SYMMETRY. DATASHEET ACCESS CONTROL Product Overview



Similar documents
SYMMETRY PRODUCT OVERVIEW

L-1 Fingerprint Reader Solutions. V-Flex 4G

Reliable Security Solutions

P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

Security Management System

AxTraxNG Access Control Management Software

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Functional Specification Document

Tailored integration to suit you

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

Integrated Building Management and Security System. Building Automation & Security.

P2000 SECURITY MANAGEMENT SYSTEM. Interactive, real time security management

Gallagher Command Centre

AD-Series. Selection Guide

Corporate Overview... 3 The Pacom System... 4

Security Management System

C CURE 800/8000 Security Management Solution

Advanced Network Video And Alarm Management Suite

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

INTEGRATED SOFTWARE SOLUTIONS

Integrated Building Management and Security System. Building Automation & Security.

AKCess Pro Server Management Software

Security Center Unified Security Platform

EQUIPMENT SPECIFICATIONS

Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever.

Doors.NET Access Control Software. Data Sheet. web:

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Access CONTROL. MANAGEMENT Software

Access Professional Edition Selection Guide

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

IP Video Surveillance

Topaz. GE Security. Intelligent software for access control. Topaz. Features

AX.S Series Access Control and I.AM Series Identity Access Management

C CURE 800/8000 v10.1 Security Management Solution

The Access Engine. Building Integration System - The Access Engine. Security Systems

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

integrated fire and security solutions Maximum protection for buildings

Contents Page. We are Grosvenor Technology Page 3. Access Control Solutions Page 4. Workforce Management Page 4. Sateon Access Control Page 5

1838AP 1810AP PG. 48 PG. 42

TCP/IP Network Communication in Physical Access Control

CKM-EP2500, CKM-EP1501, and CKM-EP1502 Mercury Network Controllers

ivms-4200 Client Software Technical Specification v1.02

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Surveillance and Security for Casinos. Cost-Effective Solutions for Any Size Facility

ELM Security System Electronic Locking & Monitoring

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

Microsoft SQL Server 2008 R2 Express.

FACILITY PHYSICAL ACCESS CONTROL SYSTEM SURVEY for use by the NMSAC TWIC Working Group ONLY ****************************************

DIGIEVER CMS logiciel de gestion de super-vision et mur d image

Complete System Solutions For Personnel and Time Management

NETAVIS Observer 4.6. Full Feature List

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Building Integration System Selection Guide for V4.0

GMS GRAPHICAL MANAGEMENT SYSTEM

EntraPass v4.0 Access Control Software

Milestone Federated Architecture TM

Windows Embedded Security and Surveillance Solutions

Edge Metrics Data Center User Manual


bright blue Intelligent Access Management

IP Convergence Delivers Security, Connectivity, Simplicity... and More

High Performance Access Control and Integrated Security Systems

XProtect Product Overview

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone

A Fully Integrated Online Hotel Locking System

EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE

Integrated Security System

The Integrated Security Management Solutions With Embedded Software. Access Control Solutions For A Changing World

PoE-Touch Fingerprint and RFID Access Control

SiloPatrol. SiloTrack Inventory Management Software Version 3.5 BULLETIN 343B. Interface With Multiple Sensor Technologies

Remember, employee payroll is YOUR BIGGEST EXPENSE

IP Access Control Management System

CONTEG Pro Server Management software

WEBs-AX Enterprise Security

securityserver Unparalleled management and detection of security, environmental, and disaster control resources.

IP Camera Network Installations are More Difficult than Analog Camera Installations? Not So!

Milestone Edge Storage with flexible retrieval

City of Coral Gables

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

Pro-Watch 4.0 FEATURES. Security Management Suite

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

Advanced integration to industry-leading manufacturers of CCTV equipment and biometric technologies is also possible using the EXgarde PRO platform.

P2000 Security Management System MAKING THE CASE FOR SITUATIONAL AWARENESS

ACCESS CONTROL SYSTEM

emerald Intelligent Access Terminal

Access Control. Granta Security Management Systems you can count on. Answers for infrastructure. 1. Answers for infrastructure.

Smart Cards and Biometrics in Physical Access Control Systems

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

Electronic Security Systems Made in Germany

1 Product. Open Text is the leading fax server vendor in the world. *

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

Transcription:

DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations of any size from small offices requiring just a few card readers or cameras to large corporations and government agencies spread over multiple sites or countries. Access Control Video Management Alarm Management Identity Management Intrusion Management Intercom Control Situational Awareness Threat Level Manager Workflow Designer Biometrics With over 30,000 security systems installed worldwide, we are one of the leading Access Control system manufacturers. We have over 30 years of experience in developing state of the art hardware and software systems to secure everything from your local store to protecting some of the highest security facilities in the world. If you need a scalable system that can grow as your organization grows, our systems can expand to handle an unlimited number of employees spread over hundreds of sites. Our systems are designed to grow in scale and complexity as your organization evolves. AMAG Technology has complete control over the design and manufacture of both the key hardware and software systems, which enables us to include features that may otherwise be difficult to implement, and to react quickly to customers requirements. We are often told that Software is the best as it is very carefully designed and is certified by Microsoft. Our innovative, rapid development and forward thinking allows AMAG Technology to pioneer products at the forefront of the industry. Our products are designed with IT managers in mind, yet they are simple to learn, operate and install. Our approach to system design is choice using an open and standards based architecture. AMAG Technology s access control, digital video, identity management and intrusion systems integrate with the latest innovations on the market to provide you with the best options and choices. We are always at the leading edge of all security management technologies to bring you the latest technology straight into your building. AMAG Technology will continue to develop new products to encompass the latest technologies and integration. We re ahead of the pack, and that s where we intend to stay.

ACCESS CONTROL Software Packages One of five different types of software packages can be used: Professional Enterprise Global Business Homeland (USA & Canada only) The choice of software package depends on the size of the system, with Professional supporting the smallest systems, and Global supporting the largest systems. All software versions communicate over the LAN, WAN or Internet with a single server machine that holds the system databases. Since the system has been designed to use minimal bandwidth, your existing network can be used, resulting in little or no additional networking costs. For small systems, a single PC can be used, acting as both the client and server. All systems are certified on Microsoft Windows operating systems and provide a graphical user interface that minimizes training needs for users. The system employs the very latest thinking in user-interface design. Features such as customizable ribbon bars, wizards, icons, tree views and drag and drop techniques make the user interface intuitive and simple to use. Extensive online help gives instant information about the task that is being carried out. At the heart of all software packages is the powerful Microsoft SQL Server database engine which provides high levels of performance for systems of any size. The Professional software uses the Desktop Engine version of the software which is freely available and supplied on the installation CD. The database engine has the advantage of being highly scalable, enabling you to expand the system to any size as your requirements grow. What s in our Security Management System? Professional, Enterprise or Global (The PC-based security management software) One or more multinode Controller units A card reader for each access-controlled area An integrated security management system including video management, alarm, visitor, intercom and intrusion management Software Package Max Card Readers Max Number of Client PCs Max Number of Cards Notes Professional 512 9 Unlimited A true client / server system for systems requiring no more than 512 readers. The server can also be used as a client for smaller systems. Enterprise Unlimited Unlimited Unlimited Uses Microsoft SQL Server on a dedicated server. Optimized for a very large number of card holders across a LAN or WAN. Supports clustered servers and virtualization. Global Unlimited Unlimited Unlimited Builds on Professional and Enterprise to provide enhanced capabilities for remote management of multiple systems spread over a number of geographically separate sites. Enables centralized alarms and card handling from a single site. Homeland Unlimited Unlimited Unlimited Designed specifically for users of federal smart card standards including FIPS 201, CAC, PIV, TWIC & FRAC. Available in USA and Canada only.

ACCESS CONTROL DATASHEET SymmETry Security Management Software Each user runs Security Management software, the application that allows you to configure, monitor and control the security management system. The software lets you set up card holders, assign access rights, produce reports, monitor alarm conditions and control hardware such as cameras and readers. The Security Management software includes an extensive range of standard features. The ability to customize the system to show only those features that your users require ensures that operator training is kept to a minimum and allows users who have different requirements to be presented with different features. The ability to customize the system in many other ways underlines the inherent flexibility of its design and ensures that the system performs to your exact requirements without compromising ease of use. The Security Management software has been designed to provide the most efficient system management with extensive and flexible reporting capabilities. The wide range of standard features ensures that you can obtain the full benefits from your investment. Key DESign ConcEPTS hardware and software is based on these main design concepts: Ease of use Flexibility Scalability Open architecture Modularity Backward & forward compatibility SymmETry Security Management Software STAnDArd FeaturES Access Control Video Management Identity Management Alarm Management Graphic Maps Command & Control Situational Awareness Badge Designer Advanced Tools Management Reports Other Optional Management ModulES Threat Level Manager Intrusion Management Workflow Designer Guard Patrol Safety Roll Call Data Connect - Import / Export XML Open Integration WEB TM client Intercom Management Directory Sync Manager SymmETry Door Controllers door controllers provide the distributed intelligence for access control and alarm monitoring. Using the relevant rules set up in, the door Controllers manage the connected devices, including card readers, locking devices, alarm sensors and auxiliary outputs. A multinode Controller can operate offline from the server to decide whether or not to grant access and can respond in the desired manner to any attempted access violation. Online communication with the server can be achieved using any standard IP network or direct RS232 link, or via dial-up modem for remote sites. Online access enables alarms monitoring, reporting and hardware control from any network connected device. The key design concept behind the door controllers modularity enables you to choose and purchase only those components that are actually required, right down to the PCB level. This approach leads to extremely cost-effective solutions that are tailored to your own requirements.

ACCESS CONTROL multinode 2150 Controller The multinode-2150 is a modular range of intelligent controllers that provide very flexible configurations for up to 16 card readers and 250,000 card holders EDGE NETWORK CONTROLLERS The 1 & 2 door EN controllers are cost effective, reducing installation costs by using Power over Ethernet for locks. SR CONTROLLERS SR Controllers are the perfect plug & play retrofit solution to replace legacy Casi Rusco Picture Perfect, Secure Perfect and FCWnx Systems. multinode Controller Benefits Distributed Intelligence Distributed database for resilient Access Control Off-site redundancy Cost-effective modular design Easy to install Easy system expansion Compatible with a wide range of standard card readers High levels of integration Flash memory reduces upgrade time Offline control Communications security UL-Listed variants Alarm Panel Integration Intrusion detection system integration Alarm control and acknowledgement from the Security Management System Open Integration Platform Management Integration of systems throughout an organization is often a key business requirement. The open platform provided by our security management system allows high levels of integration with other third-party systems. Allows import/export to a Microsoft SQL database Encryption prevents unauthorized data from being imported Selectable card data for export CARD Reader Technologies The M2150 Controller supports a full range of reading technologies including smart card, proximity, magstripe, biometrics and Wiegand (via Wiegand Interface Modules). Each card reader can control alarm inputs, auxiliary outputs and readers, including our own ranges of magnetic stripe, proximity, smart card and biometric readers, NXP MIFARE, DESFire and PIV card readers. The system can be expanded as required by using additional control units. is fully compatible with HID iclass card readers. Further system flexibility is provided by a range of remote door/ alarm units, which can be connected up to 3000 ft (1 km) from the controlling database unit. The remote door/alarm units provide a cost-effective method of connecting doors and alarm sensors that are located across a wide area. Card Readers We manufacture a wide range of reliable, high-performance card readers to meet all requirements. Javelin CARD Readers Javelin Card Readers employ the very latest proximity and contactless smart card technologies and enable the widest range of compatibility. Features wall switch and keypad versions Provides compatibility with: - NXP MIFARE Plus and DESFire - HID format proximity cards - US Government PIV, TWIC, FRAC & CAC-NG cards The Benefits Easy to install, with standard mountings High performance and reliability, many with lifetime warranty Supervised communications

ACCESS CONTROL Attractive designs Easy-to-follow instructions The full range of reader technologies from a single supplier High degree of integration with third party hardware and software Connection distance of 3000ft (1km) from multinode HID CARD Readers supports HID iclass and all other card readers following the Weigand protocol. Support is also included for hand, iris, face and fingerprint recognition. Network Cameras The network camera range makes AMAG a one-stopshop for all the key security system components. The cameras contain top quality, low cost, video analytics which integrate with software triggers to create an additional layer of security. Video Management Software Live video review of up to 72 concurrent cameras per client PC Managed, indexed storage of H.264 and MPEG-4 video from the network cameras and encoders Event-based recording integrated with Intrusion and Access Control Alarm Management including analytic and video loss alarms Graphical Maps with interactive video control Review stored video from NVR, network camera archive and video encoders Instant-replay of recently recorded video Record Now feature allows guards to initiate recording Flexible on Event presentation of video AMAG Technology www.amag.com salg@sbdinc.com www.stanleysecurity.no Tlf: 05010 03/14 AMAG Technology 2014. AMAG Technology Inc. is a subsidiary of G4S Technology Limited.