Access Control for. Part 3 of 4. Brought to You by. Presented by Video Security Consultants

Size: px
Start display at page:

Download "Access Control for. Part 3 of 4. Brought to You by. Presented by Video Security Consultants"

Transcription

1 2008 Video Security Consultants Brought to You by Presented by Part 3 of 4 A1

2 Part 3 of 4 Taking a Hard Look at Software The essential function of an electronic access control system (EACS) is to control access. But it is software that enables users to make the most of EACS hardware, including the ability to enhance alarm monitoring, control auxiliary devices and integrate badging solutions. By Steven O. Gibbs Welcome to the latest of SECURITY SALES & INTEGRATION s acclaimed D.U.M.I.E.S. series: Access Control for D.U.M.I.E.S. Brought to you by Pelco, this four-part series has been designed to educate readers about electronic access control system (EACS) design and implementation. D.U.M.I.E.S. stands for dealers, users, managers, installers, engineers and sales people. Although many of the functions and features of an EACS are inherent to the intelligent control panels (ICPs) described in Part 2 of this series, it is the EACS software that enables the user to exploit these features. Before we can discuss EACS software in more detail, we must first understand that the choice of platform (computer hardware and operating system) will have an impact on the ultimate functionality of the EACS software. Computer Platforms to Consider In years past, the most basic platform would be a dumb terminal connected to an ICP in order to utilize some basic programming functionality built into the ICP firmware. Some panels actually provided a basic menu structure back to the terminal display screen to assist with programming. A2

3 Today, some of latest EACS products are simply a revised version of this process. With much more programming power, the Web-enabled or edge system is basically an ICP with a Web host application onboard that allows any computer with an Internet browser application to access programming and transaction records over a TCP/IP network, across the room or across the world. Of course, the user can only configure one ICP (and maybe only one entry control point) at a time in this manner. Although this system could work with a limited number of ICPs or entry control points, it would soon become cumbersome to maintain as the system expands. A standalone PC running an EACS software application can communicate with many ICPs utilizing multiple communication protocols such as TCP/IP over Ethernet, RS485 over twisted pair, or RS232 over the public telephone switched network (PTSN). This configuration permits the system administrator to build a central database of panel configurations and maintain common information about credential holders, which the software application then seamlessly distributes to the appropriate ICP. Although a standalone PC running the appropriate operating system (OS) can handle the processing and programming needs of a very large system, EACS Client/Server Configuration A typical electronic access control system (EACS) client/server configuration include task specific workstations. A primary computer runs a database management system (DBMS) application and the core EACS software. Workstations, or clients, often include terminals for administrative tasks, alarm system events and badging. the need for system operation tasks to be divided among several operators usually results in the implementation of the client/server platform. The diagram EACS Client/Server Configuration (below) depicts a typical client/server system with task specific workstations. The primary computer or server will typically be implemented on a server-class PC with an advanced server-level OS and a database management system (DBMS) application. This machine will host the core EACS software application. The number and location of task-specific workstations, or clients, will depend on the complexity of the EACS. In almost any medium- to high-level system, the following workstations will be implemented: administration, alarm and badging (as depicted in the aforementioned diagram). The administration workstation will be used by the system administrator (user responsible for overall system configuration, programming and maintenance). This workstation will normally not be monitored at all times. The alarm workstation should be located in a central, 24/7 staffed area (usually a security control and dispatch center or SCC) and will handle system events that have been configured as alarms. Alarm monitoring features will be discussed in more detail shortly. In a large SCC, utilizing more than one operator, additional alarm workstations may be required. And in a very large EACS implementation spanning many facilities, alarm workstations may be located in more than one facility or building. The badging workstation will normally be the input point for credential holder information as will credential production and activation. Again, in a large EACS implementation, with multiple sites spread over a large area, it will be necessary to provide multiple badging workstations allowing for convenient enrollment points throughout the organization. Make Plans for System Expansion Before selecting any EACS software application, the systems integrator should consider system expansion. This topic, as it applies to EACS hardware, was discussed in Part 2 of this series and it is so important that its relationship to EACS software will be expanded upon here. It is not uncommon for an EACS to grow from a four- or 16-door system to a 50- or 100-door system within a very short timeframe. In fact, many systems continue to grow beyond the 500-reader mark. Expansion is normally a good thing for the systems integrator as the end user will be returning again and again asking for additions, usually in small increments, to the system. The problem occurs when the systems integrator implements an EACS software solution that has to be completely replaced in order to expand beyond a fixed number of entry control points or to expand from a standalone PC to a client/server configuration. This replacement is not only expensive in terms of new software cost, but may require many hours of support from the user s IT department and from the EACS software developer in order to transfer or enter existing EACS system data. It should be apparent that the systems integrator should select an EACS software solution that is modular in design allowing the selection of only those A3

4 components needed for the initial installation, while at the same time, providing upgrades by simply adding the additional modules or activating features installed but initially locked out. EACS Software Features, Functions Prior to the development of distributed processing systems (circa 1980), EACS software was the primary decision maker in host-based systems. A credential was presented to a device, (such as a card reader or keypad), the device relayed the credential data to the software which made the access decision, and a signal was sent back to the device to release the entry point. In today s distributed processing systems, ICPs maintain a file of accepted credentials and communicate with one or more readers, keypads or biometric devices. When a credential is presented, the local control panel makes the access decision and signals the release of the entry point. So, in the most basic EACS the software serves as a user interface to program the ICPs and as a repository of system data and events such as entry/exit transactions. The diagram Common EACS Applications (below) depicts the four basic functional areas of most any EACS Common EACS Applications software application. Although these functions are tightly integrated within the software package, we will study them individually. The basic function of any EACS is, of course, controlling access. This is accomplished by configuring access points controlled by locking hardware and credential readers, configuring rules for access (access levels and time codes), then applying those rules to credential holders. In Part 1 of this series, we discussed the four major access control goals: Limit Access, Increase Security, Provide Audit Trail, and Identify Personnel. In Part 2 of this series we, described physical methods to Limit Access created by hardware devices placed on entry control points. The access control functional area of EACS software provides the user with virtual methods to Limit Access. During initial implementation, the system administrator assigns logical addresses to physical devices, such as credential readers. Once this is accomplished, the readers are now selectable To view previous installments of this series, visit SSI s Web site ( and download them from the D.U.M.I.E.S. series section in the Special Reports link. Most any electronic access control system (EACS) software application includes four, tightly-integrated functions: assigning user access levels; alarm event monitoring; auxiliary device control; and ID badging task. by unique names and can be grouped together to create access levels. Access levels serve two major functions. First, in any system larger than a few entry control points and a dozen credential holders, it would be very time consuming to set up access privileges for each single credential holder by selecting the individual readers each person may access. Furthermore, when a new entry control point is added for each authorized credential holder, the system administrator would need to visit that person s record to add that entry control point. Using access levels, the new entry control point is simply added to the appropriate access level(s) and credential holders having those levels automatically receive access. The second function of access levels allows a system administrator to create access levels for each unique workgroup or job function within the organization, based on rules established as part of the overall security management plan. In a large system, credentials will normally be created and assigned by someone other than the system administrator. For instance, a badging station may be operated by a human resources assistant that has little understanding of the overall security plan. This operator simply assigns an access level to the credential holder based on the new employee s workgroup or job role. An access level is basically a list of credential readers. For each reader added to the list the system administrator assigns a time code. Time codes are simply definitions of when access will be allowed. For example, a time code called 24/7 or ALWAYS would be defined to be active at all times and days (including system-defined holidays). When associated with a reader in an access level, a credential holder would have access at that reader at all times. On the other hand, a time zone defined to be active from 7 a.m. until 5 p.m. on weekdays only and called DAYS would allow access at that reader only during those hours Monday through Friday. A4

5 Holidays are configured by the system administrator to represent days throughout the calendar year when access rules must be modified automatically by the system. When a time code is created the system administrator selects whether or not that time code will be active on days defined in the system as holidays. Referring back to the earlier example of the DAYS time code, if the holiday exception was applied to that time code then on Wednesday, July 4, the time code would remain inactive and deny access to a credential holder at any entry control point paired with that time code. Defining Access Levels The diagram Establishing Access Levels defines three access codes for the fictitious company American Products (described in Part 1 of this series). With access levels defined by department or job function it is very easy to assign access to new credential holders. And, should a new door be added to the production area of American Products, it will only be necessary to update the PRODUCTION access level rather than modifying each of the 50 production workers cardholder records. In many larger systems, it is not possible to define every credential holder s access with a single access level. This will be especially true in multifacility organizations that are spread across a geographical area. When this is the case, the EACS software should allow multiple access levels to be applied to a single credential holder. Access can then be built using a modular approach. Finally, no mater how much thought and effort the system administrator puts into the creation of access levels that can be easily assigned to credential holders, someone will need special access to one or more doors that others in that job function should not have. The precision access feature allows individual doors with an associated time code to be added to specific credential holders. The credential holder database within an EACS software application Establishing Access Levels EACS software should allow multiple access levels to be applied to a single credential holder. A precision access feature allows individual doors with an associated time code to be added to specific credential holders. Above is an example of access levels defined by department or job function. should accommodate all of the information gathered by the workstation operator as a credential is created. This will include name, department, job function and emergency contact information. Since the type, size, and quantity of this information will vary widely across different organizations, the systems integrator should choose a solution that allows many, user-definable fields with this database. In addition to text and numerical data stored in the credential holder s record, EACS software should be capable of maintaining the credential holder image, signature and biometric template (when biometric readers are utilized in the EACS). In Part 4 of this series, we will explore how a credential holder s demographic information should be prepopulated into the record by a tight interface with an external database such as one maintained by the human resources department. Alarm Monitoring Explored When considering the features within the second functional area alarm monitoring it s important to understand how the end user wishes to monitor and respond to alarms and events monitored by the system. Although it is obvious that in a single workstation system all alarms must be displayed there, when implementing a multiworkstation system some type of alarm routing is needed. It is very frustrating for the badging operator, and the people waiting in line, to be interrupted by a door forced open alarm every couple of minutes. There are two basic categories in this functional area: 1. Alarms and events related to the OS, access control software, and communication with field devices 2. Alarms and events associated with door contacts, motion sensors, and other detection devices connected to the EACS In the first category, conditions such as communication errors, workstation OS alerts, and file errors should be displayed on the administration workstation and reported to the system administrator as soon as possible. The second category includes all alarms that would be considered proprietary or intrusion in nature. In a large facility these alarms will normally be sent to an alarm workstation in an area staffed 24/7 by security personnel. In a multisite facility, alarms from smaller offsite facilities would also be monitored at this security control station. In multisite facilities with A5

6 larger off-site complexes, more than one alarm workstation may exist. In some cases, security may staff an information desk during normal business hours. Alarm routing is a feature of the access control software that allows the system administrator to configure one or more destinations for each alarm. It should also be possible to automatically reroute the alarm based on time of day/day of week. The system operator should not be able to clear or delete an alarm until the device has reset. Another important feature prevents motion detection devices from creating hundreds of individual alarms from movement within a protected area. Alarm mapping features allow the systems integrator to import building floor plans into the EACS software and then place icons representing EACS devices on those maps providing system operators with visual cues to device locations. When an event configured as an alarm occurs, the appropriate map should appear indicating the device in alarm. The operator should also be able to select that device for further processing (such as acknowledging) along with other adjacent devices. For instance, a video surveillance camera may be located near the alarm point and clicking on the camera icon would bring the camera up on a CCTV call-up monitor. When access control software contains an interface to digital paging services, alarms and events can also be routed through this interface to one or more pagers worn by security personnel, facility managers or the system administrator. Automating Auxiliary Functions While the alarm monitoring features of an EACS software application enable the ability to define and configure ICP input points, the third functional area of EACS software auxiliary controls allows the user to define and configure ICP relays provid- EACS Software Applications Defined What follows are descriptions of features common to electronic access control system (EACS) software applications. Database partitioning Used in larger systems that span multiple sites with autonomous control. While the system administrator may access and manipulate all the system data, a system user at one site can not access system data associated with another. Alarm routing Alarms can be routed across a multisite system to appropriate system operator consoles. Alarms can also be routed based on day/time criteria sending specific alarms to an information desk workstation only while it is staffed. Alarm video call-up The EACS directs the video surveillance system to display a camera associated with a specific alarm through an interface between the two systems. Credential-holder verification The EACS retrieves the stored credentialholder s image from the database for comparison to a live image from a camera associated with an entry/exit point. Transaction verification The access control system directs a DVR to retrieve a stored series of images associated with a specific record in the EACS transaction log file through an interface between the two systems. Alarm/Event paging The EACS sends a text message to a digital pager or wireless phone through a software driver designed to access digital paging and wireless phone networks. ing output signals to auxiliary access control and alarm components. The primary output control feature allows the systems integrator to define and configure the operation of control relays that operate devices such as locks on nonreader-controlled doors or gate operators at parking access areas. Relays can also be utilized to create simple interfaces with other security management and safety systems. Examples of this type of interface include activating a fire alarm system, triggering a digital dialer or calling up a specific surveillance camera. While all auxiliary output relays may be activated from a workstation by the system operator, it is more common to automate the operation of outputs in one of two ways. In the first method of automation, the system administrator associates a time code with a physical output device to create a timed command. For example, send a relay pulse to the alarm system at 7 a.m. each weekday to disarm the building s intrusion alarm. Or turn on a relay connected to a magnetic lock on the front lobby door at 5 p.m. to lock this entrance after normal business hours. The second method for automating auxiliary outputs involves associating an input point event with an output control relay device. For instance, when a panic switch is operated in the reception area, an output control relay signals a CCTV alarm switcher to call up the reception area camera. Or when an input is received from the fire alarm system, all lock control relays activate to unlock the building s exterior doors. This functionality becomes very useful for many building management functions normally considered outside the scope of a security management system. Since the communication network is in place and the EACS has ICPs and interface modules spread throughout the facility or across a large geographic area, it becomes very easy to configure a response at one location based on an event at another. A6

7 Even though this functionality allows the systems integrator to create an interface between various security management systems, a hard-wired interface of this type can quickly become cumbersome and difficult for the system administrator to manage. In Part 4 of this series we will investigate integration between security management systems using digital integration. Defining System User Privileges The ability to assign access levels or credential holder privileges is an important function of EACS software. The above Edit User window examples the variety of options available in allocating access privileges for individual cardholders. Integrated ID Badging As depicted in the Common EACS Applications diagram, the production of photo ID access credentials makes up the fourth (and sometimes optional) functional area of an EACS software application. Not that long ago, video badging systems and access control systems were two stand-alone systems. Systems integrators were required to interface these systems themselves. Today, every major access control software solution has an integrated badging function. As part of the review of the end user s needs, the systems integrator should determine how many new and replacement badges will be produced per month. In a large facility, a separate workstation will be required in a location convenient for employees, contractors and visitors to have their pictures taken. In a well integrated system, when a new employee arrives at the badging workstation, their demographic information (name, title, department) should already be in the EACS database through an interface with the human resources (HR) system (see Part 4 of this series). The badging operator simply captures a picture, assigns an access level and produces the badge. While reviewing the end user s needs, the systems integrator should also know how many different badge formats may be required. Badge formats should be easy to create either by the end user or as a value- or cost-added service from the systems integrator. A typical badging workstation consists of a computer workstation, video capture card, video camera, badge printer and (in the case of encodable cards) an encoder. In addition to the above hardware costs, an additional software license or package will usually have to be purchased for each workstation. In an organization with multiple sites it s usually impractical to implement a badging workstation at the smaller, off-site facilities. In this case, the main badging workstation (and software) should be capable of importing digital photos captured at the remote site (with an inexpensive digital camera) and sent to the badging workstation on media cards or by attachment. The badging operator produces the card and returns it to the originating facility. This simple feature eliminates the need for employees to travel between sites to obtain an ID badge, saving thousands of dollars in lost productivity. If the access control system will operate across several operational areas, the end user may not want a system operator at one facility to have access to credential holder records, access levels and time codes at another. Nor would they like an operator at one facility to unlock a door at another. If this is the case, the systems integrator will need to implement some form of database partitioning within the EACS database. This is normally a feature set of the EACS software application. In large systems the workload is normally spread out among several operators, each with a specific responsibility. In this situation, it is a good idea to implement workstations configured to perform only these specific jobs. For example, the security officer working the alarm workstation should not be able to change access levels or credential holder privileges and the badging station operator should not be able to change basic configurations or shunt alarms. This functionality is normally a software feature based on privileges assigned by the system administrator when the operator s login is created. If this is an important requirement to the end user, the systems integrator should ensure that the software provides a wide flexibility in assigning privileges. For an example of this, see the diagram above. Continue Bringing It Together As a practical exercise, review what has been discussed in Parts 1-3 of this series. Use the site survey and floor plan of American Products, Pomona Facility introduced in Part 1 of this series (download it on SSI s Web site) and begin to expand it by determining the type of operating platform you would select and listing those software features and functions that the system administrator at American Products might benefit from implementing. In Part 4 of this series we will investigate some advanced features of an EACS focusing on large DBMS issues, advanced security network communications and IT convergence, utilizing reports to better manage the system, and creating a tightly integrated security management system using digital and data interfaces. Steven Gibbs has more than 30 years experience in access control systems performing installation, system design, project management and training functions. He can be contacted at (248) or steve@ dvdrvtravel.com. A7

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software Engineered to meet today s demands and tomorrow s challenges, Keyscan s System VII software delivers unique features to provide an access control solution

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS Security management system for multi-site organizations. PACOM Graphical Management System (GMS) is the modular client-server application that integrates all of PACOM

More information

The system should also be capable of recording events automatically on any compatible DVR and should be able to retrieve recordings based on events.

The system should also be capable of recording events automatically on any compatible DVR and should be able to retrieve recordings based on events. 0BThe System The Security Management System should be capable of Controlling and Monitoring Access through the doors, Monitor and control Inputs and Outputs, include an Integrated Video Badging, Integrate

More information

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports Aviation Solutions Why Tyco for airports? Our systems help protect over 110 airports Secures over 80% of UK Airports and more than 60 US Airports Tyco has the only dedicated airport specific access control

More information

Access Professional Edition. The flexible access control system that grows with your business.

Access Professional Edition. The flexible access control system that grows with your business. Access Professional Edition The flexible access control system that grows with your business www.boschsecurity.com Access Professional Edition: the ideal solution for easy and intuitive access management

More information

ARCHITECTURAL AND ENGINEERING SPECIFICATION

ARCHITECTURAL AND ENGINEERING SPECIFICATION ARCHITECTURAL AND ENGINEERING SPECIFICATION Access Control System ACTpro Vanderbilt Industries, Clonshaugh Business and Technology Park, Dublin, D17 KV84, Ireland TABLE OF CONTENTS PART 1 GENERAL 1.1 System

More information

Pro-Watch Software Suite. Architect and Engineering Specifications. January 9, 2002 Revision 3.4

Pro-Watch Software Suite. Architect and Engineering Specifications. January 9, 2002 Revision 3.4 Architect and Engineering Specifications Revision 3.4 SECTION 13800 BUILDING AUTOMATION AND CONTROL Part 1 GENERAL 1.0.1. GENERAL 1.0.2. REFERENCES 1.0.3. DEFINITIONS 1.0.4. SYSTEM DESCRIPTIONS 1.0.5.

More information

AIRPORTS. CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds

AIRPORTS. CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds AIRPORTS CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds CARECALLER CARECALLER Emergency Call Systems are perfect for any Airport that is concerned with the safety and security of their employees.

More information

Avigilon Control Center System Integration Guide

Avigilon Control Center System Integration Guide Avigilon Control Center System Integration Guide with Gallagher Command Centre INT-CARDAX-C-Rev3 Copyright 2013 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation

More information

Facility Commander Complete, Integrated Command and Control

Facility Commander Complete, Integrated Command and Control Facility Commander Complete, Integrated Command and Control 2.0 Facility Commander Complete, integrated command and control Securing your business facilities requires multiple systems, often from different

More information

Facility Commander Wnx

Facility Commander Wnx Facility Commander Wnx Integrated security management platform for Windows Seamless. Effective. Efficient. Integrate security applications on one versatile platform It s easy and efficient to seamlessly

More information

DVTEL DVR Interface. DigiOp DVR Interface

DVTEL DVR Interface. DigiOp DVR Interface Cardax FT Command Centre supports interfaces with a range of third party security products, via Cardax FT Controller API middleware software interfaces. All Cardax FT Controller API interfaces are individually

More information

Millenium Electronic Access Control Systems Networked Real-Time Access Control

Millenium Electronic Access Control Systems Networked Real-Time Access Control Millenium Electronic Access Control Systems Networked Real-Time Access Control N e t w o r k e d R e a Automate routine security issues throughout your facilities. Millenium achieves increased security

More information

Monitoring Operator Guide. Access Control Manager Software Version

Monitoring Operator Guide. Access Control Manager Software Version Monitoring Operator Guide Access Control Manager Software Version 5.10.10 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, ACM VERIFY AND TRUSTED

More information

Net2. Total Access Control.

Net2. Total Access Control. Paxton Access Net2. Total Access Control. PC based access control from Paxton Access. Why use Access Control? Why get rid of keys? Access control gives you control over who gains entry to your building.

More information

Gallagher System Integrations

Gallagher System Integrations Gallagher System Integrations Gallagher Command Centre supports integrations with a range of third party security products, using Gallagher developed interface software and industry standard protocols.

More information

CARD ACCESS CONTROL SYSTEM

CARD ACCESS CONTROL SYSTEM SECTION 13851 CARD ACCESS CONTROL SYSTEM PART 1 GENERAL 1.01 SUMMARY A. Section Includes: A complete, operable, tested, integrated proximity access control system, to operate on a proximity principle where

More information

Tech Data Sheet D01662GB0_Esgraf 4.1 and Configuration Server 30/2011 2/(5)

Tech Data Sheet D01662GB0_Esgraf 4.1 and Configuration Server 30/2011 2/(5) Tech Data Sheet D01662GB1_Esgraf 4.1 and Configuration Server 30/2011 1/(5) Esgraf 4.1 graphical user interface, configuration server and fire detectors contamination monitoring Esgraf 4.1 ESGRAF is a

More information

Avigilon Control Center System Integration Guide

Avigilon Control Center System Integration Guide Avigilon Control Center System Integration Guide with Gallagher Command Centre INT-CARDAX-C-Rev2 Copyright 2011 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation

More information

Course Catalogue. An evolution of excellence. Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers

Course Catalogue. An evolution of excellence. Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers Course Catalogue Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers An evolution of excellence Contact information: UTC Fire & Security Kouterveldstraat

More information

Net2 Access Control. Paxton Access

Net2 Access Control. Paxton Access Net2 Access Control Paxton Access Why use Access Control? Why get rid of keys? Access control gives you control over who gains entry to your building. Keys also do this - so what is the difference? When

More information

Architect and Engineering Specification

Architect and Engineering Specification Architect and Engineering Specification TD0045a rev0400 5007 South Howell Ave. Milwaukee WI 53207 (414) 769-5980 (800) 323-4576 Fax (414) 769-5989 www.engsysgroup.com SECTION 13800 BUILDING AUTOMATION

More information

Integrated security management platform for Windows. Seamless. Effective. Efficient.

Integrated security management platform for Windows. Seamless. Effective. Efficient. Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them on multiple applications when each

More information

CITY OF DENTON RFP FOR SECURITY CARD ACCESS CONTROL SYSTEM EXHIBIT 2 SCOPE OF WORK AND TECHNICAL SPECIFICATIONS

CITY OF DENTON RFP FOR SECURITY CARD ACCESS CONTROL SYSTEM EXHIBIT 2 SCOPE OF WORK AND TECHNICAL SPECIFICATIONS EXHIBIT 2 SCOPE OF WORK AND TECHNICAL SPECIFICATIONS The scope of work shall be finalized upon the selection of the Firm. The proposal submission shall have accurately described your understanding of the

More information

OpenDevice Events Guide

OpenDevice Events Guide OpenDevice Events Guide 2016 United Lenel is a part of UTC Climate, Controls & Security, a unit of United July 19, 2016 1 Table of Contents Open Device Events... 3 Granted Access Events... 8 Denied Events...

More information

Made possible by an innovative licensing scheme, which allows individual hardware configuration, up to the maximum configuration:

Made possible by an innovative licensing scheme, which allows individual hardware configuration, up to the maximum configuration: Security Solutions MB-Secure The modular platform for security solutions The multifunctional control unit series MB-secure is the base platform for integration of intrusion detection, access control and

More information

Cardax System Comparison

Cardax System Comparison System Comparison Hardware FT Series 5 Syst Com 131102 Syst Com 131102 2 Contents 1. Introduction... 5 2. System Diagrams... 7 3. Hardware Comparison... 10 4. Comparison... 11 Syst Com 131102 3 Syst Com

More information

GE Security. Wnx. Facility Commander. Integrated security management platform for Windows. Seamless. Effective. Efficient.

GE Security. Wnx. Facility Commander. Integrated security management platform for Windows. Seamless. Effective. Efficient. GE Security Facility Commander Wnx Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them

More information

NextGen Home Security. Quick Reference Guide

NextGen Home Security. Quick Reference Guide TM NextGen Home Security Quick Reference Guide Fire Auxiliary Panic (not active) Stay Away Chime Reset Bypass To view the full user manual, go to www.bellaliant.net/homesecurity and select Support. Arming

More information

HikCentral Web Client. User Manual

HikCentral Web Client. User Manual HikCentral Web Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright protection.

More information

Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire

Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire ISC West 2013 Product Showcase Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire www.mircomgroup.com [TX3] Unified Solution Our unified solution

More information

P2000 and Metasys System Integration

P2000 and Metasys System Integration P2000 and Metasys System Integration Product Bulletin Code No. LIT-12012141 Software Release 3.14 SP1 Issued June 23, 2017 The Johnson Controls P2000 Security Management System supports the integration

More information

G SERIES: Security INTEGRATION as you want it. Greater expansion, communication, video integration, system resilience, and automation.

G SERIES: Security INTEGRATION as you want it. Greater expansion, communication, video integration, system resilience, and automation. G SERIES: Security INTEGRATION as you want it Greater expansion, communication, video integration, system resilience, and automation. G Series Integrated Security Solution Fire Intrusion Access Greater

More information

RFP Addendum 2 March 31, 2016

RFP Addendum 2 March 31, 2016 RFP Addendum 2 March 31, 2016 For Best Value Procurement Option Three Security Upgrades Ph 1 UT Health Science Center SBC No. 540/013-04-2015 This Addendum forms a part of the Request for Proposals (RFP)

More information

Building Integration System. Your platform for customized security and safety management.

Building Integration System. Your platform for customized security and safety management. Building Integration System Your platform for customized security and safety management www.boschsecurity.com One platform for everything Efficient building management is becoming not only more important,

More information

Advisor Advanced Mobile Application User Manual

Advisor Advanced Mobile Application User Manual Advisor Advanced Mobile Application User Manual Content Warnings and Disclaimers 2 Advanced Mobile 2 Contact information 2 Description 2 Screen navigation 4 Gestures 4 Menu 4 Help navigation 4 Login 5

More information

HikCentral Web Client. User Manual

HikCentral Web Client. User Manual HikCentral Web Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright protection.

More information

Honeywell Total Connect Remote Services

Honeywell Total Connect Remote Services Honeywell Total Connect Remote Services Basic User Guide With Honeywell Total Connect Remote Services, you can stay connected and in control of your home or business whenever you want, wherever you are.

More information

Perimeter Product Overview. Effective protection for your business

Perimeter Product Overview. Effective protection for your business Perimeter Product Overview Effective protection for your business The Gallagher difference Our innovation is driven by the desire to solve problems, meet your needs and provide real business value. We

More information

Why Should You Invest In An Access Management System?

Why Should You Invest In An Access Management System? Why Should You Invest In An Access Management System? The key word in this question is Invest. Buying and installing an access system by itself is an investment that will increase security, enhance overall

More information

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC Integrated Security and Building Automation Technology Solutions and Services SDI Security Center of Excellence Charleston, SC SDI 7445 Cross County Road, Suite 10 North Charleston, SC 29418 843.554.7622

More information

Integrated Solutions. Integrated Solutions HONEYWELL SECURITY & COMMUNICATIONS. More and more, customer requirements cannot

Integrated Solutions. Integrated Solutions HONEYWELL SECURITY & COMMUNICATIONS. More and more, customer requirements cannot HONEYWELL SECURITY & COMMUNICATIONS Integrated Solutions More and more, customer requirements cannot be met with one solution rather, they need a seamless approach that integrates different elements to

More information

Redefining Security for the Modern Facility

Redefining Security for the Modern Facility Redefining Security for the Modern Facility TAC I/A Series Andover Continuum Security Solutions Make the most of your energy 02 Protecting your people, property and data Andover Continuum 01 Trust your

More information

Ademco Vista Alarm Panel

Ademco Vista Alarm Panel System Galaxy Quick Guide CONFIGURATION AND OPERATION Ademco Vista Alarm Panel JAN 2018 SG 10.5.6 System Galaxy Quick Guide For Ademco Vista Panel Configuration & Operation 2nd edition JAN 2018 Information

More information

Patriot Systems Limited

Patriot Systems Limited COPYRIGHT 1997 - The Patriot Systems Ltd. Patriot Alarm Monitoring Automation Package is licensed for use on one computer, by the original person, or company, or organization whose name is registered with

More information

Vykon. Security. Integrated Access Control. Web enabled security management built on the Niagara Framework

Vykon. Security. Integrated Access Control. Web enabled security management built on the Niagara Framework Vykon Security Integrated Access Control Web enabled security management built on the Niagara Framework Niagara for Security Applications Integrating security within building automation systems brings

More information

USD 380 Centralia, Frankfort & Vermillion

USD 380 Centralia, Frankfort & Vermillion PROJECT MANUAL District Wide Security Upgrade Project Software and Hardware Specifications Covering Locking Hardware Access Control Software & Hardware Video Software & Hardware January 30, 2018 USD 380

More information

System Galaxy Quick Guide

System Galaxy Quick Guide System Galaxy Quick Guide CONFIGURATION AND OPERATION Integrating CCTV with System Galaxy JAN 2019 SG 11.1.0.2 System Galaxy Quick Guide For CCTV Integration Configuration & Operation Information in this

More information

Automations and ACLinks. Technical Support Engineering Rosslare Security NA For more information please see

Automations and ACLinks. Technical Support Engineering Rosslare Security NA For more information please see Automations and ACLinks Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com AC Links are used to create automations and perform custom operations on access

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

ACCESS CONTROL SOLUTIONS ACTEC SERIES

ACCESS CONTROL SOLUTIONS ACTEC SERIES ACCESS CONTROL SOLUTIONS ACTEC SERIES CONTENTS Introduction...1 Our Global Solution...2-3 Security and Building Management Architecture ProNet PLUS Software...4-6 The Combination of Power and User Friendliness!...4

More information

INDUSTRIALMANDOWN & LONEWORKER

INDUSTRIALMANDOWN & LONEWORKER INDUSTRIALMANDOWN & LONEWORKER PowerfulSecuritySolutionsForSeriousSecurityNeeds Emergency Call Systems are perfect for any company that is concerned with the safety and security of their employees. Our

More information

Complexity made simple

Complexity made simple Complexity made simple ICTProtegeGX : Faster, smarter, stronger. Introducing ProtegeGX At ICT we believe the key to great software is doing all the hard thinking up-front so you don t have to. There s

More information

SIMPLIFIED HOME SECURITY AND CONTROL

SIMPLIFIED HOME SECURITY AND CONTROL SIMPLIFIED HOME SECURITY AND CONTROL HOME CONTROLLER USER GUIDE HOME CONTROLLER Mediacom introduces a whole new level of security for the things that matter most in your life. Whether you re home or away,

More information

Ion Gateway Cellular Gateway and Wireless Sensors

Ion Gateway Cellular Gateway and Wireless Sensors Page 1 of 9 Account & Network Setup If this is your first time using the Ion Gateway online system site you will need to create a new account. If you have already created an account you can skip to the

More information

Session VI Smart safety systems

Session VI Smart safety systems Session VI Smart safety systems September 09th, 2016 Kolkata Denzil D Enterprise security Building Technologies Siemens Ltd Siemens AG 2011. All rights reserved. Safety every where Hospital Office Residential

More information

P2000 and Metasys System Integration

P2000 and Metasys System Integration P2000 and Metasys System Integration Product Bulletin Code No. LIT-12011781 Software Release 3.12 Issued June 20, 2013 Supersedes April 20, 2012 Refer to the QuickLIT Web site for the most up-to-date version

More information

UltraSync Modular Hub

UltraSync Modular Hub Intrusion UltraSync Modular Hub UM-5000-CPU OVERVIEW The UltraSync Modular Hub is a smart security system ideal for residential installations requiring hardwired and/or wireless intrusion systems, as well

More information

Avigilon Control Center 5 System Integration Guide

Avigilon Control Center 5 System Integration Guide Avigilon Control Center 5 System Integration Guide for Paxton Net2 Access Control Systems 2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with

More information

Paradox Integration Module Settings Guide

Paradox Integration Module Settings Guide Paradox Integration Module Settings Guide List of Terms used in Paradox Integration Module Settings Guide............. 3 Introduction into Paradox Integration Module Settings Guide............... 4 Configuration

More information

Common Questions & Answers

Common Questions & Answers Common Questions & Answers Summary of Advantages Honeywell has proven manufacturing and design capability, distribution expertise and the field training/support necessary for a successful partnership with

More information

Integrated Security Solutions

Integrated Security Solutions Integrated Security Solutions Table of Contents Control Panels 4 Keypads 8 Communication Modules 16 I/O Expanders 20 Door Control 24 Home Automation 25 RF Receivers 26 3 Our integrated security solutions

More information

The WAVE Plus Instant Notification System for Schools and Colleges

The WAVE Plus Instant Notification System for Schools and Colleges Instant Notification System for Schools and Colleges Duress alarm has been activated in the School of Engineering! Schools strive to provide a safe environment for students and teachers. In an emergency,

More information

Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks

Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks This guide supplements the Synergis Master Controller Configuration Guide and explains how to configure Assa Abloy

More information

Complete Security Solution

Complete Security Solution Complete Security Solution Intrusion Video Access All-in-one, comprehensive security for premises, property and people Complete Security Solution Tyco s Complete Security Solution provides a comprehensive

More information

UD-VMS510i. Surveillance Management Center

UD-VMS510i. Surveillance Management Center Surveillance Management Center Introduction VMS510i is a flexible, scalable, high reliable and powerful central management system. Client-Server Architecture, Integrating with multiple surveillance systems.

More information

Lighting Xpert Insight User Manual

Lighting Xpert Insight User Manual Lighting Xpert Insight User Manual Table of Contents 1 About This Document... 3 1.1 Key Terms... 3 1.2 Related Fifth Light Documentation... 3 2 Lighting Xpert Insight Overview... 4 2.1 Key Features...

More information

Network Hardware and wiring (quiz)...

Network Hardware and wiring (quiz)... 4120 Network/TSW (FA049) Course Agenda Day 1 Course Introduction (Presentation)... 8:00 am to 8:30 am Break Module 1 Installing and Configuring Network Software Applications 4120 New Network Programmer

More information

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable. New thinking Sentus Automation is able to control and manipulate data at ease whilst delivering a low cost per point return. XML interface: Information can be exported/viewed by an unlimited number of

More information

A Smart & Integrated Security solution

A Smart & Integrated Security solution Advisor Advanced A Smart & Integrated Security solution In a connected world Empowered with UltraSync services Security and Access Control in one providing a scalable system UTC s Advisor Advanced security

More information

Lonix Access Control Operation & Maintenance Manual

Lonix Access Control Operation & Maintenance Manual 1 (7) Lonix Access Control Operation & Maintenance Manual Lonix Ltd Teollisuuskatu 33 FI-00510 Helsinki Finland www.lonix.com 2 (7) Contents 1 Introduction...3 1.1 Health and Safety...3 1.2 Health and

More information

Designing the Right Access Control System A Case Study. 12 th May 2010

Designing the Right Access Control System A Case Study. 12 th May 2010 Designing the Right Access Control System A Case Study 12 th May 2010 Partner of Choice Approach Committed to working together to deliver innovative security solutions - End User - System Integrator -

More information

Grandstream Networks, Inc. GDS3710 Input/output Connection Guide

Grandstream Networks, Inc. GDS3710 Input/output Connection Guide Grandstream Networks, Inc. Table of Contents INTRODUCTION... 4 GDS3710 WIRING CONNECTION... 5 Powering and Connecting the GDS3710... 5 Power and Data PINs... 5 Alarm In and Alarm Out PINs... 6 DETECT AND

More information

OnGuard 7.1 Resolved Issues

OnGuard 7.1 Resolved Issues Lenel Systems International, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Contents OnGuard 7.1 Resolved Issues 1. Introduction... 2 2. Access

More information

Patriot Systems Limited

Patriot Systems Limited COPYRIGHT 1997 - The Patriot Systems Ltd. Patriot Alarm Monitoring Automation Package is licensed for use on one computer, by the original person, or company, or organisation whose name is registered with

More information

OnGuard 7.2 Resolved Issues

OnGuard 7.2 Resolved Issues UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Contents OnGuard 7.2 Resolved Issues 1. Introduction...

More information

This technical update applies to Pro-Watch Software Release 3.5 and later.

This technical update applies to Pro-Watch Software Release 3.5 and later. Technical Update Pro-Watch Software Intercom Product Support Product Versions This technical update applies to Pro-Watch Software Release 3.5 and later. Overview Intercom systems consist of master stations,

More information

CITY OF MT. PLEASANT MT. PLEASANT DEPARTMENT OF PUBLIC SAFETY 804 E. High St. Mt. Pleasant, MI 48858

CITY OF MT. PLEASANT MT. PLEASANT DEPARTMENT OF PUBLIC SAFETY 804 E. High St. Mt. Pleasant, MI 48858 CITY OF MT. PLEASANT MT. PLEASANT DEPARTMENT OF PUBLIC SAFETY 804 E. High St. Mt. Pleasant, MI 48858 ELECTRONIC ACCESS CONTROL SYSTEM (EACS) & FACILITY MANAGEMENT & CONTROL SYSTEM (FMCS) INTEGRATION PROJECT

More information

ACTIVE INFRARED BARRIER

ACTIVE INFRARED BARRIER Although PROTECH provides high security indoor intrusion sensors for the military and government markets, our specialty is outdoor protection. Since we first introduced our PIRAMID outdoor dual technology

More information

WEBs AX Security. Integrated Security With Simple, Web-Based Management

WEBs AX Security. Integrated Security With Simple, Web-Based Management WEBs AX Security Integrated Security With Simple, Web-Based Management Built-In Peace Of Mind Flexibility is the key to Honeywell WEBs-AX Security. Whether you need single site or enterprise access control,

More information

Architectural and Engineering Specification for a Security Management System. StarNet 2

Architectural and Engineering Specification for a Security Management System. StarNet 2 Architectural and Engineering Specification for a Security Management System StarNet 2 Jan 2, 2018 Page 1 of 12 AE-S2-IN-R1-EN-01/18 This document is intended to provide performance specifications and

More information

EC-BOS-602/616 AX Security

EC-BOS-602/616 AX Security D a t a s h e e t EC-BOS-602/616 AX Security Comprehensive, easy-to-use Access Control management solution Overview The heart of EC-Net AX Security is the EC- BOS-602/616 AX Security, an advanced IP-based

More information

Welcome to a world where technology flows through the heart of your business environment. Welcome to CDC

Welcome to a world where technology flows through the heart of your business environment. Welcome to CDC Welcome to a world where technology flows through the heart of your business environment Welcome to CDC Introduction to Integra 4 Integra configuration 4 Graphical Supervisor 6 Integra difference 8 Integra

More information

Dell and Lenel Grow Globally, Together

Dell and Lenel Grow Globally, Together technology Dell and Lenel Grow Globally, Together CASE STUDY OnGuard Delivers Flexible Capabilities and Ability to Handle Eventualities That We Couldn t Even Yet Predict. At age 19, Michael Dell founded

More information

Boztek Solutions` PLAYSTATE

Boztek Solutions` PLAYSTATE Boztek Solutions` PLAYSTATE REMOTE MONITORING & CONTROL SYSTEM FOR PLAYING FIELDS & OPEN SPACE Contact Details: Boztek Solutions Pty Ltd PO Box 272, Windsor, NSW 2756 Unit 12/124 Ham Street, South Windsor,

More information

Intelligent Keys. A smart solution for recurring revenue

Intelligent Keys. A smart solution for recurring revenue Intelligent Keys A smart solution for recurring revenue Cloud-Based Services Benefits of the Cloud: For your customers: Ensures that a facility s database is always accessible, secure and up-to-date Enables

More information

Using ANM Mobile CHAPTER

Using ANM Mobile CHAPTER CHAPTER 19 Date: 3/22/13 This chapter describes Cisco ANM Mobile, which allows you to access your ANM server or ANM Virtual Appliance and manage your devices using a mobile device such as an iphone or

More information

Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr

Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr Date: October 13, 2006 Announcing: Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr Facility Explorer Asset Protection Yorkland Controls Ltd. is excited to announce a significant addition

More information

Gallagher Perimeter Product Overview

Gallagher Perimeter Product Overview Gallagher Perimeter Product Overview 1 security.gallagher.com Gallagher is a global leader in the innovation, manufacture and delivery of security solutions. Meeting our customers needs inspires us to

More information

Remarkable Entry Just Got Easier. VISCOUNT MESH. Making a

Remarkable Entry Just Got Easier. VISCOUNT MESH. Making a Making a Remarkable Entry...... Just Got Easier. VISCOUNT MESH Touch Screen Telephone Entry Systems Card Access, Elevator Control, Door Alarms and Accessories. MESH MUCH More Than Telephone Entry MESH

More information

WIN-PAK SE with VISTA Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination

WIN-PAK SE with VISTA Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination WIN-PAK SE with VISTA Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS A Winning Combination Unlock the Possibilities! Typical Applications Office Buildings Day Care Centers Pharmacies

More information

TX3 Series. TX3 Nano. Configuration Manual

TX3 Series. TX3 Nano. Configuration Manual TX3 Series TX3 Nano Configuration Manual Version 2.4 TX3 Nano Configuration Manual 1 LT-1194 Copyright March 2018 Copyright March 2018 Mircom Inc. All rights reserved. TX3 Nano Configuration Manual Version

More information

Product Datasheet MM8000 MP3.15 Management Station

Product Datasheet MM8000 MP3.15 Management Station Product Datasheet MM8000 MP3.15 Management Station DMS The MM8000 provides a wide array of solutions for the centralisation and management of physical security and control systems. Founded on cutting edge

More information

Datasheet Face Recognition [Genetec VMS]

Datasheet Face Recognition [Genetec VMS] Datasheet Face Recognition [Genetec VMS] Version 3.6 This Specification Sheet gives the details of system requirements, features and other salient points of AllGoVision Face Recognition application for

More information

Contents. 30 References

Contents. 30 References LIMITLESS IP SYSTEM Contents 05 Applications 07 What can Botech offer me 09 Video IP Intercom Systems 11 Doorbell Panel 13 Monitor for Single-Family Home 18 Doorbell Panel Villa Type 19 Integrated Security

More information

Flair 500 Series Annunciators

Flair 500 Series Annunciators Flair 500 Series s Basics Flair Multi-Zone s (MZAs) are fully functional, flexible, programmable micro controller based alarm control panels. They can be used independently d or in conjunction with other

More information

Am I safe working in this building?

Am I safe working in this building? Am I safe working in this building? Fusion is a user-friendly security management solution providing situational awareness and peace of mind at all times. Answers for infrastructure. Sophisticated technology

More information

BMS Specification. Lonix Ltd.

BMS Specification. Lonix Ltd. BMS Specification 1 (18) BMS Specification Lonix Ltd www.lonix.com BMS Specification 2 (18) INDEX 1 System Architecture...3 1.1 System Integration...3 1.2 Layered System Architecture...3 1.2.1 Service

More information

DeltaV Operate. Product Data Sheet DeltaV Operate December 2006 Page 1. Introduction. Benefits

DeltaV Operate. Product Data Sheet DeltaV Operate December 2006 Page 1. Introduction. Benefits December 2006 Page 1 You can easily manage your process with. Powerful operator interface, optionally up to four monitors Alarms prioritized by user Secure, standard operating desktop Intuitive graphics

More information

RVRC Training Manual Fast Trace Installer Menu

RVRC Training Manual Fast Trace Installer Menu RVRC Training Manual Fast Trace Installer Menu Advanced Independent Monitoring Introduction The following guide is explain how to set up a Fast Trace or Fast TX and common areas to look out for and check

More information