ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION



Similar documents
Gallagher Command Centre

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management

AXXONSOFT INTRODUCES VERSION OF AXXON INTELLECT ENTERPRISE PSIM

View. Select View Managed Video Services ADT

INTELLECT TM Software Package

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Building Integration System (BIS)

GMS GRAPHICAL MANAGEMENT SYSTEM

How to Use Motion Detection in ACTi Cameras

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

WIN-PAK Integrated Security POWERFUL SECURITY INTEGRATION. Integrated Access Control, Video and Intrusion Platform

Doors.NET Access Control Software. Data Sheet. web:

Access Control Management Software

Reliable Security Solutions

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

Security Alarm Monitoring Protocol

The Automation Engine The central security and alarm management

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Electronic Security. For Financial Institutions

LB Sky Global. 92 Lobachevskogo St, Bld 92, Office 5, Moscow, Russia Tel/Fax 7(495) , Site:

Access Control, Integrated

System integration oriented data center. planning. In terms of ATEN's eco Sensors DCIM solution

Integrated Physical Security and Incident Management

Security Center Unified Security Platform

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

Tradition of quality and innovation

CDW Advanced Image Deployment Service Customer Guide

Premium Server Client Software

IT - General Controls Questionnaire

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Axis network cameras A wide portfolio of products for professional video surveillance.

What s Best. for You? Protecting What s Important to You

COMPACT GUIDE. Camera-Integrated Motion Analysis

BUILDING SECURITY & ACCESS CONTROL

Integrated Security System

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SAMAY - Attendance, Access control and Payroll Software

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

How To Protect A Water System

SANS Top 20 Critical Controls for Effective Cyber Defense

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Building Integration System Selection Guide for V4.0

Introduction. Industry Changes

Spyware Doctor Enterprise Technical Data Sheet

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

AKCess Pro Server Management Software

Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER. Vindicator Radar Detection System

Education Security Solutions YOUR PARTNER OF CHOICE. Challenging Times Call For Uncompromising Solutions

Hosted Testing and Grading

IPSASP TimeIPS Monthly Web Hosted Service

WORKFORCE MANAGEMENT SUITE

Integrated Building Management and Security System. Building Automation & Security.

Remote Monitoring offers a comprehensive range of services, which are continually

How To Ensure Security At A Site Security Site

Contents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow

A guide to access control for manufacturing sites

Supply Chain Security Audit Tool - Warehousing/Distribution

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

How To Protect Your Business With Cms.Com

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

SoMac 2.2 User Manual (Access Control)

Introducing Tripp Lite s PowerAlert Network Management Software

AXS Biometric Security System

Remote Security Management Addresses Security Challenges

integrated fire and security solutions Maximum protection for buildings

Access CONTROL. MANAGEMENT Software

Application of Tracking Technology to Access-control System

Advanced Network Video And Alarm Management Suite

Integrated Building Management and Security System. Building Automation & Security.

Infinity 2020 Perimeter Intrusion Detection System

RIVA Megapixel cameras with integrated 3D Video Analytics - The next generation

Pacom Systems. All rights reserved.

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

CenterMind G+ Smart and Proactive Environment Monitoring

P2000 SECURITY management SYSTEM. More control means more freedom

Integrated security management platform for Windows. Seamless. Effective. Efficient.

Security Systems. Scenarios

Where Identity Matters

Appropriate response: A guide to security system integration, monitoring and verification

Pre-Emptive, Economic Security for Perimeters & Outdoor Areas

SITECATALYST SECURITY

Remember, employee payroll is YOUR BIGGEST EXPENSE

Tk20 Network Infrastructure

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

EntraPass v4.0 Access Control Software

CRESCENT GUARDIAN, INC. SECURITY & TECHNOLOGY SIMPLIFIED.

Industry Ap plications

Axis IP surveillance. Endless possibilities for video surveillance.

City Surveillance and the Cloud

securıty HOME home protection 101

Our focus is innovating security where you need it most

- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).

honeywell building solutions INNOVATIVE TECHNOLOGY ACHIEVING MEASURABLE RESULTS Intelligent healthcare Management

Transcription:

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs Reduced security outlays

ACFA Intellect is a suite of modules for integrating access control, fire/security alarm, and perimeter security hardware into Intellect-powered security systems. These modules allow connecting access control, fire/security alarm, and perimeter security infrastructure to the Intellect platform and exchanging information between these components. Configuration options and hardware health information are accessed through the standard Intellect interface. Modules are configured independently of each other, which makes your system more flexible and versatile. ACFA INTELLECT: FEATURES Connect and combine security functions. For example, you can link access control to your video cameras. Now your cameras can automatically start recording any time an access card is used! Automatically react to events. Configure automatic reactions to events. Access control options can be automatically enabled/disabled based on events detected by other parts of your security system. Manage access control privileges automatically. Powerful access control options: privileges for entering certain areas of your site are automatically determined by the status of the employee s access card. Combine users into groups. Set access privileges for a single user or for an entire department. Monitor system health and performance. Get automatic notifications if security hardware goes offline. ACFA INTELLECT SUPPORTS SECURITY SYSTEMS WITH AN UNLIMITED NUMBER OF SERVERS AND WORKSTATIONS. THIS MEANS THAT YOU CAN BUILD A SECURITY SYSTEM THAT IS PERFECTLY MATCHED TO THE UNIQUE NEEDS OF YOUR BUSINESS. Benefits of ACFA Intellect: Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs Reduced security outlays OPC WRAPPER INTEGRATION, SIMPLIFIED RESULT: MORE POWERFUL SECURITY, BETTER COMPANY PERFORMANCE, AND IMPROVED PROFITS. The OPC Wrapper module offers a central, one-stop interface for monitoring and managing system components. OPC Wrapper ties together all the software layers of the security system, enabling them to work together as a cohesive whole. The module can exchange data and get events via the Data Access and Alarms & Events standards. OPC Data Access (DA) is the most popular standard. Intended for real-time data exchange with controllers, management systems, and other hardware. In Intellect, DA is a tree of items that have a specific value. Values can change in real time: these changes can be observed in the Event Log in Intellect. OPC Alarms & Events (AE) informs of special events: emergencies, operator actions, advisory messages, and more. These notifications are logged in the Intellect Event Log as well. Here s the big picture of how integration works: subsystems installed on different computers talk to each other via OPC Wrapper, requesting data and sending commands to each other. OPC Wrapper automatically detects active OPC servers and builds object trees, which makes it easy to configure and start OPC Wrapper in Intellect. Configure conditional reactions to system values with the help of scripts and macros. Why use OPC Wrapper version 5.2: Connect to any server, whether local or remote. Set rules for changing the state of an object. The badge of an object on the map changes color based on the object s value. Change the values of visualized DA objects directly from the map. BACNET WRAPPER GENERAL-PURPOSE INTEGRATION, POPULAR PROTOCOL The BACnet integration module adds support for devices that use the BACnet protocol, enabling creation of consolidated integrated security systems powered by AxxonSoft software. BACnet allows combining devices for lighting, life support, access control, and electrical supply, as well as elevators and other key equipment, into a single system. BACnet (Building Automation and Control Networks) is an open communications protocol for automating and programming building systems. Leading manufacturers of security equipment and building automation systems include BACnet support with their products, including Siemens, Honeywell and others. The BACnet integration module enables interaction between ACFA Intellect and BACnet-compliant devices, opening up an array of options for management and scripting. Events Supported: Events and alarms from access control systems like Access Granted, Access Denied, Door forced alarms, Access violations, etc.; Any sets of alarms from perimetral security systems; Any data from engineering infrastructure like Temperature, Humidity, Conditioning, Emergency sensors and more other; Any data from industrial equipment like Oil pressure, Fan control, Control sensors and more other; Any of the above events or systems can trigger a wide range of actions within the system. This includes: Moving PTZ cameras to specific locations Displaying video from one or more cameras on operator s PC Recording of any camera started, etc. Set service mode Enable the program, Disable the program. 2 ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION 3

VIRTUAL ACCESS SERVER MORE SAVINGS, MORE VALUE What s the secret to deploying a reliable security system without sky-high access control expenses? Do you know how to set up constant, selective face control without hiring full-time security guards? WHY USE THE PHOTO ID MODULE: AUTOMATE THE WORK OF SECURITY STAFF. MAKE ACCESS CONTROL MORE POWERFUL AND EFFICIENT. What is the best way for precisely recording your employees working hours? The Virtual Access Server module creates virtual checkpoints, integrating Auto Intellect/Face Intellect and their recognition capabilities with the Time and Attendance module. Create a virtual checkpoint (VC) to record when a person or vehicle listed in your database enters or leaves. VCs work just like the access control devices that are supported by Intellect. You can cross-reference employee access privileges and access levels with VCs! Virtual Access Server functions: Integrate Auto Intellect/Face Intellect with the Time and Attendance module. Virtual checkpoints can generate the data you need for reports on employee time and attendance. Recognition of employee faces or license plates provides all the necessary information. When a face or license plate is successfully recognized, the Passage allowed event is generated. This can be used to mark the beginning of an employee s workday, for example. Perform system actions based on Passage allowed and Passage denied events. Virtual checkpoints can generate events (allow or deny passage) automatically based on database matches. This makes it easy to configure event-specific reactions (such as closing a relay contact) using macros or scripts. The Intellect platform allows creating a vast array of scripts involving any of the security subsystems connected to it. For example, you can use a vehicle boom barrier like an ordinary relay, in effect, thanks to Intellect. Or if a user tries to cross the same virtual checkpoint twice, scripts can display an alarm automatically. With Intellect, if you can think it, you can script it! USING THE VIRTUAL ACCESS SERVER MODULE ALLOWS STRENGTHENING ACCESS CON- TROL AT YOUR SITE WITHOUT THE FINANCIAL OUTLAYS OF TRADITIONAL HARDWARE-INTEN- SIVE SOLUTIONS. THESE BENEFITS ARE PARTICULARLY SIGNIFICANT FOR SENSITIVE SITES SUCH AS BANKS AND DEFENSE FACILITIES. FACILITY ACCESS MANAGEMENT Are you proactive in preventing theft at company facilities? ACCESS CONTROL SUBSYSTEM CORPORATE SECURITY POLICIES PHOTO ID MODULE Can a person sneak into your facilities by taking someone else s access card? Do you get real-time information about who is entering and leaving your buildings? Is your security system able to differentiate access privileges in sensitive areas versus less-sensitive areas? The Photo ID module combines with access control to monitor system events in real time. Photo identification performs visual verification of events at entries/exits. The Access Control subsystem reads a user s access card. Simultaneously, the operator is shown the photo and information of the card s rightful owner from the database. The operator can compare the database picture and the camera picture before deciding whether to allow access. The module allows selecting which data to display (name, position, department, card number, date/time, etc.) and configuring the arrangement of these fields on screen, thanks to a convenient visual editor. Several windows with employee details are shown simultaneously, helping security staff to keep a close eye on comings and goings. Operators can view the event log in order to trace the history of user entries/exits. Do you do enough to protect your company s intellectual property? Could employee timeliness and discipline be optimized? The Facility Access Management module automates tasks related to databases for authorizing/denying access. Security staff can create time-based restrictions, access levels, and access schedules for employees and departments. This module simplifies many common tasks for administrators of Intellect-powered security systems. Configuration of the Schedules, Shift Schedules, Holidays, Access Levels, and Departments panels can be performed all through the module s interface. The FAM module is more convenient than the Intellect settings interface because there are many more configurable fields, which makes it easier to manage user information. Contextual search of all data types means that you can quickly find specific users in the Intellect database. Use the Facility Access Management module to: Simplify creation/editing of users and access levels. Modify user entries from client workstations. Protect company property by restricting employee and visitor access, as well as movement of merchandise to and from facilities. Safeguard intellectual property by creating and configuring access levels within the company, at both the individual and department levels. Encourage on-the-job conscientiousness: employees «clock in» by passing through Intellect-monitored entries. 4 ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION If this module is not installed, the Intellect settings interface is used for editing. 5

SEARCH FOR USER ACCOUNTS (VEHICLES) Search is performed by class (Employees, Clients, Visitors, Vehicles). Set the search type and maximum number of results. Results are displayed on screen as a table. Use the Time and Attendance module to: Coordinate employee actions and improve diligence. Optimize employee workloads and redirect employee efforts where necessary. Minimize losses caused by tardiness and unauthorized absences. Make better-informed decisions about overtime compensation and bonuses. Simplify reporting and accounting tasks. Streamline staff counts for performing HR tasks. TIME AND ATTENDANCE Schedules supported: Weekly (five-day workweek) Shifts (one day on, two days off) Monthly (when all even-numbered days are working days, for example) Flex hours: employees must work a certain number of hours during a defined interval (8 hours between 8 AM and 10 PM, for example) Maintain employee records on overtime and more. With the Time and Attendance module, you can create and track documents related to employee overtime and excused absences. Calculate each employee s total working hours and view the results in table form. Generate reports. Data from the Access Control module is used to create reports, with the help of the Intellect Web Report System. Get statistics at any time, for any reporting period, about the hours worked by an employee (taking into account night work, tardiness, work-related travel, absences, and sick leave). Do you monitor the time spent by employees on their work tasks? Is overtime information used to determine bonus pay and compensation? Could you benefit from tools to minimize unauthorized tardiness and absences? The Time and Attendance module automatically records employee hours and simplifies planning-related tasks. The Time and Attendance module uses the information generated by the access control module. Functions of the module include: Calculation of employee hours. The Time and Attendance module reports the total hours worked by each employee of a department in an easy-to-understand table. View the company s organizational chart and get information for each employee (the organizational chart is created in Intellect) Create time intervals, shifts, and schedules. When planning and organizing working hours, you can create schedules and shifts that vary by period. Apply these schedules and shifts to an entire department or at the individual level. Wide range of bundled reports, including: Detailed overview Overview Unexcused absences Total hours Time and attendance documents Errors Employee lateness FIRE / SECURITY ALARM SUBSYSTEM WHEN EVERY SECOND COUNTS FIRE AND SECURITY ALARMS Presence in office Entry/exit times Group time and attendance Employee time in office Overview of tardiness and overtime Simplified overview Payroll calculation documents Do you have effective tools for resolving emergencies at your business? Are you receiving automatic notifications of emergencies as they happen? Can you be sure that your fire safety equipment is in good working order? Fire/Security Alarm Integration modules allow connecting alarms from diverse vendors to Intellect. Alarm data is sent to Intellect, which can send commands to alarms in response. Securely manage your alarm equipment via Intellect, whether from your central monitoring hub or an unlimited number of remote workstations. Write conditional statements to specify how to react to events. This simple programming makes system installation a breeze! Integration of alarms with other security subsystems offers major benefits for security staff. Now if a fire alarm is triggered, an operator can instantly reference the relevant video footage to determine whether a fire is truly occurring. Intellect allows jumping to the camera closest to the suspected fire, so that the operator can visually determine the presence of smoke/open flame and react accordingly. No more false alarms! The reverse is possible as well: if a flame is visible on screen but the fire alarm has not been triggered, this means either that the detector is faulty or that the sensor or communication line is not working. Similar benefits for security are available as well: when a intrusion alarm is triggered, the operator can instantly cross-check with real-time video footage. For even greater efficiency, footage from the area of a fire alarm can be automatically displayed and enlarged on a dedicated monitor. Why integrate fire and security alarms? Identify and react to threats in record time: intrusion, fire, etc. Create commands to automatically activate fire suppression equipment, broadcast evacuation announcements, control electrical and utility systems, and more. Make access control more effective. 6 ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION 7

PERIMETER SECURITY SYSTEM DETECT INTRUDERS BEFORE THEY STRIKE The Perimeter Security Integration module provides support in Intellect for perimeter security devices from numerous manufacturers. Thanks to the module, these devices can send information to Intellect and perform Intellect-generated commands. Manage perimeter security from the regular Intellect interface. With the Perimeter Security Integration module, the full feature set of manufacturer-provided perimeter security hardware is maintained (timely detection of violators prior to them entering a protected area, resistance to inclement conditions including wind, rain, snow, etc.). Configure relationships between perimeter security and other subsystems (such as video surveillance, alarms, and access control) to set up automatic reactions in case an intruder approaches your site. THANKS TO THE PERIMETER SECURITY INTEGRATION MODULE, YOU CAN: SUBSTANTIALLY REDUCE SECURITY STAFF NEEDS. RELY ON AUTOMATICALLY GENERATED ALERTS THAT DO NOT REQUIRE PERSONAL INTERVENTION BY SECURITY STAFF. MINIMIZE FALSE ALARMS: THE SYSTEM IGNORES BIRDS, ANIMALS, SWAYING TREES, AND OTHER SOURCES OF FALSE POSITIVES. Email: info@axxonsoft.com www.axxonsoft.com