Leader in Access Control Installation. – Call For A Free Estimate – (916) 842-4729

Access Control By: Kantech

Kantech offer lower costs with improved productivity. Easy-to-use, intuitive access control security solutions are just the start.

The first of its kind, EntraPass

The first of its kind, EntraPass Go Install mobile app provides easy configuration of KT-1 and KT-400 controllers by scanning a QR code.

Watchdog Security 2017 Award Recipient in the Security Industry. Great Job, keep up the good work. Best in security class on yelp.

Your Access Control Security Solution – Watchdog Security

We are a partner in Carmichael California

Watchdog Security is the leader in Residential and Commercial Smart Automation Control, giving you solutions to monitor, protect and automate your home and business through the user app and web interface. That’s why we are installation experts and a direct distributor of their products and services. We also sell and install card access control systems on commercial businesses.

Our IP security cameras are of the highest quality this year to date. We only use HD 1080p video resolution or higher on any security system we install. We even offer new 4K video streaming quality. Stay in complete and total control of your home and business while your away with a surveillance camera system you can monitor on the go from a smartphone app and computer web interface from Watchdog Security.

2GIG Go! Control Panel installation Carmichael

Get true peace of mind with a better burglar alarm system with complete awareness and control from Watchdog Security. Receive real time notifications as well as 24/7 Monitoring from Police, Medical and Fire through our CSAA Five Diamond Certified Monitoring Station and Voice Verification Control. You can control your burglar alarm on the go with a premier app and web interface from

Why Go With Watchdog Security?

Great Technical Support

We offer great technical support when setting up your new act by making sure you are able to operate the system or computer logged into your new system.

12 Years Experience

Over twelve years experience in the alarm industry installing surveillance security cameras as well as security alarm systems in residential homes and commercial businesses.

California State Licenced

Licensed, and Insured. We are licensed in the State of California through the Bureau of Security and Investigative Services, (BSIS)


What is a Access Control System?


Access Control Systems utilize technology and procedures to maintain access for whom is able to go where and when they may enter that area. An Access Control System is made of: input/output devices to manipulate ingress/egress (doors, windows, and related equipment) systems. In order, to maintain and manipulate information regarding a known risk system and to manage information regarding personnel there is a central database. An Access Control System has multiple components: (Doors) entryways, locking devices (Locks), sensors to monitor if the door is open or closed. Verification devices are used to properly identify authorized users, and devices to allow exiting from the secure area to the outside. Notification Protocols contained in an external system to control devices within the system such as a PC.

Call us to assist you with the complete installation and facilitation of your custom access control system.

What is a Biometric Access Control System?


Access Control Systems benefit using technology within accordance in clearly defined and carefully built security procedures allow an organization to create a highly effective means of managing risk. Risk management is when an organization is able to minimize their vulnerability to losses. Companies without effective means to manage risk, and associated costs often see a severe impact in short-term profits and a rise in costs to offset losses.

Access Control Systems require four basic technologies in order to function adequately; PC (personal computer) to manage overall system control of all input devices (devices that detect conditions or events not specifically a door) Access Control doors and the related peripherals, including card readers, keypads, etc. Output Devices are items that respond directly to the input devices. (How they interact is explained below.)

Bio-Metric Scanner Bio-Metric Scanner System Architecture


Before we examine specific Access Control components, we will discuss briefly the architecture involved in an Access Control System. The systems architecture has three basic levels: field controllers, entry/exit devices, and the head end. The “head end” provides the system management capability for all the devices in the network and related information. The “Head End” is typically a personal computer (PC) that receives input information and initiates a signal at the appropriate locations with Basic Access Control Technologies devices. Operator interfacing takes place at the head end (PC).

In most systems now, field controllers, reside between the PC and the entry/exit devices; field controllers provide most of the moment-to-moment controls for the Access Control System. In older systems without the use of intelligent field controllers the PC almost exclusively provided these controls, and when a fault occurs and the (PC) head end goes offline, the entire system became unresponsive. Thankfully today this is not the case. In today’s systems, when the head end is offline, the field controllers ensure the system continues to operate in an effective manner.

Entry/Exit Devices are the “end-of-the-line” components. Working with field controllers, these low level components are able to provide minimal decision making capability independent (PC), to ensure a basic usage of Access Control functionality in case of a fault.

What is the Head End?


The PC functions as a control unit for the system. The PC receives processes and relays data to other devices within the Access Control network. It provides the operator a display to monitor system and day to day operations. In addition, the PC provides the operator a means to “interrogate” the system thoroughly, meaning the operator is able to request specific information about the status of the system and any of the devices within the system. They can also initiate specific actions at any specified location within the system from the Head End.

The PC also stores data and allows the operator to retrieve information, create reports, and back-up any data. In the larger applications requiring advanced systems there may be multiple control units (PC)s located throughout the system. It also should be noted that as we design security systems we prefer to have Access Control systems built on a its own Local Area Network (LAN). This provides significant advantages over the systems which exist on an organization’s main LAN.

What are Field Controllers?


These days, security/surveillance systems are networked together. More importantly, they feature “distributed architectures.” This basically means that instead of having all processing capabilities residing at the head end (PC), processing is “distributed” at many points throughout the network. Field controllers provide this additional processing.

A field controller contains: a CPU (central processing unit), Network communications capability, I/O (input/output) modules (printed circuit boards), card reader modules (printed circuit boards).

Field controllers allow the system to continue to function when the head end (PC) is temporarily unavailable or if another section in the system is down. If this happens, the field controllers store all event activity in order to upload later to the head end (PC) once the system is functional again. If a field controller has requirement for additional information to process a command, it can request information from the head end (PC). Additionally, scheduled exchanges of required data between the head end (PC) and the field controllers allow tracking for events to be logged into history and the current information made available to the field controllers. Also note, our security networks are custom designed to use the industry standard communications protocols. This ensures high level of reliability and minimum down time in the event of component failures.

Access Control System Installations Sacramento california

What are Input devices?


Input devices are connected to Access Control Systems and any detector which reports their status to a PC electronically. The purpose is to provide data to the processor in regards to the current conditions at any given location. Typically they include a wide range of detector types, including: glass break detectors, motion detectors, panic buttons, temperature monitors, ETC.

In addition, to the devices listed above there are additional functioning items that physically reside near or on a door. These devices provide data specifically related to if the door’s open or closed.

Each of these devices provides data directly to the head end (PC) The Head end (PC) can perform a variety of analysis, the modern user interfaces and a wide range of output options.

What are Access Control Door Peripherals?


There are many intricate devices designed in order to control the status of a door. These devices include; door contact switches place requests with exit devices, card readers and/or keypad devices. Door position indicators show the current status of a door and reveal whether it’s open or closed. They are basic electrical devices, by completing a circuit when the door is closed.

Request exit devices are simple electrical switches. These devices are used to indicate someone inside the secured side of the Access Control Door wants to have the door unlocked. This action is typically reported to the PC.

Keypads and Card Readers are perhaps they are the most sophisticated door peripherals used in operation of a Control System. These particular devices, usually exist as a integrated or single unit

Finally, each Access Control door is equipped with a locking mechanism. Either an magnetic lock or electric door strike which can be manipulated by a field controller.

Keypad Card Readers and Card Readers


Keypad Card Readers and Card Readers are devices that read data from the users supplied card. There are a wide variety of distinct media used for these cards: proximity (active or passive), magnetic stripe, bar code, Passive proximity cards, all contain electronic circuitry (including an antennas) which stores the ID data. Each time these cards pass near a reader, then electrical energy radiating from the reader charges the circuitry in the card. Then the circuitry transmits the data (ID information) on the card to the reader. Each card proximity card maintains its own power source. This “on-board” power supply their by increases the range. Proximity card technology is easy-to use and provides a high level of security. Each card stores information in a unique fashion.


Leader in Access Control Installation. – Call For A Free Estimate – (916) 842-4729

See Our Excellent Reviews On Your Favorite Local Directory - Also Check Out Our YouTube Channel For New Videos