Functional Specification Document

Size: px
Start display at page:

Download "Functional Specification Document"

Transcription

1 Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: (0) Web:

2 Index Introduction 1.1 Hardware Components 1.2 Power Requirements 1.3 Structured Cabling 1.4 Communications 1.5 Housings & Equipment Tamper Switches 1.6 Alarm Handling / Fire Override 1.7 Local Event Buffer 1.8 Card Reading Technologies 1.9 Wireless Electronic Locks 2.0 System Architecture 2.1 Software 2.2 Database Accessibility 2.3 Immediate Propagation 2.4 Authentication 2.5 Interactive Sitemaps 2.6 Multi Tennant (Partitioning) 2.7 Card Design 2.8 Cardholders 2.9 Searching 2.10 User Tracking 2.11 Real Time Audit Trail 2.12 Automatic Archive 2.13 Reporting 2.14 Help 3.0 Warranty Appendix 1 Appendix 2 Software Requirements Hardware Requirements Page 1

3 Introduction The access control system (ACS) shall comprise of an integrated, scalable, electronic proximity card system. The Access Control System s primary function is to regulate access through specific portals (doors, gates or barriers) to secured controlled access points, also have provision of capturing cardholder s images and producing access cards used to provide access throughout designated areas. The system will support an integrated network of intelligent smart card readers using MIFARE technology at fixed locations which provides the backbone of the access control system. The database for the Access Control System (ACS) will operate using Microsoft SQL Database 2005 or later. There shall be a dedicated server allowing remote client computers (workstations) access the ACS using client/server protocol. Access to the security application software shall be password protected. Hardware Specification 1.1 Hardware Components Controllers Access Control Units (ACU) are supplied with internal non-volatile memory. This memory will allow all programming of access permissions, time schedules and the current date and time data stored in the internal memory to be retained during periods of power failure. ACU shall be configurable via Enterprise level software. ACUs will also be configurable via an integral keyboard/display or internal web server. ACU controllers shall have the facility to control Entry and Exit readers per door and shall be capable of differentiating between valid entry and exit events. ACUs shall be integrated with a 12Volt DC 2Amp power supply (PSU) and be capable of monitoring and reporting mains present, supply voltage and tamper. All faults shall be reported via the ACS controlling software. The metal housing shall be capable of supporting an external back-up battery. ACUs shall support direct IP 100Mbs Ethernet connection for connection with the software. Page 2

4 1.1 Hardware Components Cont. ACU device shall support the following features; 60,000 users 1024 user groups TCP/IP (100/10 Mbs) USB Connectivity. RS485 Protocol. Automatic door discovery NetBIOS over TCP/IP name resolution. Dynamic IP Address (DHCP). Voltage Monitoring and reporting Elevator control Input / output monitoring 1.2 Power Requirements ACU controllers shall be powered by a 12V DC supply. Power consumption of ACU are 230mA.. Power Supply Unit (PSU) shall be monitored and regulated with the ability of battery backup. 1.3 Structured Cabling Wiring shall be in accordance with the schematic and floor plan drawings as indicated below. ACU controllers shall be networked over a TCP/IP protocol or an RS485 configuration. 1.4 Communications Master ACU uses TCP/IP communications techniques over Ethernet, whilst employing proprietary communications protocols. In the event of communication failure or interruption, the local ACU shall continue to operate independently, using criteria held in non-volatile memory, and logging usage until communication has been restored. The system shall employ a distributed architecture so that all access decisions are made locally. It shall be possible to cluster ACUs to share data and make one ACU a master of a cluster of up to 16 ACUs. the main point of communication to the server, with an alternate master within each cluster to support the cluster in event of a failure; this will keep network bandwidth at a minimal level Page 3

5 1.5 Housings & Equipment Tamper Switches ACU controllers are fitted with equipment tamper switches which consist of a spring loaded switch assembly. 1.6 Fire Override / Alarm Notification ACU controllers shall unlock all doors automatically on Fire Alarm Activation. When the ACU gets an input from the fire alarm it shall automatically release all specified online-doors. The system shall allow doors to be configured to cause a variety of alarms to activate based upon inputs. Each hardware component will generate a number of alarms. These alarms include (but will not be limited to): DOOR AJAR DOOR FORCED OPEN DOOR OPENED UNDER DURESS ENCLOSURE TAMPERING VOLTAGE MONITORING BREAKGLASS MONITORING 1.7 Local Event Buffer ACU devices maintain a buffer of all events that occur locally. The ACU stores events until they are uploaded to the server. If communication between ACU and server is lost, events will be retained until communication is restored, at which point the last 5000 logged events shall be uploaded to the server. 1.8 Card Reading Technologies The access control system shall operate using contactless smart card 13.56MHz MIFARE technology conforming to standards compliant with ISO/IEC MIFARE protocol proximity readers shall use a Belden 9504 (or equivalent) cable and may be located at a cable distance up to 100m from the ACU. MIFARE protocol proximity readers shall recognize the unique ID encoded to the appropriate memory sector. Card read range shall be a minimum of 25mm in normal operating conditions. Card readers shall be in a polycarbonate housing provided with LED indicators to indicate power status, valid and invalid reads. The card reader or entry device will give an audible indication of each read. Readers will be available in Proximity and/ or Pin and Proximity formats. Readers can be mounted on a standard electrical pattress box. A mullion variant will be available rated to IP67. Page 4

6 1.9 Wireless Electronic Locks On-line stainless steel wireless electronic locks will support 868 MHz standard wireless bandwidth. Wireless electronic locks will communicate with a TCP/IP ACU Controller. Each ACU controller will be able to manage up to 32 locks per hub (range dependent). Locks will use CR123a 3v lithium battery as standard. In event of battery failure, USB override can be used. Wireless locks will allow free egress from secure side of the door. Wireless lock must be in unobtrusive colours such as black and grey. A status LED to inform on the current status of the door is required. Locks must be no larger than 293mm x 46mm x 30mm inside and 293 x 46 x 25 outside. Wireless Electronic Locks shall support; up to 200,000 door activation on a single battery MHz MIFARE (Classic, DESFire EV1) real-time reporting to ACU USB connection Key override (optional) 72mm Euro profile key locks. 128bit AES encrypted communication fail secure facility white listed cards for emergency access Page 5

7 Software Specification 2.0 System Architecture Access Control Software (ACS) shall provide a multi-tasking windows environment that allows operators access the ACS system from their client PC. The software shall cater for multiple sites and be managed from a centralized server. 2.1 Software An Enterprise level Access Control management system will provide the standard IT tools and innovative distributed architecture. The application software shall interface with video management systems using the Milestone software platform or Physical Security Information Management (PSIM) systems. The system will utilise Microsoft's.NET 4.0 technology, use IT-standard tools that provide native encryption and XML data transfer. It will deliver user intuitive tools and screens similar to other office systems such as Outlook and Explorer to increase usability and reduce training required at implementation. The Enterprise level Software shall support, at a minimum, Microsoft SQL Server 2005 / 2008 (Express, Standard, or Enterprise), for data protection and redundancy. The Enterprise Software shall have true multi-tasking, multiprocessor and remote client support; allowing independent activities and monitoring to occur simultaneously at multiple locations. The operator workstation (Client) shall be user friendly, employing icon-based menus and providing a mouse-driven interface for system operation and the creation of color graphic maps. It shall have an intuitive user interface with easy navigation, using hyperlinks and back and forward buttons to navigate between pages on the screen. Page 6

8 The Enterprise Software shall support the following role based access modules: Installation A module for the installation, expansion and maintenance of the access control system hardware. Management A module dedicated for the management of users, doors, credentials and access rights. Monitoring A module dedicated to the monitoring of the access control system. This module must include a real-time logging of events on the system as they happen and allow remote-control (lock/unlock) of the doors. 2.2 Database Accessibility All system data must reside on a SQL database on the network and must be accessible in real-time to every / any system workstation. This allows for automatic change propagation to all workstations on the system as well as a common database to consolidate all information and allow for efficient disaster recovery. 2.3 Immediate Propagation Changes made using the ACS are automatically recorded to the SQL database and downloaded to the ACU controller using the appropriate communications channel. All database changes can be performed while the workstation is on-line without disrupting other system operations. 2.4 Authentication The ACS application shall request an operator s user name and password before entry to the system is granted. The software will not rut until the identification of the operator has been verified and access is granted. Privilege Levels When defining the operators access levels, the system shall allow the level of assignment to be specified. These levels include the following: Read only: This type of privilege level does not allow the operator to create or modify components in the specified area of the system. However, they are allowed to view those records. Page 7

9 Modify: This type of privilege level does not allow the operator to create components in the specified area of the system. However, they are allowed to view and make modifications to existing records. Full: This type of privilege level allows the operator to create, modify and view components in the specified area of the system. 2.5 Interactive Sitemaps The ACS shall also support the use of interactive Site Maps. The graphics and floor plans shall be configured in a JPEG, GIF or Bitmap format to allow for the importation of existing site drawings. Upon activation of a selected alarm, the system shall automatically display the associated graphic / floor plan on the PC monitor. The operator shall use the mouse to click on an icon on the graphic and acknowledge / cancel alarm events as well as operating the door. 2.6 Multi-Tenant (Partitioning) The ACS system shall have the facility to partition multiple sites. It shall allow systems, with a large number of doors and users, to be partitioned into smaller manageable systems (Sites). The hardware (Master ACU) shall connect as normal to the system. ACS operator can only view and configure attributes (users, user groups, doors, timezone, events etc) that belong to their particular site. The operators shall not see attributes from other sites. As new items are added to the database, the administrator can assign the items to different sites. 2.8 Card Design The ACS shall facilitate the design and printing of ID cards which shall allow the operator to create unlimited card templates which may be printed from the software. The card templates may be configured to display the card holder s photo, company logo, user details etc as designed. It may also be programmed to include a barcode or to encode a magnetic stripe on the card. 2.9 Cardholders The database shall support 60,000 cards all of which are downloaded and retained in the memory of the ACU. This cardholder management functionality allows the enrolment of cardholders into the database, capturing of images and import / export of employee data. This functionality also allows a system operator to assign or modify the access rights of any cardholder and the changes to be implemented in real time User Tracking Page 8

10 The ACS records the last visited access point (with date and time) for every cardholder. A special trace function is available for operators to track activity of specific cardholders. When the trace has been applied, all card activity relating to that cardholder will be highlighted in the user tracking report. A report may also be generated that details the locations visited by the traced cardholder Real Time Audit Trail The ACS shall log all changes to the database and these events are logged on-screen as they occur (in real-time). All system changes, alarm events, access rights changes, input/output state changes, exception messages, miscellaneous system messages, or any information relating to the access control system in general are logged to the audit trail and the event log Automatic Archive The ACS shall be capable of creating an automatic backup of the database. This facilitates a backup to be created for the database on a scheduled daily basis Reporting The ACS shall provide detailed reports regarding the information contained in the database, audit trail, or operator journals, without the need for programming skills. The operator shall be able to select the specific system components on which to base a report, and order the report according to any logical criteria Help The software shall provide a HELP option which shall provide supplementary information relevant to the event displayed on the main screen. The help menu should be activated by the use of the mouse and should detail all relevant material. 3.0 Warranty The access control equipment shall come with a minimum of 5 years manufacturer s warranty. Page 9

11 Appendix 1 Software Requirements: The following software is required for the installation and running of the Enterprise software: Database Server Software Requirements: Windows Server bit, or 64 bit, OR Windows Server bit, or 64 bit Microsoft.Net Framework V.4.0 Microsoft SQL Server 2005 Express Edition with SP2, OR Microsoft SQL Server 2005 Standard Edition with SP2 Client Requirements Windows XP, Windows Vista or Windows 7 Appendix 2 Hardware Requirements: The minimum hardware requirements are as follows: Database server: Processor: Core i5 Memory: 4GB Hard disk: 20G Note: These are minimum specifications guidelines only. Requirements may change depending on the number of doors, users, etc. Page 10

12 Appendix 3 Schematics Diagram 1 Diagram 1: An example of a elock and ACTpro4000 access control system is shown. It consists of two Hubs in a Hub Group, with 4 elocks, 2 ACTpro ACU and a PC running the ACT Enterprise software. The system is completely extendable up to 4000 doors with additional elocks, Hubs and ACU devices. ACT Enterprise Server/Client Software with multiple administrators ACTpro Series IP controllers with wireless hub, elocks and input /output module Page 11

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

ACCESS CONTROL SYSTEM

ACCESS CONTROL SYSTEM ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

Cisco Physical Access Manager

Cisco Physical Access Manager Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used

More information

SiPass Software. Fire Safety & Security Products. SiPass integrated

SiPass Software. Fire Safety & Security Products. SiPass integrated SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

Access Control Management Software

Access Control Management Software ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s

More information

White Paper ClearSCADA Architecture

White Paper ClearSCADA Architecture White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed

More information

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch - Milestone Certified Solution Summary document 1 Table of Contents Products Tested

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management

More information

Hybrid HD (Megapixel) Recording System Super Hybrid Server = an all-in-one solution for IP, HD-SDI and Analog cameras

Hybrid HD (Megapixel) Recording System Super Hybrid Server = an all-in-one solution for IP, HD-SDI and Analog cameras Hybrid Extreme - Video Management Software (VMS) High Definition Megapixel Camera Video Recording and Management System The Hybrid Extreme Surveillance Solution for Integrators looking to Make, Manage

More information

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12 Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering

More information

Saturday from 09:00-13:00 (GMT) Documentation on all Paxton products can be found on our website -

Saturday from 09:00-13:00 (GMT) Documentation on all Paxton products can be found on our website - 8/04/203 Ins-30075 Net2 nano control unit Paxton Technical Support 0273 80 support@paxton.co.uk Technical help is available: Monday - Friday from 07:00-9:00 (GMT) Saturday from 09:00-3:00 (GMT) Documentation

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EasyMP Multi PC Projection Operation Guide Contents Introduction to EasyMP Multi PC Projection... 7 EasyMP Multi PC Projection Features... 7 Connection to Various Devices... 7 Four-Panel Display... 8

More information

Access control designed simply for you

Access control designed simply for you TruPortal Access control designed simply for you QUICK START GUIDE Introduction TruPortal access control solutions have been engineered and designed to install quickly and easily right out of the box.

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use The Johnson Controls P2000 security management system

More information

Topaz. GE Security. Intelligent software for access control. Topaz. Features

Topaz. GE Security. Intelligent software for access control. Topaz. Features GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security

More information

LockView 4.3.1 CompX Database & Network Configuration & Installation Manual

LockView 4.3.1 CompX Database & Network Configuration & Installation Manual LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...

More information

LockView 4.2 CompX Database & Network Configuration & Installation Manual

LockView 4.2 CompX Database & Network Configuration & Installation Manual LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5

More information

Sagem Integrator Software Manual

Sagem Integrator Software Manual Sagem Integrator Software Manual Table of Contents: Page 3 Login and Password Page 4 User Properties Page 5 User Properties (Permissions) Page 6 Device Properties (General) Page 7 Device Properties (Database)

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

DCS110 CATVisor COMMANDER

DCS110 CATVisor COMMANDER Broadband Cable Networks April 13, 2006 1(5) DCS110 CATVisor COMMANDER Introduction CATVisor Commander is the standalone software tool for configuring, adjusting and monitoring Teleste Headend and HFC

More information

Doc 10. UTM Standards: Card Access Security System

Doc 10. UTM Standards: Card Access Security System Doc 10 UTM Standards: Card Access Security System 1. GENERAL... 2 1.1. GENERAL REQUIREMENTS.... 2 1.2. SUMMARY OF WORK INCLUDED... 2 1.3. OVERVIEW... 2 1.4. MANDATORY REQUIREMENTS... 3 1.5. ACCESS CONTROL

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

Software Icon Glossary. Aliro IP access control not complication.

Software Icon Glossary. Aliro IP access control not complication. Software Icon Glossary Aliro IP access control not complication The Aliro Software icon glossary is a comprehensive list of all of the icons used within the software. It is designed to help you easily

More information

A Fully Integrated Online Hotel Locking System

A Fully Integrated Online Hotel Locking System ZLock ALV2 Wireless Online System A Fully Integrated Online Hotel Locking System A state-of-the-art integrated real-time access system especially designed for today s demanding Lodging industry. Unlike

More information

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training) TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:

More information

UNICORN 7.0. Administration and Technical Manual

UNICORN 7.0. Administration and Technical Manual UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

OnGuard Online User Guide

OnGuard Online User Guide OnGuard Online User Guide T81165/Rev ER-7991-40 Jan 2005 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Config software for D2 systems USER S MANUAL

Config software for D2 systems USER S MANUAL DT-CONFIG SOFTWARE Config software for D2 systems USER S MANUAL CONTENTS 1. Introductions ------------------------------------------------------------------- 3 2. System Requirement and Connection ----------------------------------------

More information

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform. 1 EXgarde PRO Based Access Management System Overview EXgarde PRO is a windows-based, fully featured access management PC software application providing flexibility and ability to tailor the software to

More information

38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM

38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM 38. ACCESS CONTROL AND ELECTRONIC SECURITY SYSTEM 38.1 GENERAL Scope Modification and extension of the existing CDU Cardax security system and CCTV System including: Cardax (FT 3000 series) Access control

More information

AS-525. AxTrax Access Control Management Software. Software Manual

AS-525. AxTrax Access Control Management Software. Software Manual AS-525 AxTrax Access Control Management Software Software Manual August 2010 Table of Contents Table of Contents 1. Introduction... 5 1.1 System Features... 5 1.1.1. Access Control... 6 1.1.2. Access

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

INSTALLATION GUIDE. Trimble AutoBid Mechanical Software

INSTALLATION GUIDE. Trimble AutoBid Mechanical Software INSTALLATION GUIDE Trimble AutoBid Mechanical Software Revision A April 2014 F Englewood Office Trimble Navigation Limited 116 Inverness Drive East, Suite 210 Englewood, Colorado 80112 (800) 234-3758 Copyright

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display... Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple

More information

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

SQL Server Solutions GETTING STARTED WITH. SQL Safe Backup

SQL Server Solutions GETTING STARTED WITH. SQL Safe Backup SQL Server Solutions GETTING STARTED WITH SQL Safe Backup Purpose of this document Due to its depth and potential for customization, there are often parts of SQL Safe Backup that are overlooked during

More information

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3

More information

Workflow Solutions Data Collection, Data Review and Data Management

Workflow Solutions Data Collection, Data Review and Data Management Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

Electronics Ltd. Presenting. Power, Intelligence... with a sense of feeling

Electronics Ltd. Presenting. Power, Intelligence... with a sense of feeling Electronics Ltd Presenting Power, Intelligence... with a sense of feeling By Appointment to Her Majesty The Queen Supplier of Fire Detection Equipment Kentec Electronics Ltd. Dartford Plug in slots K772

More information

Ensto Chago Master EVM300 and EVM500 Operational description

Ensto Chago Master EVM300 and EVM500 Operational description Pages: 1 (8) Ensto Chago Master EVM300 and EVM500 Operational Pages: 2 (8) Contents 1 What is Ensto EVM... 3 2 EVM versions... 3 2.1 EVM300... 4 2.2 EVM500... 5 3 Technical information... 7 Pages: 3 (8)

More information

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256 DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256 E Data Projector Wireless Function Guide Be sure to read the precautions in the Setup Guide that comes with the Data Projector. Be sure to keep all user documentation

More information

Radiological Assessment Display and Control System

Radiological Assessment Display and Control System Features Fast, real-time data acquisition and control Highly reliable communication with remote terminal units Collecting, converting, integrating and analyzing data from all monitors Detecting, annunciating

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Introduction. Editions

Introduction. Editions Introduction TRAIN TRACK Employee Training Management Software gives you the tools you need to make sure employee training requirements are met. Assign required training for groups or individuals. Easily

More information

SAFETICA INSIGHT INSTALLATION MANUAL

SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

RS COMPONENTS CATALOGUE ON CD APRIL Installation Guide and User s Manual

RS COMPONENTS CATALOGUE ON CD APRIL Installation Guide and User s Manual RS COMPONENTS CATALOGUE ON CD APRIL 2009 Installation Guide and User s Manual TABLE OF CONTENTS 1. INTRODUCTION...3 2. INSTALLATION...4 2.1 SYSTEM REQUIREMENTS...4 2.2 INSTALLATION MODES...5 2.3 SOFTWARE

More information

Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS

More information

Hardware/Software Requirements For Self-Hosting Multi Server

Hardware/Software Requirements For Self-Hosting Multi Server Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best

More information

securityserver Unparalleled management and detection of security, environmental, and disaster control resources.

securityserver Unparalleled management and detection of security, environmental, and disaster control resources. securityserver Unparalleled management and detection of security, environmental, and disaster control resources. Map cameras & sensors in server rooms or buildings in cities AKCP securityserver puts you

More information

We recommend that the computer running the Server should meet the following minimum requirements to run EVE:

We recommend that the computer running the Server should meet the following minimum requirements to run EVE: EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.

More information

Installation Guide v1.11 and Higher

Installation Guide v1.11 and Higher Progeny Imaging Installation Guide v1.11 and Higher 00-02-1604 Rev. D ECN P3483 Revision Date: 6/2/2015 0120 Contents 1. About This Manual... 3 Text Conventions... 3 2. Welcome to Progeny Imaging... 4

More information

Ins-60005-GD-US. Master Controller Installation Guide

Ins-60005-GD-US. Master Controller Installation Guide Ins-60005-GD-US Master Controller Installation Guide Mounting This housing should be fixed to the surface with suitable fasteners; screws and wall plugs are provided for this in the fitting kit. Also provided

More information

Amcrest 960H DVR Quick Start Guide

Amcrest 960H DVR Quick Start Guide Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and

More information

CRM Connector Installation & Integration USER GUIDE

CRM Connector Installation & Integration USER GUIDE CRM Connector Installation & Integration USER GUIDE TABLE OF CONTENTS Table Of Contents Installation... 4 System Tray Icon.... 5 Salesforce.com Integration.... 6 Salesforce Security Token.... 6 Configuration....

More information

P2000 SECURITY management SYSTEM. More control means more freedom

P2000 SECURITY management SYSTEM. More control means more freedom P2000 SECURITY management SYSTEM More control means more freedom More freedom to achieve More freedom to reduce costs How can you keep people safe and productive, while reducing costs and staying compliant

More information

Next Generation ProSystem fx Suite. Planning and Implementation Overview

Next Generation ProSystem fx Suite. Planning and Implementation Overview Next Generation ProSystem fx Suite Planning and Implementation Overview Next Generation ProSystem fx Suite Introduction This guide will help your firm prepare for implementation of the next generation

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

JKW-IP. IP Video Entry System. QuikStart Guide

JKW-IP. IP Video Entry System. QuikStart Guide 1210 JKW-IP IP Video Entry System QuikStart Guide This is an abbreviated instruction manual for installation purposes. Please see the JKW-IP Installation Manual and JKW-IP Operation Manual for complete

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Complete fleet management package for Qualitrol Information Products

Complete fleet management package for Qualitrol Information Products + iq Master Station Configuration, collection and analysis platform Complete fleet management package for Qualitrol Information Products Scalable client-server solution Advanced Record Analysis diagnostics

More information

YZP 480...495: SAUTER Vision Center

YZP 480...495: SAUTER Vision Center YZP 480...495: SAUTER Vision Center SAUTER Vision Center 3.0 - latest-generation modular building management software for energy-efficient buildings The SAUTER Vision Center (SVC) is a web-based building

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

WEBs-AX Enterprise Security

WEBs-AX Enterprise Security WEBs-AX Enterprise Security SPECIFICATION DATA APPLICATIONS WEBs-AX Enterprise Security is a comprehensive access control and security management solution, built on a truly open, IP based platform. Developed

More information

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

AKCess Pro Server Management Software

AKCess Pro Server Management Software Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management

More information

PCV123D Terminal Unit and DGM1D 1-Door Controller + Contactless Smartcard Reader Version 2.0

PCV123D Terminal Unit and DGM1D 1-Door Controller + Contactless Smartcard Reader Version 2.0 PCV123D Terminal Unit and DGM1D 1-Door Controller + Contactless Smartcard Reader Version 2.0 G00301FR0219V02 DGM1D: 1-door controller + contactless smartcard reader PCV123D: Terminal unit + PC software

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology: //DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

NT500 Offline Getting Started Guide

NT500 Offline Getting Started Guide NT500 Offline Getting Started Guide Copyright 2007 Stanley Security Solutions, Inc. and Stanley Logistics, Inc. All rights reserved. Printed in the United States of America. Information in this document

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

OpenScape Web Collaboration

OpenScape Web Collaboration OpenScape Web Collaboration Give your teams a better way to meet Enabling the Bring-Your-Device-to-Work era OpenScape Web Collaboration is a scalable, reliable, and highly secure web conferencing solution

More information

Metasys For Validated Environments, Extended Architecture Product Bulletin

Metasys For Validated Environments, Extended Architecture Product Bulletin Metasys For Validated Environments, Extended Architecture Product Bulletin MS-MVE5U-0, MS-MVE10U-0, MS-MVE25U-0, MS-MVE50U-0 Code No. LIT-12011326 Software Release 7.0 Issued March 2, 2015 Refer to the

More information

Software Operations Manual

Software Operations Manual Software Operations Manual Version 5.0 BinMaster 7201 North 98th Street Lincoln, NE 68507 Phone: 402-434-9102 / Fax: 402-434-9133 info@binmaster.com - www.binmaster.com System Requirements PC with 1GHz

More information

KViewCenter Software User Manual 2012 / 04 / 20 Version 2.2.1.0

KViewCenter Software User Manual 2012 / 04 / 20 Version 2.2.1.0 KViewCenter Software User Manual 2012 / 04 / 20 Version 2.2.1.0 Table of Contents Chapter 1. KViewCenter Interface... 5 1.1. Log in.... 5 1.2. Log out... 5 1.3. Control Panel... 6 1.4. Control Panel (Preview

More information

Access Control Software Manual

Access Control Software Manual CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11

More information

ivms-4200 Client Software Quick Start Guide V1.02

ivms-4200 Client Software Quick Start Guide V1.02 ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...

More information