IMAGINE A USER-FRIENDLY SYSTEM THAT NOT ONLY INTEGRATES ALL YOUR SECURITY REQUIREMENTS INTO ONE MANAGEMENT SYSTEM, BUT INTEGRATES THIS INTO THE OPERAT

Size: px
Start display at page:

Download "IMAGINE A USER-FRIENDLY SYSTEM THAT NOT ONLY INTEGRATES ALL YOUR SECURITY REQUIREMENTS INTO ONE MANAGEMENT SYSTEM, BUT INTEGRATES THIS INTO THE OPERAT"

Transcription

1 CARDAX FT: EXTENDING THE BOUNDARIES WHO`S WATCHING YOUR BUSINESS AROUND THE CLOCK?

2 IMAGINE A USER-FRIENDLY SYSTEM THAT NOT ONLY INTEGRATES ALL YOUR SECURITY REQUIREMENTS INTO ONE MANAGEMENT SYSTEM, BUT INTEGRATES THIS INTO THE OPERATION OF YOUR COMPANY WITH SCOPE FOR FUTURE EXPANSION AND GROWTH. 1am perimeter fence attacked cameras activated alarm generated The Cardax FT system makes use of existing IT networks, and uses the most secure encryption technology available. It can utilise existing company databases, and provides the means for future expansion. At initial conception, Cardax FT was developed with enterprise capabilities achieved through an extremely well designed system architecture, use of professional SQL databases and industry standard network technologies. Designed by some of the world s most capable security engineers, the Cardax FT system is without peer in the field of large scale, high security, integrated systems. CORE SECURITY Cardax FT is not simply a question of combining a number of different products to operate at the same time. The idea is to create one system that assumes the central role, utilising different technologies. Cardax FT is a comprehensive Microsoft Windows based security system that provides high-level security management for global access control, intruder alarms, voice over IP, and alarm management requirements. At the face of the Cardax FT system are its comprehensive range of readers, Intelligent Door Terminals and Remote Arming Terminals. By badging a card at the reader, a multitude of reactions can be programmed to happen. First and foremost the door will unlock provided the person is authorised to enter. Other programmed reactions could include: - your CEO badging his card, and the airconditioning and lights leading to his office turning on; - a factory worker presenting his card, and being logged in at work for the day; - the last person on level three leaving work, and the alarms on the floor being armed. The system also interacts with digital video management systems integrating multiple numbers and types of Digital Video Recorders and voice over IP systems. Any event or breach in security can trigger an associated camera to start recording, immediately sending pre and post event video back to a Cardax FT monitoring workstation. And there is a comprehensive, integrated, audit trail for all activities happening events are linked to video recording, providing a link for visual and auditable records that are relied upon for evidence. Even operators can be closely monitored with the recording of all changes made within the system. All this happens automatically and most amazingly the technology of Cardax FT means the system will continue to function, without relying on the main server for its operation.

3 ACCESS GRANTED. FLOOR SELECTION O INTEGRATION PLATFORM Keeping up with the day to day changes that occur within large organisations can present real challenges for security management. Utilising IT industry protocols, Cardax FT can integrate with most existing information systems, such as student or staff databases, resource scheduling, visitor management, the payroll system, and paging. This means only one point of data entry is needed to maintain employee/student/ contractor records. Imagine, for a university, the impact of using the student registry database to automatically generate access information at enrolment time. Lecture theatres can be unlocked at scheduled class times, with lighting and air-conditioning activated for the duration. Using industry standard OPC, Cardax FT interfaces to Building Management for energy management functionality, based on area occupancy. SCALABILITY The Cardax FT system can grow from just a few monitored doors to thousands on distributed sites accomplished without hardware redundancy or unreasonable costs. This means as a company adds new buildings, employees or even a new tenant, the expansion can easily be incorporated into the existing system even across time zones and international borders. Large systems with distributed sites manage costs by bringing sites on to one centralised system. Using IT infrastructure, remote bases are managed from the central Cardax FT system. Centralised access control and alarm monitoring can significantly reduce telecommunication and monitoring expenses. The head office in New York might have control over who gains access to the Sydney office in Australia. Furthermore, it will not matter if an employee is working in the Tokyo plant or the Dublin office they will be able to use the same Cardax card. The scope and inherent security of Cardax FT has proven the system to be a winner for market leaders in a diverse range of industries. From government to busy shipping ports, telecommunications companies to large scale banking and financial organisations Cardax FT has the ability to meet the security needs of any enterprise. A core system for security management and monitoring, the Cardax FT software provides a single graphical user interface. SECURITY MANAGEMENT 24/7 Cardax FT Online Manager, the web interface into the Cardax FT system, provides the flexibility and convenience of being able to manage your security anywhere, at anytime. Cardax FT Online Manager is a tool which enables you to distribute management and monitoring responsibility of Cardholders and Alarms to people in your organisation such as Line Managers - people 'on the ground', who best know the access requirements of Cardholders. Cardax FT Online Manager allows Operators to fully manage Cardholders and Alarms for their own Division, department, faculty, floor or office - a Lecturer who has been given system Operator privileges, for example, can allocate students access to certain areas and facilities for certain times for the duration of their course. Access can be granted to different areas, at different times, in real-time or in advance of when it is required. With Line Managers facilitating access requests and basic security operations, your Security staff have more time to focus on core security management requirements.

4 Managing Access Access parameters of where and when are defined for Access Groups (i.e. Managers, Night Staff), rather than assigned to individuals, enabling bulk changes. Unique ability to manage almost an unlimited number of access groups across a system to accommodate different combinations of access parameters. Extreme flexibility. Data sharing with other business systems Utilise existing databases and applications. Cardholder data can be imported from external sources, for example an HR database. Very Attractive Readers World class industrial design has been applied to readers, giving them the reputation of the most aesthetically pleasing readers available. Range of technologies Magstripe, TIRIS Series, 125 Series (ability to read Cardax format and simultaneously third party formats such as HID and Motorola), and Mifare Series (for Smart Card solution, and higher data encryption). Incorporating Biometrics Third party Biometrics readers, using techniques such as hand geometry, fingerprint, and iris scan can also be employed with Cardax FT. Monitored Readers Cardax readers are monitored, so operators know they are all functioning. Incorporating Philips Mifare Standard for Smart Cards Multiple applications prepaid metering, cashless vending, library, ID, loyalty schemes.all residing on the single security card. Detecting Intruders Separate intruder alarm systems become superfluous. Core security both allowing access and eliminating intruders is streamlined into one system. Readers can also arm and disarm alarms. If there is a security breach, an immediate report will be sent to your monitoring company reporting exactly where the incident has occurred. Combining Cardax FT with video surveillance Cardax FT integrates with many brands of CCTV / DVR systems to work in conjunction with your core access and alarm system. Cameras can be viewed live at all times, or triggered to start recording in response to an event.

5 ACROSS THE ENTIRE ORGANISATION WHEREVER IN THE WORLD THAT MAY BE Incorporating Cardax FT Challenge Some readers only require card, others card plus PIN. Some doors may require the cardholder to be visually verified by the operator, known as Challenge. Integrating Elevators Card readers can be installed in elevators, providing control and reporting of access to floors. Integrating with Intercom Systems Multiple intercom systems are supported enabling intercom functionality to be integrated into Cardax FT. Efficiently managing Building Resources Integrating access with resource bookings, lighting and airconditioning often creates significant operational and energy efficiencies. Securing premises at the Perimeter PowerFence TM perimeter security can be linked with Cardax FT, reporting any compromises or problems directly to the operator. A breach of the perimeter fence could activate cameras to record the site, as well as link the images to the event record in Cardax FT. Employees could also use their Cardax FT cards to open the perimeter gate or to turn the fence pulse off. Managing Multi- Tenants System division enables individual sites or tenants within a large network to manage the security of the property that is pertinent only to them, without viewing other divisions. The cost of the system can then be shared by tenants, or managed centrally by a property manager. Managing Remote Sites It doesn t matter how many buildings your company has or where they are in the world, they can all be effectively managed on the one system. While each building might have a Cardax FT workstation, it will be linked to the main server allowing one central management system to monitor security right across the entire enterprise. IT compatible network friendly Utilises existing IT networks, and uses minimal bandwidth. Managing visitors and contractors Manage access at short notice or in advance. Control visitor and contractor access as required. Any card can be cancelled in a keystroke you ll never need to change the locks again. Produce a time-on-site report when required to reconcile contractor invoices against work done.

6 6AM ZONE 6 CAMERA ACTIVATED 1AM UTILISES EXISTING TCP/IP NETWORKS MINIMAL BANDWIDTH DATA PROTECTION HIGH ENCRYPTION So why is the level of data encryption important for your company? Use of the organisation s IT infrastructure to communicate with the remote security devices makes it practical to have integrated security right across the organisation. Encryption is very much a standard IT technique to preserve the integrity and confidentiality of the organisation s data. Consequently, the security equipment utilising the network should similarly incorporate robust encryption to keep data secure. Cardax FT has the technology capability to handle the extensive processing to encrypt data to a high standard. The default level of encryption for Cardax FT network communications is 40-bit Secure Socket Layer Encryption, a standard similar to the technology used to secure Internet banking transactions. Encryption for communications from Controllers to peripheral equipment means Cardax FT achieves end to end data security. For very high security situations, where protection is required against a competent technical attack from both internal and external parties, the Cardax FT XtraSec product range is available. Cardax FT XtraSec utilises 168-bit encryption which, according to calculations, is 35 followed by 37 zeros times more difficult to break than 40-bit encryption. The security of all data is critical to the integrity of the security and IT systems, and encryption is vital to prevent system data transmission from being intercepted. IT COMPATIBLE One of the most important questions always asked is How will Cardax FT integrate with the existing infrastructure of the company? Cardax FT is designed to be compatible with IT systems. Cardax FT resides on the existing network, and follows industry standard rules for network connectivity. It uses minimal bandwidth, and will not interrupt normal IT communications. Each access and alarm event is approximately 100 bytes of data. Every 30 seconds each Controller sends out a heart beat, which again is approximately 100 bytes of data. Over all, on a modern TCP/IP network including WANs, this is hardly measurable compared with other normal network traffic. The processing power of Cardax FT is distributed throughout the system s components. Peer-topeer communications between the field Controllers on the network ensure that valid and instantaneous access decisions are made even if communication links or the central Server fail. Cardholders will never know there is a network problem, because the Cardax FT Controllers will still be operational. In large distributed systems, peer-to-peer communications are essential for ensuring reliability for operations such as emergency evacuation, duress and panic alarms. Minimising network delays for time critical communications is required for immediate capture of video data in response to a security related event. Cardax FT also protects and monitors the IT infrastructure in other simple ways. With environment sensors, if the temperature or humidity in the server room gets above a certain level, Cardax FT can send a signal to your IT manager to assess the situation.

7 VISITORS GIVEN ACCESS TO 3RD FLOOR MEETING ROOM ONLY AIR CONDITIONING TURNED ON FOR MEETING 12AM 2PM 3 When you purchase a Cardax FT system you are recommended to invest in a Software Maintenance Agreement (SMA). The SMA programme provides a cost effective means of obtaining future upgrades. MAINTAINING YOUR CARDAX FT SOFTWARE An SMA will help your system keep pace with Microsoft upgrades and regular Cardax FT releases designed to enhance system performance and functionality. There may even be the opportunity to install new Cardax FT features onto your system. We recommend that an SMA becomes the cornerstone of a total site security support plan. There may be up to four software releases a year depending on updates, but we commit to providing at least one release per calendar year. You appoint your Cardax FT dealer to receive the software releases for you and provide the services for the implementation and ongoing support of your SMA. GALLAGHER SECURITY MANAGEMENT SYSTEMS Cardax is developed and manufactured by Gallagher Security Management Systems, a division of the Gallagher Group, a privately owned New Zealand based company. In addition to Cardax, Gallagher Security Management Systems also develops and markets PowerFence perimeter security systems. Established in 1938, the Gallagher Group is the operating company for an integrated international organisation, which encompasses the development, manufacturing, and marketing of its solutions animal management systems and security management systems. The Gallagher Group is a well-established global business group with distributors located in over 100 countries across Europe, North and South America, Asia, Africa and the Pacific.

8 The scope of the Cardax FT system means it is the choice for market leaders in a diversity of sectors: Government, Education, Industrial, Banking and Finance, Communications, Commerce, Transport and Health. FOR MORE INFORMATION CONTACT: Gallagher Security Management Systems Kahikatea Drive, Private Bag 3026 Hamilton, New Zealand Phone Fax cdxsales@cardax.com DISCLAIMER In accordance with the Gallagher policy of continuing development, designs and specifications are subject to change without notice. Gallagher Security Management Systems is a division of Gallagher Group Limited. Offices/Distributed are located in: Asia Australia Europe Middle East New Zealand Russia South Africa United Kingdom United States of America Cardax and PowerFence are registered trademarks of Gallagher Group Limited. All other product, brand or trade names mentioned within are the property of their respective trademark owners. Copyright Gallagher Group Limited All rights reserved. Cardax is manufactured by Gallagher Security Management Systems, a division of the Gallagher Group of companies. 6J /06

Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

Gallagher Aged-Care Security Solutions

Gallagher Aged-Care Security Solutions Gallagher Aged-Care Security Solutions security.gallagher.com Gallagher Aged-Care Security Solutions When safety and security are paramount, industries all over the world choose Gallagher. As a leading

More information

Gallagher System Integrations

Gallagher System Integrations Gallagher System Integrations Gallagher Command Centre supports integrations with a range of third party security products, using Gallagher developed interface software and industry standard protocols.

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

a guide to integrated security management systems March 2007 For other information please contact:

a guide to integrated security management systems March 2007 For other information please contact: a guide to integrated security management systems March 2007 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk

More information

Access Control, Integrated

Access Control, Integrated Access Control, Integrated An essential guide to integration of your security systems and the benefits that can bring Duncan Gooch Product Manager Copyright 2011 Time and Data Systems International Limited

More information

A guide to access control for offices

A guide to access control for offices A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

Security Management System

Security Management System Security Management System High Level System Benefits Integrated Solutions For: Access Control Intrusion Detection Alarm Monitoring CCTV Integrated Badging Digital Video Surveillance & Retrieval Visitor

More information

Answering the Security Challenge

Answering the Security Challenge GE Security Answering the Security Challenge Forcefield by GE g Imagination at work Security management made easy What is Forcefield? Forcefield by GE is an innovative security management solution that

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Contents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow

Contents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow Contents Expertise in access control 3 SaaS Software as a Service, a comprehensive solution 4 Megaflex Officeflow 6 Megaflex control is always secure anytime, anywhere 8 Benefits of using Megaflex 9 Greenbox

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE Protect your property As Safe As Houses Are you looking for a security system that is... Highly effective but easily affordable? Extremely

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS

P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS UNLOCK THE DOOR TO INTEGRATED SECURITY MANAGEMENT Managing all of a facility s disparate security systems can be a daunting task,

More information

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12 Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering

More information

P2000 SECURITY management SYSTEM. More control means more freedom

P2000 SECURITY management SYSTEM. More control means more freedom P2000 SECURITY management SYSTEM More control means more freedom More freedom to achieve More freedom to reduce costs How can you keep people safe and productive, while reducing costs and staying compliant

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management

More information

integrated fire and security solutions Maximum protection for buildings

integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Johnson Controls: expert qualified in building protection Johnson Controls is the recognised

More information

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies

More information

Control and management of privileged users

Control and management of privileged users Control and management of privileged users The secure solution for monitoring and recording privileged users Visulox The complete Access Management Solution ToolBox Solution GmbH, established in 2003,

More information

Improving the Healthcare Experience

Improving the Healthcare Experience Improving the Healthcare Experience At Senior Care Facilities For senior care facilities, it is difficult to provide a safe environment and a high quality of care for residents while still allowing for

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

Redefining Security for the Modern Facility

Redefining Security for the Modern Facility Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.

More information

Integrated security management platform for Windows. Seamless. Effective. Efficient.

Integrated security management platform for Windows. Seamless. Effective. Efficient. Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them on multiple applications when each

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Education Market Overview: The Case for Networking and Remote Access. A Perle Systems White Paper

Education Market Overview: The Case for Networking and Remote Access. A Perle Systems White Paper Education Market Overview: The Case for Networking and Remote Access A Perle Systems White Paper The IT requirements of an Educational Institution, be it a University, Primary or Secondary School, are

More information

C CURE 800/8000 Security Management Solution

C CURE 800/8000 Security Management Solution D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Advanced event and alarm monitoring solution provides flexible and powerful control Easily integrate with

More information

Innovative Access Solutions CEM Systems is a leading provider of access control and fully integrated security management systems that you can rely on

Innovative Access Solutions CEM Systems is a leading provider of access control and fully integrated security management systems that you can rely on Innovative Access Solutions CEM Systems is a leading provider of access control and fully integrated security management systems that you can rely on Company profile Our Vision To remain at the cutting

More information

SECURITY FAQs Vunetrix Network Monitor Hosted Service. ver. 15.3.17 Revision: 1.2 Updated: April 2016. 1 P a g e

SECURITY FAQs Vunetrix Network Monitor Hosted Service. ver. 15.3.17 Revision: 1.2 Updated: April 2016. 1 P a g e SECURITY FAQs Vunetrix Network Monitor Hosted Service ver. 15.3.17 Revision: 1.2 Updated: April 2016 1 P a g e Introduction Welcome to Vunetrix Network Monitor (VNM), a world-class monitoring tool designed

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

INTEGRATED SOFTWARE SOLUTIONS

INTEGRATED SOFTWARE SOLUTIONS INTEGRATED SOFTWARE SOLUTIONS 1.0 INTEGRATED SOFTWARE SOLUTIONS > B.A.S.I.S. ET650 from Stanley Security Solutions combines flexibility with enormous capabilities. Using a single database server and a

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

Electronic Security Systems Made in Germany

Electronic Security Systems Made in Germany Electronic Security Systems Made in Germany State-of-the-art Security Technology from Germany Whether in business, public authorities, or private homes everywhere, assets need to be protected. To get the

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance GE Security VisioWave TM Intelligent Video Platform (IVP) Optimized for high-performance, mission-critical digital video surveillance Smart Scalable Open Take a good look at VisioWave TM IVP You ll watch

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER

Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER Protecting datacenters & mission critical facilities - using IP based systems Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER Agenda Industry drivers Business trends Developing the

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

SiPass Software. Fire Safety & Security Products. SiPass integrated

SiPass Software. Fire Safety & Security Products. SiPass integrated SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control

More information

Gallagher Systems Catalogue

Gallagher Systems Catalogue Gallagher Systems Catalogue ACCESS CONTROL, ALARMS MANAGEMENT, perimeter SYSTEMs www.gallagher.co Contents Overview Integrated access control, intruder alarms, & perimeter security...4 Software Controlled

More information

GE Security Alliance. imagination at work

GE Security Alliance. imagination at work GE Security Alliance Imagine your alarm, access control and video surveillance systems operating in perfect alliance as part of a truly integrated and cohesive security system. No need to imagine any longer.

More information

GET THE ALARM.COM ADVANTAGE.

GET THE ALARM.COM ADVANTAGE. BETTER SECURITY REMOTE WEB CONTROL MOBILE APPS GET THE ALARM.COM ADVANTAGE. STAY SECURE. STAY CONNECTED. WIRELESS TECHNOLOGY VIDEO MONITORING INTERACTIVE SERVICES HOME AUTOMATION ENERGY MANAGEMENT Alarm.com

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Access Control. Granta Security Management Systems you can count on. Answers for infrastructure. 1. Answers for infrastructure.

Access Control. Granta Security Management Systems you can count on. Answers for infrastructure. 1. Answers for infrastructure. Access Control Granta Security Management Systems you can count on Answers for infrastructure. Answers for infrastructure. 1 Granta: tried, tested and true In order to efficiently run any organisation

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

The EVA Solution to Physical Security

The EVA Solution to Physical Security The EVA Solution to Physical Security Protect your network, your data, your infrastructure, and your personnel with security solutions from Black Box. Environmental Monitoring Access Control 1-877-342-5837

More information

Security and the Mitel Teleworker Solution

Security and the Mitel Teleworker Solution Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

University of Brighton School and Departmental Information Security Policy

University of Brighton School and Departmental Information Security Policy University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives

More information

Flexible access control for all enterprises Building access and workforce management

Flexible access control for all enterprises Building access and workforce management Flexible access control for all enterprises Building access and workforce management Kaba have for over 100 years been providing solutions of quality from simple locking systems to complex electronic access

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Learning Outcomes. Physical Security. Zoning systems. Zone 1 Open areas. Information Security

Learning Outcomes. Physical Security. Zoning systems. Zone 1 Open areas. Information Security Learning Outcomes Physical Security Information Security Dr Hans Georg Schaathun After this week, students should be able to identify threats and useful controls in the physical environment of an information

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management

honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management As an industry leader and single source expert, Honeywell can deliver fully integrated

More information

A better way to secure your business. Vodafone Power to you. White paper: M2M for business security. m2m.vodafone.com

A better way to secure your business. Vodafone Power to you. White paper: M2M for business security. m2m.vodafone.com A better way to secure your business White paper: M2M for business security m2m.vodafone.com Vodafone Power to you M2M for business security What this paper is about Security is an industry in flux. While

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

2011 Tyco International Ltd. and its respective companies. All rights reserved. February 2011 2

2011 Tyco International Ltd. and its respective companies. All rights reserved. February 2011 2 Distributed Network Architecture: Scalability and Load Balancing in a Security Environment Introduction Global enterprises and large, multi-site hospitals, universities, or government agencies are increasingly

More information

Access Control Management Software

Access Control Management Software ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s

More information

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities I N T E LLIGENCE WATC H Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities WELCOME TO I-WATCH i-watch (Intelligence Watch) provides monitoring services for residential

More information

IP Convergence Delivers Security, Connectivity, Simplicity... and More

IP Convergence Delivers Security, Connectivity, Simplicity... and More IP Convergence Delivers Security, Connectivity, Simplicity... and More IP Convergence Solutions IP convergence is the smart choice Security command centers typically rely on multiple applications to secure

More information

a l A a l l i e v r l o r t a l l i e v r G e t a r a l g r u d i V e v i s s a l a u t r i V s s c c d i V e v i t c A l a u t r i V

a l A a l l i e v r l o r t a l l i e v r G e t a r a l g r u d i V e v i s s a l a u t r i V s s c c d i V e v i t c A l a u t r i V Security Technology EnveraSystems.com 7280 W Palmetto Park Rd, Ste 306 Boca Raton, FL 3333 P (561) 910-5826 8132 Blaikie Court Sarasota, FL 320 P (91) 556-0731 Gate Guard Active Video Surveillance Access

More information

Our support team are very technically proficient and have a combined experience of over 30 years supporting the vehicle hire and rental industry.

Our support team are very technically proficient and have a combined experience of over 30 years supporting the vehicle hire and rental industry. Company Profile Prohire Software Systems has been established since 1996 and dedicated itself to providing the highest quality of services and computer software to the vehicle hire industry. Prohire has

More information

WEBFIL LIMITED. Your Security Partner

WEBFIL LIMITED. Your Security Partner WEBFIL LIMITED Your Security Partner ABOUT THE COMPANY WEBFIL is a state based company under the Andrew Yule Group. Andrew Yule & Co. Ltd. a Government of India Enterprise is multi product, multi unit

More information

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD. MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard

More information

A Fully Integrated Online Hotel Locking System

A Fully Integrated Online Hotel Locking System ZLock ALV2 Wireless Online System A Fully Integrated Online Hotel Locking System A state-of-the-art integrated real-time access system especially designed for today s demanding Lodging industry. Unlike

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

SPECIAL CONDITIONS FOR VIRTUAL PRIVATE SERVERS

SPECIAL CONDITIONS FOR VIRTUAL PRIVATE SERVERS SPECIAL CONDITIONS FOR VIRTUAL PRIVATE SERVERS Version date: 28/03/2011 DEFINITIONS: Based power: The amount of resources (CPU and RAM) of the Virtual Private Server. This is the minimum number of resources

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

SAMAY - Attendance, Access control and Payroll Software

SAMAY - Attendance, Access control and Payroll Software SAMAY - Attendance, Access control and Payroll Software Welcome to a new world of comprehensive Human Capital Management (HCM) solutions from ISS. ISS SAMAY is a highly simplified HCM solution with an

More information

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control

More information

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use The Johnson Controls P2000 security management system

More information

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

Modern Manufacturing in the Cloud

Modern Manufacturing in the Cloud A Comprehensive Guide To Modern Manufacturing in the Cloud Manufacturing ERP Consultants Introduction The internet has introduced new ways of doing business for many industries, and manufacturing is no

More information

AKCess Pro Server Management Software

AKCess Pro Server Management Software Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform. 1 EXgarde PRO Based Access Management System Overview EXgarde PRO is a windows-based, fully featured access management PC software application providing flexibility and ability to tailor the software to

More information

Honeywell Enterprise Buildings Integrator. Maximise productivity, compliance and flexibility while reducing costs and risk

Honeywell Enterprise Buildings Integrator. Maximise productivity, compliance and flexibility while reducing costs and risk Honeywell Enterprise Buildings Integrator Intelligent Building Management Solutions Maximise productivity, compliance and flexibility while reducing costs and risk Improve ROI and reduce risk by enabling

More information