1 Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n
2 A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control as a service has forever changed. A simple concept that combined existing Keyscan access control hardware with a cloud-based version of our industry-leading access control management software. Together, they formed Keyscan CMAC which has revolutionized the business by introducing a new recurring revenue stream with access control. And, we made it easier for dealers and integrators to get started building intrinsic value in their business. Keyscan Hosted Services Keyscan Hosted Services (KHS) takes CMAC to a whole new cost-saving level. With KHS, dealers and integrators can choose the option to have access control data and software hosted by Keyscan at our facility using our secure server infrastructure. Keyscan Hosted Services simplifies the entire process and allows you the opportunity to create a CMAC business model offering remote and RMR-based managed access control services to your customers while avoiding the upfront expense attributed to implementing your own central host service. KHS advantages with zero risk With Keyscan Hosted Services, dealers and integrators can take advantage of a CMAC model, build a base of customers, reap a new RMR revenue stream, and refine their business model in ways that will build lasting and intrinsic value to their organization. Then, at a later time, if they ever choose to implement their own host service, Keyscan Hosted Services will make the future transfer of hosting responsibilities seamless and without complications. Keyscan Hosted Services is the new and convenient way for dealers and integrators to enter the recurring monthly revenue (RMR) model with Access Control, while allowing you to leverage existing core competencies. 2 Keyscan Hosted Services
3 to manage clients access control Rethinking Access Control Keyscan Hosted Services solution allows you to bring the benefits of Centrally Managed Access Control to a whole new group of customers that would not have previously considered it an option. The CMAC solution provides the convenience of web based access control without ever compromising security. For the first time, Dealers and Integrators can save time and valuable resources by partnering with Keyscan to establish a CMAC RMR-generating service. This allows your customers to focus on their core business, while having peace of mind that access control security experts are managing their facility security. KHS high data security, ease of use, with no compromise With any such internet-based hosting activity, security is always a top priority. Keyscan Hosted Services takes data security very seriously. That s why Keyscan uses AES Rijndael (Advanced Encryption Standard) technology to tightly secure all data transmissions. AES Rijndael is a symmetric-key standard that offers 256 bit encryption. This encryption level is so effective, it is approved and used for US government top secret level data transmissions. Keyscan also mandates SSL data certificates for all internet based log-in access. While security is a top priority, performance and ease of system installation is never compromised. KHS removes the up-front expense, maintenance and management commitment so you can focus on building your customer base and adding intrinsic value to your business. Not only is your data encrypted and secure it is always safe and protected when you need it with KHS back-up provisions. The result is high security coupled with day to day ease of use that is ultimately designed to maximize system deployments that drive a new found RMR stream. What s more, you ll appreciate that KHS makes the future transfer of hosting responsibility seamless and without complication. 3
4 Web Based Access Control Solutions With Keyscan Hosted Services, your customers still get the same maximum flexibility leveraging Keyscan s highly secured servers and IT infrastructure. Using Keyscan s industry-leading access control management software and the fully password protected K-WEB module; system management can be done from any PC or mobile device with an internet connection. The power and flexibility of Keyscan Hosted Services and K-WEB module provides organizations the ability to manage their facility s access control systems. K-WEB Home Page K-WEB capabilities Add and edit cardholders Assign and update cardholder access privileges Generate system reports Lock, unlock and pulse controlled doors Schedule visitors Review system status Change time zone schedules Door maintenance and status Live online transactions Cardholder Management With Keyscan Hosted Services, all your customer needs is a web connection and K-Web. It is the ideal solution you can offer your customers who need, or want, some level of autonomous control over their systems. Dealers and integrators may choose to create a turnkey offering and provide a one-stop management of their customers access control systems contributing to increased RMR. Door status control 4 Keyscan Hosted Services
5 Innovation driven by Reverse IP technology Keyscan Hosted Services uses a Reverse IP network technology for host connectivity and communications. This is accomplished using Keyscan s NET6P-KHS network communication board and a normal high speed internet connection. The Reverse IP technology establishes a Keyscan access control panel as a network appliance and reduces the level of IT knowledge required for system installation. And, with any such internet activity, your data security is ensured with Keyscan s adoption of AES Rijndael 256 bit encryption which is approved for US government top secret level transmissions. Keyscan s Reverse IP technology uses Dynamic Host Communication Protocol (DHCP), allowing the panel to auto negotiate a network IP address and eliminating the need for static IP addresses for the panel, which can be difficult to acquire. Navigating network ports and firewalls is also reduced with Keyscan s Reverse IP network technology. It ensures any technician can install the access control system with minimized network permissions or advanced IT training. Once the installation is complete, connectivity with the Keyscan host is kept indefinitely. If the connection to the Keyscan host is ever lost, the panel remains fully operational and will automatically re-connect to the Keyscan host - while continuing to log all activities. Once the connection is made, all logged activity will be uploaded to the host. Keyscan Hosted Services also runs the same Keyscan software you have come to depend on. No new training is required as all server and IT infrastructure is maintained by Keyscan. Using Keyscan Hosted Services in a CMAC application With Keyscan Hosted Services, your customers get the same flexibility of accessing their Keyscan System from anywhere in the world. The only difference is the data is hosted at Keyscan using our secure server infrastructure. Power CA150-KHS Single Mid-Span PoE Injector CA4500 Optional "out" Reader Keyscan K-WEB NET6P-KHS (Plug on board) External 12VDC Power Supply CA150-KHS Keyscan Hosted Services Secure Server. This infrastructure provides Access Control Management Software, system database, communications receiver and provides web client provisions. Power Optional "out" Reader 5
6 CA150-KHS Single Door PoE Equipped ACU Making access control more accessible Keyscan has always offered access control solutions that optimize system designs and maximize installation flexibility. At the heart of our organization is a vibrant team of engineers and product specialists that continually evaluate new and emerging technologies. Their aim is to select proven technologies that will enhance our product offering without compromising reliability and security. The CA150-KHS is a culmination of these efforts. The innovative CA150-KHS represents the latest addition to Keyscan s flexible line up of 2, 4 and 8 reader access control units and elevator floor access control units. When it comes to performance, capacities and overall capability, the CA150-KHS is comparable with our full range of access control units. From its total number of supported credentials to total number of supported time zones, not a single detail was overlooked. Exclusive to the CA150-KHS is the fact that it s equipped to support power-over-ethernet (PoE). That single door at the far end of a building or those customers that have only one critical door to be secured have never been so easily accommodated. How the CA150-KHS works with Keyscan Hosted Services and CMAC solutions The CA150-KHS is the perfect solution for Keyscan Hosted Services and Centrally Managed Access Control solutions. With all of the on-site features (network connectivity, power requirements, and door access) all contained in a single part, setting up customer sites couldn t be easier. Reverse networking functionality is built into the on-board ethernet connection and, with the AES encryption, provides a secure connection from customer sites to the Keyscan host server. Whether opening a new site with one door, or adding an additional door to an existing site, the CA150-KHS makes everything easier. Keyscan s entire line up of ACU s are designed to support CMAC, providing maximum system design flexibility. Best of all, there is no limit to the total number of doors that may be centrally managed. 6 Keyscan Hosted Services
7 CA150-KHS Single Door PoE Equipped ACU Design overview A) Status LEDs System status, communication and bit counter LEDs allow for instant system troubleshooting. B) Dual Processors Dual processors ensure uninterrupted panel operation even during system downloads. C) Tamper Switch If the CA150-KHS cover is removed, for any reason, the tamper switch will activate triggering a Panel Tamper Alarm. A B F E D) Network Connectivity Equipped with a PoE enabled Ethernet port (IEEE 802.3af); DHCP Supported; Encrypted/non-Encrypted modes. E) Four Supervised Inputs Inputs allow for request to exit (RTE), door contact input and two auxiliary inputs. F) Two Reader Ports Provides IN and OUT reader capabilities; Readers powered in PoE or DC supply mode up to per port. C D G H G) Two Heavy Duty Relays One Strike Relay and one Auxiliary Relay are provided; Selectable powered or non-powered modes. Powered mode provides up to 500mA per relay. Non-powered provides dry contact rated for 4 amp, 30VDC; 6 amp, 24VDC. H) DC Input/Output When PoE is not available a 12VDC input option is provided. Also available is a 12VDC output to supply any local auxiliary device such as a PIR, or glass-break sensor rated for 12VDC up to 250mA. Mix and match with Keyscan s full line up of access control and elevator floor control units: CA250; CA4500; CA8500; EC1500 and EC2500. Keyscan makes hosted services simple Be sure to inquire about Keyscan KHS kits. We ve simplified the KHS sales and ordering process by introducing CMAC kits. These kits are pre-configured to connect to Keyscan Hosted Servers and come complete with readers, cards and all necessary communications hardware. 7
8 KEYSCAN S FULL LINE UP OF ACCESS CONTROL UNITS PoE Single Door Control System Multiple Reader Access Control Systems Elevator Floor Control Systems Access Control Unit Doors/Elevator Floors Supported 1 door 2 doors 4 doors 8 doors 1 cab (up to 40 floors) 2 cabs (up to 16 floors) Reader Ports 2 (In/Out) Multi-ACU Compatibility Yes (Ethernet) Yes Yes Yes Yes Yes System Status LEDs Yes Yes Yes Yes Yes Yes Dual Processors Yes Yes Yes Yes Yes Yes Flash Memory Yes Yes Yes Yes Yes Yes Power Fail Output NA Yes Yes Yes Yes Yes Floor Monitor Inputs (Supervised) CA150-KHS CA250 CA4500 CA8500 EC1500 EC2500 NA NA NA NA Yes Yes Inputs Request to Exit (RTE) Inputs (Supervised) NA NA Door Contact Inputs NA NA Auxiliary Inputs (Supervised) NA NA I/O Input Expansion NA NA 64 (banks of 16) 64 (banks of 16) NA NA Outputs Auxiliary Output Relays NA NA Expansion Auxiliary Output Relays NA NA 8 8 NA NA I/O Outputs NA NA 64 (banks of 16) 64 (banks of 16) NA NA Door Output Relays NA NA Capacity No. of Cardholders 32,000 32,000 32,000 32,000 32,000 32,000 Transaction File Buffer Time Zones Time Schedules Group Levels Holiday Dates Connectivity PoE-Power over Ethernet (IEEE 802.3af) Equipped NA NA NA NA NA KHS Reverse IP Equipped Optional Optional Optional Optional Optional Serial Communication Yes (single panel) Yes Yes Yes Yes Yes To learn more contact your Keyscan Regional Sales Manager or call: KEYSCAN ( ) 901 Burns Street East Whitby, Ontario, L1N 0E6, Canada Toll Free: KEYSCAN (Canada/US) Tel: Web: Keyscan Inc. LR complies to: UL STD 294 Fifth Ed. Access Control System Units CA8500; CA4500; CA250; EC1500; EC V ac, 40VA, Class 2 input; relay output contacts, 24V ac, 10A; 30V dc; 5A CSA STD C M1983 Signal Equipment KEY Keyscan Inc. (2015), a member of the Kaba Group. Information in this folder is intended for general use only. Some KHS configured hardware may be required. KHS master account must be opened and active before any KHS hardware can be installed. Keyscan Inc., reserves the right to alter designs and specifications without notice or obligation. Printed in Canada.
ROGERS WHITE PAPER 1 Rev. May 2011 page 2 2 TABLE OF CONTENTS Introduction 3 Small Business Telephony Options 4 Basic Phone Service 4 Traditional PBX and Key Systems 4 Digital Services Business Cable and
VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,
WHITEPAPER Hosted vs. On-Premise PBX a Comparison of Direct Costs & Indirect Benefits The adoption of Voice over Internet Protocol (VoIP) solutions across the world and within Canada continues to rise.
INR-410 INR-420 System Administrator s Manual For V3.0.06 Version 2013/11/20 About This Manual Target Audience This manual is intended for System Administrators who are responsible for installing and setting
m Windows 7 Reviewer s Guide A First Look at Windows 7 DRAFT 2 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication.
The Definitive IP PBX Guide Understand what an IP PBX or Hosted VoIP solution can do for your organization and discover the issues that warrant consideration during your decision making process. This comprehensive
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
Microsoft SharePoint Workspace 2010Product Guide Microsoft SharePoint Workspace 2010: An Overview... 1 SharePoint Workspace: At-a-Glance... 3 Sync with SharePoint 2010 sites... 3 Take all or some of your
Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals Adopting an Aconex SaaS Solution It s the job of CIOs and IT managers to ensure that their organizations adopt secure
Product Overview for Windows Small Business Server 2011 December 2010 Abstract Microsoft offers Windows Small Business Servers as a business solution for small businesses by providing a simplified setup,
NETGEAR VoIP Avaya QE 20 Avaya Quick Edition and NETGEAR Design Guide Table of Contents 1.0 Introduction................................................ 2 2.0 Scope....................................................
THE INTERNET DATA VAULT From enterprise-sized corporations, to simple home-based businesses, all companies have information that is important to their success and that needs to be protected. Data storage
Estimating the Cost of a GIS in the Amazon Cloud An Esri White Paper August 2012 Copyright 2012 Esri All rights reserved. Printed in the United States of America. The information contained in this document
3CX Phone System Cloud Server Administration Manual Copyright 2013 2014, 3CX Ltd. http://www.3cx.com E mail: email@example.com Information in this document is subject to change without notice. Companies names
Touchpoint Pro Flexible Gas Control System The ideal safety system Honeywell s Touchpoint Pro makes gas control system design, installation, configuration and operation simple. Touchpoint Pro uses a building
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
White Paper: Managed Network Services Trends for Today s Enterprise Organizations Released December 2010 Spacenet Inc 1750 Old Meadow Road McLean, VA 22102 www.spacenet.com 866-480-2263 1 Table of Contents
Solutions Guide Education Networks Education needs and objectives Modern education networks are complex, and serve a rapidly developing set of requirements, some of which challenge the technology and its
I n n o v a t i o n N e t w o r k A p p N o t e TPP: 10347 Date: September, 2011 Product: ShoreTel EtherSpeak with Adtran System version: ShoreTel 11.x Abstract In 2008, EtherSpeak certified the SureTrunk
Contents Introduction What is the Cloud? How does it work? Types of Cloud Service Cloud Service Providers Summary Introduction The CLOUD! It seems to be everywhere these days; you can t get away from it!
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General