Access Control, Integrated

Size: px
Start display at page:

Download "Access Control, Integrated"

Transcription

1 Access Control, Integrated An essential guide to integration of your security systems and the benefits that can bring Duncan Gooch Product Manager Copyright 2011 Time and Data Systems International Limited

2 Contents 1 Introduction What Does Integration Actually Mean?... 3 Who Are the Integration Stakeholders? How would Integration Benefit My Project? How does Data Integration to Access Control Work? Overview Read-Only Database Connections Fusion Scripting Tool... 5 Real-Time Event Exporting Command Import Card Import Function User Export Function OPC Server Bringing Video to Access Control... 6 Fire Door Monitoring and Control Lift System Integration Intruder Integration... 6 Conclusion... 6

3 1 INTRODUCTION There s no doubt that Integration has become something of a buzz word in the security industry in recent years. Manufacturers are keen to stress to prospective clients the ability of their products to integrate with others. At the same time, clients are increasingly searching for truly integrated solutions which will allow them to not only maximise the capabilities of each individual product, but more importantly to enjoy the benefits that only true integration can deliver. 1.1 What Does Integration Actually Mean? There is a danger that integration becomes a slightly over-used claim; so what do we actually mean by a term that potentially covers a multitude of definitions and probably means many different things to many different people? At its most basic level, it s possible to define integration as the act of combining two or more separate items with the aim making the whole more effective than the sum of the individual parts. In this context, the process of integration actually brings together a number of different, but potentially linked, subsystems to form one homogeneous whole establishing interfaces through which each system is able to communicate. Clearly to achieve this, the language of each sub-system must be common, or at least have certain elements of commonality, and so for this to be possible it is vital that the correct interfaces are carefully specified. Essentially, integration is just the glue that allows these systems to work together. Once two or more sub-systems are integrated, then some of the key benefits can begin to be realised, with well designed and managed integrated systems delivering operational and cost advantages to a wide number of groups. 1.2 Who Are the Integration Stakeholders? There are a wide range of integration stakeholders, each of whom may be involved at a different stage of the process. At the start, consultants, architect and system designers must consider the requirements that they demand from a system and the design of the system architecture - taking into account factors such as the security of the perimeter of the building and specific areas within it; the safety of its occupants and the needs of the system users. Consideration will also need to be given to the deliverables that are required in terms of reporting and performance, for instance if and how systems will need to integrate across areas such as HR, time and attendance and building management systems. The installation company will then be tasked with setting up and commissioning the system - delivering the requirements of the specification as well as the individual needs of the security manager, IT manager and other system users - all of whom may need support to maximise the system s effectiveness. Throughout the process, leading manufacturers will provide support both for their own systems and to ensure that the effectiveness of the integrated whole is maximised. Although the shape and scope of systems will vary according to the specific needs of individual projects, integration can benefit a host of applications across a wide range of market sectors in both the public and private sectors - from schools, universities and hospitals to offices, banks, manufacturing plants and transport hubs. 1.3 How would Integration Benefit My Project? Clearly there are advantages to an integrated solution, but how are these realised in practice? Again this goes back to understanding each user s specific needs, but two typical examples of system components will help demonstrate the potential that integration can unlock. From a user s and building management point of view, smart card solutions provide the advantage of needing to have just one single card to cover multiple applications. The development of smart card technology brought a highly cost-effective form of integration to the market. In this case, the glue is the card itself and its ability to be used for a wide range of applications, which as well as physical access control can include cashless vending, library services, time and attendance systems, transportation and photocopier control. At the other end of the spectrum sit fully integrated management systems - providing seamless integration capability across a number of different applications. For example, a number of modern, intelligent systems provide third-party data integration with multiple management systems - such as HR, time and attendance, vending, building management systems (such as power, air conditioning and lift controls) and other proprietary database applications such as School Information

4 Management Systems (SIMS). Manufacturers often provide full data integration packs for applications such as SIMS, allowing read-only database access, the ability to export live events to PC, mobile phone, or PDA as well as a number of synchronisation tools to make sure that the process is fast and straightforward. These systems are also capable of effectively integrating with CCTV systems - as well as specific packages (such as guard patrol) and sophisticated biometric systems. Their inherent flexibility enables outputs from the sub-systems to be monitored against pre-set criteria, triggering activities in other systems based on certain events (for example the activation of CCTV recording when specific access control readers are swiped). Integration then can operate at a whole host of levels from a simple combination of functions in a smart card, to a fully integrated system which brings together applications from across every area of an organisation. A full Integrated Security Management System (ISMS) can integrate any combination, or all of a wide range of systems including access control; CCTV; digital video; intruder and fire systems; building management systems; time and attendance and payroll systems as well as logical security. 2 HOW DOES DATA INTEGRATION TO ACCESS CONTROL WORK? W 2.1 Overview Leading access control manufacturers have developed a range of technologies and systems to provide effective and seamless integration. For example, TDSi provides a suite of tools that allow the EXgarde access control management system to be integrated and shared with third-party systems. Typically this may include packages such as Building Management, HR and Time and Attendance Systems. These tools are summarised in the diagram below and then covered individually in a little more detail later in this section: Read-Only Database Connection Fusion Scripting Tool Real-Time Event Export Access Control Database Command Import Tool User Import Function User Export Function OPC Interface SDK 2.2 Read-Only Database Connections A read-only database connection allows a third-party system to view the contents of the access control database via ODBC, OLE DB, JDBC and Microsoft DotNET connections. The external connections to the database can easily be controlled by setting up database users within the access control system. Once the connection is set up, the third-party system can view any object within the database - such as users and cards. As the name suggests, information can be viewed within the access control system, but it cannot be changed. For that, a scripting tool would be required.

5 2.3 Fusion Scripting Tool TDSi This tool is used to allow certain changes to be made within the access control database. For security reasons, certain items cannot be changed, but all of the main items may be, such as the creation, modification and deletion of users and cards, as well as the ability to assign users to specific access groups and issue cards to them. The tool links to a table in the third-party database (or External Database System - EDBS) via ODBC and changes are effected in the access control database based on custom scripts that provide the instruction for tasks to be carried out. All actions that are implemented by Fusion are executed in real-time and logged in the database in exactly the same way that a normal operator s changes would be. The system can be further enhanced with a synchronisation tool, which searches for a file containing changes. The synchronisation tool then compares these changes to information contained within the database and instructs Fusion to automatically make any necessary changes. This has the distinct benefit of providing complete control of user maintenance from a third-party system, eliminating the need for the double-entry of information and practically eliminating the risk of errors occurring. 2.4 Real-Time Event Exporting This tool is ideal for sending information to a third-party system that can then filter and act on event information as it occurs. For example, a CCTV system could filter on an access-granted event for a specific user and use this information to switch to a camera. Events can be sent to a serial port, database or file. 2.5 Command Import This allows commands to be sent to the access control system through a secure log-in. The tool reads a file (CSVbased) and allows users, access groups and key boxes and cards to be added, together with the assignment of cards to users, and users to access groups. This feature is particularly useful when migrating from one access control system to another. 2.6 Card Import Function Allowing card numbers to be imported into the access control system, this tool is useful if, for example, a large number of cards need to be loaded during the commissioning phase of a system. 2.7 User Export Function This allows all users to be exported from the access control system, together with their respective images. Again this feature is particularly useful when migrating from one system to another, or if a large amount of user data needs to be manipulated it can be exported to a spreadsheet application and re-imported once complete. 2.8 OPC Server Part of the Fusion tool, the OPC Server supports Data Access (DA) and Alarm and Event (AE) interfaces. The DA interface provides tags for door controllers, doors and users. It also allows the changing of the door status - for example, a remote application can release a door. The AE interface outputs the events as a tidal separated string.

6 3 BRINGING VIDEO TO ACCESS CESS CONTROL Incorporating a visual element adds a new dimension to access control, significantly enhancing system security. Features include: Display and activate live video from any camera linked into the system from a graphical site plan and obtain an instant view of the situation from a single user interface Associate video with particular access control events and quickly locate relevant video Search and access video that has been associated with an access event Automatically display live view from a selected camera when an access control event occurs, providing an instant way of verifying that the user is who they say that they are 4 FIRE DOOR MONITORING AND CONTROL Integrating the access control and fire systems provides an effective, complementary solution: Display active fire inputs on a graphical site plan and if required, raise an alarm situation Release selected fire doors 1 Automatically print a report of all occupants within defined areas Install a reader at the fire muster point to allow users to badge against 1 This feature should never be used as the primary method of releasing fire doors - call points, mechanical releases or fire relays should always be installed, as appropriate. 5 LIFT SYSTEM INTEGRATION ION The access control system can be used to control the floor selection buttons within the lift car. This controls the access that individuals may be granted to the floors of a building, thereby improving site security. For example an employee may be allowed to access floors 2, 3 and 4, but may not access the management offices on floor 5. Only enable floor selection buttons to which a user is allowed access Monitor floor selection button usage through the access control software 6 INTRUDER INTEGRATION Nuisance alarms are one of the largest issues associated with an intruder system. These can be significantly reduced if not eliminated when the access control and intruder systems are integrated. Only allow those users who can unset the alarm into the area, meaning that those that do not have the means to cannot accidentally trip the alarm Get indication when there may still be users in an area before setting the alarm 7 CONCLUSION By effectively integrating systems, significant cost and operational benefits can be achieved. For example, information can be shared across the system, allowing data to be kept and maintained consistently across the whole. As data only needs to be entered once to populate a number of systems, savings in terms of both time and cost will be achieved as well as an important reduction in the risk of anomalies being present across data held in separate systems. Well designed integrated systems will prove to be cost-effective and maximise the return on investment as the benefits of each individual system are enhanced by the advantages of integration. Integration will also deliver increased security, with systems working in harmony (for example access control, CCTV and DVR) as well as providing flexibility for both system set up and future capabilities new modules and additional functionality can be added easily in the future as the requirements of the user evolve. So, whilst integration may at times appear to be a rather nebulous concept, the reality is that it has real substance and delivers tangible benefits, resulting in processes working effectively in combination (or combinations), generating benefits in terms of increased operational efficiency, reduced costs and increased security, with systems able to be upgraded, expanded and amended to suit future requirements.

a guide to integrated security management systems March 2007 For other information please contact:

a guide to integrated security management systems March 2007 For other information please contact: a guide to integrated security management systems March 2007 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk

More information

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform. 1 EXgarde PRO Based Access Management System Overview EXgarde PRO is a windows-based, fully featured access management PC software application providing flexibility and ability to tailor the software to

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

Flexible access control for all enterprises Building access and workforce management

Flexible access control for all enterprises Building access and workforce management Flexible access control for all enterprises Building access and workforce management Kaba have for over 100 years been providing solutions of quality from simple locking systems to complex electronic access

More information

Integrated Security System

Integrated Security System Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System

More information

integrated fire and security solutions Maximum protection for buildings

integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Johnson Controls: expert qualified in building protection Johnson Controls is the recognised

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

GE Security Alliance. imagination at work

GE Security Alliance. imagination at work GE Security Alliance Imagine your alarm, access control and video surveillance systems operating in perfect alliance as part of a truly integrated and cohesive security system. No need to imagine any longer.

More information

A Real Time, Object Oriented Fieldbus Management System

A Real Time, Object Oriented Fieldbus Management System A Real Time, Object Oriented Fieldbus Management System Mr. Ole Cramer Nielsen Managing Director PROCES-DATA Supervisor International P-NET User Organisation Navervej 8 8600 Silkeborg Denmark pd@post4.tele.dk

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

Advanced Network Video And Alarm Management Suite

Advanced Network Video And Alarm Management Suite Advanced Network Video And Alarm Management Suite ViMS. Advanced Network Video & Alarm Management Suite G anz ViMS Command is a powerful IP network based, open standards Video & Alarm Management software

More information

7 Reasons Why Your Business Should Adopt ACT365

7 Reasons Why Your Business Should Adopt ACT365 7 Reasons Why Your Business Should Adopt ACT365 By David Moran ACA ACT Marketing Director Introduction The past ten years have seen companies moving online for services like email, payroll, accounting

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

Integrated Building Management and Security System. Building Automation & Security. www.lonix.com

Integrated Building Management and Security System. Building Automation & Security. www.lonix.com Integrated Building Management and Security System Building Automation & Security www.lonix.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 GREEN BUILDING REQUIREMENTS...

More information

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management

More information

IP Access Control Management System

IP Access Control Management System 04 BioStar IP Access Control Management System BioStar is a comprehensive access control management software featuring efficient TCP/IP based system architecture with intelligent IP readers. It supports

More information

Video Management Software. Product Brochure

Video Management Software. Product Brochure Video Management Software Product Brochure Flexible, Powerful and Intelligent Video Management Software gives the user a powerful and advanced video surveillance software that is easy to use. These unique

More information

POS UNITS. Installation and user guide. Count, video recording and POS control unit ENGLISH

POS UNITS. Installation and user guide. Count, video recording and POS control unit ENGLISH ENGLISH POS UNITS Installation and user guide Count, video recording and POS control unit INDEX 1 FUNCTIONALITY... 2 2 GENERAL CONSIDERATIONS... 4 3 CAMERAS INSTALLATION... 5 3.1 CAMERA TYPES... 5 3.2

More information

A guide to access control for offices

A guide to access control for offices A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

More information

Management Software for Concept Security & Access Systems

Management Software for Concept Security & Access Systems Management Software for Concept Security & Access Systems LAN, WAN, Internet or Serial SERVER CLIENT Management Software for Concept Hardware Systems Insight software is the central and integral software

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits

More information

Product Overview. Dream Report. OCEAN DATA SYSTEMS The Art of Industrial Intelligence. User Friendly & Programming Free Reporting.

Product Overview. Dream Report. OCEAN DATA SYSTEMS The Art of Industrial Intelligence. User Friendly & Programming Free Reporting. Dream Report OCEAN DATA SYSTEMS The Art of Industrial Intelligence User Friendly & Programming Free Reporting. Dream Report for Trihedral s VTScada Dream Report Product Overview Applications Compliance

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Access Control Management Software

Access Control Management Software ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs

More information

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,

More information

Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

MM8000 highest safety and security with intelligent danger management

MM8000 highest safety and security with intelligent danger management MM8000 highest safety and security with intelligent danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive

More information

ivms-4200 Client Software Technical Specification v1.02

ivms-4200 Client Software Technical Specification v1.02 ivms-4200 Client Software Technical Specification v1.02 Introduction ivms-4200 Client Software is a centralized video management software using a distributed structure for surveillance device control and

More information

EntraPass v4.0 Access Control Software

EntraPass v4.0 Access Control Software Sales Guide EntraPass v4.0 Access Control Software This newest version of EntraPass enables customers to secure their property and personnel more effectively while utilizing a host of exciting new access

More information

Premium Server Client Software

Premium Server Client Software Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management

More information

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS A Winning Combination Unlock the Possibilities! Typical Applications Office Buildings Day Care Centres Pharmacies

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

Dream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report

Dream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report Dream Report vs MS SQL Reporting 10 Key Advantages for Dream Report Page 2 of 15 Table of Contents INTRODUCTION 3 PROFESSIONAL SOFTWARE FOR NON-PROGRAMMING USERS 4 CONSIDERABLE DIFFERENCE IN ENGINEERING

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

integrated security solutions Because everyone deserves peace of mind

integrated security solutions Because everyone deserves peace of mind integrated security solutions Because everyone deserves peace of mind TDSi protect people, assets and information by providing high quality, cost effective and well supported integrated access control

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

Video Analytics and Security

Video Analytics and Security Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI TABLE OF CONTENTS I. Executive Summary... 1 II. Captured on Video. Now What?... 2 III. Start Where

More information

Temaline Solutions. Raising the benchmark in security and people management

Temaline Solutions. Raising the benchmark in security and people management Temaline Solutions Raising the benchmark in security and people management Honeywell Temaline solutions The standard in integrated enterprise-wide access control, time & attendance management and intruder

More information

SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM

SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network-enabled access control system for security management, including engineering,

More information

Business Intelligence for Excel

Business Intelligence for Excel Business Intelligence for Excel White Paper Business Intelligence Technologies, Inc. Copyright 2002 All Rights Reserved Business Intelligence for Excel This white paper concerns business intelligence for

More information

idvr-pro Viewer Software for Mac User Manual ver 0.1

idvr-pro Viewer Software for Mac User Manual ver 0.1 idvr-pro Viewer Software for Mac User Manual ver 0.1 1 Contents 1. Introduction... Error! Bookmark not defined. 1.1 Summary... Error! Bookmark not defined. 2. Install... Error! Bookmark not defined. 2.1

More information

Think Remote Monitoring Think Concept Pro Think VXM4B

Think Remote Monitoring Think Concept Pro Think VXM4B The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not

More information

P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS

P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS UNLOCK THE DOOR TO INTEGRATED SECURITY MANAGEMENT Managing all of a facility s disparate security systems can be a daunting task,

More information

Voice and data recording Red Box makes it easier than you imagine

Voice and data recording Red Box makes it easier than you imagine Voice and data recording Red Box makes it easier than you imagine SIMPLER SMARTER VOICE If you re reading this, there s a good chance your organization has to record phone calls, radio conversations or

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Gallagher System Integrations

Gallagher System Integrations Gallagher System Integrations Gallagher Command Centre supports integrations with a range of third party security products, using Gallagher developed interface software and industry standard protocols.

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Postgres Plus xdb Replication Server with Multi-Master User s Guide

Postgres Plus xdb Replication Server with Multi-Master User s Guide Postgres Plus xdb Replication Server with Multi-Master User s Guide Postgres Plus xdb Replication Server with Multi-Master build 57 August 22, 2012 , Version 5.0 by EnterpriseDB Corporation Copyright 2012

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA For EAD and TDM products Value-Adding Software Licenses ABOUT OneAccess OneAccess designs and develops a range of world-class multiservice routers for over 125 global service provider customers including

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

Work Process Management

Work Process Management GE Intelligent Platforms Work Process Management Achieving Operational Excellence through Consistent and Repeatable Plant Operations With Work Process Management, organizations can drive the right actions

More information

SYMMETRY WHITE PAPER. Destination Dispatch Elevator Integration. Adam Shane

SYMMETRY WHITE PAPER. Destination Dispatch Elevator Integration. Adam Shane SYMMETRY WHITE PAPER Destination Dispatch Elevator Integration Adam Shane Destination Dispatch Elevator Integration Many systems run simultaneously to make up the office building ecosystem. In addition

More information

RFID System Description for Logistics & Inventory

RFID System Description for Logistics & Inventory RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.

More information

www.excellium.ca Tel. : 514.798.8899 Fax. : 514.798.8898 Toll Free : 1.888.381.2457 Equipmentperfect Controlperfect IDperfect Keyperfect Reportperfect

www.excellium.ca Tel. : 514.798.8899 Fax. : 514.798.8898 Toll Free : 1.888.381.2457 Equipmentperfect Controlperfect IDperfect Keyperfect Reportperfect Controlperfect Equipmentperfect With its unique approach, Controlperfect is the first software suite to integrate, in a complete and interactive whole, the numerous daily tasks related to the management

More information

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application

More information

Building Technologies

Building Technologies Building Technologies TELSCAN Web Server - Fast ethernet transmission of the highest quality images: Get your pictures anywhere. Compact, standalone system for easy rem Siemens is one of the largest and

More information

A whole new way of time management. BiovisionOnline.com

A whole new way of time management. BiovisionOnline.com A whole new way of time management. BiovisionOnline.com Up and running in minutes. BioVision is a time tracking software that gives you real-time insight into workforce productivity by collecting live

More information

Apps for Android. Apps for iphone & ipad INS584-3

Apps for Android. Apps for iphone & ipad INS584-3 Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,

More information

Spreadsheets and OLAP

Spreadsheets and OLAP 40 Spreadsheets and OLAP Senior Lect. Daniela ENACHESCU PhD, Department of MEIG, Oil & Gas University of Ploiesti e-mail: denachescu@mail.upg-ploiesti.ro OLAP, the acronym for On Line Analytical Processing,

More information

Central Management System (CMS) USER MANUAL

Central Management System (CMS) USER MANUAL Central Management System (CMS) USER MANUAL LEGAL INFORMATION Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission

More information

Avigilon Control Center System Integration Guide

Avigilon Control Center System Integration Guide Avigilon Control Center System Integration Guide with STENTOFON AlphaCom INT-STENTOFON-B-Rev3 Copyright 2013 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation

More information

Transforming Field Service Operations w ith Microsoft Dynamics NAV

Transforming Field Service Operations w ith Microsoft Dynamics NAV Transforming Field Service Operations w ith Microsoft Dynamics NAV Open Door Technology Inc. Date: May 2010 www.opendoor.ca 8 77.777.776 Contents Introduction... 3 Mobile Technology Needs for Field Services

More information

SiteManager. Air-Site s advanced facility management system

SiteManager. Air-Site s advanced facility management system Air-Site s advanced facility management system Brochure ENG Page 2 of 6, facility management, communication, Table of Contents What is?... 3 Saving power in an equipment room... 4 Outsourcing... 5 Solutions

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

SPPA-T3000 Control System The Benchmark in Controls

SPPA-T3000 Control System The Benchmark in Controls Instrumentation, Controls & Electrical SPPA-T3000 Control System The Benchmark in Controls Siemens Power & Process Automation Answers for energy. The benchmark for Distributed Control Systems Developed

More information

WINDOWS PHONE CMS for WINDOWS PHONE phones user's manual

WINDOWS PHONE CMS for WINDOWS PHONE phones user's manual WINDOWS PHONE CMS for WINDOWS PHONE phones user's manual User s manual version 0.1 (January 2013) This manual applied to program version 3.0.0.xxx Table of contents The table of contents is empty because

More information

E-Map Application CHAPTER. The E-Map Editor

E-Map Application CHAPTER. The E-Map Editor CHAPTER 7 E-Map Application E-Map displays the monitoring area on an electronic map, by which the operator can easily locate the cameras, sensors and alarms triggered by motion or I/O devices. Topics discussed

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai RCDD CISA CFOT Consulting Specialist Communication Cabling. Auditor Information Systems & Technology. Convergence

More information

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the Effort Out of Log Management and Gain the Actionable Information You Need to Improve Your Organisation s

More information

High Performance Access Control and Integrated Security Systems

High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems EntraPass Corporate Edition is a powerful multi-user access control system

More information

SCADA Questions and Answers

SCADA Questions and Answers SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...

More information

Access Central 4.2 Tenant Billing

Access Central 4.2 Tenant Billing Access Central 4.2 Tenant Billing Software Package Access Central/Tenant Billing is comprised of four executable programs which all must reside in the subdirectory named: c:\tc85dir 1. ACCESS CENTRAL.MDB

More information

Why Can t We Be Friends?

Why Can t We Be Friends? Why Can t We Be Friends? Monitoring the Server Room by Introducing Modbus to SNMP Stanley Liu Product Manager, Data Acquisition & Control Division Overview IA devices are very useful for monitoring server

More information

Guest Room Controls & Monitoring System. Integrated Solution for Hotels Southern Countries. www.lonix.com

Guest Room Controls & Monitoring System. Integrated Solution for Hotels Southern Countries. www.lonix.com Guest Room Controls & Monitoring System Integrated Solution for Hotels Southern Countries www.lonix.com GUEST ROOM CONTROLS & MONITORING SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3 1.2 USER

More information

Time & Access System An RFID based technology

Time & Access System An RFID based technology Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.

More information

The Power of Analysis Framework

The Power of Analysis Framework All too often, users must create real-time planning and analysis reports with static and inconsistent sources of information. Data is locked in an Excel spreadsheet or a rigidly customized application

More information

QLIKVIEW DATA FLOWS TECHNICAL BRIEF

QLIKVIEW DATA FLOWS TECHNICAL BRIEF QLIKVIEW DATA FLOWS TECHNICAL BRIEF A QlikView Technical Brief September 2013 qlikview.com Table of Contents Introduction 3 Overview 3 Data Sourcing 5 Loading and Modeling Data 6 Provisioning Data 9 Using

More information

Answering the Security Challenge

Answering the Security Challenge GE Security Answering the Security Challenge Forcefield by GE g Imagination at work Security management made easy What is Forcefield? Forcefield by GE is an innovative security management solution that

More information

Attendance Enterprise

Attendance Enterprise Attendance Enterprise.the answer to your time and attendance needs Attendance Enterprise is a full-featured time and attendance system designed to automate employee time tracking and scheduling. With Attendance

More information

With Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are.

With Windows, Web and Mobile clients Richmond SupportDesk is accessible to Service Desk operators wherever they are. Richmond Systems Richmond Systems is a leading provider of software solutions enabling organisations to implement enterprise wide, best practice, IT Service Management. Richmond SupportDesk is currently

More information

Microsoft Robotics Studio

Microsoft Robotics Studio Microsoft Robotics Studio Tyco Security Products Ensures Real-Time Alarm Delivery Using Microsoft Robotics Studio Tyco Security Products provides world-class security and accesscontrol systems to customers

More information