APOGEE Security Technology Management Software

Size: px
Start display at page:

Download "APOGEE Security Technology Management Software"

Transcription

1 Technical Specification Sheet Rev 1, July, 1999 APOGEE Security Technology Management Software Figure 1 APOGEE Security Technologies workstation The APOGEE Security Technology System (ASTS) is a family of fully integrated Security, Access Control and Alarm Monitoring Systems ASTS combines reliability with the very latest technology innovations in a 32 bit multi-user, multiprocessing operating system ASTS provides the most sophisticated security management system currently available in the security market Multiple industry standard LAN and serial communications facilities available, for local and wide area control Hot redundant system capability with separately located file servers and separate supervisory computer(s) Landlord/Tenant and Partitioned Database facilities available Intelligent field panels (ACUs) directly support card readers, alarm sensors and relay outputs with alternative direct transaction handling by the file server Removable hard disk cartridge with up to 270 MB storage for archive and backup, and direct access for archive reports Can support up to 2,000 card readers, up to 40,000 fully supervised alarm points and up to 40,000 relay outputs Up to 250,000 cardholder capacity available Up to 2,000 security areas, 2,000 access groups and 255 user defined time zones available Integrated or separated Dynamic Color Graphic alarm presentation with zoom facility Integrated video badging and photo ID system Up to 32 ASTS Servers, each with up to 32 workstations can be networked together with shared database information and shared administration and control Powerful interfacing capabilities for other software based systems Features Multi-user/multitasking system with up to 32 simultaneous users on workstations, able to run multiple concurrent applications in Windows Document No P25 Page 1 of 12

2 SECURITY MANAGEMENT SYSTEM ALARM PRINTER FILE SERVER OPERATOR WORKSTATION OPERATOR WORKSATION ALARM PRINTER REPORT PRINTER REPORT PRINTER LOCAL AREA NETWORK (TYPICAL) ACTIVE HUB INTEGRATION WITH EXTERNAL COMPUTER SYSTEMS RS-485 MULTIDROP RS-232 SERIAL INTERFACE (TYPICAL) FIELD DEVICES PHOTO-BADGING SUBSYSTEM RS-485 MULTIDROP (TYPICAL) COLOR CCD CAMERA PHOTO BADGING ENROLLMENT WORKSTATION ACU-2 INTELLIGENT CONTROLLER CARD READERS 1-4 ALARM INPUTS 1-64 RELAY OUTPUTS 1-64 #5 CARD READERS 5-8 RS-485 MULTIDROP (TYPICAL) #8 VIDEO BADGE PRINTER CARD READERS 1-4 RELAY OUTPUTS 1-64 CCTV SUBSYSTEM ACU-2 INTELLIGENT CONTROLLER MONITOR MONITOR CAMERAS ALARM INPUTS 1-64 CARD READERS 5-8 RADIO PAGING SUBSYSTEM CCTV CPU SEC0075R1 PAGERS RADIO PAGER VIDEO RECORDER MONITOR Figure 2 System Architecture Siemens Building Technologies, Inc Page 2 of 12

3 System Overview ASTS is a family of state-of-the-art, computer based systems designed to provide a total security solution, by making individual security subsystems work together in an integrated, cohesive manner Offering unparalleled power and fleibility, ASTS merges the functions of Access Control, Alarm Monitoring, Elevator Control, Photo Badging, CCTV Control, Radio Paging, Intercom, and a host of other security subsystems into a complete, seamlessly integrated and effective security system Each subsystem provides its own unique functions to enhance and improve the effectiveness and performance of other related subsystems To compliment their power and fleibility, ASTS is etremely easy to use, with unique operator interface features which are intuitively designed to simplify their use by security staff Using the Windows NT operating system, ASTS brings a new standard of reliability and fleibility to the market place ASTS is available in several models: ASTS Ultra Lite System Supports 16 card readers with 1 workstation ASTS Lite System Supports 32 card readers and 2 workstations (software only for smaller applications) ASTS-64 System Supports 64 card readers and 3 workstations (software only) be continuously upgraded to larger configurations with the simple addition of appropriate hardware and software These systems are modular and scalable, at both the component and system levels, to maimize cost-effective installations File Server System operators and administrators interact with the system via the File Server The File Server interacts with workstations in a client/server relationship on a high speed Local or Wide Area Network Multiple File Servers, each with their own workstations can also be networked together in order to share database information, system control, monitoring and reporting capabilities Complete multi-user, multitasking operation is supported at all workstations ACUs Microprocessor-based Autonomous Control Units (ACUs) are intelligent field panels, which support the networked distributed intelligence design concept As a result, overall system responsiveness, reliability and fleibility are greatly enhanced Communication Network A data communication network is used to interconnect the File Server and Workstations with the ACUs A wide variety of data communications technologies are supported, to provide cost-effective communication solutions regardless of the size or type of facility Systems can be configured to support small localized sites, to large installations spread over wide geographical areas ASTS-128 System Supports up to 128 card readers and 8 operator workstations ASTS-500 System Supports up to 512 card readers and 16 operator workstations ASTS-2000 System Supports up to 2,048 card readers and 32 operator workstations Access Control The ASTS supports up to 250,000 cardholders Each record is user definable and dynamically assigned within the system The ASTS can support up to 2,000 card readers, each of which can be defined with individual operating parameters and descriptive tet Card readers can be configured by time zone to operate in card only, card and keypad, and keypad only modes and can include an LCD message display All of the fully configured ASTS systems offer the same range of features and options Each model can Siemens Building Technologies, Inc Page 3 of 12

4 The Cardholder and Visitor Data Bases include over seventy descriptive fields, of which eleven are user definable The access control system has features and options for a highly fleible AREA CONTROL capacity, GLOBAL and LOCAL ANTIPASSBACK, anti-tailgating features These facilities include hard, soft and timed anti-passback High Integrity Dial-Up Up to 500 remote locations can be monitored and controlled using dial-up modems and the High Integrity Dial-Up feature The system provides a port partitioning feature which allocates ports specifically for alarm annunciation A special initialization feature ensures that there is no waiting period for downloading the data base when new remote sites are brought on line, as the system is immediately useable with full access to the card and alarm database Alarm Monitoring The ASTS has the capability to monitor over 40,000 five-state supervised alarm inputs Individual alarm points are user-configured with descriptive and action tet, priority level, category tet, acknowledgement requirements, reporting location, and other reporting parameters Each alarm input point can be individually configured for when and if it can be masked (shunted) In addition, inputs can be programmed to initiate special commands when set or reset KEYPAD ALARM MASKING allows an authorized cardholder to mask or unmask alarm points within a designated area by entering special codes at the keypad of the card reader controlling entry into the area ALARM ROUTING can be used to route alarm annunciation to any of the workstations on the system Notification of unacknowledged alarms can be annunciated at another workstation Each workstation has the capacity to provide full COLOR GRAPHIC representation of alarms on fully graphic floor plans and maps with ZOOM capabilities The system is capable of controlling up to 40,000 output relays Each relay may be individually configured for manual control, locally linked to an alarm point, or automatically controlled by time or by card transaction Automatic Control AUTOMATIC READER CONTROL allows readers to be configured to automatically change operating modes based on time or the activation of an alarm point AUTOMATIC ALARM POINT MASKING allows any alarm point to be configured to automatically mask or unmask based on time, or the activation or deactivation of another alarm point The system supports 255 USER-DEFINED TIME ZONES with each time zone having up to eight userdefined time intervals Over 2,000 SECURITY AREAS can be defined for sophisticated area control throughout the facility The system also provides up to 256 OPERATOR PASSWORDS, each with user defined function assignments Up to 1,000 ACUs can be addressed by the system, with up to 16 ACUs multidropped on a single communication link Redundant Architecture The Redundant Systems option supports fully redundant File Servers with a high-speed Local Area Network between the two systems In this configuration, the File Servers can be placed up to 2000 feet apart If the primary File Server fails, the alternate File Server assumes control of all system functions in less than 20 seconds without loss of event or alarm data, including alarms coincident with Server failure Both File Servers monitor each other, and are controlled by the microprocessor based Dual- System Controller This mechanism identifies any failure in the primary or secondary File Server and automatically switches field devices to the standby File Server Each File Server can be configured with Redundant Disks, which provides dual hard disk drives with a mirror write capability to both disk drives The system automatically switches to the healthy drive in the event of failure Page 4 of 12 Siemens Building Technologies, Inc

5 SECURITY MANAGEMENT SYSTEM TO ASTS-SERIES WORKSTATIONS ALARM PRINTER FILE SERVER - PARY FILE SERVER - SECONDARY ALARM PRINTER REPORT PRINTER ACTIVE HUB LOCAL AREA NETWORK (TYPICAL) REPORT PRINTER RS-485 LINK DUAL SYSTEM CONTROLLER RS-485 LINK MULTIPLE RS-232 SERIAL LINKS MULTIPLE RS-232 SERIAL LINKS MULTI-PORT SWITCHER PANEL RS-485 MULTIDROP (TYPICAL) FIELD DEVICES RS-485 MULTIDROP (TYPICAL) RS-485 MULTIDROP (TYPICAL) CARD READERS 1-4 ALARM INPUTS 1-64 CARD READERS 1-4 ALARM INPUTS 1-64 SEC0091R1 ACU-2 INTELLIGENT CONTROLLER RELAY OUTPUTS 1-64 #5 #8 CARD READERS 5-8 ACU-2 INTELLIGENT CONTROLLER RELAY OUTPUTS 1-64 #5 #8 CARD READERS 5-8 Figure 3 Redundant Architecture The architecture is truly HOT REDUNDANT, and not simply Hot Standby as with most systems in the market This is due to the etensive monitoring and automatic control provided by the dual System Controller and the individual File Servers Advanced Features System Architecture The ASTS is a family of integrated computer-based Security Management Systems, designed to operate on numerous types of PC hardware, and run under the Windows NT operating system The system architecture provides an etremely fleible and cost effective solution for all sizes of installations The ASTS can be configured relatively small with under 64 readers to etremely large with a multiple server system with thousands of readers, alarms and remote control points The fleibility and performance of the ASTS is unmatched anywhere in the industry The system is available in configurations that support the broadest possible range of applications Communications Engine The hardware design of the ASTS is unique Although the system is PC based, the architecture of the hardware is designed to ensure that loading of the system with field devices does not significantly impact the speed and performance of the overall system The Pentium processor in the PC is dedicated eclusively to the administration of the system, the Siemens Building Technologies, Inc Page 5 of 12

6 annunciation and display of events and the running of reports Serial ports are managed by separate processors plugged into the bus The overhead of polling and communications with eternal devices is managed by these communications processors As a result, the file server PC has the capability to efficiently handle 127 serial communications ports CCTV Subsystem Integration The ASTS offers an optional software feature which provides functional integration with a CCTV subsystem This capability is provided by means of a software controlled RS-232C data link between ASTS and the matri CCTV switcher, and interfaces most proprietary systems currently available in the market Multiple Server Systems Multiple Server Control Software allows Multiple ASTS File Servers, each with their own complement of workstations to be interconnected together sharing cardholder records where necessary This also allows monitoring and control of alarm points and output control functions The system can consist of 32 servers each with their corresponding ACU2s, readers, alarms, remote controls and workstations Each of the file servers may be connected on a local or wide area network File Servers of workstations can access any of the other file servers through password protection, to administer the system and make changes, or to control the remote system as if it were directly connected Alarms, events and overall control of any file server can be routed to any other file server based on time parameters or operator control Photobadging and Video Imaging The ASTS is designed to provide maimum fleibility to the user by offering a full featured, fleible and integrated Photobadging system The ASTS can optionally interface to most of the other proprietary Photobadging systems The integrated system allows the file server or system workstations to be used as enrollment stations, where badge data can be captured and stored, and badges produced Badges are stored at the file server as part of the card record information System workstations may also be utilized as assessment stations An important feature of the integrated photobadging system is that it allows the user to specify conditions related to cardholder information to determine which cards can be produced with colors, formats, legends or icons specific to the contents within individual cardholder database fields Most of the proprietary systems which are currently available can be interfaced to the system if required In many cases these systems can upload the complete cardholder database for the ASTS Radio Paging The ASTS has an optional software controlled data link to a Radio Paging Subsystem This feature provides for the automatic routing of selected alarm messages, under specific conditions Messages are transmitted to portable, alphanumeric pagers carried by security staff or mobile patrols The messages sent to the alphanumeric pagers include a full tet description of the alarm, and the location Support can be provided for both on-site paging systems used at specific facilities and dial-up access to commercial paging services, which offer city wide, regional or national paging coverage Guard Tour The ASTS provides an optional Guard Tour function, allowing 64 different Guard Tours to be operated simultaneously, with each tour having up to 64 different points Each point can be a card reader, key switch or alarm point anywhere in the system Progress events are reported on-line, by active tours, with history reports available for reporting on past tour activity On Line Diagnostics The ASTS has a very sophisticated form of on-line diagnostics This feature allows technical support personnel at any location to access the system, virtually anywhere in the world, in order to diagnose any problems Access to the system by any technical personnel is controlled by the customer through a key protected port, which is connected via modem to a phone line One very beneficial feature of on-line diagnostics, is that the technician can literally look over the shoulder of the customer while he or she is using the system This allows the technician to identify any operator errors or training needs which the operator might have Page 6 of 12 Siemens Building Technologies, Inc

7 High Performance Operating System By using the most advanced 32 bit Operating system, the system is able to offer the user an enormous range of networking and multimedia capabilities The user can run several other applications simultaneously with the ASTS, and can network with other users Additionally, the system comes complete with facilities to access the Internet Specifications Hardware Processor Archiving Ports Interface Intel Pentium CPU with 2 parallel ports, color monitor and mouse and up to 1GB hard drive depending on capacity of system Available with floppy disk, tape drive or removable Winchester drive for archiving Up to 127 RS232 or RS422 serial ports available in groups of 4,8,16 or 32 Interfaces to almost any local or wide area network Access trace Automatic card activation/deactivation Access activity analysis Variable card formats Alarm zone latching Alarm routing Operator fails to respond alarms User defined remote control functions by time or event User definable report generator Off line device reminder reports Audit trail Windows and MS-DOS Software Options Partitioned database Multiple server control software CCTV interface software (available for most CCTV control systems) Alphanumeric alarm paging software Guard tour software Local elevator control software Configurations File Server Support Available full Hot Redundant System, or Redundant Disk configuration Up to 32 full function Pentium or 486 based workstations can be supported by each file server Host elevator control software Monitor point verification software SCIF area control software Multiple site/facility code software Standard Software Administration, event monitoring and status windows and multiple application windows open simultaneously Integrated or separated dynamic color graphic Alarm annunciation with zoom feature Siemens Building Technologies, Inc Integrated video imaging and photo badging Multiple alarm priority levels High integrity dial-up communications to field devices Global and local hard or soft antipassback or timed anti-passback Global or local alarm masking by operator or cardholder Separate visitor database and visitor control Separate visitor anti-passback Area loading software Two man control software Temporary badge access control software Biometric access control software Mantrap control software Data encryption software Automatic program eecution software Server upload software for communication with other computer systems Server remote diagnostic software Server antivirus software Redundant system software Redundant disk software Secure workplace (desktop) software Server CPU monitor software Page 7 of 12

8 Ordering Information Table 1 Standard File Server / Software Only ASTS Ultra Software ASTS Lite Software ASTS 64 Software ASTS 128 Software ASTS 500 Software ASTS 2000 Software Product Number CP-Ultra-SW CP-Lite-SW CP-64-SW CP-128-SW CP-500-SW CP-2000-SW Table 2 Standard File Server / Software and Hardware ASTS Ultra Software and Hardware ASTS Lite Software and Hardware ASTS 64 Software and Hardware ASTS 128 Software and Hardware ASTS 500 Software and Hardware ASTS 2000 Software and Hardware Product Number* CP Ultra- CP Lite- CP-64- CP-128- CP-500- CP *Refer to Table 3 to complete product number () Page 8 of 12 Siemens Building Technologies, Inc

9 Table 3 Enhancements for Complete File Servers with Hardware and Software In the bo below are the elements that make up a product number for the desired enhanced configuration Follow the directions for Boes 1 5 to develop the product number you desire Base Product Disk Drive Memory Ports Monitor (1) (2) (3) (4) (5) (1) Select a base product File Server from Table 2 above Enter Product Number in Bo 1 (2) Select the appropriate code for one of the Disk Drive options listed below Enter selected code in Bo 2 Code A B C 25 GB Standard - IDE 42 GB SCSI 80 GB SCSI (3) Select the appropriate code for one of the Additional System Memory options listed below Enter selected code in Bo 3 Code 1 Base File Server RAM 32MB 2 48-MB 3 64-MB (4) Select the appropriate code for one of the Additional Serial Ports options listed below Enter selected code in Bo 4 Code A B C D Standard File Server 8 Additional Ports 16 Additional Ports 32 Additional Ports (5) Select the appropriate code for one of the Video Monitor options listed below Enter selected code in Bo 5 Code 1 15-inch SVGA 2 17-inch SVGA EXAMPLE: Once all boes have been completed, you have a product number for the desired enhanced configuration As shown in the eample below, the number is: CP-64-A2A2 Base Product Disk Drive Memory Ports Monitor CP-64- A 2 A 2 Siemens Building Technologies, Inc Page 9 of 12

10 Table 4 Workstations Workstation Software - Standard Workstation System Completely Configured with Hardware/Software Product Number CP-WKSTN-SW CP-WKSTN-* *Refer to Table 5 to complete product number () Table 5 Enhancements for Complete Workstation with Hardware and Software In the bo below are the elements that make up a product number for the desired enhanced configuration Follow the directions for Boes 1 4 to develop the product number you desire Base Product Disk Drive Memory Monitor CP-WKSTN (1) (2) (3) (1) Select the appropriate code for one of the Disk Drive options listed below Enter selected code in Bo 1 Code A B C 25 GB Standard - IDE 42 GB SCSI 80 GB SCSI (2) Select the appropriate code for one of the Additional System Memory options listed below Enter selected code in Bo 2 Code 1 Base File Server RAM 32MB 2 48-MB (3) Select the appropriate code for one of the Video Monitor options listed below Enter selected code in Bo 3 Code A B 15-inch SVGA 17-inch SVGA EXAMPLE: Once all boes have been completed, you have a product number for the desired enhanced configuration As shown in the eample below, the number is: CP-WKSTN-A2A Base Product Disk Drive Memory Monitor CP-WKSTN- A 2 A Page 10 of 12 Siemens Building Technologies, Inc

11 Table 6 File Server Optional Software Area Loading / Two Man Control Software CCTV Preset Interface Software, Javelin, AD Vicon, Burle Note: All APOGEE Security Systems are shipped with Pelco CCTV driver installed DES Encryption Software Note: ACU2 DES Prom Chip is required Elevator Control Software Guard Tour Software Monitor Point Verification Software Multiple ASTS Server Control Software Note: A separate is required, one for each system Multiple Site / Facility Code Software Alarm Paging Interface Software Motorola Note: Motorola People Finder Base Unit required; end-user must purchase direct from Motorola Partitioned Database Software SCIF Area Control Software Server CPU Monitor Software Server Hot Redundant Software Note: A second Server, Multi-port Switcher and System Controller are required Server Remote Diagnostics Software Note: Filer Server Modem is required End-user is responsible for setting up account, all setup charges and monthly fees Server Upload Software Product Number CP-ALMC CP-CCTV CP-DES CP-ELEV CP-GARD CP-MPV CP-MSC CP-MSFC CP-PAGE CP-PSD CP-SCIF CP-SCM CP-SHR CP-SRD CP-SUP Siemens Building Technologies, Inc Page 11 of 12

12 Notice: Information in this document is based on specifications believed correct at the time of publication The right is reserved to make changes as design improvements are introduced Credits: APOGEE is a trademark of Siemens Building Technologies, Inc Copyright 1999 by Siemens Building Technologies, Inc Siemens Building Technologies, Inc 1000 Deerfield Parkway Buffalo Grove, IL Printed in the USA (origin) Page 12 of 12

C CURE 800/8000 Security Management Solution

C CURE 800/8000 Security Management Solution D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Advanced event and alarm monitoring solution provides flexible and powerful control Easily integrate with

More information

Topaz. GE Security. Intelligent software for access control. Topaz. Features

Topaz. GE Security. Intelligent software for access control. Topaz. Features GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

Corporate Overview... 3 The Pacom System... 4

Corporate Overview... 3 The Pacom System... 4 1 Table of Contents Introduction Corporate Overview................................................. 3 The Pacom System................................................... 4 Graphical Monitoring System

More information

High Performance Access Control and Integrated Security Systems

High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems EntraPass Corporate Edition is a powerful multi-user access control system

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

SiPass Software. Fire Safety & Security Products. SiPass integrated

SiPass Software. Fire Safety & Security Products. SiPass integrated SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control

More information

CMS Central Monitoring System

CMS Central Monitoring System General In This Section CMS for Windows CMS Hardware CMS Functional Spec Relational Database Monitoring Interface Communication Network CMS Central Monitoring System General CMS Central Monitoring System

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use The Johnson Controls P2000 security management system

More information

DeltaV Remote Client. DeltaV Remote Client. Introduction. DeltaV Product Data Sheet. Remote engineering and operator consoles

DeltaV Remote Client. DeltaV Remote Client. Introduction. DeltaV Product Data Sheet. Remote engineering and operator consoles January 2013 Page 1 DeltaV Remote Client Remote engineering and operator consoles View Multiple DeltaV Systems from a single workstation Remote Operator Station over low speed and dial up communications

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

Access Control Management Software

Access Control Management Software ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s

More information

C CURE 800/8000 v10.1 Security Management Solution

C CURE 800/8000 v10.1 Security Management Solution A Tyco International Company C CURE 800/8000 v10.1 Security Management Solution Features That Make a Difference: NEW! Seamlessly integrates with American Dynamics HDVR NEW! Easily create a report on personnel

More information

Section 28 16 00 Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4

Section 28 16 00 Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4 Section 28 16 00 Intrusion Detection FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4 Architectural and Engineering Specifications TECHNICAL SPECIFICATIONS DIVISION 28 ELECTRONIC

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

Healthcare Security Solutions. Building Technologies

Healthcare Security Solutions. Building Technologies Healthcare Security Solutions Building Technologies s Meeting the Challenge More than ever before, security is one of healthcare s fundamental infrastructure needs. The security requirements of a hospital,

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

EntraPass v4.0 Access Control Software

EntraPass v4.0 Access Control Software Sales Guide EntraPass v4.0 Access Control Software This newest version of EntraPass enables customers to secure their property and personnel more effectively while utilizing a host of exciting new access

More information

Alliance System Ordering Guide

Alliance System Ordering Guide Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers

More information

OfficeServ Application Suite

OfficeServ Application Suite OfficeServ Application Suite Introduction to the standard package The OfficeServ application suite consists of a number of applications designed to enhance the functionality and usability of the Samsung

More information

DATA/SPEC SHEET VIRTUAL MATRIX DISPLAY CONTROLLER VERSION 8

DATA/SPEC SHEET VIRTUAL MATRIX DISPLAY CONTROLLER VERSION 8 DATA/SPEC SHEET VIRTUAL MATRIX DISPLAY CONTROLLER VERSION 8 V920 - PRODUCT DESCRIPTION Virtual Matrix Display Controller The Virtual Matrix Display Controller (VMDC) is a selfcontained, matrix control

More information

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management

More information

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application

More information

Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide

Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Document Number: P0874391 Document Release: Standard 1.00 Date: November 1997 Year Publish FCC TM 1997 All rights reserved Printed in

More information

Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS

More information

Item Minimum Required Recommended Notes

Item Minimum Required Recommended Notes Carestream Dental strongly adheres to compliance with Microsoft Windows operating systems and hardware compatibility (HCL), which can be found at www.microsoft.com/whdc/hcl/default.mspx. Only operating

More information

DCS Data and communication server

DCS Data and communication server 8 58 PLD.TOWER PLD.RACK VISONIK DCS Data and communication server PLD.TOWER PLD.RACK Data and communication servers (DCS) are used as management stations in building automation and control (BAC). With

More information

Doors in a Network Environment

Doors in a Network Environment in a Network Environment 1.0 Purpose of this Document Doors is designed for use in stand-alone computer applications; no network functionality has been built into the program. However, with the prevalence

More information

TrueAlarm Fire Alarm Systems

TrueAlarm Fire Alarm Systems TrueAlarm Fire Alarm Systems UL, ULC, CSFM Listed; FM Approved; MEA (NYC) Acceptance* Fire Alarm System Accessories, 4190 Series PC Annunciator with Multi-Client Capability Features Fire alarm control

More information

Hardware/Software Requirements For Self-Hosting Multi Server

Hardware/Software Requirements For Self-Hosting Multi Server Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best

More information

SiloPatrol. SiloTrack Inventory Management Software Version 3.5 BULLETIN 343B. Interface With Multiple Sensor Technologies

SiloPatrol. SiloTrack Inventory Management Software Version 3.5 BULLETIN 343B. Interface With Multiple Sensor Technologies Setting The Standard For Supplier Excellence SiloPatrol SiloTrack Inventory Management Software Version 3.5 Interface With Multiple Sensor Technologies Simple Local And Remote User Access Vendor/Remote

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile Reform PDC Document Workflow Solution Streamline capture and distribution intuitive lexible mobile Reform PDC Innovation and convenience to maximize efficiency. Your organization is unique so is its document

More information

UniFireNet Facilities Monitoring System MEA GENERAL NETWORK FEATURES

UniFireNet Facilities Monitoring System MEA GENERAL NETWORK FEATURES November 16, 1999 A1-100 UniFireNet Facilities Monitoring System Section: Integrated Systems GENERAL UniFireNet is the next generation in advanced technology to monitor and control security, fire, card

More information

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 07/2015 2015 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software

More information

This page was intentionally left blank.

This page was intentionally left blank. WinDSX User s Guide b This page was intentionally left blank. DSX, Our Commitment to Service Our Commitment to service is continually demonstrated through our Training Programs and Technical Support Department.

More information

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control. Kaba Electronic Access Control Keyscan Aurora Software Guide Powering the future of access control. Keyscan Aurora Access Control Management Software Powering the future of access control For Kaba EAC,

More information

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate

More information

Tekla Structures 18 Hardware Recommendation

Tekla Structures 18 Hardware Recommendation 1 (5) Tekla Structures 18 Hardware Recommendation Recommendations for Tekla Structures workstations Tekla Structures hardware recommendations are based on the setups that have been used in testing Tekla

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

WEBs-AX Enterprise Security

WEBs-AX Enterprise Security WEBs-AX Enterprise Security SPECIFICATION DATA APPLICATIONS WEBs-AX Enterprise Security is a comprehensive access control and security management solution, built on a truly open, IP based platform. Developed

More information

Ultra Thin Client TC-401 TC-402. Users s Guide

Ultra Thin Client TC-401 TC-402. Users s Guide Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE

More information

FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS

FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS APPLICATION NOTE A monitoring system is referred to by a number of different names, a Facility Monitoring System (FMS), a Continuous Monitoring System,

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access 4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12 Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

Insight Advanced Workstation

Insight Advanced Workstation Technical Specification Sheet Document No. 149-333P25 October 29, 2015 Insight Advanced Workstation Figure 1. Insight Advanced Main Menu. The Insight Advanced Workstation transforms a personal computer

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

Configuring an APOGEE System on an IT Infrastructure White Paper

Configuring an APOGEE System on an IT Infrastructure White Paper Configuring an APOGEE System on an IT Infrastructure White Paper 149-1006 Building Technologies 149-1006, Rev. DA Copyright Notice Copyright Notice Notice Document information is subject to change without

More information

WIN-PAK. User Manual. Complete Access Control for Windows. WIN-PAK Version 1.17. TD0015 rev0102

WIN-PAK. User Manual. Complete Access Control for Windows. WIN-PAK Version 1.17. TD0015 rev0102 WIN-PAK Complete Access Control for Windows User Manual WIN-PAK Version 1.17 TD0015 rev0102 Information in this document is subject to change without notice. Companies, names and data used in examples

More information

Priority Pro v17: Hardware and Supporting Systems

Priority Pro v17: Hardware and Supporting Systems Introduction Priority Pro v17: Hardware and Supporting Systems The following provides minimal system configuration requirements for Priority with respect to three types of installations: On-premise Priority

More information

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

BlackHawk for MAC Software User Guide

BlackHawk for MAC Software User Guide BlackHawk for MAC Software User Guide Products: BLK-DH2 Series and BLK-HD Series DVRs Please read this manual before using your software, and always follow the instructions for safety and proper use. Save

More information

Section 28 16 00 Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Version 3.10

Section 28 16 00 Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Version 3.10 Section 28 16 00 Intrusion Detection FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Version 3.10 Architectural and Engineering Specifications OPTELLIOS AE Rev.090608 TECHNICAL SPECIFICATIONS

More information

Chapter 5: System Software: Operating Systems and Utility Programs

Chapter 5: System Software: Operating Systems and Utility Programs Understanding Computers Today and Tomorrow 12 th Edition Chapter 5: System Software: Operating Systems and Utility Programs Learning Objectives Understand the difference between system software and application

More information

Answering the Security Challenge

Answering the Security Challenge GE Security Answering the Security Challenge Forcefield by GE g Imagination at work Security management made easy What is Forcefield? Forcefield by GE is an innovative security management solution that

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

Support of Windows Server 2012 The NCP Secure Enterprise VPN Server supports the Windows Server 2012 (64 bit) operating system.

Support of Windows Server 2012 The NCP Secure Enterprise VPN Server supports the Windows Server 2012 (64 bit) operating system. NCP Secure Enterprise HA Server Service Release 3.03 Build 007 (Windows 32/64) Date: March 2013 1. New Features and Enhancements The following new feature has been introduced in this release: Support of

More information

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected Niagara Security Overview Niagara Security by Tridium, is an open, web-based security management solution that allows you to manage and monitor your facility anytime, anywhere. Built on Tridium s Niagara

More information

Network and Facility Management: Needs, Challenges and Solutions

Network and Facility Management: Needs, Challenges and Solutions Network and Facility Management: Needs, Challenges and Solutions Graham Jones Harris Broadcast Communications gjones04@harris.com New tools are needed to enable broadcasters to efficiently manage the modern

More information

Patriot Hardware and Systems Software Requirements

Patriot Hardware and Systems Software Requirements Patriot Hardware and Systems Software Requirements Patriot is designed and written for Microsoft Windows. As a result, it is a stable and consistent Windows application. Patriot is suitable for deployment

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE. AXIS Camera Station INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25

More information

TNT SOFTWARE White Paper Series

TNT SOFTWARE White Paper Series TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE

More information

Diamond II Troubleshooting Guide

Diamond II Troubleshooting Guide GE Security Diamond II Troubleshooting Guide P/N 460985001A ISS 07MAR10 2010 GE Security, Inc. This document may not be copied in whole or in part or otherwise reproduced without prior written consent

More information

SPECIAL SPECIFICATION 8498 Video Management Software

SPECIAL SPECIFICATION 8498 Video Management Software 2004 Specifications CSJ 0912-34-150 & 1062-05-009 SPECIAL SPECIFICATION 8498 Video Management Software 1. Description. Furnish and install video management software that provides display and control functions

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

NexSentry Manager Access Control & Security Management System

NexSentry Manager Access Control & Security Management System NexSentry Manager Access Control & Security Management System Featuring: NexSentry Manager Security Management System, version 3.0 NexSentry Star I Controllers NexSentry Star II Controllers A/E Guideform

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Alliance 8300 Administration Manual and Operation Guide

Alliance 8300 Administration Manual and Operation Guide Alliance 8300 Administration Manual and Operation Guide P/N 1068767 REV 4.0 ISS 26JUL11 Copyright Trademarks and patents Manufacturer Certification Contact information Customer support 2011 UTC Fire &

More information

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc.

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc. NDA-30141 ISSUE 1 STOCK # 200893 CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications,

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide

Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Updated: May 2008 Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 7 2. Installing the

More information

The Complete Access Control Software

The Complete Access Control Software WIN-PAK PRO The Complete Access Control Software Quick Reference Guide TD0074 rev. 0701 2 WIN-PAK PRO Quick Reference Guide Information in this document is subject to change without notice. Companies,

More information

S-SupremaConfigurationGuide-DOC 7/23/2014. Suprema Biometrics Configuration Guide ACS OnSite Aparato

S-SupremaConfigurationGuide-DOC 7/23/2014. Suprema Biometrics Configuration Guide ACS OnSite Aparato S-SupremaConfigurationGuide-DOC 7/23/2014 Suprema Biometrics Configuration Guide ACS OnSite Aparato Page 2 Suprema Configuration Guide ACS OnSite Aparato Table of Contents 1. SUPREMA BIOSTAR CONFIGURATION...

More information

Security Management System

Security Management System Security Management System High Level System Benefits Integrated Solutions For: Access Control Intrusion Detection Alarm Monitoring CCTV Integrated Badging Digital Video Surveillance & Retrieval Visitor

More information

70-271. Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version

70-271. Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration

More information

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform. 1 EXgarde PRO Based Access Management System Overview EXgarde PRO is a windows-based, fully featured access management PC software application providing flexibility and ability to tailor the software to

More information

APC Enterprise KVM Switches

APC Enterprise KVM Switches APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean

More information

Product Life Cycle Management

Product Life Cycle Management Engineering Change Control Systems (atecc) Product Life Cycle Management Enterprise information boundaries are disappearing as corporations open their networks to allow external access by manufacturing

More information

ACCESS IT! UNIVERSAL USER MANUAL

ACCESS IT! UNIVERSAL USER MANUAL ACCESS IT! UNIVERSAL USER MANUAL Welcome to Access It! Universal Thank you for choosing Access It! Universal as your access control and photo id badging solution! Access It! Universal is a 32 bit software

More information

NETWORK MANAGEMENT SOLUTIONS

NETWORK MANAGEMENT SOLUTIONS N E T S M A R T NETWORK MANAGEMENT SOLUTIONS UNIFY YOUR NETWORK As new and legacy services coexist to support a widening variety of customers, network support presents more technical challenges. This complex,

More information

The 2-Door Access Control Solution That Grows With Your Needs

The 2-Door Access Control Solution That Grows With Your Needs The 2-Door Access Control Solution That Grows With Your Needs NStar NS2 Access Control Solution Page 1 Introduction NStar NS2 2-door Access Control System The Northern NStar NS2 is a totally new access

More information

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information