CENTRALLY MANAGED. Access Control



Similar documents
Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

Access CONTROL. MANAGEMENT Software

Access Control Management Software

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

Setting Up Scan to SMB on TaskALFA series MFP s.

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP

NETASQ SSO Agent Installation and deployment

KEYSCAN SOFTWARE - END-USER LICENSE AGREEMENT

How To Use Quantum Rbs Inc. Small Business Backup

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Getting Started with HC SharePoint Module

Ignify ecommerce. Item Requirements Notes

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Security and the Mitel Teleworker Solution

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Experiment # 6 Remote Access Services

Locking down a Hitachi ID Suite server

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Potential Targets - Field Devices

Immotec Systems, Inc. SQL Server 2005 Installation Document

Cloudvue Remote Desktop Client GUI User Guide

E-Commerce: Designing And Creating An Online Store

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

Technical Support Information

MIGRATION GUIDE. Authentication Server

Internet/Intranet Alarm Communications. Maximize security and convenience with Internet/Intranet alarm communications

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc.

IP Wireless / Wired Camera NIGHT VISION & REMOTE PAN/TILT ROTATE. User Manual

QUANTIFY INSTALLATION GUIDE

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Remote Application Server Version 14. Last updated:

AVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS

Section 12 MUST BE COMPLETED BY: 4/22

YubiCloud OTP Validation Service. Version 1.2

SECURITY DOCUMENT. BetterTranslationTechnology

TOP SECRETS OF CLOUD SECURITY

An online up-to-date version of this document is available on the Scomis Frequently Asked Questions website

How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

WhatsUp Gold v16.1 Installation and Configuration Guide

SNMP Manager User s Manual

Emerson Smart Firewall

NCSU SSO. Case Study

Cisco ASA. Administrators

VPN Lesson 2: VPN Implementation. Summary

Configuring Routers and Their Settings

Installation and Deployment in Microsoft Dynamics CRM 2013

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA USA. November v1.0

Allworx OfficeSafe Operations Guide Release 6.0

How to Secure a Groove Manager Web Site

ADDING STRONGER AUTHENTICATION for VPN Access Control

Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack

Quick Start Guide: Iridium GO! Advanced Portal

NEFSIS DEDICATED SERVER

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Network Management System (NMS) FAQ

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Pearl Echo Installation Checklist

VMware Mirage Web Manager Guide

Two Factor Authentication in SonicOS

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

System Management. What are my options for deploying System Management on remote computers?

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

EntraPass v4.0 Access Control Software

X Series Application Note 43:

3.5 EXTERNAL NETWORK HDD. User s Manual

Wireless Encryption Protection

System VII User Guide v7.0.21

L-1 Fingerprint Reader Solutions. V-Flex 4G

How to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2

Remote Application Server Version 14. Last updated:

Connection and Configuration of Baudisch SIP unit with Display and RFID Reader Module

Unisys Internet Remote Support

Cisco QuickVPN Installation Tips for Windows Operating Systems

High Level Design Distributed Network Traffic Controller

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

BestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.

Transcription:

CENTRALLY MANAGED Access Control

Keyscan Introduces a whole new way to think about access Control 2 KEYSCAN Centrally managed solutions

Keyscan s Centrally Managed Access Control Solution (CMAC) has revolutionized access control as a service. Based on Keyscan s world class access control systems, our centrally managed solution provides a wide range of new features designed with the integrator in mind. End-users continue to benefit from Keyscan s industry renowned ease of use, while reducing the upfront costs associated with implementing a traditional access control system, opening up a whole new market of customers for installers and dealers. The Keyscan CMAC solution is run with the feature loaded System VII Access Control Management Software with the flexible, convenient K-Web application, to allow users to perform dayto-day system maintenance from any internet connection. The Keyscan CMAC model allows integrators to easily migrate to offering access control as a service, without additional training, and enables them to easily create recurring monthly revenue for their business. End-user customers will save on computers, servers, and administrative costs. With a centrally managed system, all they will require is internet access. Smaller organizations that do not have the resources and man power to manage their own system benefit from lower up front costs, and installing dealers increase their customer base by offering access control as a service with the Keyscan solution. SOFTWARE AS A SERVICE (SAAS) SAME PANEL USED BY LARGE CORPORATIONS EASY IP CONFIGURATION LOWERED UP FRONT COSTS $ rethinking access Control Keyscan s Centrally Managed Access Control solution brings the benefits of electronic access control to a whole new group of end-users that would not have previously considered it an option. The CMAC solution provides the convenience of web based access control without ever compromising security. End-users save time and valuable resources by partnering with an access control service provider. This allows end-user organizations to focus on their core business, while having peace of mind that their facility security is being managed by access control security experts. NO ON-SITE SOFTWARE NO DATABASE MAINTENANCE NO ON-SITE SERVER OR PC REQUIRED 3

web Based solutions With Keyscan s Centrally Managed Access Control, you get the flexibility of accessing your Keyscan System from anywhere in the world. Using the fully password protected K-WEB module; system maintenance can be done from any internet connection. The power and flexibility of K-WEB allows end users, based on their login permissions, to manage these core functions from anywhere: Add and edit card holders Assign and update card holder access privileges Full reporting capability Lock & unlock doors Schedule visitors View system status Change Time Zone Schedules Door maintenance and status Card Holder Management Main Web Page Door Control 4 KEYSCAN Centrally managed solutions

how Keyscan makes It secure and easy The Keyscan Centrally Managed Access Control solution uses reverse network technology for host connectivity. This reverse network technology establishes the Keyscan panel as a network appliance and dramatically reduces the level of IT knowledge required for system installation. The reverse network technology uses Dynamic Host Communication Protocol (DHCP), allowing the panels to auto negotiate a network IP. This eliminates the need for static IP addresses at the panel, which are not only costly, but can be difficult to acquire when working with an enduser s IT department. The trouble of navigating network ports and firewalls is eliminated with Keyscan s reverse network technology, and ensures that any technician can install the access control system without special network permissions, or advanced IT training. Panel connectivity with the host is kept indefinitely, ensuring that adding and deleting cards or generating reports occurs instantaneously. If the connection to the central host is ever lost, the panel will automatically attempt to reestablish connection. The panel will continue to look for the central host until connection is made with the database. In the event that anything should happen to the panel onsite, the presence of a backend database allows for easy recovery of information and reduces panel downtime. Keyscan s Centrally Managed Access Control runs on the same Keyscan software installers have come to depend on. No new training is required as all equipment is installed normally at the end-user site. The reverse network connection is established using Keyscan s NETCOM6 network communication board, which allows for panel communication back to the central host using a high speed internet connection. The reverse network solution also utilizes AES Rijndael 256 bit U.S. government approved Top Secret encryption, ensuring all internet based communications are secure. As always with Keyscan, total security is a top priority. I N T E R N E T Router/Switch Internet Modem Firewall SINGLE CLIENT DEPLOYMENT * Diagram for informational purposes only. Actual implementations may vary. Contact Keyscan for design specifications Access control as a service customers 5

Creating a Central Host The central host is set up using three software programs. Communication Receiver Software The communications receiver runs complex encryption/decryption algorithms to validate access control panels that request connectivity via the internet. It also manages communication activity for panels that have been authenticated and have established a connection. System VII & Database The standard System VII SQL Express database runs at the central host and provides capability for an unlimited number of sites or end-user connections. For central stations that grow beyond the SQL Express capabilities, Keyscan offers a full SQL upgrade. Keyscan s System VII client is installed at the central host to provide full system management functionality for administration and maintenance. This allows for Keyscan s impressive and feature packed System VII Access Control Management Software to be used for every end user site. Router/Switch Firewall Keyscan CMAC Server(s) Internet Modem 6 KEYSCAN CENTRALLY MANAGED SOLUTIONS

K-weB Installing the K-WEB software at the central host allows the integrator to provide end-users a level of control over the management of their access control system, without the need for any special software. This remote administration tool allows those end-users that wish to retain some control over their system a completely secure web portal to perform general system management. Whether using a smart phone or internet connected computer this remote administration tool provides the ultimate in convenience. Access control as a service customers I N T E R N E T SYSTEM EXPANSION * Diagram for informational purposes only. Actual implementations may vary. Contact Keyscan for design specifications 7

KeysCan InC. 901 Burns Street East, Whitby, ON Canada L1N 6A6 Phone: +1 905.430.7226 Fax: +1 905.430.7275 Toll Free: +1 888-KEYSCAN (539.7226) Web Site: www.keyscan.ca Key 2011-03 KeysCan InC. hardware ComPlIes to (lr110441): UL STD 294 Access Control System Units CSA STD C22.2 CSA STD C22.2 CE 0.4-M1982 Bonding and Grounding of electrical equipment 205-M1983 Signal Equipment NRTL/C Information in this folder is intended for general use only. Keyscan Inc reserves the right to alter designs and specifications without notice or obligation. Keyscan, Inc (2010) Printed in Canada