{"id":15639,"date":"2021-06-16T09:47:34","date_gmt":"2021-06-16T09:47:34","guid":{"rendered":"https:\/\/blogsecuritasdirect.es\/?p=15639"},"modified":"2021-08-10T09:59:48","modified_gmt":"2021-08-10T09:59:48","slug":"tipos-sistema-control-accesos","status":"publish","type":"post","link":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/","title":{"rendered":"Tipos de sistema de control de accesos"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_69_1 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor:pointer\">\u00cdndice:<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#sistemas-autonomos\" title=\"Sistemas aut\u00f3nomos\">Sistemas aut\u00f3nomos<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#sistemas-centralizados\" title=\"Sistemas centralizados\">Sistemas centralizados<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#sistemas-biometricos\" title=\"Sistemas biom\u00e9tricos\">Sistemas biom\u00e9tricos<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#sistemas-en-la-nube\" title=\"Sistemas en la nube\">Sistemas en la nube<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#sistemas-distribuidos\" title=\"Sistemas distribuidos\">Sistemas distribuidos<\/a><\/li><\/ul><\/nav><\/div>\n[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb overlay_strength=\u00bb0.3&#8243; shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_position=\u00bbright\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_link_target=\u00bb_self\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb overlay_strength=\u00bb0.3&#8243; column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column_text]<span style=\"font-weight: 400;\">Asegurar el control de acceso a una propiedad o negocio es esencial. Por ese motivo, es importante elegir el sistema que mejor se adapte a tus necesidades en funci\u00f3n del espacio, el n\u00famero de entradas y el objetivo principal. Te guiamos a trav\u00e9s de los diferentes <\/span><b>tipos de sistemas de control de accesos<\/b><span style=\"font-weight: 400;\"> a fin de realizar la elecci\u00f3n adecuada.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"sistemas-autonomos\"><\/span><strong>Sistemas aut\u00f3nomos<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Es el sistema de control que controla una \u00fanica puerta y no requiere de conexi\u00f3n a una red. Este tipo de control de acceso es recomendable, por ejemplo, para la entrada principal a una oficina, ya que se limita simplemente a permitir el acceso de la persona identificada a trav\u00e9s de un impulso el\u00e9ctrico.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"sistemas-centralizados\"><\/span><strong>Sistemas centralizados<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Este sistema resulta m\u00e1s complejo y efectivo, ya que se gestionan diferentes accesos a una propiedad o negocio a trav\u00e9s de un canal centralizado que controlo todos los accesos y posibles irregularidades. Es un aliado m\u00e1s ambicioso que permite conectar varias unidades centrales entre s\u00ed recopilando toda la informaci\u00f3n de los accesos m\u00faltiples.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"sistemas-biometricos\"><\/span><strong>Sistemas biom\u00e9tricos<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Es un sistema de control de acceso m\u00e1s sofisticado, ya que se basa en una \u201clectura\u201d de las propias caracter\u00edsticas f\u00edsicas de la persona a identificar. Al detectar cualquier intento de suplantaci\u00f3n, este sistema implica una manipulaci\u00f3n de datos que debe pasar el filtro de las normativas vigentes en torno a la primavidad y uso de datos. Existen diferentes tipos de sistemas de acceso de control bi\u00f3metricos:\u00a0 el de huella dactilar (el m\u00e1s implantado), el de detecci\u00f3n de iris, o el an\u00e1lisis del rostro.\u00a0<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb bg_color=\u00bb#ff0033&#8243; scene_position=\u00bbcenter\u00bb text_color=\u00bblight\u00bb text_align=\u00bbleft\u00bb top_padding=\u00bb2%\u00bb bottom_padding=\u00bb2%\u00bb overlay_strength=\u00bb0.95&#8243; shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbpadding-4-percent\u00bb column_padding_position=\u00bbleft-right\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_link_target=\u00bb_self\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb tablet_text_alignment=\u00bbcenter\u00bb phone_text_alignment=\u00bbcenter\u00bb overlay_strength=\u00bb0.3&#8243; column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb bg_image_animation=\u00bbnone\u00bb][vc_raw_html]JTVCUmliYm9uJTVE[\/vc_raw_html][\/vc_column][vc_column column_padding=\u00bbpadding-4-percent\u00bb column_padding_position=\u00bbleft-right\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_link_target=\u00bb_self\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb width=\u00bb1\/2&#8243; tablet_width_inherit=\u00bbdefault\u00bb tablet_text_alignment=\u00bbcenter\u00bb phone_text_alignment=\u00bbcenter\u00bb overlay_strength=\u00bb0.3&#8243; column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb bg_image_animation=\u00bbnone\u00bb][vc_row_inner column_margin=\u00bbdefault\u00bb text_align=\u00bbright\u00bb][vc_column_inner column_padding=\u00bbno-extra-padding\u00bb column_padding_position=\u00bball\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb overlay_strength=\u00bb0.3&#8243; column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb bg_image_animation=\u00bbnone\u00bb][vc_raw_html]JTVCYm90b24lNUQ=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=\u00bbfull_width_background\u00bb full_screen_row_position=\u00bbmiddle\u00bb equal_height=\u00bbyes\u00bb content_placement=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb overlay_strength=\u00bb0.3&#8243; shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbpadding-4-percent\u00bb column_padding_position=\u00bbtop-bottom\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_link_target=\u00bb_self\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb overlay_strength=\u00bb0.3&#8243; column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column_text]\n<h2><span class=\"ez-toc-section\" id=\"sistemas-en-la-nube\"><\/span><strong>Sistemas en la nube<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Gracias a la tecnolog\u00eda, existen cada vez sistemas m\u00e1s optimizados y precisos. El sistema en la nube es un buen ejemplo, ya que permite controlar los accesos de cualquier negocio o casa desde un dispositivo m\u00f3vil, pudiendo abrir, bloquear o supervisar cualquier \u00e1rea concreta.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"sistemas-distribuidos\"><\/span><strong>Sistemas distribuidos<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Es un tipo de sistema que controla diferentes accesos desde un mismo puesto empleando tecnolog\u00eda de radiofrecuncia. Se trata de un sistema inal\u00e1mbrico y es recomendable en grandes empresas, urbanizaciones o negocios al aire libre.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En Securitas Direct contamos con los sistemas de control de acceso m\u00e1s innovadores del mercado, entre ellos, nuestro novedoso sistema de lector de llaves electr\u00f3nicas. Gracias a una llave de Securitas Direct, cualquier empleado o familiar podr\u00e1 identificarse al acceder a tu negocio u hogar sin necesidad de utilizar c\u00f3digos complicados. Calcula tus posibilidades y descubre cu\u00e1l es la soluci\u00f3n que mejor se adapta a ti.<\/span>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb overlay_strength=\u00bb0.3&#8243; shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb&#8230;<\/p>\n","protected":false},"author":4,"featured_media":15640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-15639","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-servicios-de-seguridad"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tipos de sistema de control de accesos - Securitas Direct<\/title>\n<meta name=\"description\" content=\"Conoce todos los tipos de sistema de control de accesos, adem\u00e1s de otra informaci\u00f3n relacionada con seguridad. Inf\u00f3rmate.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tipos de sistema de control de accesos - Securitas Direct\" \/>\n<meta property=\"og:description\" content=\"Conoce todos los tipos de sistema de control de accesos, adem\u00e1s de otra informaci\u00f3n relacionada con seguridad. Inf\u00f3rmate.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de seguridad - Securitas Direct\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SecuritasDirect\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-16T09:47:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-10T09:59:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Internet Republica\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SecuritasDirect\" \/>\n<meta name=\"twitter:site\" content=\"@SecuritasDirect\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Internet Republica\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\"},\"author\":{\"name\":\"Internet Republica\",\"@id\":\"https:\/\/blogsecuritasdirect.es\/#\/schema\/person\/a0dd562b58ed6d1bc6b0beefd6ca94c5\"},\"headline\":\"Tipos de sistema de control de accesos\",\"datePublished\":\"2021-06-16T09:47:34+00:00\",\"dateModified\":\"2021-08-10T09:59:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\"},\"wordCount\":894,\"publisher\":{\"@id\":\"https:\/\/blogsecuritasdirect.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg\",\"articleSection\":[\"Servicios de seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\",\"url\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\",\"name\":\"Tipos de sistema de control de accesos - Securitas Direct\",\"isPartOf\":{\"@id\":\"https:\/\/blogsecuritasdirect.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg\",\"datePublished\":\"2021-06-16T09:47:34+00:00\",\"dateModified\":\"2021-08-10T09:59:48+00:00\",\"description\":\"Conoce todos los tipos de sistema de control de accesos, adem\u00e1s de otra informaci\u00f3n relacionada con seguridad. Inf\u00f3rmate.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage\",\"url\":\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"cartel prohibido entrar\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"blog\",\"item\":\"https:\/\/blogsecuritasdirect.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tipos de sistema de control de accesos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogsecuritasdirect.es\/#website\",\"url\":\"https:\/\/blogsecuritasdirect.es\/\",\"name\":\"Blog de seguridad - Securitas Direct\",\"description\":\"Protege lo que m\u00e1s te importa con las alarmas de Securitas Direct\",\"publisher\":{\"@id\":\"https:\/\/blogsecuritasdirect.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogsecuritasdirect.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blogsecuritasdirect.es\/#organization\",\"name\":\"Securitas Direct\",\"url\":\"https:\/\/blogsecuritasdirect.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogsecuritasdirect.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2020\/04\/logo_securitas-direct.png\",\"contentUrl\":\"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2020\/04\/logo_securitas-direct.png\",\"width\":100,\"height\":68,\"caption\":\"Securitas Direct\"},\"image\":{\"@id\":\"https:\/\/blogsecuritasdirect.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SecuritasDirect\/\",\"https:\/\/x.com\/SecuritasDirect\",\"https:\/\/www.instagram.com\/securitasdirect\/\",\"https:\/\/es.linkedin.com\/company\/securitas-direct-verisure-group\",\"https:\/\/www.youtube.com\/user\/securitasdirect\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogsecuritasdirect.es\/#\/schema\/person\/a0dd562b58ed6d1bc6b0beefd6ca94c5\",\"name\":\"Internet Republica\",\"sameAs\":[\"http:\/\/internetrepublica.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tipos de sistema de control de accesos - Securitas Direct","description":"Conoce todos los tipos de sistema de control de accesos, adem\u00e1s de otra informaci\u00f3n relacionada con seguridad. Inf\u00f3rmate.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/","og_locale":"es_ES","og_type":"article","og_title":"Tipos de sistema de control de accesos - Securitas Direct","og_description":"Conoce todos los tipos de sistema de control de accesos, adem\u00e1s de otra informaci\u00f3n relacionada con seguridad. Inf\u00f3rmate.","og_url":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/","og_site_name":"Blog de seguridad - Securitas Direct","article_publisher":"https:\/\/www.facebook.com\/SecuritasDirect\/","article_published_time":"2021-06-16T09:47:34+00:00","article_modified_time":"2021-08-10T09:59:48+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Internet Republica","twitter_card":"summary_large_image","twitter_creator":"@SecuritasDirect","twitter_site":"@SecuritasDirect","twitter_misc":{"Escrito por":"Internet Republica","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#article","isPartOf":{"@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/"},"author":{"name":"Internet Republica","@id":"https:\/\/blogsecuritasdirect.es\/#\/schema\/person\/a0dd562b58ed6d1bc6b0beefd6ca94c5"},"headline":"Tipos de sistema de control de accesos","datePublished":"2021-06-16T09:47:34+00:00","dateModified":"2021-08-10T09:59:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/"},"wordCount":894,"publisher":{"@id":"https:\/\/blogsecuritasdirect.es\/#organization"},"image":{"@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage"},"thumbnailUrl":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg","articleSection":["Servicios de seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/","url":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/","name":"Tipos de sistema de control de accesos - Securitas Direct","isPartOf":{"@id":"https:\/\/blogsecuritasdirect.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage"},"image":{"@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage"},"thumbnailUrl":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg","datePublished":"2021-06-16T09:47:34+00:00","dateModified":"2021-08-10T09:59:48+00:00","description":"Conoce todos los tipos de sistema de control de accesos, adem\u00e1s de otra informaci\u00f3n relacionada con seguridad. Inf\u00f3rmate.","breadcrumb":{"@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#primaryimage","url":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg","contentUrl":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2021\/06\/kyle-glenn-dGk-qYBk4OA-unsplash-scaled.jpg","width":2560,"height":1707,"caption":"cartel prohibido entrar"},{"@type":"BreadcrumbList","@id":"https:\/\/www.securitasdirect.es\/blog\/tipos-sistema-control-accesos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"blog","item":"https:\/\/blogsecuritasdirect.es\/"},{"@type":"ListItem","position":2,"name":"Tipos de sistema de control de accesos"}]},{"@type":"WebSite","@id":"https:\/\/blogsecuritasdirect.es\/#website","url":"https:\/\/blogsecuritasdirect.es\/","name":"Blog de seguridad - Securitas Direct","description":"Protege lo que m\u00e1s te importa con las alarmas de Securitas Direct","publisher":{"@id":"https:\/\/blogsecuritasdirect.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogsecuritasdirect.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/blogsecuritasdirect.es\/#organization","name":"Securitas Direct","url":"https:\/\/blogsecuritasdirect.es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogsecuritasdirect.es\/#\/schema\/logo\/image\/","url":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2020\/04\/logo_securitas-direct.png","contentUrl":"https:\/\/blogsecuritasdirect.es\/wp-content\/uploads\/2020\/04\/logo_securitas-direct.png","width":100,"height":68,"caption":"Securitas Direct"},"image":{"@id":"https:\/\/blogsecuritasdirect.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SecuritasDirect\/","https:\/\/x.com\/SecuritasDirect","https:\/\/www.instagram.com\/securitasdirect\/","https:\/\/es.linkedin.com\/company\/securitas-direct-verisure-group","https:\/\/www.youtube.com\/user\/securitasdirect"]},{"@type":"Person","@id":"https:\/\/blogsecuritasdirect.es\/#\/schema\/person\/a0dd562b58ed6d1bc6b0beefd6ca94c5","name":"Internet Republica","sameAs":["http:\/\/internetrepublica.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/posts\/15639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/comments?post=15639"}],"version-history":[{"count":0,"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/posts\/15639\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/media\/15640"}],"wp:attachment":[{"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/media?parent=15639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/categories?post=15639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitasdirect.es\/blog\/wp-json\/wp\/v2\/tags?post=15639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}