognition software</a> </strong>with the fingerprint or face recognition system.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Now you are nearly ready to use the installed fingerprint or facial recognition attendance system.</span></p>
<hr />
<h2><strong><span style="font-family: helvetica, arial, sans-serif;">Fingerprint and Face Recognition <span style="color: #ff0000;">System Training</span></span></strong></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">All personnel must be trained on how to use the facial recognition attendance system device. Your device supplier will help train all staff that will have access to the biometric scanner.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">They will learn several procedures such as how to login, using the installed non contact biometric attendance system according to shifts or overtime hours and other necessary features.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Following the training, the inhouse human resource department can gradually learn how to manage log analyses for payrolls.</span></p>
<hr />
<h2><strong><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #ff0000;">Registering</span> Employee’s Biometrics</span></strong></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">The registration of members is the last procedure of the biometric attendance installation. Fingerprints, face recognition or proximity cards are registered and inputted into the time attendance system.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">The staff attendance system will securely store their data for future use of access control once the user registration process is completed.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This procedure can be repeated depending on the different facilities and scanners you have planned to install following the different staff departments or locations for better efficiency.</span></p>
<hr />
<h2><strong><span style="font-family: helvetica, arial, sans-serif;">Biometric Time Attendance <span style="color: #ff0000;">System Support</span></span></strong></h2>
<p><span style="font-family: helvetica, arial, sans-serif;">Security systems suppliers like Vigilance provide extra after sales services.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">In most cases, businesses need a helping hand to master their newly installed time attendance system.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">This includes warranty support with minimum downtime, online support and video tutorials.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">As a result of excellent customer service, everyone will know how to manage their <a href="http://www.vigilance.com.my/product-category/time-attendance-finger-print-reader/"><strong>attendance time tracking system</strong>. </a></span></p>
<hr />
<h3><strong><span style="font-family: helvetica, arial, sans-serif; font-size: 18pt;">Be ready for the future</span></strong></h3>
<h3><a href="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002.jpg"><img data-attachment-id="12047" data-permalink="http://www.vigilance.com.my/how-is-a-biometric-time-attendance-system-installed/biometric-time-attendance-system-installed_002/" data-orig-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002.jpg" data-orig-size="840,330" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Biometric-Time-Attendance-System-Installed_002" data-image-description="" data-medium-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002-300x118.jpg" data-large-file="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002.jpg" class="alignnone wp-image-12047 size-full" src="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002.jpg" alt="biometric-time-attendance-system-installed" width="840" height="330" srcset="http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002.jpg 840w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002-300x118.jpg 300w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002-768x302.jpg 768w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002-250x98.jpg 250w, http://www.vigilance.com.my/wp-content/uploads/2020/06/Biometric-Time-Attendance-System-Installed_002-500x196.jpg 500w" sizes="(max-width: 840px) 100vw, 840px" /></a></h3>
<blockquote>
<h3><em><span style="font-family: helvetica, arial, sans-serif;">Office automation is crucial for today’s business for the sake of the future.</span></em></h3>
</blockquote>
<p><span style="font-family: helvetica, arial, sans-serif;">In conclusion, whether you work for a government sector, factory or in manufacturing, office automation data is the most valuable asset moving forward.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Although the total price may seem costly but if you don’t implement a biometric security system now, it will cost your business more since this is the future.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">We at Vigilance Security are constantly fine-tuning our services and systems to prepare for the future together with you.</span></p>
<p style="text-align: center;"><strong><span style="font-family: helvetica, arial, sans-serif;">Click the button below to schedule a FREE Product Demo with our system consultant.</span></strong></p>
<p style="text-align: center;"> <a class="fusion-button button-3d button-round button-xlarge button-default button-1 fusion-animated" style="visibility: visible; animation-duration: 1s;" href="contact-us" target="_self" data-animationtype="1InUp" data-animationduration="1"><span class="fusion-button-text">Claim your FREE Demo Now !</span></a></p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/how-is-a-biometric-time-attendance-system-installed/">How is a Biometric Time Attendance System Installed?</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">11935</post-id>	</item>
		<item>
		<title>Technical Support</title>
		<link>http://www.vigilance.com.my/technical-support/</link>
		<comments>http://www.vigilance.com.my/technical-support/#comments</comments>
		<pubDate>Wed, 06 May 2015 04:47:15 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>

		<guid isPermaLink="false">http://103.13.122.166/~thevasil/vigilanceweb/?p=11496</guid>
		<description><![CDATA[<p>Consists of General Technical Issues, User Manuals and Guides etc.. General Technical Issues Frequent Asked Questions Enrolment Quick Guide Enrolment Hint Card Connection Failed Troubleshooting Att Logs Deletion S Logs Deletion Changing Optical Prism Door Access Installation Guide (Single Leaf) Door Access Installation Guide (Double Leaf) 12DVC Power Supply Connection Layout User Manuals and Guides [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/technical-support/">Technical Support</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: left;">Consists of General Technical Issues, User Manuals and Guides etc..</p>
<h2>General Technical Issues</h2>
<ol>
<li><a href="http://www.vigilance.com.my/dl/FAQ.pdf" target="_blank" rel="noopener">Frequent Asked Questions</a></li>
<li><a href="http://www.vigilance.com.my/dl/eqg.pdf" target="_blank" rel="noopener">Enrolment Quick Guide</a></li>
<li><a href="http://www.vigilance.com.my/dl/ehc.pdf" target="_blank" rel="noopener">Enrolment Hint Card</a></li>
<li><a href="http://www.vigilance.com.my/dl/checkconnection-guide.pdf" target="_blank" rel="noopener">Connection Failed Troubleshooting</a></li>
<li><a href="http://www.vigilance.com.my/dl/delete-attlog.pdf" target="_blank" rel="noopener">Att Logs Deletion<br />
</a></li>
<li><a href="http://www.vigilance.com.my/dl/delete-slog.pdf" target="_blank" rel="noopener">S Logs Deletion<br />
</a></li>
<li><a href="http://www.vigilance.com.my/dl/changing-optical-prism.pdf" target="_blank" rel="noopener">Changing Optical Prism</a></li>
<li><a href="http://www.vigilance.com.my/dl/ta880-access-control-wiring-diagram-single-lock.pdf" target="_blank" rel="noopener">Door Access Installation Guide (Single Leaf)</a></li>
<li><a href="http://www.vigilance.com.my/dl/ta880-wiringdiagram-2emlock.pdf" target="_blank" rel="noopener">Door Access Installation Guide (Double Leaf)<br />
</a></li>
<li><a href="http://www.vigilance.com.my/dl/powersupply-installationguide.pdf" target="_blank" rel="noopener">12DVC Power Supply Connection Layout</a></li>
</ol>
<h2>User Manuals and Guides</h2>
<ol>
<li><a href="http://www.vigilance.com.my/dl/ta880-installationmanual.pdf" target="_blank" rel="noopener">TA 880 &#8211; Installation Manual<br />
</a></li>
<li><a href="http://www.vigilance.com.my/dl/ta880-usermanual.pdf" target="_blank" rel="noopener">TA 880 &#8211; User Manual<br />
</a></li>
<li>VT 300 &#8211; User Manual</li>
<li><a href="http://www.vigilance.com.my/dl/vt260-usermanual.pdf" target="_blank" rel="noopener">VT 260 &#8211; User Manual<br />
</a></li>
<li>VT 130 &#8211; User Manual</li>
<li><a href="http://www.vigilance.com.my/dl/tp103-wiringdiagram.pdf" target="_blank" rel="noopener">TP 103 &#8211; Wiring Diagram</a></li>
<li>VF 302  &#8211; User Manual</li>
<li><a href="http://www.vigilance.com.my/dl/vigilance-XS20101018-05-01.rar" target="_blank" rel="noopener">VAMS   &#8211;  Software Program<br />
</a></li>
<li>VAMS   &#8211; User Manual</li>
<li><a href="http://www.vigilance.com.my/dl/vtms-basicguide.pdf" target="_blank" rel="noopener">VTMS   &#8211; User Manual<br />
</a></li>
<li>VGMS   &#8211; User Manual</li>
<li><a href="http://www.vigilance.com.my/dl/powersupply-manual.pdf" target="_blank" rel="noopener">12DVC Power Supply User Manual</a></li>
</ol>
<p>Technical supports and enquiries, please email to <span style="color: #0000ff;"><strong>support@vigilance.com.my</strong></span>, we are more than happy to assist you.</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/technical-support/">Technical Support</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vigilance.com.my/technical-support/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">11496</post-id>	</item>
		<item>
		<title>Why Fingerprint?</title>
		<link>http://www.vigilance.com.my/why-fingerprint/</link>
		<comments>http://www.vigilance.com.my/why-fingerprint/#respond</comments>
		<pubDate>Thu, 12 Mar 2015 09:07:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>

		<guid isPermaLink="false">http://103.13.122.166/~thevasil/vigilanceweb/?p=11323</guid>
		<description><![CDATA[<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/why-fingerprint/">Why Fingerprint?</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="fusion-title title fusion-title-size-two"><h2 class="title-heading-left">Why Fingerprint?</h2><div class="title-sep-container"><div class="title-sep sep-single sep-solid"></div></div></div><p>Unique, Identification, Convenience, Irrefutable and Cost Saving.</p>
<ul class="fusion-checklist fusion-checklist-1" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#e10707;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><span class="fusion-highlight dark rounded highlight1" style="background-color:#dd3333;">UNIQUE</span> characteristic / patent of human fingerprint makes “You are You”. Twins can have similar face, body, hair or height BUT their Fingerprint patent are different</div></li><li class="fusion-li-item"><span style="background-color:#e10707;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><span class="fusion-highlight dark rounded highlight1" style="background-color:#dd3333;">IDENTIFICATION</span> is different from Verification. Using a ID Card or Proximity Card is a Verification. The system only can tell the Card is PASS or FAIL and the system can’t tell who is the right person should having the card. Fingerprint Identification will tell who are you and no one could replace your fingerprint patent.</div></li><li class="fusion-li-item"><span style="background-color:#e10707;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><span class="fusion-highlight dark rounded highlight1" style="background-color:#dd3333;">CONVENIENCE</span> to use and no need to carry anything with you. Most important thing, you won’t forget.</div></li><li class="fusion-li-item"><span style="background-color:#e10707;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><span class="fusion-highlight dark rounded highlight1" style="background-color:#dd3333;">IRREFUTABLE</span> in Time Attendance reports will produce better “Return Of Investment” and in long term will improve discipline. Reduce labour hours in calculation will concurrently reduce flaws / mistake.</div></li><li class="fusion-li-item"><span style="background-color:#e10707;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><span class="fusion-highlight dark rounded highlight1" style="background-color:#dd3333;">COST SAVING</span> in employment, overtime and no repeating expenditure over cards.</div></li></ul><div class="fusion-title title fusion-title-size-two"><h2 class="title-heading-left">Why Fingerprint Time Management System (TMS)?</h2><div class="title-sep-container"><div class="title-sep sep-single sep-solid"></div></div></div><ul class="fusion-checklist fusion-checklist-2" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">NO more buddy punching</div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">NO cards replacement</div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">NO manual calculation</div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Cost Saving</div></li></ul><div class="fusion-title title fusion-title-size-two"><h2 class="title-heading-left">Why Fingerprint Access Control?</h2><div class="title-sep-container"><div class="title-sep sep-single sep-solid"></div></div></div><ul class="fusion-checklist fusion-checklist-3" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">HIGH security level</div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Avoid unauthorized access, “You Are You”</div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">NO need cards &#8211; Convenient and You can forget the common reasons “I FORGOT”</div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Fingerprint is an <strong>IDENTIFICATION</strong></div></li><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Vigilance fingerprint reader that combines door access control system and time clocking system, designed to safeguard your company as well as to improve your employee&#8217;s discipline and productivity.</div></li></ul><div class="fusion-title title fusion-title-size-two"><h2 class="title-heading-left">When and where you apply Fingerprint System (Time Attendance and Access Control) ?</h2><div class="title-sep-container"><div class="title-sep sep-single sep-solid"></div></div></div><ul class="fusion-checklist fusion-checklist-4" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Fingerprint Access Control enhance your security well-being and reduce your worries towards unauthorized entry, besides this you may utilize further the common need of Time Attendance record. <strong><span style="color: #ff0000;">Office, Factory, Condominium and College are the most recommended areas.</span></strong></div></li></ul>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/why-fingerprint/">Why Fingerprint?</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vigilance.com.my/why-fingerprint/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">11323</post-id>	</item>
		<item>
		<title>The History of fingerprint Identification</title>
		<link>http://www.vigilance.com.my/the-history-of-fingerprint-identification/</link>
		<comments>http://www.vigilance.com.my/the-history-of-fingerprint-identification/#respond</comments>
		<pubDate>Thu, 05 Mar 2015 05:14:42 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Useful Info]]></category>
		<category><![CDATA[fingerprint history]]></category>

		<guid isPermaLink="false">http://103.13.122.166/~thevasil/vigilanceweb/?p=11037</guid>
		<description><![CDATA[<p>The science of fingerprint Identification stands out among all other forensic sciences for many reasons, including the following:</p>
<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/the-history-of-fingerprint-identification/">The History of fingerprint Identification</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Fingerprints offer an infallible means of personal identification. That is the essential explanation for their having supplanted other methods of establishing the identities of criminals reluctant to admit previous arrests.</p>

The science of fingerprint Identification stands out among all other forensic sciences for many reasons, including the following:</p>
<ul class="fusion-checklist fusion-checklist-5" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Has served all governments worldwide during the past 100 years to provide accurate identification of criminals. No two fingerprints have ever been found alike in many billions of human and automated computer comparisons. Fingerprints are the very basis for criminal history foundation at every police agency on earth.</div></li></ul>
<ul class="fusion-checklist fusion-checklist-6" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Established the first forensic professional organization, the International Association for Identification (IAI), in 1915.<br />
</div></li></ul><ul class="fusion-checklist fusion-checklist-7" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Established the first professional certification program for forensic scientists, the IAI’s Certified Latent Print Examiner program (in 1977), issuing certification to those meeting stringent criteria and revoking certification for serious errors such as erroneous identifications.<br />
</div></li></ul><ul class="fusion-checklist fusion-checklist-8" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Remains the most commonly used forensic evidence worldwide – in most jurisdictions fingerprint examination cases match or outnumber all other forensic examination casework combined.<br />
</div></li></ul><ul class="fusion-checklist fusion-checklist-9" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Continues to expand as the premier method for identifying persons, with tens of thousands of persons added to fingerprint repositories daily in America alone – far outdistancing similar databases in growth.</div></li></ul><ul class="fusion-checklist fusion-checklist-10" style="font-size:13px;line-height:22.1px;"><li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Worldwide, fingerprints harvested from crime “scenes lead to more suspects and generate more evidence in court than all other forensic techniques combined. 2″<br />
</div></li></ul><p>Other visible human characteristics change &#8211; fingerprints do not. In earlier civilizations, branding and even maiming were used to mark the criminal for what he was. The thief was deprived of the hand which committed the thievery. The Romans employed the tattoo needle to identify and prevent desertion of mercenary soldiers.</p>
<p>The basic fundamentals in the science of fingerprint identification are permanence and individuality.<br />
Permanence: Fingerprint ridges are formed during the third to fourth month of fetal development. These ridges consist of individual characteristics called ridge endings, bifurcations, dots and many ridge shape variances. The unit relationship of individual characteristics does not naturally change throughout life&#8230; until decomposition after death. After formation, an infant&#8217;s growing fingerprint ridges are much like drawing a face on a balloon with a ball-point pen and then inflating the balloon to see the same face expand uniformly in all directions. Unnatural changes to fingerprint ridges include deep cuts or injuries penetrating all layers of the epidermis and some diseases such as leprosy.</p>
<p>Permanent scars, disease damage, and temporary changes such as paper cuts appear as jagged edges and sometimes &#8220;puckered&#8221; ridge detail in opposition to smooth flowing natural formations. Warts can come and go, but generally push apart an area of friction ridges and can disappear completely when the wart is gone because they are not a part of the friction ridge structure. Look at a wart with a magnifying glass and you will notice that the friction ridges &#8220;surround&#8221; the wart. Senile atrophy of friction skin due to old age causes the ridges to often almost flatten, causing fingerprints with many creases (creases are also unique but not always permanent) and poorly defined ridges. Oddly, newborn infants also often have more creases than clearly defined ridge detail in their barefoot prints. The creases are unique, but change relatively rapidly and often disappear as the infant grows. The best chance of seeing friction skin ridges on newborn infant footprints is to look carefully with a magnifying glass on and near the big toe.</p>
<p>Individuality: In the over 140 years that fingerprints have been routinely compared worldwide, no two areas of friction skin on any two persons (including identical twins) have been found to contain the same individual characteristics in the same unit relationship. This means that in general, any area of friction skin that you can cover with a dime (and often with just a pencil eraser) on your fingers, palms, or soles of your feet will contain sufficient individual characteristics in a unique unit relationship to enable identification. Recent studies comparing the fingerprints of cloned monkeys showed that they, just like identical twin humans, have completely different fingerprints. When doctors state that twins have the same fingerprints, they are referring to the class characteristics of the general ridge flow, called the fingerprint pattern. These loop, arch and whorl ridge flow patterns are not the individual characteristics used to positively identify persons. Before modern computerized systems, fingerprint classification was essential to enable manual filing and retrieval of fingerprints in large repositories.</p>
<p>For many years experts testified that no two fingerprints in the hundreds of millions of fingerprint cards on file in America had ever been found to be alike. This was misleading in that large fingerprint files were for the first 110 years of police usage separated into small file categories by class characteristics such as:</p>
<ul>
<ul class="fusion-checklist fusion-checklist-11" style="font-size:13px;line-height:22.1px;">
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">sex.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">age.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">presence of scars.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">presence of whorl, loop and arch formations in various fingers.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">ridge counts and tracings between different pattern focal points (deltas and cores)</div></li>
</ul>
</ul>
<p>Thus, for example, at the FBI&#8217;s former Identification Division with over 200 million fingerprint cards, no individual card and no individual fingerprint was ever completely compared against all the other fingerprints on file. In such manual filing systems fingerprints were compared only with corresponding fingerprint cards possessing the same class characteristics.</p>
<p>This all changed with the advent of AFIS (Automated Fingerprint Identification Systems), and many agencies have now compared thousands of individual fingerprints (such as fingertip impressions from crime scenes) against every fingerprint in the entire repository. None have been found to have the same individual characteristics in the same unit relationship.</p>
<p>Math is the only exact science. However, fingerprint identification lends itself well to mathematical validation. As of September 2002, at least seven state AFIS sites make fingerprint card to fingerprint card positive identifications without human intervention. Latent prints (finger, palm and foot) from crime scenes are not positively identified by computers primarily because of background interference (dirt, scratches on items/surfaces touched, etc.) and the relatively poor clarity of some crime scene latent prints.</p>
<p>When DNA evolved as a science, the term &#8220;<strong>DNA fingerprinting</strong>&#8221; was adopted to lend credibility to that science&#8217;s newcomer status which is in its infancy compared with the empirical validation of fingerprint identification worldwide. DNA analysis as commonly practiced in forensic science laboratories cannot differentiate between identical twins, but fingerprints have always been able to differentiate identical twins.</p>
<p>The two basic ideas scientists believe about fingerprints are:</p>
<ul>
	<ul class="fusion-checklist fusion-checklist-12" style="font-size:13px;line-height:22.1px;">
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><strong>Fingerprints never change</strong>. Small ridges form on a person&#8217;s hands and feet before they are born and do not change for as long as the person lives.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;"><strong>No two fingerprints are alike</strong>. The ridges on the hands and feet of all persons have three characteristics (ridge endings, birfurcations and dots) which appear in combinations that are never repeated on the hands or feet of any two persons. A ridge ending is simply the end of a ridge (also known as an ending ridge). A bifurcation is a Y-shaped split of one ridge into two. A dot is a very short ridge that looks like a &#8220;dot.&#8221;</div></li>
</ul>
</ul>
<p>The basic fundamentals in the science of fingerprint identification are permanence and individuality.<br />
Beyond the John Q. Public info you can read by clicking here, you should know that a &#8220;positive identification&#8221; is not necessarily a &#8220;positive identification&#8221;. The science of friction ridge identification leaves no room for error when professional guidelines are followed in its application&#8230; but, in any field of human endeavor (including simple math addition, subtraction, etc.) there will always be oversights.</p>
<p>Every competent fingerprint expert will have an identification verified. Procedurally, at most agencies it is not an identification until it is verified by another competent expert. Most state and federal level crime labs will not even inform you that a fingerprint match occurred until after the &#8220;identification&#8221; has been verified. An exception to this rule is fingerprint card to fingerprint card identifications made in some Automated Fingerprint Identification System (AFIS) computers. Latent print &#8220;matching&#8221; scores at AFIS sites are normally evaluated and &#8220;verified&#8221; by two human experts before the &#8220;identification&#8221; is reported.</p>
<p>Never base an identification on just the matching fingerprint classification. A matching fingerprint classification (Henry classification, NCIC classification, etc.) means only that the person printed belongs to the group of persons whose prints all have that same classification&#8230; just like sorting out a large number of persons based on sex, age, height, weight, eye color, etc. The identification should be verified by a well qualified fingerprint expert based on a comparison of the individual characteristics in the fingerprints&#8230; not based on the classification. In some agencies the inked print to inked print identifications are automatically reported after computerized matching in an AFIS (Automated Fingerprint Identification System) with a minimum matching &#8220;score&#8221; set so high that human intervention is not necessary. Low score matches in an AFIS are checked and verified by humans.</p>
<p>Do NOT have an arrest warrant issued based on a fingerprint &#8220;match&#8221; unless you are certain of the credentials of the expert. Unless an ID tech at your agency was an expert before they attended schools such as the one-week FBI classification course and the one-week FBI latent print techniques course, they did NOT leave those schools as experts (the FBI issues certificates of attendance&#8230; not certificates of successful course completion). Although American law accepts them as experts with such little training, they are not. In court they only have to have more knowledge about fingerprints than the average man on the street to be legally qualified as an expert.</p>
<p>Most fingerprint experts train for at least two or three years under the watchful eye of experienced Latent Print Examiners before they are allowed to work unsupervised on latent prints from crime scenes. Self-training can equip an ID tech at a small department with the same two weeks of experience, 50 times over. Also, a deputy who looks at latent prints a couple of hours per month for ten years does NOT have ten years experience&#8230; he has the equivalent of a few weeks of crime lab type experience&#8230; and it is poor quality experience if his work was not reviewed. How much is he missing if he only takes his &#8220;idents&#8221; to someone else for verification. He may only be identifying the prints a chimp could match and missing more difficult impressions.</p>
<p>Although there are very competent fingerprint experts in America who hold no certification, over nine hundred have attained the title of Certified Latent Print Examiners from the International Association for Identification (IAI) after completion of stringent testing (most years less than 50% of those persons taking the six hour exam have passed). In recent years the IAI has simplified the classification portion of the test and there is now no reason for any latent print examiner to avoid testing with excuses such as, &#8220;I only work with latent fingerprints and don&#8217;t do filing so I can&#8217;t be tested on classification.&#8221; Suspect their expertise if they use such excuses. A part time expert with poor quality training will not be able to pass the examination.</p>
<p><strong>THE HISTORY OF FINGERPRINTS</strong></p>
<p>Updated 30 July 2010</p>
<p><strong>Why Fingerprint Identification?</strong></p>
<p>Fingerprints offer an infallible means of personal identification. That is the essential explanation for their having supplanted other methods of establishing the identities of criminals reluctant to admit previous arrests. 1</p>
<p>The science of fingerprint Identification stands out among all other forensic sciences for many reasons, including the following:</p>
<ul>
	<ul class="fusion-checklist fusion-checklist-13" style="font-size:13px;line-height:22.1px;">
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Has served all governments worldwide during the past 100 years to provide accurate identification of criminals. No two fingerprints have ever been found alike in many billions of human and automated computer comparisons. Fingerprints are the very basis for criminal history foundation at every police agency on earth.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Established the first forensic professional organization, the International Association for Identification (IAI), in 1915.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Established the first professional certification program for forensic scientists, the IAI&#8217;s Certified Latent Print Examiner program (in 1977), issuing certification to those meeting stringent criteria and revoking certification for serious errors such as erroneous identifications.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Remains the most commonly used forensic evidence worldwide &#8211; in most jurisdictions fingerprint examination cases match or outnumber all other forensic examination casework combined.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Continues to expand as the premier method for identifying persons, with tens of thousands of persons added to fingerprint repositories daily in America alone &#8211; far outdistancing similar databases in growth.</div></li>
<li class="fusion-li-item"><span style="background-color:#dd3333;font-size:11.44px;height:22.1px;width:22.1px;margin-right:9.1px;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-arrow-right" style="color:#ffffff;"></i></span><div class="fusion-li-item-content" style="margin-left:31.2px;">Worldwide, fingerprints harvested from crime &#8220;scenes lead to more suspects and generate more evidence in court than all other forensic techniques combined. 2&#8221;</div></li>
</ul>
</ul>
<p>Other visible human characteristics change &#8211; fingerprints do not. In earlier civilizations, branding and even maiming were used to mark the criminal for what he was. The thief was deprived of the hand which committed the thievery. The Romans employed the tattoo needle to identify and prevent desertion of mercenary soldiers.</p>
<p>Before the mid-1800s, law enforcement officers with extraordinary visual memories, so-called &#8220;camera eyes,&#8221; identified previously arrested offenders by sight. Photography lessened the burden on memory but was not the answer to the criminal identification problem. Personal appearances change.</p>
<p>Around 1870, French anthropologist Alphonse Bertillon devised a system to measure and record the dimensions of certain bony parts of the body. These measurements were reduced to a formula which, theoretically, would apply only to one person and would not change during his/her adult life.</p>
<p>The Bertillon System was generally accepted for thirty years. But it never recovered from the events of 1903, when a man named Will West was sentenced to the U.S. Penitentiary at Leavenworth, Kansas. It was discovered that there was already a prisoner at the penitentiary at the time, whose Bertillon measurements were nearly the same, and his name was William West.</p>
<p>Upon investigation, there were indeed two men who looked exactly alike. Their names were Will and William West respectively. Their Bertillon measurements were close enough to identify them as the same person. However, a fingerprint comparison quickly and correctly identified them as two different people. (Per prison records discovered later, the West men were apparently identical twin brothers and each had a record of correspondence with the same immediate family relatives.)</p>
<p><strong>Prehistoric</strong></p>
<p>Picture writing of a hand with ridge patterns was discovered in Nova Scotia. In ancient Babylon, fingerprints were used on clay tablets for business transactions. In ancient China, thumb prints were found on clay seals.</p>
<p>In 14th century Persia, various official government papers had fingerprints (impressions), and one government official, a doctor, observed that no two fingerprints were exactly alike.</p>
<p><strong>Malpighi</strong></p>
<p><strong>1686 &#8211; Malpighi</strong></p>
<p>In 1686, Marcello Malpighi, a professor of anatomy at the University of Bologna, noted in his treatise; ridges, spirals and loops in fingerprints. He made no mention of their value as a tool for individual identification. A layer of skin was named after him; &#8220;Malpighi&#8221; layer, which is approximately 1.8mm thick.</p>
<p><strong>1823 &#8211; Purkinje</strong></p>
<p>In 1823, John Evangelist Purkinje, an anatomy professor at the University of Breslau, published his thesis discussing 9 fingerprint patterns, but he too made no mention of the value of fingerprints for personal identification.</p>
<p><strong>Herschel</strong></p>
<p>Herschel&#8217;s fingerprints recorded over a period of 57 years</p>
<p><strong>1858 &#8211; Hershel</strong></p>
<p>The English first began using fingerprints in July of 1858, when Sir William James Herschel, Chief Magistrate of the Hooghly district in Jungipoor, India, first used fingerprints on native contracts. On a whim, and without thought toward personal identification, Herschel had Rajyadhar Konai, a local businessman, impress his hand print on a contract.</p>
<p>The idea was merely &#8220;&#8230; to frighten [him] out of all thought of repudiating his signature.&#8221; The native was suitably impressed, and Herschel made a habit of requiring palm prints&#8211;and later, simply the prints of the right Index and Middle fingers&#8211;on every contract made with the locals. Personal contact with the document, they believed, made the contract more binding than if they simply signed it. Thus, the first wide-scale, modern-day use of fingerprints was predicated, not upon scientific evidence, but upon superstitious beliefs.</p>
<p>As his fingerprint collection grew, however, Herschel began to note that the inked impressions could, indeed, prove or disprove identity. While his experience with fingerprinting was admittedly limited, Sir William Herschel&#8217;s private conviction that all fingerprints were unique to the individual, as well as permanent throughout that individual&#8217;s life, inspired him to expand their use.</p>
<p><strong>1863 &#8211; Coulier</strong></p>
<p>Professor Paul-Jean Coulier, of Val-de-Grâce in Paris, publishes his observations that (latent) fingerprints can be developed on paper by iodine fuming, explains how to preserve (fix) such developed impressions and mentions the potential for identifying suspects&#8217; fingerprints by use of a magnifying glass. 3, 4</p>
<p><strong>Faulds</strong></p>
<p><strong>1880 &#8211; Faulds &#8211; First Latent Print Identification</strong></p>
<p>During the 1870&#8217;s, Dr. Henry Faulds, the British Surgeon-Superintendent of Tsukiji Hospital in Tokyo, Japan, took up the study of &#8220;skin-furrows&#8221; after noticing finger marks on specimens of &#8220;prehistoric&#8221; pottery. A learned and industrious man, Dr. Faulds not only recognized the importance of fingerprints as a means of identification, but devised a method of classification as well.</p>
<p>In 1880, Faulds forwarded an explanation of his classification system and a sample of the forms he had designed for recording inked impressions, to Sir Charles Darwin. Darwin, in advanced age and ill health, informed Dr. Faulds that he could be of no assistance to him, but promised to pass the materials on to his cousin, Francis Galton.</p>
<p>Also in 1880, Dr. Henry Faulds published an article in the Scientific Journal, &#8220;Nature&#8221; (nature). He discussed fingerprints as a means of personal identification, and the use of printers ink as a method for obtaining such fingerprints. He is also credited with the first fingerprint identification of a greasy fingerprint left on an alcohol bottle.</p>
<p><strong>1882 &#8211; Thompson</strong></p>
<p>In 1882, Gilbert Thompson of the U.S. Geological Survey in New Mexico, used his own thumb print on a document to prevent forgery. This is the first known use of fingerprints in the United States. Click the image below to see a larger image of an 1882 receipt issued by Gilbert Thompson to &#8220;Lying Bob&#8221; in the amount of 75 dollars.</p>

<p>The post <a rel="nofollow" href="http://www.vigilance.com.my/the-history-of-fingerprint-identification/">The History of fingerprint Identification</a> appeared first on <a rel="nofollow" href="http://www.vigilance.com.my">Vigilance Fingerprint Time Attendance System</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vigilance.com.my/the-history-of-fingerprint-identification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">11037</post-id>	</item>
	</channel>
</rss>
