Access Manager Hosted Access control platform & System Integration

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Access Manager Hosted Access control platform & System Integration"

Transcription

1 Access Manager Hosted Access control platform & System Integration

2 Hosted Access Control Platform Managing Card based access control systems across multi-sites or large buildings can be a difficult and labour intensive process especially for clients who have a combination of manufacturer s hardware. When combined with hardware ranging from the new latest state of the art systems to older legacy panels and management software which is now obsolete; the problem becomes more complex and difficult to manage. Many customers and specifiers consider the option of aligning all of their sites to one access standard by using the same access control panel at each site to simplify the management process. The investment cost required often makes the project unviable, especially when the hardware maybe obsolete but is still fully serviceable. The Paramount ACCESS MANAGER platform was designed to overcome the problem of multiple system manufacturers and obsolete access management software offering centralised management and control utilising IP infrastructure. Designed initially to replace the Europlex software ranges such as Euronet, 3GS+ and 3GS+ global, and provide a solution for managing the legacy 3GS systems. The Paramount Access manager bespoke platform now supports multiple access system manufacturers equipment from one single platform. Supported systems: Europlex 3GS (Via Citec IP connectivity) Europlex Signet Range (220 and 300 range panels with IP connectivity (Available Oct 2011) Siemens SPC single panel control range with IP connectivity (Available Oct 2011) Honeywell/Northern computers N1000 panels equipped with IP connectivity/lantronix Honeywell Pro 22 access panels equipped with IP connectivity Honeywell Netaxs Access control panels Access manager is constantly developing. If you require compatibility with another access hardware manufacturers other than the ones specified above, please contact us. Access Manager simultaneously communicates with any combination and quantity of the listed Hardware, managing the different systems from one centralised location. Designed from the outset to reduce strain on access users both financially and operationally access manager is a hosted solution, which is continuously connected to your access/integrated panels. Clients still have control over all of your connected sites using a secure web browser utility which offers remote management.

3 The hosted ACCESS MANAGER solution offers many advantages to end users. There is no requirement to purchase and maintain servers and software, and all database management is included as part of the hosted service. Critical data protection Database back up and critical recovery is always a concern to many end users, ACCESS MANAGER address this issue, as our system is backed up automatically every hour, and based off site from your premises it is unaffected by fire or flood damage should the worst happen to your premises reducing the business risk to any client. Web browser management utility Clients logging into our web portal manage their own access control account, the following scope of control is available to our subscribers: Add new card holders: first name, middle name, surname, employee number, department, card number and a ID photo per user, expiry date for users. Assign Access control levels on a per system hardware basis, any individual can be assigned an access level to work on a 3GS panel and a Honeywell Netaxs panel, and use the same card at both of the separate sites whilst linked to ACCESS MANAGER. Edit existing card holders, change card status from active/suspend users live. Event Log events from all a single or multiple sites are fed live from your control equipment on your site into our central stations ACCESS MANAGER platform live. Using the web browser our clients can interrogate the platform to identify transactions on their sites. Included as standard is an intelligent search filter and report print out facility. Card bureau service Optional card printing and supply is available at an additional cost, ACCESS MANAGER PRO allows our customers to enter all the details of a card holder, we then produce and thermally print a high quality identity card in your own company corporate livery. This makes the card totally unique to each customer without the investment and maintenance of printing your own cards. Our Bureau service provides single or dual sided thermal printing using the latest state of the art high resolution printing solutions on proximity cards. Custom design for ID cards is also included with ACCESS MANAGER PRO clients are asked to provide logos and artwork in order for us to produce a proof for prior approval. Platform connectivity Reliable and fast communications are crucial to the effective operation of ACCESS MANAGER. Our Central Monitoring Station uses the latest fibre optic connectivity. Connections in and out of the platform are fast and secure with a vast bandwidth and super fast operating speed, providing our clients the next generation of access control management. Stored Data All data entered into ACCESS MANAGER by our customer, remains the property of the client at all times. A data export can be requested at any time.

4 Platform Functionality ACCESS MANAGER is a fully customisable management solution, our software development road map allows end users develop features within our platform to provide bespoke features. Common feature across the supported hardware include: First name, middle name, last name Card number Department Phone number Mobile number Employee number Car registration number Comments box Warrant card number (Police use only) Card holders photo Card issue and expiry dates Access levels Geographical areas/panel grouping Time zones Door groups Function levels Event log Customised event reports Searchable criteria Intelligent search functions Remote door control Door status Card status, pass, suspended & void Track & trace a card holder Alarm/flag any card holder for card use Automatic card number assigning Bulk card add Automatic time & date updates Communication polling Multiple accounts Accounts up to 1000 panels/sites Web browser for customer management Remote customised ID card production Mirrored dual server Data back up Database user permissions Fast data transmission VPN Network option GSM/3G/ GPRS connectivity option Satellite connectivity option Includes software updates 128 bit secure data encryption ACCESS MANAGER was developed as a high end secure solution, and is used by a wide range of industries. The stable hosted platform is relied on by some of the largest companies in the UK, developed to meet their exacting standards. Regional police forces Utility companies Data centres Educational establishments Local authorities Financial institutions Hospitals Airports Rail Industry Prisons and detention centres Highways agency Ports and harbours

5 System Migration ACCESS MANAGER doesn't usually require any site based hardware changing, but does provide clients the option to use multiple card reader technology, multiple cards and various card formats. A flexible operating platform providing additional benefit and widening the possibility of wider migration across multiple site estates. Existing standard card reading technology, including 125KhZ proximity, magnetic swipe cards, and the more secure Desfire technology is supported providing easy migration to any final solution. Migration readers from HID Global simplify a major challenge in any technology upgrade project: the ability to use existing cards, deploy multi-technology cards and transition to new contactless smart card technology without having to change the access control system card holder database. Customers are able to transition to contactless smart cards over time while incorporating the use of multiple card technologies within a single building or across multiple facilities. The popular card proximity and combined pin reader technology is integrated into ACCESS MANAGER and offers increased security for data centres or sterile areas. For security managers, dealers, integrators and OEMs, HID proximity cards and readers are recognised as the industry standard for physical access control. HID prox products are robust, affordable, and seamlessly integrate with access control systems. Featuring FlexSecur security coding, the high-quality Indala line of 125 khz Proximity readers combines intelligent programming technology with interchangeable components including uniform modules and a range of stylish cover designs. Please contact our sales department for further information on supported and compatible technology. This ensures ACCESS MANAGER offers the best advantages of hosted access control available today; with seamless management and minimal hardware changes.

6 Network Connectivity The communications IP network provided for hosted Access Control is key to providing a reliable, fast and dependable communication path to single or multiple sites. Our state of the art network uses the latest expandable high speed fibre optic leased line technology. Capable of transmitting and receiving data in both directions up to 150mg our network can update thousands of access control panels in minutes with the latest card holder data. Ensuring a robust and reliable communication path, ACCESS MANAGER supports three WAN connections with fail over and load balancing. If the worst should happen and in the event that a single network provider failed, our platform continues to operate in two other leased line connections. Utilising A symmetrical and un-contended connection means we have access to the same amount of bandwidth both in and out of our wide area networks. We don't share our connections with other wide area ISP users increasing our platform performance. The public sector network continues to underpin the Governments ICT strategy. Improving access and delivery of public services and supporting the shared services initiative. PSN is working towards Government central policies such as Digital Britain. The public sector network will connect Government departments and organisations to one central network to share new and existing services. ACCESS MANAGER has been designed with a secure communications server which can operate with custom network solutions, providing high risk sites with secure access control solutions. The sharing of Access control management across estates significantly reduces overheads to local authorities and end users. Providing significant benefits compared to access systems using conventional databases which are managed by the system user.

7 IP & Hosting Infrastructure

8 VISIT OUR NEW WEB SITE FOR THE LATEST IN SECURITY TECHNOLOGY Access Manager Hosted Access Control & Integration Designed for system integration and platform alignment Paramount Security Group Rugeley Operations Centre Service Area 7 Albion Street Rugeley WS15 2BY Tel Fax

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

What are the benefits of Cloud Computing for Small Business?

What are the benefits of Cloud Computing for Small Business? Cloud Computing A Small Business Guide. Whilst more and more small businesses are adopting Cloud Computing services, it is fair to say that most small businesses are still unsure of what Cloud Computing

More information

CRESCENDO SERIES Smart Cards. Smart Card Solutions

CRESCENDO SERIES Smart Cards. Smart Card Solutions CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to

More information

Freedom... a true Cloud Based solution for education!

Freedom... a true Cloud Based solution for education! Freedom... a true Cloud Based solution for education! CONTENTS What is Freedom? Focus on Learning Keeping it Simple Freedom Elements Freedom Access Freedom Services 05 07 09 11 13 15 Freedom... a Cloud

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

SMI Server. Integrated system for comprehensive security management

SMI Server. Integrated system for comprehensive security management SMI Server Integrated system for comprehensive security management SMI SERVER Optimizing your security management with a single system for multi-function supervision No company, whether it is in the private

More information

VIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD

VIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD VIDEO MONITORING & ALARM VERIFICATION VIDEO MONITORING What is Video Monitoring Video or CCTV Monitoring as a service has been around for many years particularly in the Mining and Access Control Industries

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

a new solution Discover Key Features IDPod offers you flexible, personable software solutions for your proof of delivery needs Ease of use

a new solution Discover Key Features IDPod offers you flexible, personable software solutions for your proof of delivery needs Ease of use Discover a new solution IDPod offers you flexible, personable software solutions for your proof of delivery needs Key Features Ease of use Dynamic Scheduling Back-end System Integration Tools Barcode scanning

More information

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination

WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS. A Winning Combination WIN-PAK SE/PE with Galaxy Integration INTEGRATED SECURITY, VIDEO AND ACCESS CONTROL SOLUTIONS A Winning Combination Unlock the Possibilities! Typical Applications Office Buildings Day Care Centres Pharmacies

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

Infinity Time & Attendance System

Infinity Time & Attendance System Infinity Time & Attendance System THE FOLLOWING BUSINESS FUNCTIONS ARE REPRESENTATIVE OF THE INFORMATION TECHNOLOGY POSITIONS WE SERVICE: PC LINKED TIME MANAGEMENT TIME & ATTENDANCE ACCESS CONTROL SHOP

More information

Temaline Solutions. Raising the benchmark in security and people management

Temaline Solutions. Raising the benchmark in security and people management Temaline Solutions Raising the benchmark in security and people management Honeywell Temaline solutions The standard in integrated enterprise-wide access control, time & attendance management and intruder

More information

EntraPass v4.0 Access Control Software

EntraPass v4.0 Access Control Software Sales Guide EntraPass v4.0 Access Control Software This newest version of EntraPass enables customers to secure their property and personnel more effectively while utilizing a host of exciting new access

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

BT Connect Networks that think Optical Connect UK

BT Connect Networks that think Optical Connect UK BT Connect Networks that think Optical Connect UK Fast, reliable, secure and affordable Connecting the heart of your organisation Your organisation and its people rely on its applications email, databases,

More information

Reliable hosting services have been a feature of our service portfolio for over 10 years.

Reliable hosting services have been a feature of our service portfolio for over 10 years. Hosting Hosting Solutions Whether you need a reliable home for your website or a more bespoke solution, we ll provide you with technically superior hosting, backed by a personal approach to service and

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

14.95 29.95. 3 Unlimited. Click4Assistance - Package Comparison. The Packages...

14.95 29.95. 3 Unlimited. Click4Assistance - Package Comparison. The Packages... The Packages... Lite Low cost, entry level live chat software, available for small businesses with a single operator. This option allows unlimited chats, and offers a great range of button images and chat

More information

Advanced Access Solutions

Advanced Access Solutions Advanced Access Solutions Advancing Access Control CEM s culture is to remain at the cutting edge of access control technology through the design and development of high quality solutions that meet the

More information

Implementation Guide. Simplify, Save, Scale VoIP: The Next Generation Phone Service. A single source for quality voice and data services.

Implementation Guide. Simplify, Save, Scale VoIP: The Next Generation Phone Service. A single source for quality voice and data services. Implementation Guide Simplify, Save, Scale VoIP: The Next Generation Phone Service A single source for quality voice and data services. > > > > > > > > > > All signs point to VoIP so letês get started.

More information

COMLINK Cloud Technical Specification Guide DEDICATED SERVER

COMLINK Cloud Technical Specification Guide DEDICATED SERVER COMLINK Cloud Technical Specification Guide DEDICATED SERVER Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Dedicated Server 2 Why Choose Dedicated Servers? 2-4 Features

More information

Frequently Asked Questions about LEGIC

Frequently Asked Questions about LEGIC Frequently Asked Questions about LEGIC 1. Who is LEGIC? LEGIC Identsystems Ltd, with headquarters in Switzerland, is a world leader in the design and manufacture of 13.56 MHz contactless smart card technology.

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

YSoft SafeQ Accounting Software and Terminals. Applications YSoft SafeQ

YSoft SafeQ Accounting Software and Terminals. Applications YSoft SafeQ YSoft SafeQ Accounting Software and Terminals Applications YSoft SafeQ YSoft SafeQ, Intro YSoft SafeQ Complete Accounting & Security YSoft SafeQ is a server that controls and distributes printing in networks

More information

Common Questions & Answers

Common Questions & Answers Common Questions & Answers Summary of Advantages Honeywell has proven manufacturing and design capability, distribution expertise and the field training/ support necessary for a successful partnership

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

G Cloud Services Definition Document. Compliance Service. Invigilatis Limited. Contents. Pages. Invigilatis Applications 1.

G Cloud Services Definition Document. Compliance Service. Invigilatis Limited. Contents. Pages. Invigilatis Applications 1. G Cloud Services Definition Document Compliance Service Invigilatis Limited Contents Pages Invigilatis Applications 1 Modules 2 Business Intelligence 3 Service Definition 4-6 Service Levels Access Upgrades

More information

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite. Attix5 Pro Overview V7.x An overview of the Attix5 Pro product suite. Copyright notice and proprietary information This document is published by Attix5 or its local affiliated company, without any warranty.

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

May 2008. a guide to Internet Protocol. for ARCs and RVRCs. Form No. 236. Issue 1. For other information please contact:

May 2008. a guide to Internet Protocol. for ARCs and RVRCs. Form No. 236. Issue 1. For other information please contact: a guide to Internet Protocol for ARCs and RVRCs May 2008 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk

More information

For business, corporate and public sector security. Protected premises, protected network

For business, corporate and public sector security. Protected premises, protected network For business, corporate and public sector security Reduce costs, not security Protected premises, protected network Remove the cost of annual PSTN line rentals Future proofed, using digital IP technology

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

G Cloud Services Definition Document. Property Management Service. Invigilatis Limited. Contents. Pages. Invigilatis Applications 1.

G Cloud Services Definition Document. Property Management Service. Invigilatis Limited. Contents. Pages. Invigilatis Applications 1. G Cloud Services Definition Document Property Management Service Invigilatis Limited Contents Pages Invigilatis Applications 1 Modules 2 Business Intelligence 3 Service Definition 4-6 Service Levels Access

More information

Begin using tomorrow s security features today.

Begin using tomorrow s security features today. Begin using tomorrow s security features today. Advantage Services : Life Cycle for Security Systems Building Technologies Software Update/Upgrade Technology Strategy Documentation System Modernization

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

Networked Access Solutions

Networked Access Solutions Networked Access Solutions EDGE and VertX IP Access Control Open Architecture IP Access Control EDGE EVO The new platform provides enhanced security options, intelligent door communication and superior

More information

ACCESS CONTROL SOLUTIONS

ACCESS CONTROL SOLUTIONS ACCESS CONTROL SOLUTIONS ACCESS CONTROL If you need a high level of control over who is entering your building and want to know when people have entered, our state of the art electronic locking systems

More information

G Cloud Service Description Premier SIP Trunk Software as a Service October 2015

G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 Premier Choice Telecom has been a trusted provider of communications solutions for businesses for over 15 years. Our clients

More information

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits

More information

Managed Network Services

Managed Network Services Managed Network Services Delivering innovative network data services to business NETWOR Communications are an essential and integral part of any IT strategy and are as important as the systems and processes

More information

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools IT Enterprise Services Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools The freedom and agility which cloud unleashes directly impacts business performance. Cloud productivity

More information

Why Should Unified Communications Be Part Of Your Strategy?

Why Should Unified Communications Be Part Of Your Strategy? oip Why Should Unified Communications Be Part Of Your Strategy? It s not just the large firms implementing Unified Communications (UC), small organisations are also starting to reap the benefits. Who Should

More information

Contactless Solutions

Contactless Solutions Contactless Solutions Extends Windows Authentication ACCESS secure. Contactless Solutions Add contactless logical access control to your physical access control system w Three-component solution (Prox

More information

SIP TRUNKING THE COST EFFECTIVE AND FLEXIBLE ALTERNATIVE TO ISDN

SIP TRUNKING THE COST EFFECTIVE AND FLEXIBLE ALTERNATIVE TO ISDN SIP TRUNKING THE COST EFFECTIVE AND FLEXIBLE ALTERNATIVE TO ISDN A cost-effective alternative to ISDN that provides flexibility and continuity Reliable voice services SIP trunking is the fastest-growing

More information

CENTRALLY MANAGED. Access Control

CENTRALLY MANAGED. Access Control CENTRALLY MANAGED Access Control Keyscan Introduces a whole new way to think about access Control 2 KEYSCAN Centrally managed solutions Keyscan s Centrally Managed Access Control Solution (CMAC) has revolutionized

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

SPC Connect Configuration Manual V1.0

SPC Connect Configuration Manual V1.0 SPC Connect Configuration Manual V1.0 I-200090-1 28.11.2014 Copyright Copyright Technical specifications and availability subject to change without notice. Copyright Siemens AB We reserve all rights in

More information

FACT SHEET INTERNATIONAL DATA SERVICES GLOBAL IP VPN

FACT SHEET INTERNATIONAL DATA SERVICES GLOBAL IP VPN PUT OUR BACKBONE IN YOUR GLOBAL NETWORKS Telstra Wholesale s Global IP VPN solution allows our customers to offer their end users global networks for voice, video and data. With access to most major Asian

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

The NEC Infrontia DXE series are more than just voice communication systems.

The NEC Infrontia DXE series are more than just voice communication systems. The NEC Infrontia DXE series are more than just voice communication systems. Today business communications is more than just voice. Face to face communication will always be important but talking is only

More information

The DirectOne E-Commerce System

The DirectOne E-Commerce System The DirectOne E-Commerce System SecurePay Pty. Ltd. Level 4, 20 Queen St Melbourne 3000 Australia November 05 Contents INTRODUCTION 3 WELCOME TO THE DIRECTONE E-COMMERCE SYSTEM 3 AN OVERVIEW OF E-COMMERCE

More information

X.25 over IP. The Challenge. How it Works. Solution

X.25 over IP. The Challenge. How it Works. Solution over IP The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers have made significant investments in equipment and processes that depend

More information

Remote Asset Tracking Complete Control

Remote Asset Tracking Complete Control Remote Asset Tracking Complete Control Tracking our roots since 1992 Global reach technology, locally delivered service 1992 1992 1993 Company founded Launch of Enigma truck and plant immobiliser Nationwide

More information

Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world!

Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world! + Welcome to The Sentry-go Monitoring System v6 Monitoring made quick & easy! Be Proactive, Not Reactive! 3Ds (UK) Limited http://www.sentry-go.com Welcome to Sentry-go Sentry-go is a quick & easy to use

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP Intrusion Systems White Paper Series Alarm over IP Alarm over IP What is Alarm over IP? Alarm over IP is the ability for security and fire alarm systems to transmit alarm signals over IP networks such

More information

WHAT IS ENTERPRISE OPEN SOURCE?

WHAT IS ENTERPRISE OPEN SOURCE? WHITEPAPER WHAT IS ENTERPRISE OPEN SOURCE? ENSURING YOUR IT INFRASTRUCTURE CAN SUPPPORT YOUR BUSINESS BY DEB WOODS, INGRES CORPORATION TABLE OF CONTENTS: 3 Introduction 4 Developing a Plan 4 High Availability

More information

AlarmNet-i. Are you ready for Internet monitoring?

AlarmNet-i. Are you ready for Internet monitoring? AlarmNet-i Are you ready for Internet monitoring? Introducing AlarmNet-i Honeywell s AlarmNet-i lets you offer every one of your commercial customers from large banks to small retail stores the industry

More information

JDSU Signaling Analyzer Family. Dramatically Re-engineered for an Industry Revolution

JDSU Signaling Analyzer Family. Dramatically Re-engineered for an Industry Revolution JDSU Signaling Analyzer Family Dramatically Re-engineered for an Industry Revolution JDSU Signaling Analyzer LTE EPC UMTS HSPA+ UTRAN IP UTRAN Femto GSM GPRS EDGE GERAN CDMAOne CDMA2000 Vendor proprietary

More information

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...

More information

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection

More information

TimeClock Plus OnDemand

TimeClock Plus OnDemand TimeClock Plus OnDemand Software-as-a-Service TimeClock Plus OnDemand is a hosted web-based solution that utilizes the latest technology in Cloud Computing. Your organization may subscribe to TimeClock

More information

Security under your Control

Security under your Control Security under your Control www.scm-concerto.com ConCERTO combines physical & logical access and more... Do you want to Improve your access security Simplify IT administration for logical and physical

More information

The cost effective and flexible alternative to ISDN

The cost effective and flexible alternative to ISDN SIP Trunks The cost effective and flexible alternative to ISDN A cost-effective alternative to ISDN that provides flexibility and continuity Reliable voice services SIP trunking is the fastest-growing

More information

AlarmNet-i. Are you ready for internet monitoring?

AlarmNet-i. Are you ready for internet monitoring? AlarmNet-i Are you ready for internet monitoring? Introducing AlarmNet-i Honeywell s AlarmNet-i lets you offer every one of your commercial customers from large banks to small retail stores the industry

More information

full IP technology at the bedside platform independent - unlimited possibilities

full IP technology at the bedside platform independent - unlimited possibilities fusion integration Static Systems Group Heath Mill Road, Wombourne Staffordshire WV5 8AN. United Kingdom. Tel: Fax: +44 (0) 1902 895551 +44 (0) 1902 324969 full IP technology at the bedside In line with

More information

Radio Dispatch & Networking Solutions

Radio Dispatch & Networking Solutions Challenging Communication Boundaries Radio Dispatch & Networking Solutions for Digital & Analog Radios Solutions Overview Making the Complex Simple When did two-way radio get so complicated? This is a

More information

Connecting your business

Connecting your business mobiles Connecting your business fixed voice & data digital & IT autovoice managed services adsi energy About us Founded in 2002, ADSI are dedicated to reducing business costs by offering high-quality

More information

Supporting voice and business-critical applications across multiple sites

Supporting voice and business-critical applications across multiple sites MPLS Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity Reliable, highly available MPLS-based WAN solution that supports

More information

SIP Trunks. The cost-effective and flexible alternative to ISDN

SIP Trunks. The cost-effective and flexible alternative to ISDN SIP Trunks The cost-effective and flexible alternative to ISDN A cost-effective alternative to ISDN that provides flexibility and continuity Reliable voice services SIP trunking is rapidly replacing ISDN

More information

A host of hybrid phone solutions... SIP Trunk Solutions

A host of hybrid phone solutions... SIP Trunk Solutions SIP Trunk Solutions A host of hybrid phone solutions... SIP Trunking Quick Start Guide SIP Trunking Quick Start Guide SIP Trunking Overview The VoiceHost SIP Trunking solution provides substantially more

More information

Secure telephone communications with Voice over IP from Crypto AG

Secure telephone communications with Voice over IP from Crypto AG Secure telephone communications with Voice over IP from IT Security Solutions Voice over IP more than simply telephoning The introduction of Voice over IP (VoIP) is a common item on today s agenda for

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

What Every Business Needs to Know When Selecting a Phone System

What Every Business Needs to Know When Selecting a Phone System What Every Business Needs to Know When Selecting a Phone System 2013 RingCentral, Inc. 1 Introduction Whether you are starting a new business or expanding your existing business, you will need to choose

More information

Service Overview. Business Cloud Backup. Introduction

Service Overview. Business Cloud Backup. Introduction Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

#define. What is #define

#define. What is #define #define What is #define #define is CGI s production system for Application Management and Development, offered in the context of software as a service. It is a project management tool, configuration management

More information

The leading workforce management solution in Facilities management

The leading workforce management solution in Facilities management The leading workforce management solution in Facilities management About Innovise www.innovisesoftware.com Tried and trusted, Innovise is the leading IT partner of choice for hundreds of clients throughout

More information

Data. A guide to our products and services

Data. A guide to our products and services Data. A guide to our products and services Get your networks fit for purpose. Lower your costs of ownership. Data transformation with O 2 will keep your networks running smoothly, improving uptime and

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Meeting the challenge of voice services

Meeting the challenge of voice services Meeting the challenge of voice services Executive Summary Making the most of convergence to bridge the gap between IT networks and traditional telephony. This white paper is aimed at IT support companies

More information

Reactec Analytics Platform. RFID Operator Identity Card Programming

Reactec Analytics Platform. RFID Operator Identity Card Programming Reactec Analytics Platform RFID Operator Identity Card Programming Guide This document provides information about programming RFID Employee Cards or CSCS Cards. Document Date: 25 January 2016 Document

More information

Cost Effective. time clock solution for Workday

Cost Effective. time clock solution for Workday Cost Effective time clock solution for Automatically Upload Employee Time Records to s Time Tracking. Why pay someone to manually input employee time records, or waste time on staff disputes over time

More information

Access Control System Access Control System is designed for the places where need for crucial security.

Access Control System Access Control System is designed for the places where need for crucial security. rt RichtonTec as a company based on biometric and RFID technology has been supplying access control solution and time and attendance terminals for over 6 years. Over this time we developed our own unique

More information

Security Commander 2.2. Overview Presentation June 2015

Security Commander 2.2. Overview Presentation June 2015 Security Commander 2.2 Overview Presentation June 2015 Security Commander Security Commander is a software package that manages the Tecom Challenger security system, delivering the following benefits:

More information

Tema-Voyager Compact. Efficiently monitoring and controlling the flow of your resources

Tema-Voyager Compact. Efficiently monitoring and controlling the flow of your resources Tema-Voyager Compact Efficiently monitoring and controlling the flow of your resources Innovative Time and Attendance and Access Control terminal Tema-Voyager Compact Monitoring and managing your organisation

More information

Award-Winning Internet Services for Primary and Secondary Schools

Award-Winning Internet Services for Primary and Secondary Schools Award-Winning Internet Services for Primary and Secondary Schools 2015 Contents 4. The Exa story 6. Internet for schools 8. SurfProtect 10. Multi-award winning customer service 12. Budgeting for internet

More information

NEC Contact Centres (Genesys)

NEC Contact Centres (Genesys) Customisable and scalable solutions with enhanced functionality NEC Contact Centres (Genesys) On-premise or Cloud Solutions NEC Australia nec.com.au NEC supports more than 10,000 Genesys-based agent seats

More information

Remote Managed Services

Remote Managed Services Remote Managed Services A Model for Growth and Efficiency in Security IFSEC 2011 Honeywell at a Glance $38B Fortune 100 company with a 120-year legacy of innovation 120,000 employees in 100 countries World-class

More information

AT&T Connect Video conferencing functional and architectural overview

AT&T Connect Video conferencing functional and architectural overview AT&T Connect Video conferencing functional and architectural overview 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks

More information

Complete Cloud Solutions

Complete Cloud Solutions Complete Cloud Solutions Global Data Centres Glasgow, London, Nottingham, St Asaph, Leicester, Maidenhead, Gosport, Manchester, Los Angeles, Boston, Dallas, New Jersey, Virginia, Sacramento, Dubai and

More information

Web Technologies Week 4 Hosting, Servers and Databases. Context. Contents. MSc in Computing Computing - IBITE Liverpool Hope University College

Web Technologies Week 4 Hosting, Servers and Databases. Context. Contents. MSc in Computing Computing - IBITE Liverpool Hope University College Web Technologies Week 4 Hosting, Servers and Databases MSc in Computing Computing - IBITE Liverpool Hope University College Context Today s platform is tomorrow s outdated legacy system Shklar and Rosen

More information

Transforming public services in Scotland Value Added Services

Transforming public services in Scotland Value Added Services Transforming public services in Scotland Value Added Services Maximising your investment in SWAN Dedicated to connecting Scotland The Scottish Wide Area Network (SWAN) is the only secure network available

More information

KIP System K Software

KIP System K Software KIP System K Software Print management solutions KIP System K Software Suite provides an enhanced user experience and exceptional productivity for the seamless control of colour and black & white print

More information

Voice and Data Convergence

Voice and Data Convergence Voice and Data Convergence Business Benefits and Deployment Strategy WHITEPAPER - MAY 2012 Data & Internet Voice & Mobile VOICE AND DATA COVERGENCE 2012 2 INTRODUCTION Over the past six years we have seen

More information

SYNERGY SOFTWARE DATA SHEET. www.the-imcgroup.com

SYNERGY SOFTWARE DATA SHEET. www.the-imcgroup.com SYNERGY SOFTWARE DATA SHEET www.the-imcgroup.com SYNERGY SOFTWARE Synergy is the software platform system to support many current and all future Hanwell hardware and replaces the current RadioLog software.

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information