Access Control Softwares (563)
CEM SWHDVR-AD AC2000 American Dynamics HDVR interface provides the ability to associate access control alarms with digital video clips and to view live camera footage. This enables AC2000 to act as the central Security Management System. The AC2000 Video Configuration module seamlessly integrates AC2000 with the HDVR, giving the operator a range of facilities to generate alarm reports with recorded video playback. The high level two-way interface allows a user to fully integrate the power of an American Dynamics HDVR video system into the central AC2000 AED (Alarm and Event Display) application.
Add to CompareGallagher’s Action on Access solution allows a badge at a nominated reader to enable or disable access (card, competency, or access group membership) immediately or in the future, providing the ability to set sophisticated access rules using simple actions.
Add to CompareFor small- or medium-sized companies that need to increase key control and accountability throughout their organisation Manage as many as 500 locks and 500 keys Download detailed audit trails of lock and key activity Set key access schedules (i.e. M-F 8:00 a.m. – 5:00 p.m.) Expire and/or deactivate keys Manage lost keys Program locks with a multiple key mode (requires more than one key to open a lock) Program locks with a delay mode (a period of time before the lock actually opens after a key has been presented) Configure automatic email notifications on access activity (i.e. low battery, key expiration, notification of events) Grouping capabilities for locks and people Access through a LAN or securely over the Internet
Add to CompareIncludes three security features - The first is an option that makes the first key of a multi-key operation the sole key able to open a CyberLock within a sixteen-second window. The second adds a Temporary Activation option that enables activating an expired CyberKey for five minutes by touching a selected CyberLock or CyberPoint® on legacy CyberKeys G2. A CyberKey can support temporary activation times between 2 min and 72 hours. The third feature provides an option to limit temporary activation and one-time use settings on legacy CyberKeys to an eight-second window.
Add to CompareIdesco ID lets you easily and cost-effectively integrate mobile identification into your own conventional access control system. It does this first by eliminating any need for a parallel stand-alone system or registering with a cloud service. This greatly simplifies management and distribution of users’ mobile credentials because Idesco ID lets you send them directly from within your own system. Idesco ID also provides its own user-friendly mobile app to users free, letting them conveniently enter your site’s doors using only their mobile phones. Large organizations choose from two integration options for Idesco ID. Either initiate mobile credential registration with all your organization’s phones at one time or integrate Idesco ID to initiate credential registration whenever a new one is needed, 24/7/365. Small organizations with only intermittent need enjoy an even simpler solution. When your user downloads and installs free Idesco ID mobile app, it automatically embeds a unique mobile credential in their phones. Idesco’s pc-connectable Enrollment station will detect and forward this credential directly to your system. Idesco ID app connects with Idesco’s mobile-compatible 8 CD 2.0 MI readers. Idesco ID won’t require any cloud service. Alternatively, you can opt to integrate your own existing mobile access app to Idesco ID service. This lets you register mobile access for users’ phones – again, directly from your own system. System managers choose from three different security levels for each reader; 1) convenient and hygienic hands-free access without touching the phone, 2) choose nearby door from phone’s screen, or 3) first release phone’s own security lock before choosing door.
Add to ComparewebEntry™ TimeManager is a reporting method for the office manager/administrator who requires statistics on the in and out movements of staff. Using transaction files, automatically emailed from the webEntry™ controller, the software provides a configurable tool that allows the administrator to run reports on the number of hours worked by staff. Rather than installing a separate timekeeping system, existing pass cards and readers can be used for both access control and time and attendance reporting.
Add to CompareAC2000 Zone Monitor allows a real time view of all cardholder movements in defined zones. Zone Monitor provides up to date information on who is present on site for safety and security reasons and offers a real time display / numerical counter of every individual in a pre-defined zone within the building / site.
Add to CompareAdds features required to manage all the functionality the door & I/O hardware module brings to a Flex System installation In addition to managing individual access rights to each other, Request-to-Exit (RTE) events are recorded, doors can be set to automatically unlock and relock at specified times, doors sensors are monitored, and alarms can be triggered if a door is forced or left open after a specified amount of time
Add to CompareCEM AC2000 Guard Tours provides the facility to define a list of readers/ inputs that a security guard must visit in a certain order and within a specified time period. If the guard does not either swipe at a pre configured card reader time or activate a pre configured input within the guard tours parameters, an alarm will be sent to the AC2000 AED (Alarm Event Display) application.
Add to CompareAutomates the process of changing lock access codes for some or all CyberLock cylinders in a system Access codes may be configured to change (roll) on a periodic basis A “grace period” may be designated during which the lock will continue to honor the old access codes to complete the change for all affected locks
Add to CompareAdds complete support for adding FlashLocks and fobs to a CyberLock system To grant access, FlashLocks may be added to an access list Fobs may be assigned to people and given an expiration rule Flash access may be distributed by email or text message
Add to CompareAn access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS or Bosch B and G series intrusion panels As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors Intrusion areas can be armed directly from the Map View, and intrusion panel users can be centrally managed Combines high-end access control features, performance and availability with intuitive operation Web-based visitor management Comprehensive security management: Integrates with intrusion and video systems Highly scalable Easy to configure
Add to CompareProvides integration between the OnGuard Total Security Knowledge Management Solution and IT applications. OnGuard OpenIT allows OnGuard cardholders to be linked to Windows Login Accounts, OnGuard applications to be deployed (full scale or scaled down versions) onto alternative computing platforms, and information sharing and integration points with third party information systems products such as Tivoli, HP OpenView and IBM WebSphere Message Adapter.
Add to CompareAn access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS or Bosch B and G series intrusion panels As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors Intrusion areas can be armed directly from the Map View, and intrusion panel users can be centrally managed Combines high-end access control features, performance and availability with intuitive operation Web-based visitor management Comprehensive security management: Integrates with intrusion and video systems Highly scalable Easy to configure
Add to CompareAn access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS or Bosch B and G series intrusion panels As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors Intrusion areas can be armed directly from the Map View, and intrusion panel users can be centrally managed Combines high-end access control features, performance and availability with intuitive operation Web-based visitor management Comprehensive security management: Integrates with intrusion and video systems Highly scalable Easy to configure Easy to use: Intuitive GUI for maps and alarm viewer
Add to CompareEnables security level to be easily changed to match perceived threat Provides five fully-customisable levels of security Allows selective access, depending on threat level Enables site security to be enhanced during periods of low occupancy (e.g. holiday periods) Allows site security to be quickly relaxed during fire or other evacuation emergencies Executes commands when threat level changes (e.g. sets doors to card-and-PIN mode) Scheduled and conditional commands can be enabled/disabled, depending on threat level Provides compatibility with Government threat-level security policies
Add to ComparePure Access Cloud experienced a great launch at ISC West 2016, and the RMR model resonated with customers even more this year. Pure Access is a fully hosted cloud-based, access control platform that provides full administration, and management of ISONAS Pure IP access control solution. The modern user interface establishes a new standard for ease of use in managing an unlimited number of access points across any geography through a mobile device, tablet or modern browser. It also provides certified integrator partners with an opportunity to provide a very high level of service to their customers through an off-the-shelf, managed access control platform that empowers their existing RMR model. The simple installation and management of an IP access control system with a cloud software provides the industry with the next level of access control, a simple and easy installation and a no hassle software platform, hosted by ISONAS.
Add to CompareSmart Card, Microsoft Windows 2000, XP (32 or 64 bit), Windows Vista (32 or 64 bit), and Windows 7 (32 or 64 bit) operating systems, Microsoft® Internet Explorer Web browser (v6.0 or later)
Add to CompareProvides a quick, hassle-free experience for visitors Supports receptionists with features that make their many tasks smooth, efficient and secure Keeps track of expected, checked-in and overdue visitors Handles even high visitor volumes as smoothly and efficiently as possible Allows hosts to easily pre-register their visitors for smoother, faster processing on the day
Add to CompareManage access control hardware Monitor building HVAC, fire detection, and elevator devices Display video of access control events in the Senstar Symphony™ VMS (each event can be linked to graphical map and multiple videofeeds) Comprehensive modules for Event management, Device management, User enrollment, Access levels and profiles, Schedules, Triggers and macros, Logging and reporting Active Directory synchronisation Per-door licensing, no artificial device limits
Add to Compare