Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n



Similar documents
CENTRALLY MANAGED. Access Control

Access CONTROL. MANAGEMENT Software

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

Centrally Managed Access Control

Access Control Management Software

Access control designed simply for you


WISE-4000 Series. WISE IoT Wireless I/O Modules

CKM-EP2500, CKM-EP1501, and CKM-EP1502 Mercury Network Controllers

HyperAccess Access Control System

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

Functional Specification Document

Topaz. GE Security. Intelligent software for access control. Topaz. Features

AC-115 Compact Networked Single Door Controller. Installation and User Manual

Doc 10. UTM Standards: Card Access Security System

EQUIPMENT SPECIFICATIONS

Tailored integration to suit you

1 Serial RS232 to Ethernet Adapter Installation Guide

IP Box Camera ACM Ver Hardware User s Manual

[FAQ] Troubleshooting Access Control Issues

Setting up the Swann HD IP cameras

JNIOR. Overview. Get Connected. Get Results. JNIOR Model 310. JNIOR Model 312. JNIOR Model 314. JNIOR Model 410

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

EC500 BASIC SOFTWARE SETUP GUIDE. Read This First. Easy Clocking EC500 Setup Guide - Page 1

APC Enterprise KVM Switches

NetAXS-123: One door, compact (plastic) enclosure. NetAXS-123: One door, standard (metal) enclosure with power supply and battery

Security and the Mitel Teleworker Solution

Reliable Security Solutions

Access Control System Document Number: , Rev. D. User Programming Guide. Essential Essential Plus Elite

PCS300 Universal IP Reporting Module V1.0

Doors.NET Access Control Software. Data Sheet. web:

Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by

L-1 Fingerprint Reader Solutions. V-Flex 4G

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

INTERFACING SECURITY SYSTEMS TO HOMEVISION

Installing and Configuring vcenter Support Assistant

FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS

Infinity 2020 Perimeter Intrusion Detection System

JKW-IP. IP Video Entry System. QuikStart Guide

Impact of Power-over-Ethernet (PoE) on Industrial-based Networking

Redefining Security for the Modern Facility

DMP Network Monitoring

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Introducing the Schlage NDE series wireless lock with ENGAGE technology

ACCESS CONTROL SYSTEM

Emerson Smart Firewall

Table of Contents. Chapter1. Introduction Before Installation System Requirements... 1

Long Reach PoE over Coaxial Extender Kit

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers

ebus Player Quick Start Guide

HP ProCurve Wireless Access Point 10ag Overview


NETWORK ENABLED EQUIPMENT MONITOR

GlobalSCAPE DMZ Gateway, v1. User Guide

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

System VII User Guide v7.0.21

Setting Up Scan to SMB on TaskALFA series MFP s.

SANGFOR SSL VPN. Quick Start Guide

E-Series. Human Machine Interfaces. Evolution By Design MITSUBISHI ELECTRIC AUTOMATION, INC.

Wifi Pan/Tilt IP Camera User Manual

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Installation Guide v1.11 and Higher

OnGuard Online User Guide

AxTraxNG Access Control Management Software

System Integration Software

DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide

Ethernet Radio Configuration Guide

Secure, Remote Access for IT Infrastructure Management

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions

Volume. EverAccess. User s Manual

System Management. What are my options for deploying System Management on remote computers?

Setting Up the Cisco Unified IP Phone

The Integrated Security Management Solutions With Embedded Software. Access Control Solutions For A Changing World

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

EC150 BASIC SOFTWARE SETUP GUIDE. Read This First. Easy Clocking EC150 Setup Guide - Page 1

Apps for Android. Apps for iphone & ipad INS584-3

Figure 1. Example of a Security System

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Copyright 2012 Trend Micro Incorporated. All rights reserved.

EntraPass v4.0 Access Control Software

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide

8180 SIP Audio Alerter

Sensor Monitoring and Remote Technologies 9 Voyager St, Linbro Park, Johannesburg Tel: ;

How To Use An Ip Phone With A Sim Sim Sims 2 (Iphone) Or Ip Phone (Ip Phone) With A Microsoft Ip Phone 2 (Ipphone) With An Ipro (Ipro) Or Sims 1 (Ip

Installation Guide: Delta Module Manager Launcher

4-CH Hybrid Digital Video Recorder

Print4 Solutions fully comply with all HIPAA regulations

Connection and Configuration of Baudisch SIP unit with Display and RFID Reader Module

Quick Installation Guide 24-port PoE switch with 2 copper Gigabit ports and 2 Gigabit SFP ports (af Version 15.4W)

SYMMETRY PRODUCT OVERVIEW

USING THE XPERT2 / 9210B ON A TCP/IP NETWORK

Application/Connection Examples

Site Monitor. Version 5.3

Ignify ecommerce. Item Requirements Notes

Diebold Security. for Every Aspect of Your Business

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

X Series Application Note 43:

Transcription:

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control as a service has forever changed. A simple concept that combined existing Keyscan access control hardware with a cloud-based version of our industry-leading access control management software. Together, they formed Keyscan CMAC which has revolutionized the business by introducing a new recurring revenue stream with access control. And, we made it easier for dealers and integrators to get started building intrinsic value in their business. Keyscan Hosted Services Keyscan Hosted Services (KHS) takes CMAC to a whole new cost-saving level. With KHS, dealers and integrators can choose the option to have access control data and software hosted by Keyscan at our facility using our secure server infrastructure. Keyscan Hosted Services simplifies the entire process and allows you the opportunity to create a CMAC business model offering remote and RMR-based managed access control services to your customers while avoiding the upfront expense attributed to implementing your own central host service. KHS advantages with zero risk With Keyscan Hosted Services, dealers and integrators can take advantage of a CMAC model, build a base of customers, reap a new RMR revenue stream, and refine their business model in ways that will build lasting and intrinsic value to their organization. Then, at a later time, if they ever choose to implement their own host service, Keyscan Hosted Services will make the future transfer of hosting responsibilities seamless and without complications. Keyscan Hosted Services is the new and convenient way for dealers and integrators to enter the recurring monthly revenue (RMR) model with Access Control, while allowing you to leverage existing core competencies. 2 Keyscan Hosted Services

to manage clients access control Rethinking Access Control Keyscan Hosted Services solution allows you to bring the benefits of Centrally Managed Access Control to a whole new group of customers that would not have previously considered it an option. The CMAC solution provides the convenience of web based access control without ever compromising security. For the first time, Dealers and Integrators can save time and valuable resources by partnering with Keyscan to establish a CMAC RMR-generating service. This allows your customers to focus on their core business, while having peace of mind that access control security experts are managing their facility security. KHS high data security, ease of use, with no compromise With any such internet-based hosting activity, security is always a top priority. Keyscan Hosted Services takes data security very seriously. That s why Keyscan uses AES Rijndael (Advanced Encryption Standard) technology to tightly secure all data transmissions. AES Rijndael is a symmetric-key standard that offers 256 bit encryption. This encryption level is so effective, it is approved and used for US government top secret level data transmissions. Keyscan also mandates SSL data certificates for all internet based log-in access. While security is a top priority, performance and ease of system installation is never compromised. KHS removes the up-front expense, maintenance and management commitment so you can focus on building your customer base and adding intrinsic value to your business. Not only is your data encrypted and secure it is always safe and protected when you need it with KHS back-up provisions. The result is high security coupled with day to day ease of use that is ultimately designed to maximize system deployments that drive a new found RMR stream. What s more, you ll appreciate that KHS makes the future transfer of hosting responsibility seamless and without complication. 3

Web Based Access Control Solutions With Keyscan Hosted Services, your customers still get the same maximum flexibility leveraging Keyscan s highly secured servers and IT infrastructure. Using Keyscan s industry-leading access control management software and the fully password protected K-WEB module; system management can be done from any PC or mobile device with an internet connection. The power and flexibility of Keyscan Hosted Services and K-WEB module provides organizations the ability to manage their facility s access control systems. K-WEB Home Page K-WEB capabilities Add and edit cardholders Assign and update cardholder access privileges Generate system reports Lock, unlock and pulse controlled doors Schedule visitors Review system status Change time zone schedules Door maintenance and status Live online transactions Cardholder Management With Keyscan Hosted Services, all your customer needs is a web connection and K-Web. It is the ideal solution you can offer your customers who need, or want, some level of autonomous control over their systems. Dealers and integrators may choose to create a turnkey offering and provide a one-stop management of their customers access control systems contributing to increased RMR. Door status control 4 Keyscan Hosted Services

Innovation driven by Reverse IP technology Keyscan Hosted Services uses a Reverse IP network technology for host connectivity and communications. This is accomplished using Keyscan s NET6P-KHS network communication board and a normal high speed internet connection. The Reverse IP technology establishes a Keyscan access control panel as a network appliance and reduces the level of IT knowledge required for system installation. And, with any such internet activity, your data security is ensured with Keyscan s adoption of AES Rijndael 256 bit encryption which is approved for US government top secret level transmissions. Keyscan s Reverse IP technology uses Dynamic Host Communication Protocol (DHCP), allowing the panel to auto negotiate a network IP address and eliminating the need for static IP addresses for the panel, which can be difficult to acquire. Navigating network ports and firewalls is also reduced with Keyscan s Reverse IP network technology. It ensures any technician can install the access control system with minimized network permissions or advanced IT training. Once the installation is complete, connectivity with the Keyscan host is kept indefinitely. If the connection to the Keyscan host is ever lost, the panel remains fully operational and will automatically re-connect to the Keyscan host - while continuing to log all activities. Once the connection is made, all logged activity will be uploaded to the host. Keyscan Hosted Services also runs the same Keyscan software you have come to depend on. No new training is required as all server and IT infrastructure is maintained by Keyscan. Using Keyscan Hosted Services in a CMAC application With Keyscan Hosted Services, your customers get the same flexibility of accessing their Keyscan System from anywhere in the world. The only difference is the data is hosted at Keyscan using our secure server infrastructure. Power CA150-KHS Single Mid-Span PoE Injector CA4500 Optional "out" Reader Keyscan K-WEB NET6P-KHS (Plug on board) External 12VDC Power Supply CA150-KHS Keyscan Hosted Services Secure Server. This infrastructure provides Access Control Management Software, system database, communications receiver and provides web client provisions. Power Optional "out" Reader 5

CA150-KHS Single Door PoE Equipped ACU Making access control more accessible Keyscan has always offered access control solutions that optimize system designs and maximize installation flexibility. At the heart of our organization is a vibrant team of engineers and product specialists that continually evaluate new and emerging technologies. Their aim is to select proven technologies that will enhance our product offering without compromising reliability and security. The CA150-KHS is a culmination of these efforts. The innovative CA150-KHS represents the latest addition to Keyscan s flexible line up of 2, 4 and 8 reader access control units and elevator floor access control units. When it comes to performance, capacities and overall capability, the CA150-KHS is comparable with our full range of access control units. From its total number of supported credentials to total number of supported time zones, not a single detail was overlooked. Exclusive to the CA150-KHS is the fact that it s equipped to support power-over-ethernet (PoE). That single door at the far end of a building or those customers that have only one critical door to be secured have never been so easily accommodated. How the CA150-KHS works with Keyscan Hosted Services and CMAC solutions The CA150-KHS is the perfect solution for Keyscan Hosted Services and Centrally Managed Access Control solutions. With all of the on-site features (network connectivity, power requirements, and door access) all contained in a single part, setting up customer sites couldn t be easier. Reverse networking functionality is built into the on-board ethernet connection and, with the AES encryption, provides a secure connection from customer sites to the Keyscan host server. Whether opening a new site with one door, or adding an additional door to an existing site, the CA150-KHS makes everything easier. Keyscan s entire line up of ACU s are designed to support CMAC, providing maximum system design flexibility. Best of all, there is no limit to the total number of doors that may be centrally managed. 6 Keyscan Hosted Services

CA150-KHS Single Door PoE Equipped ACU Design overview A) Status LEDs System status, communication and bit counter LEDs allow for instant system troubleshooting. B) Dual Processors Dual processors ensure uninterrupted panel operation even during system downloads. C) Tamper Switch If the CA150-KHS cover is removed, for any reason, the tamper switch will activate triggering a Panel Tamper Alarm. A B F E D) Network Connectivity Equipped with a PoE enabled Ethernet port (IEEE 802.3af); DHCP Supported; Encrypted/non-Encrypted modes. E) Four Supervised Inputs Inputs allow for request to exit (RTE), door contact input and two auxiliary inputs. F) Two Reader Ports Provides IN and OUT reader capabilities; Readers powered in PoE or DC supply mode up to 12VDC @500mA per port. C D G H G) Two Heavy Duty Relays One Strike Relay and one Auxiliary Relay are provided; Selectable powered or non-powered modes. Powered mode provides up to 12VDC @ 500mA per relay. Non-powered provides dry contact rated for 4 amp, 30VDC; 6 amp, 24VDC. H) DC Input/Output When PoE is not available a 12VDC input option is provided. Also available is a 12VDC output to supply any local auxiliary device such as a PIR, or glass-break sensor rated for 12VDC up to 250mA. Mix and match with Keyscan s full line up of access control and elevator floor control units: CA250; CA4500; CA8500; EC1500 and EC2500. Keyscan makes hosted services simple Be sure to inquire about Keyscan KHS kits. We ve simplified the KHS sales and ordering process by introducing CMAC kits. These kits are pre-configured to connect to Keyscan Hosted Servers and come complete with readers, cards and all necessary communications hardware. 7

KEYSCAN S FULL LINE UP OF ACCESS CONTROL UNITS PoE Single Door Control System Multiple Reader Access Control Systems Elevator Floor Control Systems Access Control Unit Doors/Elevator Floors Supported 1 door 2 doors 4 doors 8 doors 1 cab (up to 40 floors) 2 cabs (up to 16 floors) Reader Ports 2 (In/Out) 2 4 8 1 2 Multi-ACU Compatibility Yes (Ethernet) Yes Yes Yes Yes Yes System Status LEDs Yes Yes Yes Yes Yes Yes Dual Processors Yes Yes Yes Yes Yes Yes Flash Memory Yes Yes Yes Yes Yes Yes Power Fail Output NA Yes Yes Yes Yes Yes Floor Monitor Inputs (Supervised) CA150-KHS CA250 CA4500 CA8500 EC1500 EC2500 NA NA NA NA Yes Yes Inputs Request to Exit (RTE) Inputs (Supervised) 1 2 4 8 NA NA Door Contact Inputs 1 2 4 8 NA NA Auxiliary Inputs (Supervised) 2 8 16 16 NA NA I/O Input Expansion NA NA 64 (banks of 16) 64 (banks of 16) NA NA Outputs Auxiliary Output Relays 1 2 4 8 NA NA Expansion Auxiliary Output Relays NA NA 8 8 NA NA I/O Outputs NA NA 64 (banks of 16) 64 (banks of 16) NA NA Door Output Relays 1 2 4 8 NA NA Capacity No. of Cardholders 32,000 32,000 32,000 32,000 32,000 32,000 Transaction File Buffer 6000 6000 6000 6000 6000 6000 Time Zones 256 256 256 256 256 256 Time Schedules 512 512 512 512 512 512 Group Levels 511 511 511 511 511 511 Holiday Dates 64 64 64 64 64 64 Connectivity PoE-Power over Ethernet (IEEE 802.3af) Equipped NA NA NA NA NA KHS Reverse IP Equipped Optional Optional Optional Optional Optional Serial Communication Yes (single panel) Yes Yes Yes Yes Yes To learn more contact your Keyscan Regional Sales Manager or call: 1 888 KEYSCAN (539.7226) 901 Burns Street East Whitby, Ontario, L1N 0E6, Canada Toll Free: 1.888.KEYSCAN (Canada/US) Tel: +1.905.430.7226 Web: www.keyscan.ca Keyscan Inc. LR110441-1 complies to: UL STD 294 Fifth Ed. Access Control System Units CA8500; CA4500; CA250; EC1500; EC2500 16V ac, 40VA, Class 2 input; relay output contacts, 24V ac, 10A; 30V dc; 5A CSA STD C22.2 205-M1983 Signal Equipment 187789 KEY 2015-01 Keyscan Inc. (2015), a member of the Kaba Group. Information in this folder is intended for general use only. Some KHS configured hardware may be required. KHS master account must be opened and active before any KHS hardware can be installed. Keyscan Inc., reserves the right to alter designs and specifications without notice or obligation. Printed in Canada.