C CURE 800/8000 v10.1 Security Management Solution
|
|
|
- Megan Carter
- 10 years ago
- Views:
Transcription
1 A Tyco International Company C CURE 800/8000 v10.1 Security Management Solution Features That Make a Difference: NEW! Seamlessly integrates with American Dynamics HDVR NEW! Easily create a report on personnel with specific clearances NEW! Wildcard search simplifies searches in various Administration sub-sections NEW! Display audit journal reports in Excel format for quick export Quickly access and leverage LDAP compliant data sources Monitor multiple locations from a single guard station Powerful database partitioning gives maximum security to buildings with multiple tenants Easily integrate with multiple video systems and other business-critical applications Quickly import personnel information from ODBC-based data sources for synchronization of databases Significantly enhance security with intrusion zones and keypad commands Easily create cardholder unique identifiers (CHUIDs) with extended card number support Assign up to five cards per cardholder, including a PIN-only credential Threat level support allows you to change the operation of the system based on current events Dynamic clearance filters ensure personnel clearance numbers match the clearance number of the protected area Intuitive.NET badging solution provides high performance, cost-effective identification management system Microsoft Windows login authentication provides enhanced security and password management Ideal for Government and Enterprise Customers Whether it s specifically complying with FIPS regulations or ensuring that safety precautions are augmented when critical security events occur, C CURE 800/8000 meets today s most stringent security and administrative needs.in addition, C CURE 800/8000 supports the istar ex Ethernet-ready controller 1 (four- or eight-door) and the istar Edge Ethernet-ready controller (two-door) to provide a solution for any government or enterprise application looking for the highest security available. C CURE 800/8000 also provides tighter security with the addition of a Lightweight Directory Access Protocol (LDAP) general connection. Built into the architecture of C CURE 800/8000, a user can connect to many external data sources including industry leading Microsoft Active Directory. By importing vital personnel information from an LDAP directory into C CURE 800/8000 within seconds, the customer is assured that the information in both systems is precisely matched and clearances are in place. Complete Integration with Unlimited Applications C CURE 800/8000 is a scalable security management solution encompassing complete access control and advanced event monitoring. The system integrates with critical business applications including CCTV and video systems from American Dynamics (Intellex and VideoEdge NVR), visitor management, ERP, HR/time and attendance, and third party devices such as fire alarms, intercoms, and burglar and other alarms. Easy to Network C CURE 800/8000 client workstations and istar intelligent network controllers can be placed directly on an existing network and across a wide area network (WAN). istar controllers support dual network connectivity and Dynamic Host Configuration Protocol (DHCP), easing connectivity to most existing networks. Accountability and Auditing A comprehensive audit trail is critical for organizations that must comply with process regulations, such as pharmaceutical and healthcare facilites. C CURE 800/8000 s field-level audit trail enhances the control you have of data and system integrity by tracking changes made to all relevant security objects, including configuration and clearance data. Unlimited Scalability C CURE 800/8000 is completely scalable and lets you easily add functionality and increase capacity as your security needs grow. Using Microsoft.MSI standard installer technology with C CURE 800/8000, you can easily install, upgrade, and repair remote workstations conveniently without visiting every site. (1) C CURE 800/8000 supports the entire suite of Software House istar and apc controllers (excluding istar Edge 4-door)
2 Take a closer look Advanced event and alarm monitoring station provides powerful control The C CURE 800/8000 monitoring station displays cardholder images based on granted/rejected access or events. For added convenience, you can name, prioritize, and sort alarms as they occur right at the C CURE 800/8000 monitoring station. For example, name your alarm categories 1-Life Safety, 2-SCI, 3-DoD, and 4-General in place of the default Critical, High, Medium, and Low, to customize the interface based on your security parameters. You can also easily sort alarms by priority and/or date and select from up to eight unique defined priority labels and more than 16 million colors for coding priorities. Powerful database partitioning gives maximum security to buildings with multiple tenants C CURE 800/8000 allows groups to share a single database while, at the same time, partitioning to maintain individual groups security. Partitioning supports multiple tenant locations at one site or it can support a single organization occupying multiple buildings. This ensures that security officials have access only to information that is pertinent to their facility. Integration ensures total control Using the powerful Application Programming Interface (API), C CURE 800/8000 provides seamless integration with select video systems and recorders including those from American Dynamics (Intellex, VideoEdge NVR, and HDVR) via its NetVue application. This integration allows you to tie an event generated on C CURE 800/8000 to live video. With enhanced alarm management, NetVue can automatically activate C CURE 800/8000 events based on motion detection alarms received from a video system. Refer to the C CURE NetVue datasheet on for more detailed information. A powerful dual acknowledgment screen lets you retain a record of events after all of the active causes behind them have been resolved. It s an extremely effective way to manage new alarms as they arise without losing track of those still under investigation. Monitor multiple locations from a single guard station With the C CURE 800/8000 central monitoring option, users can monitor multiple widely dispersed locations from a single monitoring station providing total enterprise security management. For integration with many other devices, such as fire panels and intrusion detection systems, the bi-directional serial interface can be used to receive and interpret messages sent to C CURE 800/8000. These messages can trigger events and generate a journal entry on the monitoring station. The interface can communicate with C CURE 800/8000 via an RS-232 serial port or remotely through TCP/IP via a qualified terminal server.
3 Ensure consistency of data across various business and security applications Companies often store personnel information in multiple databases and need to keep these databases synchronized. To prevent possible inconsistencies, you can use the ODBC functionality of C CURE 800/8000 to import personnel data, including roles or clearances, from external ODBC-compliant data sources to C CURE 800/8000. Additionally, you can use the API to import and export personnel data, including roles and clearances (based on personnel roles), from a particular outside data source in real time. Intrusion zones and keypad commands enhance security Grouping inputs and doors into intrusion zones allows you to easily arm and disarm alarm monitoring points (inputs). You can also lock and unlock groups of doors while displaying their current mode of status. Use keypad commands to remotely activate cameras, doors, and other events as well as trigger a duress call right from the RM reader keypad. Additionally, triggering a duress call, sounding an alarm, and more can be performed all from an RM reader keypad connected to an istar controller. Keypad commands can be configured to require a card presentation and/or a PIN to validate the command. Intrusion zones can be disabled while keeping critical inputs active 24 hours a day, 7 days a week. For example, the first floor of an office building has an intrusion zone with motion and glass-break detectors in place. It is crucial for the glass-break detectors to be active but unnecessary for the motion detectors to be active during normal business hours. You control what state those inputs need to be in; in this case, the motion detectors will be disabled. However, should there be a window break within that zone, the glass-break detector will trigger an alarm. Easily create CHUIDs with extended card number support C CURE 800/8000 supports extended card numbers 2 which allow users in government applications to comply with certain federal guidelines (such as FIPS 201) that require a multi-field CHUID. In addition, istar controllers support card numbers of up to 256 bits, eliminating the need for multiple facility codes, site codes, or offset in order to avoid card duplication. Longer card numbers offer greater protection against card duplication and are especially valuable to customers who require card numbers that exceed ten digits. Assign up to five cards per cardholder, including a PIN-only credential C CURE 800/8000 lets you assign up to five cards per cardholder record instead of creating a separate record for each card. Using this powerful feature, you can assign a PIN as one of the cards, providing a flexible and secure solution and greatly simplifying the management and maintenance of personnel records. For additional flexibility, you can use istar controllers to support up to 128 card formats system-wide and ten card formats per reader. This expanded ability to use multiple card types (such as 26-bit, 37-bit, or 35-bit Corporate 1000) at a single reader frees you from having to consolidate or re-issue new cards. (2) Only with istar controller
4 Controlling areas and managing occupancy levels help you maintain safety regulations Once someone is granted access to the building the real work begins to ensure that confidential areas are kept protected, occupancy levels are maintained for safety, and the general well-being of employees and visitors is ensured. With C CURE 800/8000, you can easily configure all of the areas in your building and across multiple buildings and identify inbound and outbound readers to enforce anti-passback. This prevents someone from passing his/her access card back to another person for unauthorized entry, using either a timed or event-driven configuration. The area lockout feature operates in much the same way, but takes it a step further by actually locking a cardholder out of an area based on a decrementing time specification. Managing occupancy levels is another powerful tool that lets you define how many people and/or what type of person is allowed in a room. This type of control is essential for extremely classified areas, such as Secured Compartmentalized Information Facilities (SCIFs) which exist most often in the government-related marketplace. In these sensitive instances, you can configure C CURE 800/8000 to require a supervisor to be present before allowing an employee to access the area. This type of restriction can also apply to visitors who may require an escort as they pass through restricted doors. Threat level support allows you to change the operation of the system based on current events C CURE 800/8000 provides a solution for government agencies and enterprise companies that allows them to change the operation of the security system based on a threat level. For example, if the national threat level (defined as Low, Guarded, Elevated, High, and Severe ) is raised, the administrator can react by changing the threat levels in the C CURE 800/8000 system, which may then be configured to react in the following user-defined ways: Cardholders may be required to present a higher level of credential to gain access to a door. Operators or guards may need to validate their manual actions with an approved response. Events may be automatically activated. Current threat level color is displayed on maps and the monitoring station for consistent reminder of status. An escort may be required. MODEL 1 MODEL 5 MODEL 10 MODEL 20 MODEL 30 MODEL Enterprise Server 8000z Plus Enterprise Server Number of Online Readers* * Number of Online Inputs * Number of Online Outputs * Number of Addressable Controllers No limit No limit No limit No limit No limit No limit No limit No limit Number of Cardholders* 10K 40K 40K 250K 250K 250K 500K 500K Number of Assets N/A 40K 40K 250K 250K 250K 500K 500K Number of Simultaneous Client PCs Included with Server Number of Client PCs Definable on Server Sentinel Required YES YES YES YES YES YES YES YES * C CURE 800/8000 is designed for unlimited expansion. The often stated 3,000 reader and 32,000 input/output handling are tested limits only and do not represent expansion restrictions. System performance will vary depending upon specific hardware configuration including number of communication lines/ports, download/upload frequency, etc.
5 Intuitive.NET badging Access control cards are essential for security, but can also be a nice way to communicate your company s message to employees and the public. The C CURE 800/8000 badging solution utilizes Microsoft s.net guidelines for the graphical user interface and offers superior control of color and graphics. Manage access control using a graphical interface C CURE 800/8000 s map interface allows you take any CAD drawing or Visio file, save it as.bmp, and then populate your map with icons that reflect security objects, such as doors, inputs, outputs, cameras, events, video tours, and views. You can also nest maps within maps to provide an easy interface that lets you travel graphically around your facility and manage events directly from the map. Specialized display needs for badge layouts are common and the Expression Builder can help you meet those needs. You can simply pick fields from a list that builds sophisticated expressions without ever having to understand the complexity of expressions. With the smart card enrollment solution, you can read and/ or reprogram multiple smart card formats such as MIFARE (1k & 4k cards), iclass, and DESFire. These cards can be programmed with a wide range of data depending on the protocol of each card type for critical security purposes and/ or value add-ons such as vending, parking, etc. Refer to the C CURE ID datasheet on for more detailed information. Dynamic clearance filters ensure personnel credentials match the clearance number of the protected area Assign a clearance filter number to personnel which must match the clearance filter number of the reader in a protected area. For example, an operating room may be accessible to all hospital personnel during non-surgery times. At these times, the reader that secures the room has a clearance number of 1 and each person with a clearance filter number 1 can gain access. During operations, however, the clearance filter on the reader automatically changes to a 3, which means only those personnel who have a clearance filter of 3 will be permitted access. This is done without changing the underlying clearance available to the area. At the monitoring station, you ll immediately see the benefits of the mapping feature when a critical event such as Door Forced Open occurs. This event can cause a live video window to automatically pop-up on the map, giving you the exact location and corresponding video footage. Here, the nested maps come in very handy to help you drill down to graphically navigate through the facility looking for the person who may have caused the Door Forced Open event. Using the dynamic icons and the powerful NetVue interface, you can even launch a video tour of the affected area to immediately investigate. For more sophisticated management of a building layout, C CURE 800/8000 has solid integration with a third party graphical interface called AEGIS which provides you a way to account for walls that have been knocked down, doors that may have been moved, expansion projects, and more.
6 C CURE 800/8000 Server Specifications Processor Model Number 20 through 40 Model Number 8000 and 8000 Plus Free Hard Disk Space Model Number 20 through 8000 Plus Memory Model Number 20 through 40 Model Number 8000 and 8000 Plus Network Adapter Card Model Numbers 1 through 8000 Plus Video Adapter Card Model 1 through 10 Model 20 through 8000 Plus Monitor/Video Adapter Board Minimum 1.5 GHz Intel Pentium IV or higher 1.8 GHz Intel Pentium IV or higher 2.4 GHz Intel Pentium IV or higher 4.0 GB 4.0 GB 1 GB RAM 1 GB RAM 2 GB RAM A Tyco International Company Recommended Intel Core 2 Duo E8400, 3.0 GHz or higher Intel Xeon E5506 Processor, 2.13 GHz or higher 3 Intel Xeon E5620 Processor, 2.40 GHz or higher Two 160 GB Four 160 GB 3 GB RAM; 4 GB RAM (Windows 7 and Windows 2008 R2) 4 GB RAM; 8 GB RAM (Windows 7 64-bit and Windows 2008 R2) 4 GB RAM; 8 GB RAM (Windows 7 64-bit ); 16 GB (Windows 2008 R2) 100 MB or higher Gigabit NIC Integrated 64 MB available memory or equivalent Integrated 64 MB available memory or equivalent 17 SVGA (1024 x 768) True color support for badging 256 ATI Radeon HD3470 graphics or equivalent Integrated MATROX G200 with 8 MB sheared video memory or equivalent 17 SVGA (1024 x 768) True color support for badging DVD Drive 2X 2X Operating System (32-bit unless otherwise specified) Windows Server 2008 Standard and Enterprise (SP2 or later), Windows Server 2003 Standard and Enterprise (SP2 or later), Windows XP Professional (SP3 or later), Windows Vista Business and Enterprise (SP2 or later), Windows Server 2008 Standard and Enterprise (SP2 or later), Windows Server 2003 Standard and Enterprise (SP2 or later), Windows XP Professional (SP3 or later), Windows Vista Business and Enterprise (SP2 or later), Mouse PS/2 bus type, USB PS/2 bus type, USB Ports Backup Modem 1 USB dedicated to sentinal or 1 parallel dedicated to sentinal Tape or CDRW, Shared drive, network storage device, or DVD Dial-in Client or istar: Any modem supported by Windows apc Dialup: Software House OEM Multi-Technology for apcs At least one USB port (or parallel port) for sentinel, dual serial ports (if needed) DVD+/-RW 56.7 Kbps Sentinel Supplied by Software House Supplied by Software House Digiboard Eight port (Models 20/30/40) Eight port (Models 20/30/40) C CURE 800/8000 Client Specifications Minimum Recommended Processor Intel Pentium IV 2.0 GHz or higher Intel Pentium IV 2.0 GHz or higher Free Hard Disk Space 2 GB; 16 GB (Windows 7 32-bit); 20 GB (Windows 7 64-bit; 32 GB (Windows 2008 R2 64-bit) 20 GB; 30 GB (Windows 7 and Windows 2008 R2) Memory Model Number 20 through 40 Model Number 8000 and 8000 Plus 1 GB RAM; 2 GB RAM (Windows 7 and Windows 2008 R2 64-bit) for all models 2 GB RAM; 3 GB RAM (Windows 7 and Windows 2008 R2) 3 GB RAM 4 GB RAM Network Adapter Card 100 MB or higher 10Base-T CD-ROM Drive 10X 10X Monitor/Video Adapter Board 17 SVGA (1024 x 768), 64 MB RAM 17 SVGA (1024 x 768), 64 MB RAM Operating Systems (32-bit unless otherwise specified) Windows Server 2003 Standard and Enterprise (SP2 or later) Windows 2008 Standard and Enterprise (SP2 or later) Windows XP Professional (SP3 or later) Windows Vista Business and Enterprise (SP2 or later) Windows Server 2003 Standard and Enterprise (SP2 or later) Windows 2008 Standard and Enterprise (SP2 or later) Windows XP Professional (SP3 or later) Windows Vista Business and Enterprise (SP2 or later) Mouse PS/2 bus type, USB PS/2 bus type, USB (3) Intel Xeon 2.13 GHz or higher for Windows 7 and Windows 2008 R2 Related Products Approvals C CURE ID C CURE NetVue C CURE Central istar Edge The trademarks, logos, and service marks displayed on this document are registered in the United States [or other countries]. Any misuse of the trademarks is strictly prohibited and Tyco International Ltd. will aggressively enforce its intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary. All trademarks not owned by Tyco International Ltd. are the property of their respective owners, and are used with permission or allowed under applicable laws. Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not all products include all features. Availability varies by region; contact your sales representative Tyco International Ltd. and its respective companies. All rights reserved. SH0030-DS R07-LT-EN
C CURE 800/8000 Security Management Solution
D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Advanced event and alarm monitoring solution provides flexible and powerful control Easily integrate with
AxTraxNG Access Control Management Software
AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4
Doors.NET Access Control Software. Data Sheet. email: [email protected] web: www.kerisys.com
Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application
Access CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management
P2000 SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use The Johnson Controls P2000 security management system
SYMMETRY. DATASHEET ACCESS CONTROL Product Overview
DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated
SYMMETRY PRODUCT OVERVIEW
ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS
APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...
SiPass Software. Fire Safety & Security Products. SiPass integrated
SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
Access Professional Edition Selection Guide
Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base
Access Control Management Software
ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s
Reliable Security Solutions
Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom
C CURE Product Catalogue - Issue 2
C CURE Product Catalogue - Issue 2 a vital part of your world Introduction This is the Second Edition of Tyco Safety Products' C CURE Catalogue for product available from our European Distribution Centres.
APOGEE Security Technology Management Software
Technical Specification Sheet Rev 1, July, 1999 APOGEE Security Technology Management Software Figure 1 APOGEE Security Technologies workstation The APOGEE Security Technology System (ASTS) is a family
P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management
P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management
The Access Engine. Building Integration System - The Access Engine. Security Systems
The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware
Tailored integration to suit you
UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*
Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...
Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6
intertrax Suite resource MGR Web
intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;
High Performance Access Control and Integrated Security Systems
High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems EntraPass Corporate Edition is a powerful multi-user access control system
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.
1 EXgarde PRO Based Access Management System Overview EXgarde PRO is a windows-based, fully featured access management PC software application providing flexibility and ability to tailor the software to
Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS
P2000 SECURITY management SYSTEM. More control means more freedom
P2000 SECURITY management SYSTEM More control means more freedom More freedom to achieve More freedom to reduce costs How can you keep people safe and productive, while reducing costs and staying compliant
System Integration Software
System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G
INTEGRATED SOFTWARE SOLUTIONS
INTEGRATED SOFTWARE SOLUTIONS 1.0 INTEGRATED SOFTWARE SOLUTIONS > B.A.S.I.S. ET650 from Stanley Security Solutions combines flexibility with enormous capabilities. Using a single database server and a
Integrated Security Management Platform for Windows
Integrated Security Management Software Integrated Security Management Platform for Windows Overview Facility Commander Wnx offers powerful, easy-to-use, IT-friendly, integrated security management under
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management
Station Comprehensive video management software for monitoring, recording, playback and event management Get the full picture Endless video management possibilities, wherever you are Station is a comprehensive
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies
V2.7.x Installation on a Database Server Note: This document is to be used on a new database server installation.
V2.7.x Installation on a Database Server Note: This document is to be used on a new database server installation. REVISION A DATE: 10/01/2009 CA3000 Software Installation Procedure Continental Access and
WEBs-AX Enterprise Security
WEBs-AX Enterprise Security SPECIFICATION DATA APPLICATIONS WEBs-AX Enterprise Security is a comprehensive access control and security management solution, built on a truly open, IP based platform. Developed
P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS
P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS UNLOCK THE DOOR TO INTEGRATED SECURITY MANAGEMENT Managing all of a facility s disparate security systems can be a daunting task,
EntraPass v4.0 Access Control Software
Sales Guide EntraPass v4.0 Access Control Software This newest version of EntraPass enables customers to secure their property and personnel more effectively while utilizing a host of exciting new access
TrueAlarm Fire Alarm Systems
TrueAlarm Fire Alarm Systems UL, ULC, CSFM Listed; FM Approved; MEA (NYC) Acceptance* Fire Alarm System Accessories, 4190 Series PC Annunciator with Multi-Client Capability Features Fire alarm control
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
Topaz. GE Security. Intelligent software for access control. Topaz. Features
GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security
Security Management System
Security Management System High Level System Benefits Integrated Solutions For: Access Control Intrusion Detection Alarm Monitoring CCTV Integrated Badging Digital Video Surveillance & Retrieval Visitor
INSTALLATION GUIDE. AXIS Camera Station
INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers
TruVision Navigator v6
Video Surveillance Navigator v6 License-free video management system OVERVIEW Navigator v6.0 from Interlogix, represents the latest advancement in video management software. This license-free video management
Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform
Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management
Central Management System
Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
Intelligent Monitoring Software. IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432
Intelligent Monitoring Software IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432 IMZ-RS400 Series Reality High Frame Rate Audio Support Intelligence Usability Video Motion Filter Alarm
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...
Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5
Avigilon Control Center 5 System Integration Guide. for Software House C Cure 9000
Avigilon Control Center 5 System Integration Guide for Software House C Cure 9000 2011-2015 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect
COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER
COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER TECHNICAL SPECIFICATIONS Communication Server 1000 Telephony Manager 3.2 Communication Server 1000 Telephony Manager 3.0 Communication
Windows 2003 Server Installation Guide
Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers
Security Management System
Security Management System Schlage Security Management System High Security Enables you to maximize the effectiveness of multiple security applications in one powerful system Allows transactions, associated
Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.
Kaba Electronic Access Control Keyscan Aurora Software Guide Powering the future of access control. Keyscan Aurora Access Control Management Software Powering the future of access control For Kaba EAC,
Pipeline Compliance System v7.6. Installation Guide
Pipeline Compliance System v7.6 Installation Guide Information in this document is subject to change without notice. 1999-2014 American Innovations, Ltd. All rights reserved. American Innovations www.aiworldwide.com
Avigilon Control Center Server User Guide
Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,
KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control
Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25
Microsoft SQL Server 2008 R2 Express.
System s System s Note: Disk compression must not be used. Business/Professional Edition Database Server (with integrated client and NVR) The maximum number of clients is 9 (including Web clients). The
MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.
MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
MedInformatix System Requirements
MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large
KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control
Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
NetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
AXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
Engineering and service software For KNX and LPB plants
5 649 Engineering and service software For KNX and LPB plants As of V9.00 ACS790 The engineering and service software ACS790 is for KNX and LPB plants equipped with the appropriate bus devices. The software
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...
Security Center Unified Security Platform
Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business
s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the
Datacolor TOOLS. Datacolor TOOLS QCX. Datacolor TOOLS WORKSTATION
Datacolor TOOLS Datacolor TOOLS QCX Datacolor TOOLS WORKSTATION Installation Instructions Datacolor TOOLS Installation Guide (June, 2009) All efforts have been made to ensure the accuracy of the information
Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.
TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as
V2.8.x Installation on a Database Server Note: This document is to be used on a new database server installation.
V2.8.x Installation on a Database Server Note: This document is to be used on a new database server installation. REVISION A DATE: 10/5/2011 CA3000 Software Installation Procedure Continental Access and
New SurePOS 700 Front Service Cover features offer secure, reliable front access to the system unit
Hardware Announcement January 10, 2006 New SurePOS 700 Front Service Cover features offer secure, reliable front access to the system unit Overview The IBM SurePOS 700 Series, the premier point-of-sale
Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring
Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate
NetVue Integrated Management System
NetVue Integrated Management System Network & Bandwidth Management Overview The NetVue Integrated Management System (IMS) provides the network insight required to run optimal networks. It can be utilized
Sage Abra SQL HRMS Abra Workforce Connections. Installation and Setup Guide
Sage Abra SQL HRMS Abra Workforce Connections Installation and Setup Guide 2009 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are
Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution
September 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality
Installing Emageon PACS Remote Ultravisual
The PACS DICOM visualization software for Carondelet Health Network is a Java based application that is installed from the PACS Archive servers. Before proceeding with the installation please see Table
EntraPass WebStation. Installation Manual DN1864-1005
EntraPass WebStation Installation Manual EntraPass WebStation Installation Manual Table of Contents General Information...1 Copyright Info...1 Technical Support...1 Overview...2 Introduction... 2 Description...
CMS Central Monitoring System
General In This Section CMS for Windows CMS Hardware CMS Functional Spec Relational Database Monitoring Interface Communication Network CMS Central Monitoring System General CMS Central Monitoring System
SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM
SECTION 281300 ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network-enabled access control system for security management, including engineering,
Enterprise Edition Technology Overview
Enterprise Edition Technology Overview The Scholastic Achievement Manager, SAM, is the management system and technology platform for all Scholastic Enterprise Edition (EE) applications. Previous versions
Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n
Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control
Topaz Installation Sheet
Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright
ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07
ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall
Unparalleled speed, performance & scalability for any application or enterprise.
Continental CA3000: Enterprise access control & integrated security management Unparalleled speed, performance & scalability for any application or enterprise. Education Healthcare Business Transportation
Section 28 16 00 Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4
Section 28 16 00 Intrusion Detection FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4 Architectural and Engineering Specifications TECHNICAL SPECIFICATIONS DIVISION 28 ELECTRONIC
ACCESS CONTROL SYSTEMS USER MANUAL
Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic
RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS
RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS Components Available with Each Version of RSA Agents for Microsoft Windows Agent Local Authentication Client RSA Authentication Agent 6.1.3 Remote Authentication
for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV.
1 for Windows 7 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: [email protected] Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,
Product Life Cycle Management
Engineering Change Control Systems (atecc) Product Life Cycle Management Enterprise information boundaries are disappearing as corporations open their networks to allow external access by manufacturing
Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT
Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple
APC Enterprise KVM Switches
APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean
Time Attendance V1.4
Time Attendance V1.4 Installation Manual May 11, 2011 Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE SYSTEM...7 3.1 Set Password...7 3.2
USER PROGRAMMABLE AUTHORIZE USERS AT THE CLICK OF A MOUSE AUDIT TRAIL AND TIME ZONE CONTROL LOCK SYSTEM MANAGEMENT SOFTWARE:
SOFTWARE LDB SOFTWARE: USER PROGRAMMABLE AUTHORIZE USERS AT THE CLICK OF A MOUSE AUDIT TRAIL AND TIME ZONE CONTROL LOCK SYSTEM MANAGEMENT SOFTWARE: CLIENT/SERVER ARCHITECTURE MULTI-USER AND CLIENT CAPABILITIES
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
The Integrated Security Management Solutions With Embedded Software. Access Control Solutions For A Changing World
Access Control Solutions For A Changing World U emerge is UL 294 Listed and Meets or Exceeds Industry Standards 50 5000 The Integrated Security Management Solutions With Embedded Software Innovative Architecture
Network device management solution.
Network device management solution. iw Management Console Version 3 you can Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems and
SQL Server 2008 - Express Edition 8-April-2014
SQL Server 2008 - Express Edition 8-April-2014 SQL Server 2008 - Express Edition Publication Information 2014 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers
