Access Control Management Software

Size: px
Start display at page:

Download "Access Control Management Software"

Transcription

1 ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s latest OS - Windows 7 Professional, Enterprise & Ultimate versions Supports multiple communication modes - serial, LAN/WAN, Reverse Network & modem Has user-selectable languages - English, French & Spanish s alarms or critical messages automatically to PCs, cell phones, or pagers Has alarm summary, instructions & interactive maps for timely response Offers user-formatted transaction reports for management analysis & overview Has time-saving import & export feature for cardholder records Offers advanced CCTV integration (optional) Schedules automatic database backups with notification for protection of site records Has a Disaster Recovery utility for added safety of system data Includes context-sensitive on-line help with detailed instructions Has First Person In feature to stop unauthorized persons from gaining access to doors set on timed auto-unlock Has dual custody reader mode for enhanced security Has a Not Used Since feature to conveniently identify non-active cardholders Has an Accessibility feature with separate door monitor settings for individuals who require longer access time Includes a temporary card feature with date range and usage countdown beneficial for visitors or memberships Allows for on-going system expansion without having to purchase new software

2 K-T V CCTV Integration Module Keyscan s CCTV module - K-TV - integrates with most RS232 camera systems, with select DVRs, listed below, and IP addressable cameras. Multiple CCTV windows available with multi-monitor capability Monitor multiple video feeds and use on-screen camera commands to zero in on a subject of concern Fast retrieval of recorded CCTV images captured during a system-triggered event such as a forced entry Conveniently switch from the alarm monitoring screen to the live video screen in the click of a mouse Automate cameras to record an alarm event so security personnel see what s happening and where it s happening Combined with Keyscan s optional K-BADGE module, compare a cardholder s on-file image to a live video image at any reader controlled access point that is equipped with a CCTV camera Supported DVRs Keyscan (K-DVR & DVR2-2TB, KDVR2-4TB), Bosch ***, Dedicated Micros (Net Vu), Exacq, Honeywell (Fusion), Integral ***, Open Eye ***, Pelco (DX8000, DX8100 and Endura), and Toshiba (Surveillix) digital video recorders. *** Limited model support. Contact Keyscan for details.

3 K-DSC DSC Power Series and Maxsys Intrusion Panel Integration (System VII software module) * Observe and control your entire access and intrusion systems through one integrated software package. Add, delete, and modify individual s DSC passcodes*, all through System VII. Active logging of all DSC panel activity, arming, disarming, alarm conditions and much more. Run reports on the entire building system, including all access activity and DSC panel activity. Provides real-time display of DSC system, zone and partition status. Present 3 defined readers provide control of system or partition arming and disarming based on user defined permissions enforced by the System VII software. Generates notification if a user defined DSC event is triggered. This ensures that management is the first to know of a system breach of any kind. Map DSC partitions on the Keyscan Active Map for true real-time system wide at a glance monitoring. * Power series only

4 K-DSC DSC Power Series and Maxsys Intrusion Panel Integration (System VII software module) FEATURES AND BENEFITS User gains control of their DSC intrusion panel by permitting administrators to quickly update employee pins.* Monitoring the entire building system from access control to intrusion all from one software package provides unprecedented versatility and convenience. Comprehensive DSC event recording within the Keyscan database allows for in-depth user defined report generation provides the necessary information to solve any access control or intrusion related investigation. * Power series only APPLICATION KEYSCAN ALARM INTEGRATION DSC PC4401 for Maxsys integration DSC IT-100 for Power Series Integration SPECIFICATIONS DSC IT-100 / PC4401 (available through your DSC hardware supplier) Powered via DSC Keybus Connectivity to Keyscan RS232 TCP/IP with NETCOM2 (optional) * Required Software Module: K-DSC Keyscan Panel Requirements: Panel(s) Hardware: Control Board Revision 11 or higher Panel(s) Firmware: System EPROM 7.70/8.50 or higher *See NETCOM2 for wiring and power supply requirements **Important Note: The K-DSC software module requires the DSC IT-100 for Power Series integration or the PC4401 for Maxsys integration. Keyscan panels must meet minimum hardware and firmware requirements. Please consult the K-DSC Setup Guide for further configuration details. KEYSCAN INC. 901 Burns Street East, Whitby, Ontario L1N 6A6 Phone: Toll Free: Fax: Keyscan Inc. reserves the right to alter designs and specifications without notice or obligation Rev.:

5 K-WEB System VII -WEB Access Provides login and password authenticated; Main Screen Card holder management Report Generation Web Report Screen System Status & Alarm Review Card Holder Edit Screen

6 K-WEB System VII -WEB Access FEATURES & BENEFITS APPLICATIONS System VII - WEB Access Enabled (K-WEB) System VII Client/Comms/Database Onsite System VII application for local system administration and maintenance. *Unlimited number of panels and readers. Various communication options are available. This diagram depicts TCP/IP connectivity. LAN/WAN WEB SPECIFICATIONS ** A web server running.net Framework 3.5 is required. Web server r hardware specifications vary based on load expectations. ContactKeyscan for details. Supported Computer Hardware Remote PC/Laptop Accessing K-WEB site Supported Operating Systems (32 bit) Supported Client Browser Software Available Part Numbers KEYSCAN INC. Rev.: 06.08

7 K-BADGE Photo Badging & Verification Module Keyscan s Photo Badging & Verification module integrates with System VII for a streamlined badging operation and offers the added benefit of greater security. Photo Badging Has a full suite of drawing tools and graphic import feature for logos, backgrounds, and images Supports and prints a variety of industry-standard barcode types Creates unlimited template designs to distinguish departments or areas of authorization Share cardholder images with other departments such as human resources Susan Ambrose 4 - Administration Keyscan Inc. 901 Burns Ave. E., Whitby, ON L1N 6A6 Photo Verification Displays cardholder image and transaction details immediately following site activity Compare on-screen image to actual cardholder Has an Always On Top setting for constant monitoring of photo verification window even if other programs are open Ideal for monitoring main access points where security is critical

8 K-CM Security Command Module Keyscan s Security Command Module - the multi-faceted, dedicated monitoring application designed to let security personnel carry out their tasks systematically and efficiently. Fully integrates with Keyscan System VII Displays an image of active cardholders at each site with the show photos feature Control and view floor plans on the system monitor Trigger dynamic floor plans to open instantly with a flashing icon pinpointing the location of the tripped alarm Formats security tours using door readers or inputs with timed intervals between each point in the itinerary Summarizes the results of all security tours for historical records and management audits Create Active Maps enunciated in real-time; door status, alarm points, input status and more Manually lock / unlock doors or arm / disarm alarm points Click on camera icons to open live video feeds

9 K-VIS Visitor Management Module Keyscan s Visitor Management has distinct advantages when it comes to registering and monitoring visitors. Shows all visits scheduled for current date Schedules visits in advance and tracks visit status - expected, delayed, arrived, and departed Retains a complete history of all visits Has a wide array of report capabilities including all visitors currently on site Interfaces with Keyscan s business card scanner (P/N BIZSCAN) for quickly adding new visitor records Includes Keyscan s Photo Badge Template Editor for designing visitor badge templates and parking permits Formatted for self-adhesive labels x 3.5, 1 per 4 x 6 sheet such as Avery #2941 for printing visitor ID badges Assigns visitor s access cards for independent but regulated and monitored access at reader-controlled doors Maintains individual visitor files with user-defined fields for basic or detailed records Populates contact information directly from MS Outlook VISITOR Sienna Carr Sample Visitor Badge

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control. Kaba Electronic Access Control Keyscan Aurora Software Guide Powering the future of access control. Keyscan Aurora Access Control Management Software Powering the future of access control For Kaba EAC,

More information

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25

More information

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25

More information

CENTRALLY MANAGED. Access Control

CENTRALLY MANAGED. Access Control CENTRALLY MANAGED Access Control Keyscan Introduces a whole new way to think about access Control 2 KEYSCAN Centrally managed solutions Keyscan s Centrally Managed Access Control Solution (CMAC) has revolutionized

More information

System VII User Guide v7.0.21

System VII User Guide v7.0.21 System VII User Guide v7.0.21 Table of Contents Keyscan System VII... 1 Press F1 for Help... 1 Introduction... 2 What is Access Control... 2 Access Control Features and Components... 2 System VII Requirements...

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control

More information

KEYSCAN SOFTWARE - END-USER LICENSE AGREEMENT

KEYSCAN SOFTWARE - END-USER LICENSE AGREEMENT Keyscan Inc. KEYSCAN SOFTWARE - END-USER LICENSE AGREEMENT IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single legal entity)

More information

SPECIAL SPECIFICATION 8498 Video Management Software

SPECIAL SPECIFICATION 8498 Video Management Software 2004 Specifications CSJ 0912-34-150 & 1062-05-009 SPECIAL SPECIFICATION 8498 Video Management Software 1. Description. Furnish and install video management software that provides display and control functions

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display... Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5

More information

800-02577-TC 3/10 Rev. A

800-02577-TC 3/10 Rev. A 800-02577-TC 3/10 Rev. A Total Connect Online Help Guide TRADEMARKS Honeywell is a registered trademark of Honeywell International Inc. Windows and Windows Vista are trademarks, or registered trademarks

More information

Access control designed simply for you

Access control designed simply for you TruPortal Access control designed simply for you QUICK START GUIDE Introduction TruPortal access control solutions have been engineered and designed to install quickly and easily right out of the box.

More information

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed

More information

Doors.NET Access Control Software. Data Sheet. email: [email protected] web: www.kerisys.com

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application

More information

Apps for Android. Apps for iphone & ipad INS584-3

Apps for Android. Apps for iphone & ipad INS584-3 Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,

More information

P2000 SECURITY management SYSTEM. More control means more freedom

P2000 SECURITY management SYSTEM. More control means more freedom P2000 SECURITY management SYSTEM More control means more freedom More freedom to achieve More freedom to reduce costs How can you keep people safe and productive, while reducing costs and staying compliant

More information

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform. 1 EXgarde PRO Based Access Management System Overview EXgarde PRO is a windows-based, fully featured access management PC software application providing flexibility and ability to tailor the software to

More information

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management P2000 SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use The Johnson Controls P2000 security management system

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

Gallagher System Integrations

Gallagher System Integrations Gallagher System Integrations Gallagher Command Centre supports integrations with a range of third party security products, using Gallagher developed interface software and industry standard protocols.

More information

C CURE 800/8000 Security Management Solution

C CURE 800/8000 Security Management Solution D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Advanced event and alarm monitoring solution provides flexible and powerful control Easily integrate with

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

Doors in a Network Environment

Doors in a Network Environment in a Network Environment 1.0 Purpose of this Document Doors is designed for use in stand-alone computer applications; no network functionality has been built into the program. However, with the prevalence

More information

Operation Guide. Systems Integration Software

Operation Guide. Systems Integration Software Operation Guide Systems Integration Software Trademarks Microsoft, Windows, Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

More information

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL Integra32 Integrated Alarm Monitoring and Access Control USER MANUAL C o p y r i g h t N o t i c e Copyright 1995 2010 by All rights reserved Worldwide. Printed in Canada. This publication has been provided

More information

BabyWare Imperial PC Software

BabyWare Imperial PC Software Overview (see page 1) Things You Should Know (see page 1) Getting Started (see page 2) Licenses and Registration (see page 6) Usernames Passwords and Login (see page 7) BabyWare Imperial PC Software Overview

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

EntraPass v4.0 Access Control Software

EntraPass v4.0 Access Control Software Sales Guide EntraPass v4.0 Access Control Software This newest version of EntraPass enables customers to secure their property and personnel more effectively while utilizing a host of exciting new access

More information

Answering the Security Challenge

Answering the Security Challenge GE Security Answering the Security Challenge Forcefield by GE g Imagination at work Security management made easy What is Forcefield? Forcefield by GE is an innovative security management solution that

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

OnGuard Online User Guide

OnGuard Online User Guide OnGuard Online User Guide T81165/Rev ER-7991-40 Jan 2005 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones

More information

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,

More information

LobbyWorks VMS Configuration and Technical Requirement Survey

LobbyWorks VMS Configuration and Technical Requirement Survey LobbyWorks VMS Configuration and Technical Requirement Survey Initial Date Completed: Revised Date: Sales Person: Name Office Phone: Email Address Title: Mobile Phone: Customer Contact: Name: IT Person:

More information

IP Access Control Management System

IP Access Control Management System 04 BioStar IP Access Control Management System BioStar is a comprehensive access control management software featuring efficient TCP/IP based system architecture with intelligent IP readers. It supports

More information

Access control that easily integrates into the modern world

Access control that easily integrates into the modern world Access control that easily integrates into the modern world TruPortal 1.5 delivers user-friendly operation while expanding features and functionality to meet more application needs TruPortal 1.5 Effective,

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

WEBs-AX Enterprise Security

WEBs-AX Enterprise Security WEBs-AX Enterprise Security SPECIFICATION DATA APPLICATIONS WEBs-AX Enterprise Security is a comprehensive access control and security management solution, built on a truly open, IP based platform. Developed

More information

CENTAUR. Access Control Software Version 4.2 REFERENCE MANUAL

CENTAUR. Access Control Software Version 4.2 REFERENCE MANUAL CENTAUR Access Control Software Version 4.2 REFERENCE MANUAL Copyright (C) 2006-2008 CDVI Americas LTD. All rights reserved. Centaur access control system software is protected by copyright law and international

More information

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate

More information

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility Surveillance and Security for Casinos Cost-Effective Solutions for Any Size Facility Honeywell Security Technologies Honeywell s video systems protect many of the world s casino properties. But did you

More information

Cogito Security Management System

Cogito Security Management System Cogito Security Management System Unified Security Platform Enterprise Security Management Solution Flexible, Powerful and Scalable Averics systems are designed with flexibility, power, and scalability

More information

Access Easy Controller 2.1

Access Easy Controller 2.1 Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 readers expandable to 32 readers Supports up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access groups

More information

Alliance 8300 Administration Manual and Operation Guide

Alliance 8300 Administration Manual and Operation Guide Alliance 8300 Administration Manual and Operation Guide P/N 1068767 REV 4.0 ISS 26JUL11 Copyright Trademarks and patents Manufacturer Certification Contact information Customer support 2011 UTC Fire &

More information

Ademco Vista Alarm Panel

Ademco Vista Alarm Panel System Galaxy Quick Guide CONFIGURATION AND OPERATION Ademco Vista Alarm Panel SG 10 APR 2011 System Galaxy Quick Guide For Ademco Vista Panel Configuration & Operation Information in this document is

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

Chapter 4 Control Center

Chapter 4 Control Center Chapter 4 Control Center Control Center is a central monitoring station solution (CMS) that provides the CMS operator with these major features: Access to client DVRs (See Remote DVR) Access to remote

More information

Remote Client Program... 3. Web Client... 39

Remote Client Program... 3. Web Client... 39 Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group

More information

Why Use ThinManager to Manage Thin Clients? White Paper. For more information, please visit: www.thinmanager.com

Why Use ThinManager to Manage Thin Clients? White Paper. For more information, please visit: www.thinmanager.com Why Use ThinManager to Manage Thin Clients? Table of Contents Terminal Services... 1 Terminal Server Relationship... 1 Centralized Computing Benefit... 1 Managing All The Pieces... 2 Centralized Client

More information

Remote Managed Services

Remote Managed Services Remote Managed Services A Model for Growth and Efficiency in Security IFSEC 2011 Honeywell at a Glance $38B Fortune 100 company with a 120-year legacy of innovation 120,000 employees in 100 countries World-class

More information

Next Generation Web-Based Time & Attendance

Next Generation Web-Based Time & Attendance Next Generation Web-Based Time & Attendance PerfectTIME Take control of labor costs and workforce management Streamline PerfectTIME is an intuitive, convenient and efficient web-based time and attendance

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Topaz. GE Security. Intelligent software for access control. Topaz. Features

Topaz. GE Security. Intelligent software for access control. Topaz. Features GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security

More information

SoMac 2.2 User Manual (Access Control)

SoMac 2.2 User Manual (Access Control) SoMac 2.2 User Manual (Access Control) Document revision date: June/7th/2013 Based on firmware version SoMac 2.2.1.28 Content SoMac introduction... 1 Installation and Un-installation... 1 SoMac Function

More information

AS-525. AxTrax Access Control Management Software. Software Manual

AS-525. AxTrax Access Control Management Software. Software Manual AS-525 AxTrax Access Control Management Software Software Manual August 2010 Table of Contents Table of Contents 1. Introduction... 5 1.1 System Features... 5 1.1.1. Access Control... 6 1.1.2. Access

More information

S-IA-PRO Intelli-M Access Professional V4.0

S-IA-PRO Intelli-M Access Professional V4.0 S-IA-PRO Intelli-M Access Professional V4.0 An Addendum to the Intelli-M Access V4.0 User Guide For SKU: S-IA-PRO ACCESS Professional PLEASE READ THIS MANUAL BEFORE USING YOUR INTELLI-M ACCESS PROFESSIONAL

More information

Partizan Access Control Management User Manual. Version 2.0.0, 14 August 2015

Partizan Access Control Management User Manual. Version 2.0.0, 14 August 2015 Partizan Access Control Management User Manual Version 2.0.0, 14 August 2015 Abstract This document is the Software User Manual (SUM) for the Partizan Access Control Management project and was made according

More information

Legacy (RedCloud) Security Management Software 4.2 Release Notes

Legacy (RedCloud) Security Management Software 4.2 Release Notes Legacy (RedCloud) Security Management Software 4.2 Release Notes --------------------------------------------------------------------------------------------------------------------- --------- General

More information

Serenity s Web & Mobile Remote Access Concept

Serenity s Web & Mobile Remote Access Concept Serenity s Web & Mobile Remote Access Concept Communication Concept INSTALLATION Panel first connection Panel first connection The Serenity is supplied with unique serial number and Mac Address (factory

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

Access Control. Granta Security Management Systems you can count on. Answers for infrastructure. 1. Answers for infrastructure.

Access Control. Granta Security Management Systems you can count on. Answers for infrastructure. 1. Answers for infrastructure. Access Control Granta Security Management Systems you can count on Answers for infrastructure. Answers for infrastructure. 1 Granta: tried, tested and true In order to efficiently run any organisation

More information

Short Manual Intellect v.4.7.6 SP2 module Unipos Contents:

Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: 1. Software Installation... 2 2. Hardware Configuration... 12 3. System Dispatching... 14 3.1. Create dispatching objects... 14 3.2. Graphical

More information

Access Control Software Manual

Access Control Software Manual CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11

More information

SiPass Software. Fire Safety & Security Products. SiPass integrated

SiPass Software. Fire Safety & Security Products. SiPass integrated SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control

More information

Integrated security management platform for Windows. Seamless. Effective. Efficient.

Integrated security management platform for Windows. Seamless. Effective. Efficient. Integrated security management platform for Windows Seamless. Effective. Efficient. We have 70% security personnel turnover in a year. How can we effectively train them on multiple applications when each

More information

Rapid Eye. System Administrator Guide. Multi-Media Digital Video Recorder. Document 800-02953V4 Rev A 03/10

Rapid Eye. System Administrator Guide. Multi-Media Digital Video Recorder. Document 800-02953V4 Rev A 03/10 Rapid Eye Multi-Media Digital Video Recorder System Administrator Guide Document 800-02953V4 Rev A 03/10 System Administrator Guide Revisions Issue Date Revisions A 01/09 New preliminary document based

More information

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems ViewPower User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. ViewPower Overview... 2 1.1. Introduction...2 1.2. Structure...2 1.3. Applications...2 1.4. Features...2

More information

Flexible access control for all enterprises Building access and workforce management

Flexible access control for all enterprises Building access and workforce management Flexible access control for all enterprises Building access and workforce management Kaba have for over 100 years been providing solutions of quality from simple locking systems to complex electronic access

More information

Config software for D2 systems USER S MANUAL

Config software for D2 systems USER S MANUAL DT-CONFIG SOFTWARE Config software for D2 systems USER S MANUAL CONTENTS 1. Introductions ------------------------------------------------------------------- 3 2. System Requirement and Connection ----------------------------------------

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch - Milestone Certified Solution Summary document 1 Table of Contents Products Tested

More information

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07 ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall

More information

Similar to basic pricing, usage cost is added in specified time intervals. Example: Each 15 minutes, add $1.00. Overtime option is optional.

Similar to basic pricing, usage cost is added in specified time intervals. Example: Each 15 minutes, add $1.00. Overtime option is optional. World Leading Internet Cafe Software and WiFi HotSpot Billing Software Security Restrict access to Ctrl+Alt+Del and other system keys, local drives, Internet Explorer settings, Control Panel, and ANY window

More information

TracKing. A complete web-enabled temperature management system.

TracKing. A complete web-enabled temperature management system. TracKing A complete web-enabled temperature management system. Wireless communications for improved asset utilization and fleet efficiency. T hermo King is proud to offer a new mobile communications system

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

Food Industry. www.ats global.com

Food Industry. www.ats global.com Food Industry Significantly reduces scrap and rework cost Image driven inspection Web based analysis and reporting Eliminates paper checklists Real-time attribute data collection Easy-to-use operator interface

More information

CMS Central Monitoring System

CMS Central Monitoring System General In This Section CMS for Windows CMS Hardware CMS Functional Spec Relational Database Monitoring Interface Communication Network CMS Central Monitoring System General CMS Central Monitoring System

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

Easy Data Centralization with Webster. User Guide

Easy Data Centralization with Webster. User Guide Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

How to Configure Outlook 2010 E-mail Client for Exchange

How to Configure Outlook 2010 E-mail Client for Exchange LAUSD IT Help Desk How to Configure Outlook 2010 E-mail Client for Exchange (03/04/2012) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Table of Contents Configure Outlook 2010 for

More information

INSTALLATION GUIDE. Trimble AutoBid Mechanical Software

INSTALLATION GUIDE. Trimble AutoBid Mechanical Software INSTALLATION GUIDE Trimble AutoBid Mechanical Software Revision A April 2014 F Englewood Office Trimble Navigation Limited 116 Inverness Drive East, Suite 210 Englewood, Colorado 80112 (800) 234-3758 Copyright

More information

DIGIMobile V2 User Manual

DIGIMobile V2 User Manual DIGIMobile V2 User Manual Information in this document is subject to change without notice. 2014 Copyright, DIGIEVER Corporation. All rights reserve 1 Table of Contents CHAPTER1. OVERVIEW... 1 CHAPTER2.

More information

SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM

SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network-enabled access control system for security management, including engineering,

More information

Corporate Overview... 3 The Pacom System... 4

Corporate Overview... 3 The Pacom System... 4 1 Table of Contents Introduction Corporate Overview................................................. 3 The Pacom System................................................... 4 Graphical Monitoring System

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Kramer Electronics, Ltd. Site-CTRL and Web Access Online User Guide (Documentation Revision 2)

Kramer Electronics, Ltd. Site-CTRL and Web Access Online User Guide (Documentation Revision 2) Kramer Electronics, Ltd. Site-CTRL and Web Access Online User Guide (Documentation Revision 2) Software Version 1.9. 2902 To check that you have the latest version, go to the DOWNLOADS section of our Web

More information

Access control. SiPass integrated The perfect balance between security and accessibility

Access control. SiPass integrated The perfect balance between security and accessibility Access control SiPass integrated The perfect balance between security and accessibility Building Technologies 1 SiPass integrated: Freedom of movement in a secure environment SiPass integrated is an extremely

More information