The system is modular and allows for scaling up – adding more rooms and users as needed. A single ID medium is used across all access points, ensuring ease of use and a clear system overview.
A unified access control system provides comprehensive, centralized management of entry to company premises – from the reception area to high-security zones. Each user can be assigned a single identification medium or a combination of different ones. The system enables access restriction and monitoring, maintaining accurate records of all entries and entry attempts – who entered, where, and when.
Room occupancy (roll call) records are updated based on registrations at Access Control readers or Time and Attendance terminals. For the functionality to operate, a room must be defined, and entry and exit readers assigned. Registration at an entry reader adds a person to the list of those present, while registration at an exit reader removes them from the list. The functionality is used to ensure occupational health and safety and for evacuation purposes.
Access Control is part of the Time and Attendance system and is closely linked to time tracking. Users employ the same identification medium for both systems, which means user data and access rights are shared, reducing duplicate work and minimizing the risk of errors. In specific cases, the Time and Attendance terminal can also be used for door access.
The visitor announcement and reception system for company premises is part of a comprehensive security system. The process is digitally supported with two modules – the online and/or internal visit announcement and the visitor reception at the front desk.
Employees can announce guests themselves and reserve meeting rooms, or direct them to the company’s website, which features an integrated online form for entering visit details that are automatically transferred to the system. The system also provides an overview of all announced visits and guests.
The receptionist registers visitors at the front desk, issues ID cards for door access on the day of the visit, and manages their consent forms. When a visitor leaves, the receptionist closes the visit record, ensuring that the list of currently present visitors is always up to date.
Regular security rounds are essential for preventing security risks and reducing unnecessary costs in business premises, such as lights left on, open windows, or the risk of burglary. To effectively monitor and supervise the work of security staff, the KADRIS 4 Access Control patrol system is used, allowing security officers to record their patrols via the dedicated KADRIS 4 Security mobile app. Patrols are logged at terminals installed at designated checkpoints, while the control center gains a comprehensive overview of all completed patrols. This system ensures a higher level of security and greater efficiency in managing security tasks in the business environment.
Using lockers with ID cards is simple for employees, while administrators have an overview of locker occupancy. Access Control allows alarms to be triggered in case of a break-in and provides event and status reports, improving overall supervision. In addition, it enables companies to optimize locker maintenance costs.
Using ID cards to open key lockers enables control and monitoring of access. This solution is suitable for all environments where electronic locking is not required or not economically viable.
Logical Access Control using smart ID media and passwords ensures the security of information systems and computers. The system requires appropriate ID media, readers, software, and public key infrastructure (PKI). For the highest level of security, it is recommended to combine a physical ID medium, a unified media database, and a Single Sign-on (SSO) system. Users must handle their ID cards with care, as they cannot use their computer without them, and the system automatically logs them out when leaving the office. To ensure information system security, sharing of cards and passwords is strictly prohibited.
The system enables easy door unlocking by holding an ID card or smartphone close to a reader connected to the database via a control unit. In-house software development, production of long-lasting components, and the SIST EN 60839-11-1 security certificate ensure stable supply, servicing, regular upgrades, and the highest level of security.
Monitor entrances, record visits and room occupancy, and manage logical access control to information systems. The system can also be used for security patrols, as well as for opening key lockers and wardrobes.
Doors and passages can be opened only after correct user identification, confirming the user’s access rights. The reader retrieves data from the identification medium and sends it to the control unit, which verifies whether the user is authorized to enter. All events are recorded in the database that manages the entire system.
Readers in the Access Control system enable contactless reading of ID media, allowing fast and secure user identification. The control unit communicates with the database and uses the ID media data to operate the latch mechanisms. The most advanced hardware version, compliant with the SIST EN 60839-11-1:2013 standard and grade 4 requirements, provides four hours of autonomous operation, while the grade 3 version provides two hours. For grade 2, an uninterruptible power supply is not required.
CMX3 and CMX5 readers
The CMX reader series combines a modern balanced flat design with advanced RGB LED indication. It enables easy and secure door access using cards, key tags, or the mobile app. The CMX3 model additionally provides 24/7 access to ATM rooms simply by using a bank payment card.

CM03/SF and CM03/TP readers
Conventional ID media readers and combined readers with an integrated keypad or fingerprint scanner..

VT-500 control unit
The control unit can operate autonomously for up to four hours, depending on the selected security grade under the SIST EN 60839-11-1:2013 and the built-in uninterruptible power supply.
SIST EN 60839-11-1:2013 certificate
Since 2022, the Access Control system has been certified according to the international security standard SIST EN 60839-11-1:2013 (grades 2, 3, and 4). The certificate covers the KADRIS 4 software and hardware: the VT-500 control unit, and the CMX3, CM03/TP, and CM03/TP/SF ID media readers.

Identification media (ID media) are built using technology that enables contactless reading on readers, allowing access to rooms. Cards and key tags use the ČETRTA POT DESFire EV3 (MIFARE NXP) technology, compliant with the ISO 14443 standard. For identification with smartphones, NFC and Bluetooth BLE technologies are used. The system is also compatible with older solutions such as remote controls, UHF media, and older types of ID cards. A PIN code can also be used as an additional authentication factor.
ČETRTA POT DESFire EV3 identification card
The DESFire EV3 card is part of the MIFARE DESFire family of smart cards by NXP. It is a technologically advanced and secure contactless card that offers greater operating distance and improved transaction speed. These features make it ideal for use in advanced Time and Attendance systems and Access Control.
KADRIS 4 Mobile app
Mobile identification on CMX3 and CMX5 readers for door access within the Access Control system.