Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
|
|
|
- Louisa Ray
- 10 years ago
- Views:
Transcription
1 Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled. This is true for video cameras, access control systems, perimeter security, and other key system components. This white paper explains how IP video camera systems from IVC and IP access control systems from ISONAS can be integrated to provide a more automated and complete solution. The intended audience for the executive summary of this white paper is the information technology manager or facility security manager. For the detailed discussion, the intended audience is the network or security engineer responsible for facility security and personnel access control. The integration between an IVC camera system and ISONAS access control system is designed to automate the recording of facility access by authorized and unauthorized personnel and record causes of tampering or fault alarms initiated by the access control system. Executive Summary Heightened security concerns at critical and remote facilities have created a need for more secure access control to these locations. Traditional gate and access control systems are no longer sufficient. Users now want video confirmation and event recording at these facility access points. Video confirmation adds a higher level of security and ensures that only authorized personnel are using the premises. It also provides the advantage of registering and viewing unauthorized access attempts. IVC s video surveillance systems are comprised of cameras and camera management software. The primary functions of IVC s camera management software include the following: Provide single IP address access to large network of cameras. Provide web-based GUI for users to view video, control cameras, initiate recording, and playback recorded video. Serve video from the camera network to View Station or 3 rd party clients. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -1- Provide a means for creating unlimited user-defined, multi-up, multi-monitor displays. Automate camera and system functions through the use of schedules. Manage alarms from cameras and other devices on the network. IVC s software-based video surveillance systems provide tools for easy integration of IP-enabled security components. IVC s View Station Alarm Server provides the
2 mechanism for this integration. A true server application, the Alarm Server sits on the user s network and listens for alarms of varying types and from any source. IVC has recently modified its Alarm Server to recognize alarms from the ISONAS IP-based access control system. ISONAS IP Door Reader-Controllers connect direct to the same network to which the camera system is connected. The panel-free system, featuring ISONAS Crystal Matrix Software, places real-time control of enrollment, access, time & attendance and emergency response, in the hands of an authorized security administrator. ISONAS PowerNet IP Readers are true network devices designed using IP standards and technology. Once installed, the reader-controllers use TCP/IP to open a dialogue with the ISONAS Crystal Matrix Software and respond to specific preprogrammed commands and parameters. Alarm messages from the ISONAS system are initiated when the system determines the occurrence of an authorized or unauthorized access event or tampering of the card reader or keypad. Once an ISONAS alarm message is detected by the View Station Alarm Server and the alarm source and type is identified, any number of responses can be automatically initiated. These could include: Log the alarm for presentation in the View Station GUI Archive the alarm in an SQL database Present a visual cue to the security operator If PTZ camera at or near alarm source location, move and/or zoom camera Save video recording of activity at alarm source location Issue notification to other parties (security personnel, first responders, etc) Issue commands to access control system (enable or disable access) Issue commands to other devices or software connected to the network Key advantages of a fully integrated, IP-based video and access control system include: Cost - Since an IP-based approach relies more on software and less on highcost proprietary hardware, the installation costs per reader and per camera are significantly less than traditional analog approaches. Customers can realize additional cost savings by using existing network cabling and/or, where possible, power readers and cameras using Power over Ethernet technology. No specialized hardware is needed for storage of events and video; standard network-addressable storage is sufficient further reducing the cost of ownership. Since it is possible to remotely configure and troubleshoot these systems, installation and maintenance costs are also greatly reduced. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -2- Ease of installation and maintenance - The physical installation of readers and cameras on a network is not much more complicated than installing a network printer. ISONAS and IVC systems are essentially software-based systems. Installation and
3 configuration, addition of new or custom features, system upgrades, and troubleshooting either by the customer or the vendor can be easily accomplished remotely. Factory-assisted installation and support ensures speedy installation and greater system up-time. Operational Responsibilities The network engineer responsible for managing devices on the security network must do some configuration work when the IVC Relay Server software, IVC View Station software, and ISONAS Crystal Matrix software are installed in the enterprise. The network engineer will also have to oversee the installation of cameras, readers, switches, midspans, and other network appliances required for a functional system The facilities engineer or an electrician will be required to install camera and card reader hardware. The operation of the system is transparent to end-users, who simply supply their standard access credentials to obtain entry or exit from the facility. System responses to authorized or unauthorized entry are fully programmable and will vary from application to application. However, in most cases, these are likely to be automatic and require little or no intervention by security personnel. View Station will have to be set up to present the operator necessary views and direction to react to specific events. Security and executive management will need to develop policies and procedures incorporating the tools provided by this solution in order to provide required levels of security. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -3-
4 ISONAS IP Access Control System All ISONAS IP Door Reader-Controllers connect directly to the data network via existing LAN wiring. This panel-free system, featuring ISONAS Crystal Matrix Software, places real-time control of enrollment, access, time & attendance and emergency response, in the hands of authorized security administrators. ISONAS PowerNet IP Readers are true network devices designed using IP standards and technology. Once installed, the reader-controllers use TCP/IP to open a dialogue with the ISONAS Crystal Matrix Software and await specific commands and parameters. This plug and play configuration is easier to install than traditional panel-based systems. The streamlining of installation, maintenance and integration results in significant cost-savings. The ISONAS Crystal Matrix software package is a fully featured Access Control software system. It provides fine-detailed level control of all access security related issues. Reports are available for all system activity, as well as real time reporting on who is currently in the facility. Real-time monitoring of the system s activity includes the display of card holder images and floor plans, as well as Operator Override operations such as lock-downs and manual door operations. The system also supports display of configurable alarm conditions. The Crystal Matrix Software can initiate automatic actions, such as the scheduled unlocking and locking of doors, through its scheduling features, or the execution of userconfigurable custom action-sets through its scripting features. When installing the software, the user has the option of installing several components. For integration with the IVC video management system, the following Crystal Matrix Software components must be installed: Crystal Access Administrator This is the administrative application (ISONAS.exe). It provides all of the facilities used to define the system and how it should operate, including the definition of people, assignment of badges, definition of doors and shifts and definition of permissions. It is only necessary for this program to be run when defining or revising this information. If the access control system is installed on a computer which is connected to a network, there can be many different computers in the network that are used from time to time to update the database that defines the system and how it operates. Crystal Access Monitor This is the Monitor and Operations application (crystal.exe). It displays the current state and ongoing activity of the door controllers. If operations are enabled, it will allow the operator to manually unlatch a door, LOCK or UNLOCK a door, clear ALARMS or remove people from the IN list which is used to prevent Passback of badges so that multiple entries to the facility can be done with the same badge credential. It is not necessary for the Monitor and Operations program to be running for the access control IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -4-
5 system to be operating. In a network installation, there may be many copies of the Crystal.exe program running at the same time. Controller Supervisor The Controller Supervisor (CSUP) program is the application that is actively communicating with the door controllers. In a complex system there may be multiple servers defined, and each server may have multiple connections. There must be one copy of the CUSP running for each different server in the system. If the CUSP is not running, the controllers attached to it will drop into standalone mode and make decisions locally about whether or not to allow access for a given badge. Interfaces INRServ (ISONAS Notification Request Server) The INRServ program provides easy access to ISONAS supported interfaces including SNMP, ISOAscii, and TCP/IP as well as a testing environment for IADI. The INRServ creates and sends reader alarm messages via TCP/IP onto the network. As the diagram below illustrates, the IVC Alarm Server will read and parse these messages to determine the source of the alarm and then initiate programmed responses specific to the alarm type and source. Responses may include commands to the IVC camera management software or to other device or software on the network. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -5- Fig. 1
6 IVC Camera Management System IVC s integrated video management solution incorporates IVC s Relay Server, Alarm Server, Tour Server, and View Station software products. IVC s Relay Server software is the central component of this state-of-the-art software suite. The IVC system architecture is built on modularized component services that provide an extendable platform for building sophisticated features and functionalities: Core Services: Integration Components: Interface for Viewing: Relay Server, Tour Server, and Alarm Server ivc_ax, IVC Player, URL API View Station These software components work seamlessly together to become a complete, coherent solution or an extensible part of an integrated solution. IVC software is a standards-based, state-of-the-art solution for surveillance-related applications. The system architecture is built on modularized component services that provide an extensible platform for building sophisticated features and functionalities. The Relay Server, Tour Server and Alarm Server provide the core services. The ivc_ax and IVC Player components allow easy integration of video surveillance applications. At the heart of the IVC Camera Management Software Suite is the core service, Relay Server. The IVC Relay Server is a scalable and complete camera management solution. Because of its standard browser interface, the surveillance experience begins from a standard web browser such as Microsoft s Internet Explorer. All of the camera video and controls are unified under the Relay Server software. A comprehensive HTTP URL API provides the View Station client program, third party software and other system devices access to the cameras. The supported digital media for the audio and video is also standards-based. For video media, M-JPEG, MPEG4, and H.264 are supported. Additional functions of the Relay Server software include: Video storage management Video network bandwidth management User authentication Regardless of the complexity of the surveillance system, the solution is powerful but also easy to implement and use. Any TCP/IP network backbone is sufficient for wired and/or wireless installations. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -6- Any LAN, WAN and VPN client that have proper access rights can perform live monitoring and control. Multiple streams can be accessed simultaneously from the
7 View Station, browsers and third party software. The live media is delivered as soon as it is captured, and stored media is available for instant playback. The IVC Relay Server camera management software is designed to be scalable to grow along with the number of cameras on the network. Multiple servers can be deployed as peers to distribute the load, or they can be arranged in a hierarchy with server-to-server functionality. One to hundreds of cameras can easily be managed anywhere on the network from a simple web browser and/or a feature-rich client application. Figure 2 illustrates how a distributed video network may be deployed using IVC software. IVC View Station Software Fig. 2 IVC s View Station software component is a full-feature front-end for the IVC camera system. It will allow any single View Station location to manage and view 100s of cameras as if they were on a single physical Relay Server. Any system camera can be accessed through the View Station s intuitive user interface. View Station is a client program that presents video and data from potentially multiple instances of Relay Server, Tour Server and Alarm Server to customizable displays. View Station s customizable layout feature permits the tailoring of displays to meet the special requirements of the site. Live video, camera control, playback, custom command buttons, tour statuses, and alarm notification windows can be mixed and matched in any combination to give a bulls-eye view of the monitoring operation. Multiple views can be running simultaneously and multiple screens are supported. Live video feeds can be displayed full screen or rotating through multiple-feed scans. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -7-
8 For alarm handling, the View Station software integrates seamlessly with the Alarm Server component (described below). Audible and visual alerts are provided to the corresponding camera video window to alert the operator to the alarm condition. Video relating to the alarm event can be instantly replayed. All of these rich features make the IVC surveillance solution complete and coherent. Alarm Server Component The core service, Alarm Server, is a flexible software component designed to react to a variety input triggers and generate output events to pre-defined destinations. As Figure 3 indicates, input trigger sources may include, but are not limited to, camera in-video motion detection, intelligent video object detection, access control devices, discrete sensors, and process monitoring. The drawing also shows that the Alarm Server offers similar flexibility in response definition. Alarm Sources Alarm Responses Fig. 3 As designed, the Alarm Server acts as an integration tool, providing the means to integrate other security or system components with the video system. It is this mechanism that is used to integrate ISONAS access control systems with an IVC video system. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -8-
9 Integration of ISONAS and IVC systems To facilitate integration of ISONAS IP access control systems and IVC video systems, IVC has added specific support of the ISONAS system to its Alarm Server. Fig. 4 Using dialogs designed for the ISONAS system, users identify the IP address and port number of the ISONAS Notification Request Server (INRServ) connected to the reader for which the user wishes to create an alarm and corresponding response definitions. Once the IVC Alarm Server is aware of an INRServ, the user may then create specific reader alarms. In general, to specify an alarm from specific reader, the user must: 1. Name the alarm 2. Indentify the alarm source 3. Specify alarm responses IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -9- Fig. 5
10 It is important to note that the IVC alarm system provides the ability to generate multiple alarm types for each reader. To simplify the interface, IVC grouped all possible alarms generated by an ISONAS reader into one of five categories. As shown in Figure 6, the user chooses one of these categories in step 2 of the alarm definition process. Fig.6 The chart below lists how the ISONAS event conditions are mapped to these groups. ISONAS Event Notification IVC Access Control Event Trigger REJECT Deny ADMIT Grant UNAUTHORIZED OPEN Malfunction TAMPER Tamper AUX REX EXTENDED OPEN CONTROLLER FAILURE Malfunction LOCKDOWN UNLOCKED NORMAL RESET REJECT PASSBACK Deny REJECT EXPIRED Deny REJECT OVER LIMIT Deny REJECT TAMPER Deny OPERATIONS ADMIT OPENED Grant CLOSED CLEAR ALARM IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -10- LOCAL RESET ARM DUAL AUTHORIZATION INPUT POINT TRUE INPUT POINT FALSE OUTPUT POINT TRUE OUTPUT POINT FALSE
11 Given that the complete system is IP-based, alarm responses are not limited to camera operations. In addition to moving cameras and recording video, an alarm response may include one or more of the following: Log the alarm so it is listed in the Alarm Log window in a View Station screen Provide an audio cue to the operator Provide a visual cue to the operator o Automatically change operators monitor view (e.g. switch to full screen view of associated camera video) o Blink border of related camera video window o Actuate discreet visual device, such as a warning light Change the viewing frame rate of all live video windows within the current view Execute commands for one or more of the following: o Commands to the IVC Relay Server to control cameras, initiate recording o Alarm Server commands to enable/disable alarms o URL commands to other devices and software on the network, such as the ISONAS reader o Windows commands o Special commands added by IVC to support custom applications Notify other Alarm Servers running on the network Save the Alarm in a database Send an notification The IVC Alarm Server is architected in such a way that it is relatively easy to add support for other alarm protocols and to add component specific response capabilities. A typical response to an access control alarm generated by an ISONAS reader might be to log the alarm, unlock the door or lift the gate, move the camera, and record the person causing the alarm. The IVC Alarm Server certainly provides the capability to generate this type of response. However, as illustrated above, the response to this alarm can be much more. For most benign alarms, such as authorized entry, no other response may be required. For an attempted unauthorized access or tampering alarm, however, the user may want to include additional response activities, such as alerting security personnel or off-property authorities. IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -11-
12 Conclusion In the Executive summary of this paper, the advantages of an IP-based system, such as the one described here, were enumerated. These advantages can apply to almost any IP-based system. Clearly the trend in the security products market is moving to IP. However, at some point, someone has to make all the various components required for a comprehensive security system work together. IVC and ISONAS have worked independently to engineer high-quality products with open, well-documented interfaces. These companies have also cooperated to add features and interfaces to their products, making it easier for customers to install these distinct systems and build highly integrated, cohesive security systems. For customers that require access control with video surveillance, the solution described here will provide users a system that is highly cost-effective and easy to use, maintain, and expand. For more information contact: Industrial Video & Control [email protected] ISONAS 800/ [email protected] IVCWhitepaper ISONASAccessControlIntegratedwithIVCVideoSurveillanceSystems -12-
Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform
Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
IP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
Communications Management within Your Security Platform
WHITE PAPER Communications Management within Your Security Platform Innovative Solutions Executive Summary In the physical security and public safety industry, communications management systems, such as
NETAVIS Observer 4.6. Full Feature List
NETAVIS Observer 4.6 Full Feature List Contents 1 Live monitoring... 3 2 Event management... 3 3 Archive... 3 4 icat video analytics... 4 5 Privacy and security... 4 6 Interfaces... 4 7 Multi-server and
AKCess Pro Server Management Software
Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management
Cloud Surveillance. Cloud Surveillance NVMS. Network Video Management System. isecucloud. isecucloud
Cloud Surveillance Network Video Management System isecucloud isecucloud Network Video Management System Introduction In the digital era, the demand for remote monitoring has continued to increase. Users
Reliable Security Solutions
Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom
INTELLECT TM Software Package
AxxonSoft INTELLECT TM Software Package Quick Start Guide Version 1.0.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Intellect software package...
Access CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management
Station Comprehensive video management software for monitoring, recording, playback and event management Get the full picture Endless video management possibilities, wherever you are Station is a comprehensive
D-Link, the D-Link logo, and D-ViewCam are trademarks or registered trademarks of D-Link Corporation or its subsidiaries in the United States and
Remotely Managed Internet Cameras Deliver Low-Cost IP Surveillance Monitoring and Automation White Paper Abstract Internet Protocol cameras (IP cameras) enable anyone with access credentials and a standard
Bosch IP An introduction to IP technology and the future of CCTV. Bosch IP Network Video Product Guide
Bosch IP An introduction to IP technology and the future of CCTV Bosch IP Network Video Product Guide 2 3 Changes in CCTV technology have been driven by three main requirements. The first is the need to
Axis network cameras A wide portfolio of products for professional video surveillance.
Axis network cameras A wide portfolio of products for professional video surveillance. The market s widest range of network cameras The video surveillance market is thriving, driven by increased public
Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers
Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...
Cisco Physical Access Manager
Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
ATM Video Surveillance
ATM Video Surveillance with centralized video management Secure your ATMs with robust and reliable video surveillance solution Record record H.264 compressed video using less hard disk space Search search
AxTraxNG Access Control Management Software
AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4
Logging and SNMP Trap Notification Of Events. Isonas Access Control System. Release 12 June 2007
Logging and SNMP Trap Notification Of Events Release 12 June 2007 6325 Gunpark Drive. Boulder, CO 80301 (303) 567 6516 www.isonas.com 1 Background and Introduction This specification describes and defines
NLSS Gateway Video Management Access Control Video Analytics Intrusion Remote Monitoring Cloud-Based Security
NLSS Gateway Access Control Analytics Intrusion Remote Monitoring Cloud-Based Security Introducing the NLSS Gateway The Integrated Solution The Next Generation of Security is here Access Control & Intrusion
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
ivms-4200 Client Software Technical Specification v1.02
ivms-4200 Client Software Technical Specification v1.02 Introduction ivms-4200 Client Software is a centralized video management software using a distributed structure for surveillance device control and
A&H Software House Inc. Web: www.luxriot.com Email: [email protected]. Luxriot
A&H Software House Inc. Web: www.luxriot.com Email: [email protected] Luxriot Luxriot Product Features Luxriot is equipped with Unique, Advanced and Industry Standard Surveillance Features: Luxriot is
ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere
Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management
Security Center Unified Security Platform
Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly
NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security
Integrated Security Networ k Security Recorder NSR TM Network Security Recorder Open the Era of Embedded Security Integration Systems NSR (Network Security Recorder) is developed by Anson and will be promoted
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
Comprehensive Data Center Energy Management Solutions
FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara framework to provide full convergence of
IP-Based Communications Solutions
IP-Based Communications Solutions IP-Based Communications Solutions Effective Communications Facility-Wide and Campus-Wide Leverage your network and lower your system costs Scalable, cost-effective and
Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014
Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch - Milestone Certified Solution Summary document 1 Table of Contents Products Tested
SYMMETRY PRODUCT OVERVIEW
ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations
CONTEG Pro Server Management software
version: 16-06-2014 CONTEG DATASHEET MANAGEMENT SOFTWARE CONTEG Pro Server Management software CONTEG, spol. s r.o. Czech Republic Headquarters: Na Vítězné pláni 1719/4 140 00 Prague 4 Tel.: +420 261 219
Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.
Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring. The Enterprise version is the package which comprises all of the features available in the Digifort System, offering
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
SYMMETRY. DATASHEET ACCESS CONTROL Product Overview
DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated
Leveraging the Cloud for Video Surveillance Solutions From the Small Business to the Enterprise Organization. March 30, 2011
Leveraging the Cloud for Video Surveillance Solutions From the Small Business to the Enterprise Organization March 30, 2011 Leveraging the Cloud for Video Surveillance Solutions From the Small Business
WEBs-AX Enterprise Security
WEBs-AX Enterprise Security SPECIFICATION DATA APPLICATIONS WEBs-AX Enterprise Security is a comprehensive access control and security management solution, built on a truly open, IP based platform. Developed
securityserver Unparalleled management and detection of security, environmental, and disaster control resources.
securityserver Unparalleled management and detection of security, environmental, and disaster control resources. Map cameras & sensors in server rooms or buildings in cities AKCP securityserver puts you
TruVision Navigator v6
Video Surveillance Navigator v6 License-free video management system OVERVIEW Navigator v6.0 from Interlogix, represents the latest advancement in video management software. This license-free video management
AXIS 262+ Network Video Recorder
31433/EN/R4/0803 Complete Network Video Recording Solution Complete Network Video Recording Solution Picture this: A simple and reliable, plug-and-play video surveillance system for hotels, shops, banks,
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Comprehensive Data Center Energy Management Solutions
FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara Framework to provide full convergence of
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
EntraPass v4.0 Access Control Software
Sales Guide EntraPass v4.0 Access Control Software This newest version of EntraPass enables customers to secure their property and personnel more effectively while utilizing a host of exciting new access
Watchdog Monitor user guide
General The Watchdog AW-4, in short AW-4, can be controlled and monitored by a centralized monitor server. This server is located in a large Dutch server centre with high speed connections, directly connected
Using AnywhereUSB to Connect USB Devices
VMWARE TECHNICAL NOTE VMware ESX Server Using to Connect Devices Digi International s Remote I/O Concentrator is a remote networking solution that utilizes over IP technology, called RealPort, to enable
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS
P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS UNLOCK THE DOOR TO INTEGRATED SECURITY MANAGEMENT Managing all of a facility s disparate security systems can be a daunting task,
APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS
APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...
Using triggers and actions
Using triggers and actions Important For Triggers and Actions to function correctly, the server PC must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on
PRODUCT Synergy Security Management System
Synergy Security Management System Video Integration, Command & Control Solution Synergy Security Management System Command and Control Synergy Security Management System SYNERGY FEATURES Comprehensive
FREEDOM ACCESS CONTROL
viscount systems FREEDOM ACCESS CONTROL Rethinking Physical Access Control www.viscount.com [email protected] 604-327-9446 The Viscount Advantage No Control Panels: Say goodbye to expensive and proprietary
P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management
P2000 SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use The Johnson Controls P2000 security management system
Video Management Software for Security and Business Intelligence
Aimetis Symphony Video Management Software for Security and Business Intelligence Aimetis Symphony Video Management Software for Security and Business Intelligence Aimetis Symphony video management software
Installation Steps Follow these steps to install the network camera on your local network (LAN):
1. Description The Network Camera supports the network service for a sensor image with progressive scan, which can be monitored on a real-time screen regardless of distances and locations. By using its
www.digiever.org DIGIEVER CMS logiciel de gestion de super-vision et mur d image
DIGIEVER CMS logiciel de gestion de super-vision et mur d image DIGIEVER Central Management System (DIGIEVER CMS) is an open platform solution to centrally manage different sites of DIGIEVER NVRs in diverse
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
Rapid Eye. System Administrator Guide. Multi-Media Digital Video Recorder. Document 800-02953V4 Rev A 03/10
Rapid Eye Multi-Media Digital Video Recorder System Administrator Guide Document 800-02953V4 Rev A 03/10 System Administrator Guide Revisions Issue Date Revisions A 01/09 New preliminary document based
BUILDING SECURITY & ACCESS CONTROL
Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Crystal Matrix Software. Quick Start. Configuration Guide
Crystal Matrix Software Quick Start Configuration Guide Date: March 10, 2015 Page: 1 Table of Contents Intended Use... 2 Introduction... 3 Basic Steps... 3 Install and Register the Crystal Matrix software...
Electronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
Integrated Security System
Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System
The Integrated Security Management Solutions With Embedded Software. Access Control Solutions For A Changing World
Access Control Solutions For A Changing World U emerge is UL 294 Listed and Meets or Exceeds Industry Standards 50 5000 The Integrated Security Management Solutions With Embedded Software Innovative Architecture
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform
WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION Integrated Access Control, Video and Intrusion Platform WIN-PAK WIN-PAK - A Proven Security Integration Platform With over 100,000 systems installed
Asset Tracking System
Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and
ivms-4200 Client Software Quick Start Guide V1.02
ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...
Visualize, Document & Keep Your Network Running!
Visualize, Document & Keep Your Network Running! Ethernet Network Tools to Simplify Network Support Why IntraVUE? Do you have a tool to help you solve networking problems quickly? IntraVUE is a software
Crystal Access System
Crystal Access System Manual Updated to reflect changes in ISONAS Software V 15 January 2015 Contents Software Installation... 5 Software Registration... 7 Upgrade of Software... 12 Software Overview...
State-of-the-Art Headquarters Includes Centralized Physical Security
Customer Case Study State-of-the-Art Headquarters Includes Centralized Physical Security EXECUTIVE SUMMARY Alexander Forbes Financial Services Johannesburg, South Africa Approximately 4,000 Employees BUSINESS
March Networks Command Specification Sheet
March Networks Command Specification Sheet Table of Contents March Networks Command Solution Feature Overview...1 March Networks Command Enterprise Solution Overview...2 Optional Command Enterprise Components...3
CCTV & Video Surveillance over 10G ip
CCTV & Video Surveillance over 10G ip Background With the increase in data, research and development and corporate competition, many companies are realizing the need to not only protect their data, but
Access Control in Surveillance Station 7.0
Access Control in Surveillance Station 7.0 With Axis Network Door Controller A1001 Synology Inc. Synology_ACISS_20150305 Table of Contents Chapter 1: Introduction... 3 1.1 What Is Access Control?... 3
Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12
Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering
Intelligent Monitoring Software. IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432
Intelligent Monitoring Software IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432 IMZ-RS400 Series Reality High Frame Rate Audio Support Intelligence Usability Video Motion Filter Alarm
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Professional Surveillance System User s Manual
Professional Surveillance System User s Manual \ 1 Content Welcome...4 1 Feature...5 2 Installation...6 2.1 Environment...6 2.2 Installation...6 2.3 Un-installation...8 3 Main Window...9 3.1 Interface...9
Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers
Knowledge Base Article Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers Copyright 2009-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...
Axis video encoders. Where analog and network video meet.
Axis video encoders. Where analog and network video meet. Why it pays to switch to network video. Network video can save you money, help you work more efficiently and give you better quality images. But
Doors.NET Access Control Software. Data Sheet. email: [email protected] web: www.kerisys.com
Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application
Affordable Building Automation System Enabled by the Internet of Things (IoT)
Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,
MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.
MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety
Health Care Solutions
Health Care Solutions Increase Service Levels, Meet Expectations A Unified Approach to Health Care Automation Processes Hospitals, clinics, extended care facilities, and physician s offices are facing
Solution Overview. Smarter Video Surveillance with NETGEAR
Smarter Video Surveillance with NETGEAR A b s t r a c t a n d A u d i e n c e NETGEAR Solution Overviews provide high-level solutions to common business IT challenges for end users, Value-Added Resellers
Infinity 2020 Perimeter Intrusion Detection System
Infinity 2020 Perimeter Intrusion Detection System User Guide: Network Application Your First Line of Defense 1 Infinity 2020 Perimeter Intrusion Detection System Table of Contents Section 1: Getting Started...
Surveillance Station Guide 2014
Surveillance Station Guide 2014 www.qnap.com QNAP Surveillance Station Guide 2014 1 What is Surveillance Station? QNAP Systems, Inc. aims to deliver comprehensive offerings of cutting edge Network Attached
RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system
Solution guide for SMS-based remote access control and intrusion detection system Contents Application: Remote access control and intrusion detection Page 1 Solution: SMS Relay control cabinet Page 2 System
Avigilon Control Center Web Client User Guide
Avigilon Control Center Web Client User Guide Version: 4.12 Enterprise OLH-WEBCLIENT-E-E-Rev2 Copyright 2013 Avigilon. All rights reserved. The information presented is subject to change without notice.
Remote Client Program... 3. Web Client... 39
Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group
NGSS. Evolutionary Safeguards Surveillance. Nuclear measurement solutions for safety and security. NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NAS
Nuclear measurement solutions for safety and security. NAS DCM-C5 Camera NAS Reader UPS NGSS Evolutionary Safeguards Surveillance NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NGSS The NGSS is a modular,
Deploying VSaaS and Hosted Solutions Using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
MEZORY IP-CCTV QUICK PREVIEW
MEZORY IP-CCTV QUICK PREVIEW Current Running Products Ver. 2.4 & Test tool Ver. 13.12 One Push Focusing Motorized Lens Controllable Controlling of motorized lens via network remotely gives maximized convenience
