Access Control for. Part 3 of 4. Brought to You by. Presented by Video Security Consultants
|
|
- Branden Russell
- 5 years ago
- Views:
Transcription
1 2008 Video Security Consultants Brought to You by Presented by Part 3 of 4 A1
2 Part 3 of 4 Taking a Hard Look at Software The essential function of an electronic access control system (EACS) is to control access. But it is software that enables users to make the most of EACS hardware, including the ability to enhance alarm monitoring, control auxiliary devices and integrate badging solutions. By Steven O. Gibbs Welcome to the latest of SECURITY SALES & INTEGRATION s acclaimed D.U.M.I.E.S. series: Access Control for D.U.M.I.E.S. Brought to you by Pelco, this four-part series has been designed to educate readers about electronic access control system (EACS) design and implementation. D.U.M.I.E.S. stands for dealers, users, managers, installers, engineers and sales people. Although many of the functions and features of an EACS are inherent to the intelligent control panels (ICPs) described in Part 2 of this series, it is the EACS software that enables the user to exploit these features. Before we can discuss EACS software in more detail, we must first understand that the choice of platform (computer hardware and operating system) will have an impact on the ultimate functionality of the EACS software. Computer Platforms to Consider In years past, the most basic platform would be a dumb terminal connected to an ICP in order to utilize some basic programming functionality built into the ICP firmware. Some panels actually provided a basic menu structure back to the terminal display screen to assist with programming. A2
3 Today, some of latest EACS products are simply a revised version of this process. With much more programming power, the Web-enabled or edge system is basically an ICP with a Web host application onboard that allows any computer with an Internet browser application to access programming and transaction records over a TCP/IP network, across the room or across the world. Of course, the user can only configure one ICP (and maybe only one entry control point) at a time in this manner. Although this system could work with a limited number of ICPs or entry control points, it would soon become cumbersome to maintain as the system expands. A standalone PC running an EACS software application can communicate with many ICPs utilizing multiple communication protocols such as TCP/IP over Ethernet, RS485 over twisted pair, or RS232 over the public telephone switched network (PTSN). This configuration permits the system administrator to build a central database of panel configurations and maintain common information about credential holders, which the software application then seamlessly distributes to the appropriate ICP. Although a standalone PC running the appropriate operating system (OS) can handle the processing and programming needs of a very large system, EACS Client/Server Configuration A typical electronic access control system (EACS) client/server configuration include task specific workstations. A primary computer runs a database management system (DBMS) application and the core EACS software. Workstations, or clients, often include terminals for administrative tasks, alarm system events and badging. the need for system operation tasks to be divided among several operators usually results in the implementation of the client/server platform. The diagram EACS Client/Server Configuration (below) depicts a typical client/server system with task specific workstations. The primary computer or server will typically be implemented on a server-class PC with an advanced server-level OS and a database management system (DBMS) application. This machine will host the core EACS software application. The number and location of task-specific workstations, or clients, will depend on the complexity of the EACS. In almost any medium- to high-level system, the following workstations will be implemented: administration, alarm and badging (as depicted in the aforementioned diagram). The administration workstation will be used by the system administrator (user responsible for overall system configuration, programming and maintenance). This workstation will normally not be monitored at all times. The alarm workstation should be located in a central, 24/7 staffed area (usually a security control and dispatch center or SCC) and will handle system events that have been configured as alarms. Alarm monitoring features will be discussed in more detail shortly. In a large SCC, utilizing more than one operator, additional alarm workstations may be required. And in a very large EACS implementation spanning many facilities, alarm workstations may be located in more than one facility or building. The badging workstation will normally be the input point for credential holder information as will credential production and activation. Again, in a large EACS implementation, with multiple sites spread over a large area, it will be necessary to provide multiple badging workstations allowing for convenient enrollment points throughout the organization. Make Plans for System Expansion Before selecting any EACS software application, the systems integrator should consider system expansion. This topic, as it applies to EACS hardware, was discussed in Part 2 of this series and it is so important that its relationship to EACS software will be expanded upon here. It is not uncommon for an EACS to grow from a four- or 16-door system to a 50- or 100-door system within a very short timeframe. In fact, many systems continue to grow beyond the 500-reader mark. Expansion is normally a good thing for the systems integrator as the end user will be returning again and again asking for additions, usually in small increments, to the system. The problem occurs when the systems integrator implements an EACS software solution that has to be completely replaced in order to expand beyond a fixed number of entry control points or to expand from a standalone PC to a client/server configuration. This replacement is not only expensive in terms of new software cost, but may require many hours of support from the user s IT department and from the EACS software developer in order to transfer or enter existing EACS system data. It should be apparent that the systems integrator should select an EACS software solution that is modular in design allowing the selection of only those A3
4 components needed for the initial installation, while at the same time, providing upgrades by simply adding the additional modules or activating features installed but initially locked out. EACS Software Features, Functions Prior to the development of distributed processing systems (circa 1980), EACS software was the primary decision maker in host-based systems. A credential was presented to a device, (such as a card reader or keypad), the device relayed the credential data to the software which made the access decision, and a signal was sent back to the device to release the entry point. In today s distributed processing systems, ICPs maintain a file of accepted credentials and communicate with one or more readers, keypads or biometric devices. When a credential is presented, the local control panel makes the access decision and signals the release of the entry point. So, in the most basic EACS the software serves as a user interface to program the ICPs and as a repository of system data and events such as entry/exit transactions. The diagram Common EACS Applications (below) depicts the four basic functional areas of most any EACS Common EACS Applications software application. Although these functions are tightly integrated within the software package, we will study them individually. The basic function of any EACS is, of course, controlling access. This is accomplished by configuring access points controlled by locking hardware and credential readers, configuring rules for access (access levels and time codes), then applying those rules to credential holders. In Part 1 of this series, we discussed the four major access control goals: Limit Access, Increase Security, Provide Audit Trail, and Identify Personnel. In Part 2 of this series we, described physical methods to Limit Access created by hardware devices placed on entry control points. The access control functional area of EACS software provides the user with virtual methods to Limit Access. During initial implementation, the system administrator assigns logical addresses to physical devices, such as credential readers. Once this is accomplished, the readers are now selectable To view previous installments of this series, visit SSI s Web site ( and download them from the D.U.M.I.E.S. series section in the Special Reports link. Most any electronic access control system (EACS) software application includes four, tightly-integrated functions: assigning user access levels; alarm event monitoring; auxiliary device control; and ID badging task. by unique names and can be grouped together to create access levels. Access levels serve two major functions. First, in any system larger than a few entry control points and a dozen credential holders, it would be very time consuming to set up access privileges for each single credential holder by selecting the individual readers each person may access. Furthermore, when a new entry control point is added for each authorized credential holder, the system administrator would need to visit that person s record to add that entry control point. Using access levels, the new entry control point is simply added to the appropriate access level(s) and credential holders having those levels automatically receive access. The second function of access levels allows a system administrator to create access levels for each unique workgroup or job function within the organization, based on rules established as part of the overall security management plan. In a large system, credentials will normally be created and assigned by someone other than the system administrator. For instance, a badging station may be operated by a human resources assistant that has little understanding of the overall security plan. This operator simply assigns an access level to the credential holder based on the new employee s workgroup or job role. An access level is basically a list of credential readers. For each reader added to the list the system administrator assigns a time code. Time codes are simply definitions of when access will be allowed. For example, a time code called 24/7 or ALWAYS would be defined to be active at all times and days (including system-defined holidays). When associated with a reader in an access level, a credential holder would have access at that reader at all times. On the other hand, a time zone defined to be active from 7 a.m. until 5 p.m. on weekdays only and called DAYS would allow access at that reader only during those hours Monday through Friday. A4
5 Holidays are configured by the system administrator to represent days throughout the calendar year when access rules must be modified automatically by the system. When a time code is created the system administrator selects whether or not that time code will be active on days defined in the system as holidays. Referring back to the earlier example of the DAYS time code, if the holiday exception was applied to that time code then on Wednesday, July 4, the time code would remain inactive and deny access to a credential holder at any entry control point paired with that time code. Defining Access Levels The diagram Establishing Access Levels defines three access codes for the fictitious company American Products (described in Part 1 of this series). With access levels defined by department or job function it is very easy to assign access to new credential holders. And, should a new door be added to the production area of American Products, it will only be necessary to update the PRODUCTION access level rather than modifying each of the 50 production workers cardholder records. In many larger systems, it is not possible to define every credential holder s access with a single access level. This will be especially true in multifacility organizations that are spread across a geographical area. When this is the case, the EACS software should allow multiple access levels to be applied to a single credential holder. Access can then be built using a modular approach. Finally, no mater how much thought and effort the system administrator puts into the creation of access levels that can be easily assigned to credential holders, someone will need special access to one or more doors that others in that job function should not have. The precision access feature allows individual doors with an associated time code to be added to specific credential holders. The credential holder database within an EACS software application Establishing Access Levels EACS software should allow multiple access levels to be applied to a single credential holder. A precision access feature allows individual doors with an associated time code to be added to specific credential holders. Above is an example of access levels defined by department or job function. should accommodate all of the information gathered by the workstation operator as a credential is created. This will include name, department, job function and emergency contact information. Since the type, size, and quantity of this information will vary widely across different organizations, the systems integrator should choose a solution that allows many, user-definable fields with this database. In addition to text and numerical data stored in the credential holder s record, EACS software should be capable of maintaining the credential holder image, signature and biometric template (when biometric readers are utilized in the EACS). In Part 4 of this series, we will explore how a credential holder s demographic information should be prepopulated into the record by a tight interface with an external database such as one maintained by the human resources department. Alarm Monitoring Explored When considering the features within the second functional area alarm monitoring it s important to understand how the end user wishes to monitor and respond to alarms and events monitored by the system. Although it is obvious that in a single workstation system all alarms must be displayed there, when implementing a multiworkstation system some type of alarm routing is needed. It is very frustrating for the badging operator, and the people waiting in line, to be interrupted by a door forced open alarm every couple of minutes. There are two basic categories in this functional area: 1. Alarms and events related to the OS, access control software, and communication with field devices 2. Alarms and events associated with door contacts, motion sensors, and other detection devices connected to the EACS In the first category, conditions such as communication errors, workstation OS alerts, and file errors should be displayed on the administration workstation and reported to the system administrator as soon as possible. The second category includes all alarms that would be considered proprietary or intrusion in nature. In a large facility these alarms will normally be sent to an alarm workstation in an area staffed 24/7 by security personnel. In a multisite facility, alarms from smaller offsite facilities would also be monitored at this security control station. In multisite facilities with A5
6 larger off-site complexes, more than one alarm workstation may exist. In some cases, security may staff an information desk during normal business hours. Alarm routing is a feature of the access control software that allows the system administrator to configure one or more destinations for each alarm. It should also be possible to automatically reroute the alarm based on time of day/day of week. The system operator should not be able to clear or delete an alarm until the device has reset. Another important feature prevents motion detection devices from creating hundreds of individual alarms from movement within a protected area. Alarm mapping features allow the systems integrator to import building floor plans into the EACS software and then place icons representing EACS devices on those maps providing system operators with visual cues to device locations. When an event configured as an alarm occurs, the appropriate map should appear indicating the device in alarm. The operator should also be able to select that device for further processing (such as acknowledging) along with other adjacent devices. For instance, a video surveillance camera may be located near the alarm point and clicking on the camera icon would bring the camera up on a CCTV call-up monitor. When access control software contains an interface to digital paging services, alarms and events can also be routed through this interface to one or more pagers worn by security personnel, facility managers or the system administrator. Automating Auxiliary Functions While the alarm monitoring features of an EACS software application enable the ability to define and configure ICP input points, the third functional area of EACS software auxiliary controls allows the user to define and configure ICP relays provid- EACS Software Applications Defined What follows are descriptions of features common to electronic access control system (EACS) software applications. Database partitioning Used in larger systems that span multiple sites with autonomous control. While the system administrator may access and manipulate all the system data, a system user at one site can not access system data associated with another. Alarm routing Alarms can be routed across a multisite system to appropriate system operator consoles. Alarms can also be routed based on day/time criteria sending specific alarms to an information desk workstation only while it is staffed. Alarm video call-up The EACS directs the video surveillance system to display a camera associated with a specific alarm through an interface between the two systems. Credential-holder verification The EACS retrieves the stored credentialholder s image from the database for comparison to a live image from a camera associated with an entry/exit point. Transaction verification The access control system directs a DVR to retrieve a stored series of images associated with a specific record in the EACS transaction log file through an interface between the two systems. Alarm/Event paging The EACS sends a text message to a digital pager or wireless phone through a software driver designed to access digital paging and wireless phone networks. ing output signals to auxiliary access control and alarm components. The primary output control feature allows the systems integrator to define and configure the operation of control relays that operate devices such as locks on nonreader-controlled doors or gate operators at parking access areas. Relays can also be utilized to create simple interfaces with other security management and safety systems. Examples of this type of interface include activating a fire alarm system, triggering a digital dialer or calling up a specific surveillance camera. While all auxiliary output relays may be activated from a workstation by the system operator, it is more common to automate the operation of outputs in one of two ways. In the first method of automation, the system administrator associates a time code with a physical output device to create a timed command. For example, send a relay pulse to the alarm system at 7 a.m. each weekday to disarm the building s intrusion alarm. Or turn on a relay connected to a magnetic lock on the front lobby door at 5 p.m. to lock this entrance after normal business hours. The second method for automating auxiliary outputs involves associating an input point event with an output control relay device. For instance, when a panic switch is operated in the reception area, an output control relay signals a CCTV alarm switcher to call up the reception area camera. Or when an input is received from the fire alarm system, all lock control relays activate to unlock the building s exterior doors. This functionality becomes very useful for many building management functions normally considered outside the scope of a security management system. Since the communication network is in place and the EACS has ICPs and interface modules spread throughout the facility or across a large geographic area, it becomes very easy to configure a response at one location based on an event at another. A6
7 Even though this functionality allows the systems integrator to create an interface between various security management systems, a hard-wired interface of this type can quickly become cumbersome and difficult for the system administrator to manage. In Part 4 of this series we will investigate integration between security management systems using digital integration. Defining System User Privileges The ability to assign access levels or credential holder privileges is an important function of EACS software. The above Edit User window examples the variety of options available in allocating access privileges for individual cardholders. Integrated ID Badging As depicted in the Common EACS Applications diagram, the production of photo ID access credentials makes up the fourth (and sometimes optional) functional area of an EACS software application. Not that long ago, video badging systems and access control systems were two stand-alone systems. Systems integrators were required to interface these systems themselves. Today, every major access control software solution has an integrated badging function. As part of the review of the end user s needs, the systems integrator should determine how many new and replacement badges will be produced per month. In a large facility, a separate workstation will be required in a location convenient for employees, contractors and visitors to have their pictures taken. In a well integrated system, when a new employee arrives at the badging workstation, their demographic information (name, title, department) should already be in the EACS database through an interface with the human resources (HR) system (see Part 4 of this series). The badging operator simply captures a picture, assigns an access level and produces the badge. While reviewing the end user s needs, the systems integrator should also know how many different badge formats may be required. Badge formats should be easy to create either by the end user or as a value- or cost-added service from the systems integrator. A typical badging workstation consists of a computer workstation, video capture card, video camera, badge printer and (in the case of encodable cards) an encoder. In addition to the above hardware costs, an additional software license or package will usually have to be purchased for each workstation. In an organization with multiple sites it s usually impractical to implement a badging workstation at the smaller, off-site facilities. In this case, the main badging workstation (and software) should be capable of importing digital photos captured at the remote site (with an inexpensive digital camera) and sent to the badging workstation on media cards or by attachment. The badging operator produces the card and returns it to the originating facility. This simple feature eliminates the need for employees to travel between sites to obtain an ID badge, saving thousands of dollars in lost productivity. If the access control system will operate across several operational areas, the end user may not want a system operator at one facility to have access to credential holder records, access levels and time codes at another. Nor would they like an operator at one facility to unlock a door at another. If this is the case, the systems integrator will need to implement some form of database partitioning within the EACS database. This is normally a feature set of the EACS software application. In large systems the workload is normally spread out among several operators, each with a specific responsibility. In this situation, it is a good idea to implement workstations configured to perform only these specific jobs. For example, the security officer working the alarm workstation should not be able to change access levels or credential holder privileges and the badging station operator should not be able to change basic configurations or shunt alarms. This functionality is normally a software feature based on privileges assigned by the system administrator when the operator s login is created. If this is an important requirement to the end user, the systems integrator should ensure that the software provides a wide flexibility in assigning privileges. For an example of this, see the diagram above. Continue Bringing It Together As a practical exercise, review what has been discussed in Parts 1-3 of this series. Use the site survey and floor plan of American Products, Pomona Facility introduced in Part 1 of this series (download it on SSI s Web site) and begin to expand it by determining the type of operating platform you would select and listing those software features and functions that the system administrator at American Products might benefit from implementing. In Part 4 of this series we will investigate some advanced features of an EACS focusing on large DBMS issues, advanced security network communications and IT convergence, utilizing reports to better manage the system, and creating a tightly integrated security management system using digital and data interfaces. Steven Gibbs has more than 30 years experience in access control systems performing installation, system design, project management and training functions. He can be contacted at (248) or steve@ dvdrvtravel.com. A7
Access CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software Engineered to meet today s demands and tomorrow s challenges, Keyscan s System VII software delivers unique features to provide an access control solution
More informationGMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS Security management system for multi-site organizations. PACOM Graphical Management System (GMS) is the modular client-server application that integrates all of PACOM
More informationThe system should also be capable of recording events automatically on any compatible DVR and should be able to retrieve recordings based on events.
0BThe System The Security Management System should be capable of Controlling and Monitoring Access through the doors, Monitor and control Inputs and Outputs, include an Integrated Video Badging, Integrate
More informationAviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports
Aviation Solutions Why Tyco for airports? Our systems help protect over 110 airports Secures over 80% of UK Airports and more than 60 US Airports Tyco has the only dedicated airport specific access control
More informationAccess Professional Edition. The flexible access control system that grows with your business.
Access Professional Edition The flexible access control system that grows with your business www.boschsecurity.com Access Professional Edition: the ideal solution for easy and intuitive access management
More informationARCHITECTURAL AND ENGINEERING SPECIFICATION
ARCHITECTURAL AND ENGINEERING SPECIFICATION Access Control System ACTpro Vanderbilt Industries, Clonshaugh Business and Technology Park, Dublin, D17 KV84, Ireland TABLE OF CONTENTS PART 1 GENERAL 1.1 System
More informationPro-Watch Software Suite. Architect and Engineering Specifications. January 9, 2002 Revision 3.4
Architect and Engineering Specifications Revision 3.4 SECTION 13800 BUILDING AUTOMATION AND CONTROL Part 1 GENERAL 1.0.1. GENERAL 1.0.2. REFERENCES 1.0.3. DEFINITIONS 1.0.4. SYSTEM DESCRIPTIONS 1.0.5.
More informationAIRPORTS. CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds
AIRPORTS CARECALLER PowerfulSecuritySolutionsForSeriousSecurityNeeds CARECALLER CARECALLER Emergency Call Systems are perfect for any Airport that is concerned with the safety and security of their employees.
More informationAvigilon Control Center System Integration Guide
Avigilon Control Center System Integration Guide with Gallagher Command Centre INT-CARDAX-C-Rev3 Copyright 2013 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation
More informationFacility Commander Complete, Integrated Command and Control
Facility Commander Complete, Integrated Command and Control 2.0 Facility Commander Complete, integrated command and control Securing your business facilities requires multiple systems, often from different
More informationFacility Commander Wnx
Facility Commander Wnx Integrated security management platform for Windows Seamless. Effective. Efficient. Integrate security applications on one versatile platform It s easy and efficient to seamlessly
More informationDVTEL DVR Interface. DigiOp DVR Interface
Cardax FT Command Centre supports interfaces with a range of third party security products, via Cardax FT Controller API middleware software interfaces. All Cardax FT Controller API interfaces are individually
More informationMillenium Electronic Access Control Systems Networked Real-Time Access Control
Millenium Electronic Access Control Systems Networked Real-Time Access Control N e t w o r k e d R e a Automate routine security issues throughout your facilities. Millenium achieves increased security
More informationMonitoring Operator Guide. Access Control Manager Software Version
Monitoring Operator Guide Access Control Manager Software Version 5.10.10 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, ACM VERIFY AND TRUSTED
More informationNet2. Total Access Control.
Paxton Access Net2. Total Access Control. PC based access control from Paxton Access. Why use Access Control? Why get rid of keys? Access control gives you control over who gains entry to your building.
More informationGallagher System Integrations
Gallagher System Integrations Gallagher Command Centre supports integrations with a range of third party security products, using Gallagher developed interface software and industry standard protocols.
More informationCARD ACCESS CONTROL SYSTEM
SECTION 13851 CARD ACCESS CONTROL SYSTEM PART 1 GENERAL 1.01 SUMMARY A. Section Includes: A complete, operable, tested, integrated proximity access control system, to operate on a proximity principle where
More informationTech Data Sheet D01662GB0_Esgraf 4.1 and Configuration Server 30/2011 2/(5)
Tech Data Sheet D01662GB1_Esgraf 4.1 and Configuration Server 30/2011 1/(5) Esgraf 4.1 graphical user interface, configuration server and fire detectors contamination monitoring Esgraf 4.1 ESGRAF is a
More informationAvigilon Control Center System Integration Guide
Avigilon Control Center System Integration Guide with Gallagher Command Centre INT-CARDAX-C-Rev2 Copyright 2011 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation
More informationCourse Catalogue. An evolution of excellence. Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers
Course Catalogue Welcome to the UTC Fire and Security EMEA Lenel OnGuard Training Catalogue for Value Added Resellers An evolution of excellence Contact information: UTC Fire & Security Kouterveldstraat
More informationNet2 Access Control. Paxton Access
Net2 Access Control Paxton Access Why use Access Control? Why get rid of keys? Access control gives you control over who gains entry to your building. Keys also do this - so what is the difference? When
More informationArchitect and Engineering Specification
Architect and Engineering Specification TD0045a rev0400 5007 South Howell Ave. Milwaukee WI 53207 (414) 769-5980 (800) 323-4576 Fax (414) 769-5989 www.engsysgroup.com SECTION 13800 BUILDING AUTOMATION
More informationIntegrated security management platform for Windows. Seamless. Effective. Efficient.
Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them on multiple applications when each
More informationCITY OF DENTON RFP FOR SECURITY CARD ACCESS CONTROL SYSTEM EXHIBIT 2 SCOPE OF WORK AND TECHNICAL SPECIFICATIONS
EXHIBIT 2 SCOPE OF WORK AND TECHNICAL SPECIFICATIONS The scope of work shall be finalized upon the selection of the Firm. The proposal submission shall have accurately described your understanding of the
More informationOpenDevice Events Guide
OpenDevice Events Guide 2016 United Lenel is a part of UTC Climate, Controls & Security, a unit of United July 19, 2016 1 Table of Contents Open Device Events... 3 Granted Access Events... 8 Denied Events...
More informationMade possible by an innovative licensing scheme, which allows individual hardware configuration, up to the maximum configuration:
Security Solutions MB-Secure The modular platform for security solutions The multifunctional control unit series MB-secure is the base platform for integration of intrusion detection, access control and
More informationCardax System Comparison
System Comparison Hardware FT Series 5 Syst Com 131102 Syst Com 131102 2 Contents 1. Introduction... 5 2. System Diagrams... 7 3. Hardware Comparison... 10 4. Comparison... 11 Syst Com 131102 3 Syst Com
More informationGE Security. Wnx. Facility Commander. Integrated security management platform for Windows. Seamless. Effective. Efficient.
GE Security Facility Commander Wnx Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them
More informationNextGen Home Security. Quick Reference Guide
TM NextGen Home Security Quick Reference Guide Fire Auxiliary Panic (not active) Stay Away Chime Reset Bypass To view the full user manual, go to www.bellaliant.net/homesecurity and select Support. Arming
More informationHikCentral Web Client. User Manual
HikCentral Web Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright protection.
More informationTotal Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire
ISC West 2013 Product Showcase Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire www.mircomgroup.com [TX3] Unified Solution Our unified solution
More informationP2000 and Metasys System Integration
P2000 and Metasys System Integration Product Bulletin Code No. LIT-12012141 Software Release 3.14 SP1 Issued June 23, 2017 The Johnson Controls P2000 Security Management System supports the integration
More informationG SERIES: Security INTEGRATION as you want it. Greater expansion, communication, video integration, system resilience, and automation.
G SERIES: Security INTEGRATION as you want it Greater expansion, communication, video integration, system resilience, and automation. G Series Integrated Security Solution Fire Intrusion Access Greater
More informationRFP Addendum 2 March 31, 2016
RFP Addendum 2 March 31, 2016 For Best Value Procurement Option Three Security Upgrades Ph 1 UT Health Science Center SBC No. 540/013-04-2015 This Addendum forms a part of the Request for Proposals (RFP)
More informationBuilding Integration System. Your platform for customized security and safety management.
Building Integration System Your platform for customized security and safety management www.boschsecurity.com One platform for everything Efficient building management is becoming not only more important,
More informationAdvisor Advanced Mobile Application User Manual
Advisor Advanced Mobile Application User Manual Content Warnings and Disclaimers 2 Advanced Mobile 2 Contact information 2 Description 2 Screen navigation 4 Gestures 4 Menu 4 Help navigation 4 Login 5
More informationHikCentral Web Client. User Manual
HikCentral Web Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright protection.
More informationHoneywell Total Connect Remote Services
Honeywell Total Connect Remote Services Basic User Guide With Honeywell Total Connect Remote Services, you can stay connected and in control of your home or business whenever you want, wherever you are.
More informationPerimeter Product Overview. Effective protection for your business
Perimeter Product Overview Effective protection for your business The Gallagher difference Our innovation is driven by the desire to solve problems, meet your needs and provide real business value. We
More informationWhy Should You Invest In An Access Management System?
Why Should You Invest In An Access Management System? The key word in this question is Invest. Buying and installing an access system by itself is an investment that will increase security, enhance overall
More informationIntegrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC
Integrated Security and Building Automation Technology Solutions and Services SDI Security Center of Excellence Charleston, SC SDI 7445 Cross County Road, Suite 10 North Charleston, SC 29418 843.554.7622
More informationIntegrated Solutions. Integrated Solutions HONEYWELL SECURITY & COMMUNICATIONS. More and more, customer requirements cannot
HONEYWELL SECURITY & COMMUNICATIONS Integrated Solutions More and more, customer requirements cannot be met with one solution rather, they need a seamless approach that integrates different elements to
More informationRedefining Security for the Modern Facility
Redefining Security for the Modern Facility TAC I/A Series Andover Continuum Security Solutions Make the most of your energy 02 Protecting your people, property and data Andover Continuum 01 Trust your
More informationAdemco Vista Alarm Panel
System Galaxy Quick Guide CONFIGURATION AND OPERATION Ademco Vista Alarm Panel JAN 2018 SG 10.5.6 System Galaxy Quick Guide For Ademco Vista Panel Configuration & Operation 2nd edition JAN 2018 Information
More informationPatriot Systems Limited
COPYRIGHT 1997 - The Patriot Systems Ltd. Patriot Alarm Monitoring Automation Package is licensed for use on one computer, by the original person, or company, or organization whose name is registered with
More informationVykon. Security. Integrated Access Control. Web enabled security management built on the Niagara Framework
Vykon Security Integrated Access Control Web enabled security management built on the Niagara Framework Niagara for Security Applications Integrating security within building automation systems brings
More informationUSD 380 Centralia, Frankfort & Vermillion
PROJECT MANUAL District Wide Security Upgrade Project Software and Hardware Specifications Covering Locking Hardware Access Control Software & Hardware Video Software & Hardware January 30, 2018 USD 380
More informationSystem Galaxy Quick Guide
System Galaxy Quick Guide CONFIGURATION AND OPERATION Integrating CCTV with System Galaxy JAN 2019 SG 11.1.0.2 System Galaxy Quick Guide For CCTV Integration Configuration & Operation Information in this
More informationAutomations and ACLinks. Technical Support Engineering Rosslare Security NA For more information please see
Automations and ACLinks Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com AC Links are used to create automations and perform custom operations on access
More informationComplete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies
Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed
More informationACCESS CONTROL SOLUTIONS ACTEC SERIES
ACCESS CONTROL SOLUTIONS ACTEC SERIES CONTENTS Introduction...1 Our Global Solution...2-3 Security and Building Management Architecture ProNet PLUS Software...4-6 The Combination of Power and User Friendliness!...4
More informationINDUSTRIALMANDOWN & LONEWORKER
INDUSTRIALMANDOWN & LONEWORKER PowerfulSecuritySolutionsForSeriousSecurityNeeds Emergency Call Systems are perfect for any company that is concerned with the safety and security of their employees. Our
More informationComplexity made simple
Complexity made simple ICTProtegeGX : Faster, smarter, stronger. Introducing ProtegeGX At ICT we believe the key to great software is doing all the hard thinking up-front so you don t have to. There s
More informationSIMPLIFIED HOME SECURITY AND CONTROL
SIMPLIFIED HOME SECURITY AND CONTROL HOME CONTROLLER USER GUIDE HOME CONTROLLER Mediacom introduces a whole new level of security for the things that matter most in your life. Whether you re home or away,
More informationIon Gateway Cellular Gateway and Wireless Sensors
Page 1 of 9 Account & Network Setup If this is your first time using the Ion Gateway online system site you will need to create a new account. If you have already created an account you can skip to the
More informationSession VI Smart safety systems
Session VI Smart safety systems September 09th, 2016 Kolkata Denzil D Enterprise security Building Technologies Siemens Ltd Siemens AG 2011. All rights reserved. Safety every where Hospital Office Residential
More informationP2000 and Metasys System Integration
P2000 and Metasys System Integration Product Bulletin Code No. LIT-12011781 Software Release 3.12 Issued June 20, 2013 Supersedes April 20, 2012 Refer to the QuickLIT Web site for the most up-to-date version
More informationUltraSync Modular Hub
Intrusion UltraSync Modular Hub UM-5000-CPU OVERVIEW The UltraSync Modular Hub is a smart security system ideal for residential installations requiring hardwired and/or wireless intrusion systems, as well
More informationAvigilon Control Center 5 System Integration Guide
Avigilon Control Center 5 System Integration Guide for Paxton Net2 Access Control Systems 2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with
More informationParadox Integration Module Settings Guide
Paradox Integration Module Settings Guide List of Terms used in Paradox Integration Module Settings Guide............. 3 Introduction into Paradox Integration Module Settings Guide............... 4 Configuration
More informationCommon Questions & Answers
Common Questions & Answers Summary of Advantages Honeywell has proven manufacturing and design capability, distribution expertise and the field training/support necessary for a successful partnership with
More informationIntegrated Security Solutions
Integrated Security Solutions Table of Contents Control Panels 4 Keypads 8 Communication Modules 16 I/O Expanders 20 Door Control 24 Home Automation 25 RF Receivers 26 3 Our integrated security solutions
More informationThe WAVE Plus Instant Notification System for Schools and Colleges
Instant Notification System for Schools and Colleges Duress alarm has been activated in the School of Engineering! Schools strive to provide a safe environment for students and teachers. In an emergency,
More informationSynergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks
Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks This guide supplements the Synergis Master Controller Configuration Guide and explains how to configure Assa Abloy
More informationComplete Security Solution
Complete Security Solution Intrusion Video Access All-in-one, comprehensive security for premises, property and people Complete Security Solution Tyco s Complete Security Solution provides a comprehensive
More informationUD-VMS510i. Surveillance Management Center
Surveillance Management Center Introduction VMS510i is a flexible, scalable, high reliable and powerful central management system. Client-Server Architecture, Integrating with multiple surveillance systems.
More informationLighting Xpert Insight User Manual
Lighting Xpert Insight User Manual Table of Contents 1 About This Document... 3 1.1 Key Terms... 3 1.2 Related Fifth Light Documentation... 3 2 Lighting Xpert Insight Overview... 4 2.1 Key Features...
More informationNetwork Hardware and wiring (quiz)...
4120 Network/TSW (FA049) Course Agenda Day 1 Course Introduction (Presentation)... 8:00 am to 8:30 am Break Module 1 Installing and Configuring Network Software Applications 4120 New Network Programmer
More informationWeb Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.
New thinking Sentus Automation is able to control and manipulate data at ease whilst delivering a low cost per point return. XML interface: Information can be exported/viewed by an unlimited number of
More informationA Smart & Integrated Security solution
Advisor Advanced A Smart & Integrated Security solution In a connected world Empowered with UltraSync services Security and Access Control in one providing a scalable system UTC s Advisor Advanced security
More informationLonix Access Control Operation & Maintenance Manual
1 (7) Lonix Access Control Operation & Maintenance Manual Lonix Ltd Teollisuuskatu 33 FI-00510 Helsinki Finland www.lonix.com 2 (7) Contents 1 Introduction...3 1.1 Health and Safety...3 1.2 Health and
More informationDesigning the Right Access Control System A Case Study. 12 th May 2010
Designing the Right Access Control System A Case Study 12 th May 2010 Partner of Choice Approach Committed to working together to deliver innovative security solutions - End User - System Integrator -
More informationGrandstream Networks, Inc. GDS3710 Input/output Connection Guide
Grandstream Networks, Inc. Table of Contents INTRODUCTION... 4 GDS3710 WIRING CONNECTION... 5 Powering and Connecting the GDS3710... 5 Power and Data PINs... 5 Alarm In and Alarm Out PINs... 6 DETECT AND
More informationOnGuard 7.1 Resolved Issues
Lenel Systems International, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Contents OnGuard 7.1 Resolved Issues 1. Introduction... 2 2. Access
More informationPatriot Systems Limited
COPYRIGHT 1997 - The Patriot Systems Ltd. Patriot Alarm Monitoring Automation Package is licensed for use on one computer, by the original person, or company, or organisation whose name is registered with
More informationOnGuard 7.2 Resolved Issues
UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Contents OnGuard 7.2 Resolved Issues 1. Introduction...
More informationThis technical update applies to Pro-Watch Software Release 3.5 and later.
Technical Update Pro-Watch Software Intercom Product Support Product Versions This technical update applies to Pro-Watch Software Release 3.5 and later. Overview Intercom systems consist of master stations,
More informationCITY OF MT. PLEASANT MT. PLEASANT DEPARTMENT OF PUBLIC SAFETY 804 E. High St. Mt. Pleasant, MI 48858
CITY OF MT. PLEASANT MT. PLEASANT DEPARTMENT OF PUBLIC SAFETY 804 E. High St. Mt. Pleasant, MI 48858 ELECTRONIC ACCESS CONTROL SYSTEM (EACS) & FACILITY MANAGEMENT & CONTROL SYSTEM (FMCS) INTEGRATION PROJECT
More informationACTIVE INFRARED BARRIER
Although PROTECH provides high security indoor intrusion sensors for the military and government markets, our specialty is outdoor protection. Since we first introduced our PIRAMID outdoor dual technology
More informationWEBs AX Security. Integrated Security With Simple, Web-Based Management
WEBs AX Security Integrated Security With Simple, Web-Based Management Built-In Peace Of Mind Flexibility is the key to Honeywell WEBs-AX Security. Whether you need single site or enterprise access control,
More informationArchitectural and Engineering Specification for a Security Management System. StarNet 2
Architectural and Engineering Specification for a Security Management System StarNet 2 Jan 2, 2018 Page 1 of 12 AE-S2-IN-R1-EN-01/18 This document is intended to provide performance specifications and
More informationEC-BOS-602/616 AX Security
D a t a s h e e t EC-BOS-602/616 AX Security Comprehensive, easy-to-use Access Control management solution Overview The heart of EC-Net AX Security is the EC- BOS-602/616 AX Security, an advanced IP-based
More informationWelcome to a world where technology flows through the heart of your business environment. Welcome to CDC
Welcome to a world where technology flows through the heart of your business environment Welcome to CDC Introduction to Integra 4 Integra configuration 4 Graphical Supervisor 6 Integra difference 8 Integra
More informationDell and Lenel Grow Globally, Together
technology Dell and Lenel Grow Globally, Together CASE STUDY OnGuard Delivers Flexible Capabilities and Ability to Handle Eventualities That We Couldn t Even Yet Predict. At age 19, Michael Dell founded
More informationBoztek Solutions` PLAYSTATE
Boztek Solutions` PLAYSTATE REMOTE MONITORING & CONTROL SYSTEM FOR PLAYING FIELDS & OPEN SPACE Contact Details: Boztek Solutions Pty Ltd PO Box 272, Windsor, NSW 2756 Unit 12/124 Ham Street, South Windsor,
More informationIntelligent Keys. A smart solution for recurring revenue
Intelligent Keys A smart solution for recurring revenue Cloud-Based Services Benefits of the Cloud: For your customers: Ensures that a facility s database is always accessible, secure and up-to-date Enables
More informationUsing ANM Mobile CHAPTER
CHAPTER 19 Date: 3/22/13 This chapter describes Cisco ANM Mobile, which allows you to access your ANM server or ANM Virtual Appliance and manage your devices using a mobile device such as an iphone or
More informationFacility Explorer Asset Protection by Yorkland Controls Ltd. Fr
Date: October 13, 2006 Announcing: Facility Explorer Asset Protection by Yorkland Controls Ltd. Fr Facility Explorer Asset Protection Yorkland Controls Ltd. is excited to announce a significant addition
More informationGallagher Perimeter Product Overview
Gallagher Perimeter Product Overview 1 security.gallagher.com Gallagher is a global leader in the innovation, manufacture and delivery of security solutions. Meeting our customers needs inspires us to
More informationRemarkable Entry Just Got Easier. VISCOUNT MESH. Making a
Making a Remarkable Entry...... Just Got Easier. VISCOUNT MESH Touch Screen Telephone Entry Systems Card Access, Elevator Control, Door Alarms and Accessories. MESH MUCH More Than Telephone Entry MESH
More informationWIN-PAK SE with VISTA Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination
WIN-PAK SE with VISTA Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS A Winning Combination Unlock the Possibilities! Typical Applications Office Buildings Day Care Centers Pharmacies
More informationTX3 Series. TX3 Nano. Configuration Manual
TX3 Series TX3 Nano Configuration Manual Version 2.4 TX3 Nano Configuration Manual 1 LT-1194 Copyright March 2018 Copyright March 2018 Mircom Inc. All rights reserved. TX3 Nano Configuration Manual Version
More informationProduct Datasheet MM8000 MP3.15 Management Station
Product Datasheet MM8000 MP3.15 Management Station DMS The MM8000 provides a wide array of solutions for the centralisation and management of physical security and control systems. Founded on cutting edge
More informationDatasheet Face Recognition [Genetec VMS]
Datasheet Face Recognition [Genetec VMS] Version 3.6 This Specification Sheet gives the details of system requirements, features and other salient points of AllGoVision Face Recognition application for
More informationContents. 30 References
LIMITLESS IP SYSTEM Contents 05 Applications 07 What can Botech offer me 09 Video IP Intercom Systems 11 Doorbell Panel 13 Monitor for Single-Family Home 18 Doorbell Panel Villa Type 19 Integrated Security
More informationFlair 500 Series Annunciators
Flair 500 Series s Basics Flair Multi-Zone s (MZAs) are fully functional, flexible, programmable micro controller based alarm control panels. They can be used independently d or in conjunction with other
More informationAm I safe working in this building?
Am I safe working in this building? Fusion is a user-friendly security management solution providing situational awareness and peace of mind at all times. Answers for infrastructure. Sophisticated technology
More informationBMS Specification. Lonix Ltd.
BMS Specification 1 (18) BMS Specification Lonix Ltd www.lonix.com BMS Specification 2 (18) INDEX 1 System Architecture...3 1.1 System Integration...3 1.2 Layered System Architecture...3 1.2.1 Service
More informationDeltaV Operate. Product Data Sheet DeltaV Operate December 2006 Page 1. Introduction. Benefits
December 2006 Page 1 You can easily manage your process with. Powerful operator interface, optionally up to four monitors Alarms prioritized by user Secure, standard operating desktop Intuitive graphics
More informationRVRC Training Manual Fast Trace Installer Menu
RVRC Training Manual Fast Trace Installer Menu Advanced Independent Monitoring Introduction The following guide is explain how to set up a Fast Trace or Fast TX and common areas to look out for and check
More information