Access Control Manager

Similar documents
Enterprise Access Control from Avigilon

FREEDOM ACCESS CONTROL

MaxCS. ALL SOFTWARE IP PBX and Call Center Solution

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

MaxCS. ALL SOFTWARE IP PBX and Call Center Solution

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

Security Center Unified Security Platform

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

5 Ways to Make Your Data Storage Easy to Manage

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

PROTECT, CONTROL, and MONITOR the security of your facility in real-time.

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Integrated Identity Management Whitepaper

SA Series SSL VPN Virtual Appliances

P2000 SECURITY management SYSTEM. More control means more freedom

VidyoConferencing for Service Providers A Solution & Business Model that Works VIDYO

Device Lifecycle Management

Integrated security management platform for Windows. Seamless. Effective. Efficient.

KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE

alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence

IP Convergence Delivers Security, Connectivity, Simplicity... and More

bright blue Intelligent Access Management

Communications Management within Your Security Platform

How To Use Mitel Micollab

THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

AirWatch Solution Overview

StoneFly SCVM TM for ESXi

Cogito Security Management System

WEBs-AX Enterprise Security

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

How Solace Message Routers Reduce the Cost of IT Infrastructure

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

ANY SURVEILLANCE, ANYWHERE, ANYTIME

Hosted vs On-Site IP-PBX A Guide for SMEs

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

The Key Components of a Cloud-Based Unified Communications Offering

Virtual Servers VIRTUAL DATA CENTER OVERVIEW VIRTUAL DATA CENTER BENEFITS

IBM WebSphere Cast Iron Cloud integration

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

How To Secure Your System From Cyber Attacks

SUSE Linux Enterprise Desktop 11

Customers will receive other significant benefits in this example:

Windows Embedded Security and Surveillance Solutions

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Virtual Client Solution: Desktop Virtualization

WebSphere Cast Iron Cloud integration

Clavister InSight TM. Protecting Values

Motorola RF Management Suite

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

Why Cloud BI? of Software-as-a-Service Business Intelligence. Executive Summary. This white paper explores the 10 substantial

Revolutionizing Technical Fleet Management in the Maritime Industry. White paper

SYMMETRY PRODUCT OVERVIEW

Giving Voice to the Virtual Desktop. A Mitel and VMware White Paper

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

Milestone Federated Architecture TM

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: PRICING & LICENSING GUIDE

Cloud Computing: Transformative Technology

How the Software-Defined Data Center Is Transforming End User Computing

Enterprise Desktop Solutions: VMware View 4.5

Quattra s Cloud Vision & Framework Value

GMS GRAPHICAL MANAGEMENT SYSTEM

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE KEY BENEFITS

Mitel Virtual Solutions

Autodesk PLM 360 Security Whitepaper

Trend Micro. Advanced Security Built for the Cloud

How To Protect Your Cloud From Attack

Dialogic PowerApp LB. Datasheet. Load Balancer for Real-Time Communications

Company Overview. Enterprise Cloud Solutions

Cloud computing is a way of delivering IT services to users without the need to buy, install or manage any infrastructure.

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications

Desktop Virtualization Solutions Simplified Appliance

What We Do: Simplify Enterprise Mobility

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

NLSS Gateway Video Management Access Control Video Analytics Intrusion Remote Monitoring Cloud-Based Security

Why Cloud BI? The 10 Substantial Benefits of Software-as-a-Service Business Intelligence

City Surveillance and the Cloud

PCI DSS Top 10 Reports March 2011

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

BMC Remedy OnDemand. Product Overview

The BorderNet Session Border Controller and Network Function Virtualization

ORACLE PROJECT PORTFOLIO MANAGEMENT CLOUD

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

EMC HEALTHCARE SOLUTIONS

W H I T E P A P E R. Best Practices for Building Virtual Appliances

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Motorola RF Management Suite

Security Management System

Transcription:

Access Control Manager

Avigilon Access Control Manager (ACM) is a revolutionary access control solution, engineered from the ground up by IT and security veterans to deliver a new standard in performance, integration and efficiency that can only be achieved through convergence. ACM s web-based, physical and virtual appliance platform leverages an open architecture, integrates identity management and video surveillance and achieves the highest level of scalability with the lowest cost of ownership, making Avigilon the logical choice in access control.

Open Doors, without Windows All-in-One Network Appliance Avigilon s integrated access control network appliances consist of a pre-configured, solid-state server that provides easy, out-of-the-box setup and installation within minutes, eliminating the headaches and hassles of maintaining a stand-alone database server or installing software on multiple end-user workstations. 100% Browser-based Web Application Unlike legacy, software-based access control systems, ACM is accessible anytime, anywhere from any standard web browser. Manage employee and visitor facility access privileges quickly and easily from any location without being tied to a dedicated client workstation or paying for software licenses per user. Secure, Linux Operating System All ACM appliances ship pre-installed with a secure, opensource, Linux operating system, which significantly reduces the risk of virus attacks, frees administrators from installing Windows security patches and ongoing anti-virus updates and eliminates the cost of operating system licenses and upgrade fees. Physical and Logical Security Convergence ACM allows organizations to seamlessly integrate IT and physical security systems, such as Identity and Access Governance (IAG), Security Information and Event Management (SIEM), and HR systems to correlate physical and logical security event information, monitor alarms and rapidly respond to unauthorized activities. Access Control Manager Identity Management Digital Video Integration Event and Alarm Monitoring Graphical Maps & Floor Plans Role-based Reporting IAG and SIEM Integration Hot Standby/Auto Fail-Over 2

All the PACS, Without the Pain Integrated Access Control Avigilon delivers the industry s first and only physical access control system (PACS) that seamlessly integrates identity management and video surveillance across IT and logical security systems, enabling organizations to go beyond simply managing doors to securing facilities, people and assets at multiple offices, buildings and locations. Identity Management ACM integrates with an organization s existing Identity Management system or HR employee database, without requiring duplicate data entry or ongoing maintenance. Identities, roles and policies are synchronized across all ACM network appliances and door controllers in real-time so security settings are always updated and never outdated. Video Integration ACM integrates video surveillance with physical and logical access control policies, so any time there is an alarm or event from a policy infraction, organizations can automatically view digital video related to the activity. Video can be watched live or on-demand through a single, web-based interface. Event Correlation and Alarm Monitoring With ACM s integrated access control, an unauthorized door held or forced open can automatically alert computers in an adjacent room to suspend network access and also send a command to an IP camera to immediately stream video to the security team for further investigation. 3

Access Control Manager Products Enterprise 16 2,048 reader licenses Eliminate the cost and complexity of legacy security systems Upgrade to a highly resilient, scalable software platform Enable seamless integration with IT and physical security Virtual 16 2,048 reader licenses Manage security within a private cloud infrastructure Leverage IT investments in hardware virtualization Extend security budgets with subscription licensing VMware ready 4

Plug-and-Play Protection Access Control Manager Enterprise Appliance ACM Enterprise is a web-based, access control network appliance that enables enterprises of all sizes to secure their facilities, people and assets. ACM Enterprise seamlessly integrates with IT and logical security systems to deliver a new standard in performance, scalability and efficiency that can only be achieved through convergence. Access Control Manager Virtual Appliance ACM Virtual is the industry s first and only physical access control system (PACS) that is VMware Ready for deployment on a virtual server. ACM Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment and is available through either a perpetual (CAPEX) or subscription (OPEX) licensing model. Open Field Hardware All ACM appliances support open field hardware from leading manufacturers such as Mercury Security, allowing organizations to leverage investments in non-proprietary field hardware, with retrofit programs available for industrystandard door hardware and card readers, including contact/contactless smart card, proximity, magnetic stripe and barcode. 5

Integration Made Easy All logos and trademarks are the property of their respective owners. Avigilon s solutions are engineered from the ground up with best-in-class IT standards to work seamlessly within an organization s existing physical or virtual IT environment. Avigilon is committed to providing the ease-of-use demanded by facility managers and the flexibility required by IT departments. Technology and IT Partners Access Control Partners Video Surveillance Partners TM an HID Global business GSA FIPS201 Compliant 6

avigilon.com Authorized Partner of Avigilon