Security Access Control 101
|
|
- Brent Walters
- 8 years ago
- Views:
Transcription
1 Security Access Control 101 (and some of 102)
2 What Is Access Control? Access Control provides an authority the ability to control access to areas and resources in a given physical facility. Today s electronic systems allow the determination of who is allowed to enter/exit and when. Historically, this has been partially accomplished through keys and locks, however this does not allow restriction of a key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used, and keys can easily be copied. When a mechanical key is lost, locks must be re-keyed. Electronic access control solves the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.
3 Access Control Operation Factors Presentation of one credential to a card reader illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted. The second factor can be a PIN, a second credential, operator intervention, or a biometric input. Often the factors are characterized as: Something you have, such as an access badge Something you know, e.g. a PIN, or password. Something you are, typically a biometric input.
4 Credentials A credential is a physical/tangible object, a piece of knowledge, or a part of a person's physical being, that enables an individual access. The typical credential is an access card, key fob, or PIN. There are many technologies including magnetic stripe, bar code, Wiegand, 125 khz proximity, 26 bit card-swipe, and contactless smart cards. Typical biometric technologies include fingerprint, facial recognition, iris recognition, retinal scan, voice, and hand geometry. Credentials for an access control system are typically held within a database, which stores access credentials for all staff members of an organization. Assigning access control rights determines who has access to a given area, and when they are allowed.
5 Access Control System Components Fundamental components include: Electronic Locking Devices (strikes, magnetic locks) Door Position Switches or Latch-bolt Monitors REX (request to exit) Devices to unlock by motion detection or push button from the secure side Credential Readers (card reader, biometric reading device) Control Panels (stores record holder database information) Server Computer (administrates the access control system) Credentials (held by end user) New IP Based systems allow Card Readers to make access decisions based on internal intelligence sent from the Server Computer.
6 Design Considerations Life Safety Owner s needs for building function Human & Vehicle Traffic Flow Asset Management Access Control System Functionality/Versatility/Expandability Support Organization for Access Control System integrity
7 Snapshot of Components in Typical Use Access Control System Software ASI 2000 (panel driven, conventional cabling) Focal Point (local reader intelligence, IP-Based) Card Readers and Credentials 125kHz Proximity Technology 13.56mHz Contactless Smart Card (iclass) Technology Multi-Class (combination of both of the above) Electronic Locking Devices Strikes Electrically Retractable Rim Mounted Exit Devices Live Hinges Magnetic Locks
8 ASI 2000 Access Control Software ASI 2000 is a feature-rich, integrated security management and access control system, using a robust SQL database engine. Advanced features include Event Management, Alarm Monitoring, Response and more. ASI supports both the IC-1600 and UP-2000 hardware panels. Exceptional reporting - ASI allows up to 255 zones, with each zone capable of handling up to 255 panels. Unlimited customizable data fields allow you to create exceptional reports and provide a full audit trail of all activity. Frequently used reports can run automatically. Integrated control - Full badge creation capabilities, live photos for every cardholder transaction, alarm monitoring, CCTV and response are all included as standard features. Scalable - The client/server application supports over 1,000 card readers of all technologies. Digital video recording - Access control events such as specific access groups and cardholders at sensitive locations can trigger digital video recordings for playback within the Transaction Monitor.
9 Focal Point Access Control Software Focal Point is an innovative IP-Based access control solution that is simple, effective and scalable. Flexibility - This system supports HID's Edge Product line featuring PoE (Power over Ethernet) with standard CAT-5/6 cabling for low cost installations. It also supports all card technologies. Scalability Focal Point is ideal for small to mid-size organizations and can easily expand as an organization grows. Full-Featured Offers unlimited partitioning capability along with distributed intelligence. Software is easy to understand and operate has no per seat license fee. Functions as a powerful access control system with alarm monitoring and building automation control. Simple IT Integration Readers are designed to simply plug in to a network hub, therefore eliminating the need for a dedicated security closet.
10 HID Reader Technologies How does this technology function? 125kHz Proximity Technology 13.56mHz Contactless Smart Card (iclass) Technology Edge Technology
11 HID Reader Technologies The Access Control Controller (Either a Panel or Intelligent Reader) When the controller receives the data from the credential, its decides whether or not to grant access based on several factors. During the evaluation process, non-conformity of credential data results denial of entry and a logged record into the Access Control Software. The Controller evaluates the format of the credential data if this is acceptable it breaks down the binary string of credential data. It evaluates Facility Code, Site Code, Card Number, and whether the credential is valid at the time/date of read.
12 HID Reader Technologies The Credential Access cards and key fobs carry a set of binary numbers (ones and zeros) that are used to identify the cardholder. The means of encoding data on the card and conveying the data to the reader varies according to the technology involved. In every case, however, the data on the card is a string of binary numbers of some fixed configuration and length.
13 125kHz Proximity Readers ProxPro with keypad Ideal for medium-range applications Dimensions: 5.0 x 5.0 x 1.0 Read Range: up to 8.0 ProxPro II Optional glass mount kit available for mounting the reader behind glass Read Range: up to 8.0
14 125kHz Proximity Readers ProxPoint Plus Dimensions: 3.14 x 1.70 x 0.66 Read Range: up to 3.0 MiniProx Mullion Mount Dimensions: 6.0 x 1.7 x 1.0 Read Range: up to 5.5 Thinline II Low Profile Standard U.S. switch plate size Dimensions: 4.7 x 3.0 x 0.68 Read Range: up to 5.5
15 125kHz Proximity Credentials ProxCard II Thin enough to carry in a wallet ISOProx II Printable in Photo-ID Printer ProxKey II Small enough to fit on a key ring
16 The iclass Difference iclass Authentication The reader and the card go through a complex mathematic process where they compare security keys carried within both the card and reader. This process is called Mutual Authentication. It ensures that the communication between the card and reader can never be copied and repeated back to the reader. Keys must match before the card gives its binary data to the reader and controller.
17 So What is iclass? iclass is a Contactless Smart Card When most people hear the term smart card, they think of the little microchip embedded into the surface of the card. While these have their place in the financial market, they are not ideal for outdoor/industrial uses. These cards must be inserted into a reader slot to be used. Furthermore, contact smart card readers are a prime target for vandalism. Made for access control, iclass contactless smart cards use industry standard encryption techniques, making them the perfect solution for secure access control.
18 13.56 MHz Contactless iclass Readers R15 Reader Mullion Reader Dimensions: 1.9 x 6.0 x 0.9 Read Range: Up to 3.25 R40 Reader (Single Gang Box Size) Dimensions: 3.3 x 4.8 x 1.0 Read Range: Up to 4.75 RK40 KeyPad Reader Dimensions: 3.3 x 4.8 x 1.1 Read Range: Up to 4
19 13.56 MHz Contactless iclass Readers RKLB57 bioclass Biometric Reader Provides 3 Factor Authentication Live Fingerprint PIN Card/Keyfob presentation Dimensions: 8.43" x 4.17" x 2.28" Read Range: Up to 4 R90 Long Range Reader Dimensions: 12 x 12 Read Range: Up to 18
20 13.56MHz iclass Credentials iclass Contactless Smart Card Can be printed on in Photo-ID Printers iclass Clamshell Contactless Smart Card ABS shell construction that provides durability in harsh environments iclass Keyfob Contactless SmartKey Molded plastic enclosure provides durability in harsh environments
21 Step A Little Farther Go to the Edge is the next evolution in access control hardware solutions. A true IP solution that meets the demands of open architecture, IP-centric environments, Edge provides fully distributed intelligence and decision making right to the door, leveraging the IT infrastructure to the maximum extent possible. Paired with Focal Point Access Control Software, Edge Readers add to an IT-friendly, easy to install system.
22 How does the work? Edge Power Comes Through A Single CAT-5 run to the door -- Edge IP Access Solutions run everything at the door. From reader to strike, status to REX. And since each Edge IP Access Solution can utilize PoE (Power over Ethernet) driven right through the CAT-5, separate power supplies and multi-door controllers are no longer required. Edge Readers use iclass Technology so the same Credentials are used too.
23 Options The HID EdgeReader ER40 is a unique iclass reader with an IP-enabled intelligent access control processor and host interface solution in a single unit. With the same footprint as a traditional reader, the EdgeReader ER40 provides a complete and full-featured access control hardware/software infrastructure and contactless smart card capability at the edge of the network
24 Options The HID EdgePlus E400 is a separate Controller that manages up to 44,000 cardholders or credentials in complete and full-featured host systems. And an EdgePlus can be placed anywhere at the door to address all security requirements. A fully integrated processor right at the door that s an ideal solution for retrofits or new installations, EdgePlus requires less wiring and uses standard CAT-5 or 6 cabling for both data and power. With a separately connected reader, EdgePlus is a perfect solution for migrating existing reader installations to the edge of the network. This type of installation is recommended for exterior applications.
25 Door Hardware Electronic Locking Devices Strikes Electrically Retractable Rim Mounted Exit Devices Live Hinges But first.
26 Clarify Hardware Terminology What do Fail Safe and Fail Secure mean? Fail Safe - Lock or locking device that remains unlocked on loss of power. Fail Secure - Lock or locking device that remains locked on loss of power. This can also known as Non-Fail Safe (NFS). Now we can move on to review a few common hardware types
27 HES 9000 Genesis Series HES 9600 Completely surface mounted, the 9600 accommodates rim exit devices in metal or wood jambs. Field selectable fail safe/fail secure. Optional Features LBM - Latchbolt monitor LBSM - Latchbolt strike monitor HES 9500 Same as the 9600 but Fire Rated (UL 10C fire-rated, 1-1/2 hour in fail secure state only)
28 HES 5000 Series HES 5000 series is a grade 1, compact, high performance electric strike designed for low profile steel, aluminum, and wood openings where there is limited space behind the jamb. This field selectable fail secure/fail safe unit accommodates 5/8" latchbolts. Optional Features LBM - Latchbolt monitor
29 HES 5900 Series HES 5900 series strikes are feature a unique concealed design for increased security in steel, aluminum, and wood frames with a ½ -5/8 latchbolt. Field selectable fail safe/fail secure, the 5900 also minimizes frame modification. Optional Features LBM - Latchbolt monitor
30 HES 8300 Series HES 8300 is a new 3 hour fire-rated (in fail secure condition), concealed, compact, high-performance electric strike designed for steel, aluminum, and wood frames. It fits into a standard 1" ANSI/BHMA A dustbox, with little or no modification to the frame. Accommodates 1/2"-5/8" latchbolt (5/8" with 1/8" door gap). Optional Features LBM - Latchbolt monitor
31 Folger Adam Optional Features Fail Safe Folger Adam is a Fail Secure (standard) strike for double doors (without mullion) which are equipped with surface vertical-rod exit devices having a swinging, pullman style latchbolt. LCBMA - Latchbolt & Locking Cam Monitor with Auxiliary Switch Note: The bottom rod of the exit device be removed or made inoperative
32 Folger Adam Folger Adam is a Fail Secure (standard) strike for double doors (without mullion) which are equipped with concealed vertical-rod exit devices. Optional Features Fail Safe LCBMA - Latchbolt & Locking Cam Monitor with Auxiliary Switch Note: The bottom rod of the exit device be removed or made inoperative
33 Folger Adam Optional Features Fail Safe Folger Adam is a Fail Secure (standard) strike for the active leaf of a pair of double doors (without mullion) which are equipped with concealed vertical-rod exit devices having a ½ to 5/8 throw latchbolt. LCBMA - Latchbolt & Locking Cam Monitor with Auxiliary Switch Note: The bottom rod of the exit device be removed or made inoperative
34 Von Duprin 98/98 Series Exit Devices Take this standard device and add Optional Features to make it work for an Access Control system..
35 Von Duprin 98/98 Series Options Signal Switch The SS (Signal Switch) feature signals unauthorized use of an opening. One internal switch monitors the touchbar and the latch bolt for positive security. A second internal switch is controlled by the key cylinder for alarm reset. The SS device is designed to work with additional alarm components. Electric Latch Retraction The EL (Electric Latch Retraction) devices provide remote locking control, useful where free-swinging doors are normally utilized. May be applied to fire devices when under the control of an automatic fire alarm system. A powerful, continuous duty solenoid retracts the latch bolt, either for momentary unlatching, or for extended periods of time. Serves as an alternative to manual dogging. Requires dedicated 24VDC, 16 Amp Power Supply.
36 Von Duprin 98/98 Series Options Request To Exit The RX (Request to Exit) option is used to signal egress of an opening. These devices are equipped with one internal SPDT switch, which monitors the touchbar. Latchbolt Monitor The LX (Latchbolt Monitor Switch) option is used to signal both egress and access of an opening. These devices are equipped with one internal SPDT switch, which monitors the latch bolt. Electric Mortise Lock The E7500 (Electric Mortise Lock) option provides for remote locking or unlocking of the outside trim without retracting the latch bolt. Particularly useful as a fail-safe component of an automatic fire alarm system.
37 Electric Live Hinges Multi-Conductor concealed wires conduct current regardless of door position No electrical parts are exposed when hinge is installed To conduct power to electric locks, panic bolts, or hold-open devices. Also to transmit signals from code readers on doors to remote computers for access control. Usually available in steel, brass, bronze, and stainless steel standard weight sizes Electric Hinges should be installed in the center hinge location
38 Coordination & Communication Double Doors requiring Access Control require good communication and coordination between the Access Control Vendor and Door Hardware Vendor and Sub-Contractor. With ever-changing technologies in the Access Control field, Door Sub-Contractors often don t know what to do with this box of stuff full of wires attached to the items they are used to working with. Live Hinges and Electrically Retracting Rim Mounted Exit Devices often leave these guys scratching their heads. And if they install the components incorrectly, the electric components may not function. So when Double Doors require Access Control, it is advantageous for the Access Control Vendor to be involved from start to finish (from door design to installation) to make sure the door will function the way an Owner to want it to.
39 So.Why an Access Control Vendor? Access Control enables an Owner the ability protect resources and assets using technology. There are many companies out there just to make a buck. Licensure helps to some degree, but choosing a Vendor with experience and integrity ultimately protects the interests of an Owner. Experience provides depth, ensuring product quality and performance by an Organization that knows the industry today, and which direction it will go tomorrow. Integrity offers a long-term relationship LONG after the dust has settled and the novelty of a new facility wears off. Such a Vendor will be there years after a project is complete, offering customer support to back up the high-quality products installed in the beginning. This entails seeing beyond just making a buck. A Vendor with integrity looks for the interests of an Owner every step of the way.
40
41 Giving Credit Where It Is Due. Access Specialties Products under their registered TradeMarks. HID Products under registered TradeMarks of ASSA ABLOY. HES Products under registered TradeMarks of ASSA ABLOY. Folger Adam Products under registered TradeMarks of ASSA ABLOY Von Duprin Products under their registered TradeMarks Access Control system definitions courtesy of Wikipedia
System components portfolio overview. Power supplies, electromagnetic locks, electric strikes and system accessories
System components portfolio overview Power supplies, electromagnetic locks, electric strikes and system accessories Our comprehensive commercial portfolio includes everything you need to hang, protect,
More informationPRODUCT INTRODUCTION PRECISION HARDWARE
PRODUCT INTRODUCTION PRECISION HARDWARE INTRODUCTION INTRODUCTION Originally located in southeastern Michigan, Precision Hardware has been manufacturing panic and fire exit hardware for over a half century.
More informationCONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM
GENERAL: To provide minimum standards for Access Control Systems. PART 1 Common Work Results for Access Control System 1.1 Owner will provide server and software for connecting control panels through the
More informationEQUIPMENT SPECIFICATIONS
EQUIPMENT SPECIFICATIONS IC-1600 Intelligent Controller The IC-1600 Intelligent Controller is a fully intelligent panel that has a complete database on board. It operates in conjunction with the Access
More informationACCESS CONTROL SYSTEM
ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator
More informationUnderstanding Access Control
Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly
More informationEdge Metrics Data Center User Manual
Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,
More informationAD-Series. Selection Guide
AD-Series Selection Guide The first step in our design process: Listening. We wanted to know exactly what you needed in a security solution. So we asked. We asked hundreds of questions and received thousands
More informationFunctional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
More informationSYMMETRY PRODUCT OVERVIEW
ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations
More informationElectrified Products TABLE OF CONTENTS. Power Transfers...12 Pressure Sense Bars...12 Proximity Cards & Keys... 4
TABLE OF CONTENTS A Adjustable Angle Bracket (294/2942)... 6 Angle Brackets (2950 Series)... 9 Armature Mounting Plates (2950 Series)... 7 C Coordinator Mounting Bracket (2950 Series)... 7 Concealed Magnetic
More informationSYMMETRY. DATASHEET ACCESS CONTROL Product Overview
DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated
More informationElectromagnetic locks
Electromagnetic locks Electromagnetic locks from Schlage Schlage has a rich heritage in electronic security. For years we have led the industry by providing a broad portfolio of solutions to meet the diverse
More informationLife Safety, Security Door Hardware and Integrated Door Security Systems
Life Safety, Security Door Hardware and Integrated Door Security Systems Where Trust is Built Life Safety and Security Door Hardware 10 & 40 SERIES RIM EXIT DEVICES 10 SERIES (WIDE STILE) Super heavy duty
More informationPRO Series. Card Readers, Cards and Tags
PRO Series Card Readers, Cards and Tags All Proximity Card Readers: Offer high reliability, consistent read range characteristics, and low power consumption in a single, easy-to-install package. Are sealed
More informationAn ASSA ABLOY Group brand. 4800LN Series. Interconnected Locks
An ASSA ABLOY Group brand 4800LN Series Interconnected Locks performance meets style introduction The Yale 4800LN series interconnected locksets combine our key-in-lever locksets with the added safety
More informationHES & Folger Adam Electric Strikes & Accessories CANADIAN PRICELIST. Effective Date: Apirl 4, 2016
2016 CANADIAN PRICELIST HES & Folger Adam Electric Strikes & Accessories Effective Date: Apirl 4, 2016 About HES and Folger Adam About Headquartered in Phoenix, Arizona, Hanchett Entry Systems, Inc. (HES),
More informationElectronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
More informationDIVISION 08 70 00 HARDWARE FORMAT 1. Technical specifications content and numbering system shall be based on 2004 CSI MasterFormat.
FORMAT 1. Technical specifications content and numbering system shall be based on 2004 CSI MasterFormat. BASIS OF DESIGN 1. APSU design standards shall not replace fully developed, project and market specific
More informationUBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7
Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section
More informationSecurity Management System Wiring Diagram Portfolio
Security Management System Wiring Diagram Portfolio SMS Wiring Portfolio Schlage Management System Table of Contents Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 SMS Reader Controller Configurations
More informationDoor control and security hardware
Door control and security hardware Introduction Since pioneering the first exit device in 908, Von Duprin life safety products have provided unparalleled quality, performance and flexibility for schools,
More informationDARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES
PART 1 DESIGN DIRECTIVES 1.1 OVERVIEW SECTION 13825 SECURITY MANAGEMENT SYSTEMS A. The access control, surveillance, and intrusion detection system implemented for use at Dartmouth College is a Lenel International
More informationProduct Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12
Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering
More informationTABLE OF CONTENTS. Introduction 1. Components of a System 2. Door Control Hardware 3. Request to Exit Devices 5. Credential Technology 6
TABLE OF CONTENTS Page Introduction 1 Components of a System 2 Door Control Hardware 3 Request to Exit Devices 5 Credential Technology 6 Controller Panels 8 WEB Based Systems 9 Retrofitting and Upgrading
More informationExit Devices TABLE OF CONTENTS
Exit Devices TABLE OF CONTENTS A Accessories, 4500 Series Grade 1 Alarm Kit... 15 Alarm Kit Latchbolt Monitor Switch... 17 Alarm Kit Tamper Switch... 18 Bottom Latch Assembly... 13 Cylinder Dogging Conversion
More informationSafe schools. Security solutions
Safe schools Security solutions Frequently Asked Questions How can a hardware manufacturer know how to make my school safer? Because we have already identified potential problems specific to schools through
More informationElectronic Access Control Catalogue
Electronic Access Control Catalogue Field Devices Issue: September 2008 Make the most of your energy TAC the Single Source for all Your Electronic Access Needs This catalogue presents the electronic access
More informationDIVISION 08 70 00 HARDWARE FORMAT 1. Technical specifications content and numbering system shall be based on 2004 CSI MasterFormat.
FORMAT 1. Technical specifications content and numbering system shall be based on 2004 CSI MasterFormat. BASIS OF DESIGN 1. BGSU Design Standards shall not replace fully developed, project and market specific
More informationL-1 Fingerprint Reader Solutions. V-Flex 4G
L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in
More informationDor-O-Matic Exit Devices
Dor-O-Matic Exit Devices THE FALCON DIFFERENCE S A F E T Y, S E C U R I T Y A N D U N C O M P R O M I S I N G V A L U E At Falcon, we know that every product you sell not only has to meet local building
More informationHarmony Series FOR TRAINING PURPOSES ONLY DATED MATERIAL. Integrated Wiegand Solutions Access Control Products
Integrated Wiegand Solutions Access Control Products Available through Authorized Channel Partners only. Contact your local ASSA ABLOY Door Security Solutions sales consultant for details. Copyright 2007-2013,
More informationFLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011
FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL 32306-2370 ADDENDUM ACKNOWLEDGMENT FORM DATE: December 8, 2011 ADDENDUM NO. 4 Competitive Solicitation Number ITB 5530-0
More informationInSync Lock Series SAM RF Software. Key Control Systems for Multihousing
InSync Lock Series SAM RF Software Key Control Systems for Multihousing InSync Locks & SAM RF Software: The Perfect Combination of Style and Security When it comes to residents needs, developers and property
More informationManage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
More informationGLOSSARY of SECURITY TERMS
GLOSSARY of SECURITY TERMS ACAMS (Access Control and Alarm Monitoring System) An electronic system or network of integrated systems designed to control physical access and monitor events such as intrusion.
More information280+ Mortise Mounted Series Shear Locks Special Application Solution
280+ Mortise Mounted Series Shear Locks Power Plus control module overcomes gaps of up to 1/4" Low Temperature Operation 280+ TRD Locknetics provides the industry s most complete selection of electromagnetic
More informationAccess Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper
Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control
More informationSECTION 08740 ELECTRO-MECHANICAL HARDWARE
SECTION 08740 ELECTRO-MECHANICAL HARDWARE PART 1 - GENERAL 1.1 SUMMARY: A. Section Includes: 1. Items known commercially as electro-mechanical hardware, required for special applications at limited doors.
More informationInterfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.
More informationBasic Technical Fundamentals of Builders Hardware Mortise, Bored and Auxiliary Locks
Mortise, Bored and Auxiliary Locks Copyright 2002, 2009, Sargent Manufacturing Company, an ASSA ABLOY Group company. All rights reserved. Table of Contents Page SARGENT History...................................................
More informationIntroducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System
Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n
More informationBasic Technical Fundamentals of Builders Hardware
Basic Technical Fundamentals of Builders Hardware Mortise Locks Bored Locks Auxiliary Locks Inside Cover (blank) Table of Contents SARGENT History...4 Basic Name of Products...5, 6 Doors (A Brief Review)...7
More informationIntroducing the Schlage NDE series wireless lock with ENGAGE technology
Introducing the Schlage NDE series wireless lock with ENGAGE technology 2 Allegion Engage technology Hello True innovation Strong value Welcome to ENGAGE technology, a new connectivity platform that makes
More informationSmart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
More informationWhite Papers: Delayed Egress Hardware
www.sdcsecurity.com service@sdcsecurity.com [t] 800.413.8783 805.494.0622 [f] 805.494.8681 801 Avenida Acaso, Camarillo CA 93012 PO Box 3670, Camarillo CA 93011-3670 www.sdcsecurity.com White Papers: Delayed
More informationGlossary of TermsRev G
Glossary of TermsRev G Revised Feb 12, 2001 1 A access card credit card-sized device encoded with identification data and used to access a door. access code sequence of digits that is included in a personal
More informationDigitus Biometrics. 2015 Product Catalogue. Request a quote or design assistance by emailing sales@digitus-biometrics.com or calling 912.231.8175.
Digitus Biometrics 2015 Product Catalogue Request a quote or design assistance by emailing sales@digitus-biometrics.com or calling 912.231.8175. Table of Contents Access Control Solutions db ServerRack
More informationAccess CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
More informationMiddleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
More informationFabrication Illustration Part No. Description Door Frame. P092 Mortised Butt Hinge P092D P092F (includes P2092 $ 48 $ 21 frame/door reinforcing)
Custom Blank Entrances - Applied Hardware & Preps - Tubelite Standard Hardware Butt Hinges Pivots C2 Page 1 P092 Mortised Butt Hinge P092D P092F (includes P2092 $ 48 $ 21 frame/door reinforcing) P795S
More informationDIVISION 8 DOORS AND WINDOWS
DIVISION 8 DOORS AND WINDOWS A. FINISH HARDWARE AND SPECIALTIES 1. General a. It is the intent of this document to provide guidelines for the Architect's specifications section 08710, finish hardware.
More informationIntegrated Security System
Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System
More informationElectronic Security Systems. Specifications and. Installation Guidelines Change Document
Electronic Security Systems Specifications and Installation Guidelines Change Document Changes below are highlighted in RED Version No. Description of Change Date Author Approved 1.12.2 Revision July 2012
More informationSecuring your school. Door hardware solutions for primary education
Securing your school Door hardware solutions for primary education Security at every layer Successful school operation combines a safe and secure environment with the freedom needed to focus on education.
More information3 Specification. Master Chip Broadcom 1190. Keys Direct-button 1. Microphone 1. Amplifier 0.5W Speaker 0.5W. Voice
I20-T Door Phone 1 Description I20-T Voice Access control is a digital IP door phone with Fanvil Voip Solutions (Broadcom chip 1190), stable and reliable. FDSP ensure voice loud and clear. Good looking,
More informationPanic Exit Devices. We take the worry out of protecting what s valuable to you. Lockwood: no worries. www.lockweb.com.au
Panic Exit Devices We take the worry out of protecting what s valuable to you. Lockwood: no worries www.lockweb.com.au Contents 9000/9100 Series 9300/9400 Series 9500/9600 Series 9000/9100 Series Rim Type
More informationCSP Combined Series. Telephone Door Entry. with. Proximity Keyfob Access
CSP Combined Series Telephone Door Entry with Proximity Keyfob Access PD-094 Issue 3 General Description The CSP series systems are combined Door Entry Telephone and Proximity Access Systems. The entrance
More informationAX.S Series Access Control and I.AM Series Identity Access Management
AX.S Series Access Control and I.AM Series Identity Access Management We selected the Kaba Embedded Access Control System for its features and functions, but what we like the most is how rock solid the
More information>>IP. VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert
Enjoy value-added service Seamlessly connected with IP camera Embedded SIP protocol Support App function >>IP VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert Solution SIP Intercom Security
More informationAccess Control in Surveillance Station 7.0
Access Control in Surveillance Station 7.0 With Axis Network Door Controller A1001 Synology Inc. Synology_ACISS_20150305 Table of Contents Chapter 1: Introduction... 3 1.1 What Is Access Control?... 3
More informationABLOY EL490 AND EL590 SCANDINAVIAN RANGE MOTOR LOCKS Flexible multifunctional locking ABLOY EL490 and EL590 motor locks have been developed to further increase both the security and safety of the entire
More informationELECTRONIC KEYCARD ACCESS LOCKS
ELECTRONIC KEYCARD ACCESS LOCKS Presented by Fred A. Crum, AHC,MHS SAFLOK 2608 Manor Oak Drive Valrico, FL 33594 Telephone ~ 813-643-3344 Email ~ fred.crum@saflok.com AUGUST 3, 2005 YESTERDAY WAS MECHANICAL
More informationAccess Professional Edition Selection Guide
Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base
More informationCISA esigno Contactless Lock
CISA esigno Contactless Lock Innovative Security Solution for Hotels & Resorts Seamless Contactless Wireless esigno Contactless lock CISA esigno is the latest addition to our range of security solutions
More informationPART A. Option 1: City Hall & POA Supply and Install Lenel Onguard Security Upgrade and supply and Install Axis IP Cameras
PART A Option 1: City Hall & POA Supply and Install Lenel Onguard Security Upgrade and supply and Install Axis IP Cameras General The City of Guelph has standardized on Lenel OnGuard as the corporate access
More informationASERIES ATM Access Management System
ASERIES ATM Access Management System Increase Security. Reduce Operation Costs. Reduce Liability. The A-Series ATM Access Management System from Sargent & Greenleaf increases security and management efficiency
More informationAC-115 Compact Networked Single Door Controller. Installation and User Manual
AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.
More informationBeaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems
Beaver Dam Unified School District Request for Proposal Video Surveillance and Door Access Control Systems The Beaver Dam Unified School District (BDUSD) is requesting proposals from qualified companies
More informationEgress Control Access Control
Integrated Door Security Systems Egress Control Access Control Reliable, Trouble-Free Systems in Easy-to-Order Configurable EasyKits With our new EasyKits, you can order configurable egress and/or access
More informationCabinet Locks. Benefits:
Cabinet Locks Medeco high security cabinet locks are specifically designed for drawer or cabinet door applications where a conventional utility cam lock may not be suitable. Cabinet locks utilize heavy-duty
More informationSecurity Management System
Security Management System High Level System Benefits Integrated Solutions For: Access Control Intrusion Detection Alarm Monitoring CCTV Integrated Badging Digital Video Surveillance & Retrieval Visitor
More informationTailored integration to suit you
UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*
More informationTAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE
TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE The University of Arizona has implemented a Keyless Access and Security System program to provide a cost effective, efficient, and maintainable means
More informationDoors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com
Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application
More information15370 Barranca Parkway Irvine, CA 92618. Edge. Connections APPLICATION NOTE. AN0108, Rev B.0. 2008-2011 HID Global Corporation. All rights reserved.
15370 Barranca Parkway Irvine, CA 92618 Edge Connections APPLICATION NOTE AN0108, Rev B.0 2008-2011 HID Global Corporation. All rights reserved. Contents Overview3 Contacts...3 POE 12 VDC Strike (Fail
More informationsolutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
More informationD-4990 PRECISION HARDWARE
D-4990 PRECISION HARDWARE INTRODUCTION TABLE OF CONTENTS Page Introduction...2 ADA Blue-Paint Access...2 Features/Benefits...3 Electrical Data Specifications...4 How To Order...4 INTRODUCTION Page Standard
More informationAdaptability to Enhanced Security
Installer Guide Adaptability to Enhanced Security AdapTec Plus combines power supply and door access controller features in a compact casing for an encrypted and secure I/O function, enhancing door access
More informationCluster Box Units. (CBU s) 3300 Series CBU Door Sizes. Fully Integrated Parcel Lockers CLUSTER BOX UNITS FRONT LOADING. continued on pages 7-11
Cluster Box Units (CBU s) continued on pages 7-11 CLUSTER BOX UNITS FRONT LOADING Made of heavy duty aluminum and stainless steel hardware, Salsbury 3300 series U.S.P.S. approved Cluster Box Units (CBU
More informationDOH10-022 Universal Security System. Questions and Answers
Q1) In section 5.4 p. 10; must all potential bidders have signed in on all site attendance sheets to be considered responsive bidders? A1) Yes Q2) Shall all sites listed in Attachment I (p.15) be installed
More informationIntegrated Building Management and Security System. Building Automation & Security. www.coba-group.com
Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3
More informationAdaptability to Enhanced Security
Installer Guide Adaptability to Enhanced Security AdapTec Plus combines power supply and door access controller features in a compact casing for an encrypted and secure I/O function, enhancing door access
More informationNetwork Access Control to Improve Security
c a s e S T U D Y A Phillip M. Stokoe Elementary School, one of 14 elementary schools in the Alvord USD, incorporates the Alvord Unified School District s upgraded electronic access control standards Alvord
More informationEx15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:
//DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,
More informationTopaz. GE Security. Intelligent software for access control. Topaz. Features
GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security
More informationSECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT
SECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT G U I D E L I N E S DSA Guidelines for Door Locking Hardware in Schools Egress doors shall be readily openable from
More informationPhysical Electronic Security Made Easy. From Network s Edge to Security Edge Devices
Physical Electronic Security Made Easy From Network s Edge to Security Edge Devices From Network s Edge to Security Edge Devices: Code Compliant Physical Electronic Security Made Easy From network s edge
More informationTRACK, AUDIT and CONTROL medications at the Point-of-Care.
TRACK, AUDIT and CONTROL medications at the Point-of-Care. with ISONAS THE TRUE COST OF MEDICATION ERRORS In addition to the rising costs associated with inefficient use of time within the clinical environment,
More informationB. Division 16 Basic Materials and Methods sections apply to work of this section.
SECTION 28 05 00 PAGE 1 SECTION 28 05 00 INTRUSION DETECTION PART 1 - GENERAL 1.1 RELATED DOCUMENTS: A. Drawings and general provisions of Contract, including General and Supplementary Conditions apply
More informationCKM-EP2500, CKM-EP1501, and CKM-EP1502 Mercury Network Controllers
Johnson Controls, Inc. now offers Mercury Security Corporation s high-quality access control hardware products, which can be integrated with the Johnson Controls P2000 Security Management System (SMS)
More informationHyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
More informationAutomatic Door Selection Guide
Automatic Door Selection Guide AAADM 1300 Sumner Avenue Cleveland, OH 44115 P: 216-241-7333 F: 216-241-0105 aaadm@aaadm.com Automatic Door Selection Guide General: The members of AAADM manufacture an assortment
More informationA fire escape is a door that can be easily opened by anyone, without special knowledge or equipment!
FREEDOM TO ESCAPE Adapted from an article by David Miller CPP M.I.S. (SA) which was first published in Fire Protection, the organ of the Fire Protection Association of South Africa. A fire escape is a
More information1838AP 1810AP PG. 48 PG. 42
Telephone Entry PLUS Computer Programming and Control. The DKS Access Plus product line is a true hybrid access control and telephone entry system that is ideal for residential, small apartment, condominium,
More informationBasic Fire Door Requirements
TECHNICAL DATA SERIES S D I 118-01 Basic Fire Door Requirements 2001 Steel Door Institute STEEL DOOR INSTITUTE 30200 DETROIT ROAD - CLEVELAND, OHIO 44145 Technical Data Series SDI 118-2001 Basic Fire Door
More informationReaders and Credentials. from Security Technologies
Readers and Credentials from Security Technologies readers AVAILABLE FINISHES: Black (Standard) Cream PR10 XceedID Proximity Mini-Mullion Reader Cool Tone Gray Warm Tone Brown Simplifying the security
More informationSecurity Management System
Security Management System Schlage Security Management System High Security Enables you to maximize the effectiveness of multiple security applications in one powerful system Allows transactions, associated
More informationACCESS CONTROL SOLUTIONS
ACCESS CONTROL SOLUTIONS ACCESS CONTROL If you need a high level of control over who is entering your building and want to know when people have entered, our state of the art electronic locking systems
More informationINSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK
Security Door Controls 3580 Willow Lane, Westlake Village, CA 91361-4921 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP
More information