Access Control Softwares (609)
Gallagher Command Centre server and Controller Application Programming Interfaces (APIs) extend the functionality and flexibility of the Gallagher system as the platform for integration. The Gallagher Controller API is the solution, allowing for events to be sent to and received from third parties such as video, duress, building management, external alarm and fire alarm systems.
Add to CompareTITAN is a true 32-bit access control application that provides Windows interface for management, control and monitoring of the entire Challenger range of products. These include access control, alarm monitoring, HVAC, lighting control as well as video imaging system. Some of the other features of the system are: full upload and download capabilities; alarm handling, monitoring and control via graphics maps; Smart Card programmer facilities for the creation, programming and loading of Tecom Smart Cards and Readers; Alarm handling through a 2 tier response process with individual programmable instructions; flexible database and history reporting schedule and support of multiple card reader technologies.
Add to CompareKeyMaster Lite communicates with AC-3114 system controllers via direct serial port connections or dial-up modems. Using an Ethernet/RS-232 hardware bridge or software gateway, you can also set up communication with controllers via a corporate LAN or the Internet.
Add to CompareWith Gallagher Command Centre, the number of workstations or operators is limitless. Operators are subject to system division and are assigned privileges so they can only carry out authorised functions or view content defined for them. A site can be split into divisions and sub-divsions by system division (or partitioning). This is particularly suited to: Multi-tenanted buildings where tenants manage and monitor their own security. Large enterprise-wide systems where it is more practical to divide the site – by geographic zones for example – for ongoing management and monitoring. Site plans are a graphical representation of the site and show the real-time status of remote field devices and logical entities. They display visually rich, configurable elements such as fence lines and buildings with associated alarms and can be used for general site or alarm monitoring and management. Site plans feature touch-screen support and ‘free text’ objects. An unlimited number of site plans can be stored in the system.
Add to CompareINOVA access control systems ensure that only authorized people have access to facility and only during appropriate time periods. INOVA Master software provides easy administration and activity reporting. INOVA Master software provides a central location from which all required information is distributed to individual doors controllers. The software also retrieves activity data from individual control panels for activity and basic attendance reporting.
Add to CompareAccess control administration and reporting software suitable for multi-door applications in commercial and industrial applications. Inova Master for Windows features 40 Door Control Capacity ; Multiple Reporting Formats ; Schedule Door Unlock/Lock ; Manual Door Control ; 14 TimeZones for Card Access ; 15 Fully programmable Holiday Blocks ; and Windows 95' Style Graphical User Interface.
Add to CompareWith the CSW-2000 segments can be defined and credentials can be initialised (e.g. as Master-Token or as user credential). The configuration required for a project can be easily administrated. The graphical user interface enables a quick analysis of credentials as well as the configuration of LEGIC advant reader modules. The CSW-2000 can be operated together with the Configurator Hardware CHW-2000, the Development Kit DK-2000 or a LEGIC advant based reader from a LEGIC partner.
Add to CompareGraphic maps allow monitoring and control, extensive event reports, card holder management and badge design. Other features include interbase or MS SQL database management system, single or mult-user applications, 256 work stations, unrestricted number of controllers, readers and alarm panels, modular structure, multicard formats, 255 access levels, elevator control, duress and database conversion.
Add to CompareActively monitor workers within a zone, on local or remote sites. Ensure blast zones have been cleared before explosives are detonated. Monitor the movement of people to a muster area during an evacuation. Ensure the security control room is aware of workers who are alone on remote sites. Monitor who remains within a high security area at the end of a working day or shift.
Add to CompareThe AC2000 Time and Attendance module is a reporting method for the office manager/administrator who requires statistics on the in and out movements of staff. Integrated into the AC2000 system, it provides a very powerful, configurable tool that allows the administrator to run reports on the number of hours worked by staff. Rather than installing a separate timekeeping system, existing pass cards and readers can be used for both access control and time and attendance. Any number of readers on the system, at any location, can be configured as designated IN and OUT readers for the purposes of Time and Attendance. As each member of staff presents a card their transactions are populated into the AC2000 database.
Add to CompareGallagher Elevator High Level Interfaces (HLI) allow the Gallagher security system to control access to floors from elevator cars. With a range of high level interfaces, the Gallagher system can be integrated with your new or existing elevator system to provide access control to each individual floor. Destination Based Dispatching HLI enables elevator systems to group passengers travelling to similar destinations for more efficient access control.
Add to CompareMorse Watchmans TrueTouch client software comprises the KeyBank TrueTouch client interface and the KeyBank Server for enhanced administration and control of the KeyBank Touch system. It is designed to run all programming, remote functions and reports for up to 10 KeyBank Touch locations.
Add to CompareAccess management can be based on individual competencies allowing business to effectively manage compliance with business policy and government regulations. Access management can be based on individual competencies such as: Safety - is the employee inducted, trained, licensed and fit for work?Equipment - does the employee have the right vehicles or safety equipment?Security - does the employee have the right clearance?Regulatory compliance - are there other requirements the employee has to meet?The platform can also take account of validity periods and competence expiry. Access decisions are delivered to the individual instantly by the door reader or display monitor or via SMS.
Add to CompareExtend BIS Access Engine by the ability to control and manage doors that are not continuously online. Enjoy the advantages of centralised door management without the cost of a dedicated network. Choose from a wide range of compatible lock cylinders and door fittings.
Add to CompareCEM AC2000 Muster Zones application is used for emergency situations where card holders must congregate in a dedicated ‘safe’ location. The application can be used both in the evacuation of card holders to a location away from the site (or zone) or when necessary it can be used to enable card holder’s to move to a particular safe location within the premises
Add to CompareThe AC2000 VIPPS system provides a photo imaging application that is fully and seamlessly integrated with the AC2000 access control software. VIPPS gives the operator a range of video imaging facilities for capturing personnel images, company logos and personnel signatures and incorporating these onto professionally designed passes. VIPPS allows users to design professional quality permanent and temporary ID passes which can include text, logos, multiple colours, graphics, photos, barcodes and signatures.
Add to CompareThe AC2000 AED (Alarm and Event Display) is the integrated alarm processing software for AC2000 providing dynamic graphical representation of all system events. The main function of AED is to transmit real-time graphical, audio and textbased information on all alarms and events that occur on the AC2000 system. Operators can choose how they want to view alarms - graphical maps, text alarms list or both. AED provides password protected user access to ensure that only operators with the correct privileges may take certain actions. AED provides the interface between AC2000 and CCTV.
Add to CompareSDK stands for Software Development Kit which is set of library file for software development. Generally, SDK provides library file or API which helps to develop users' own software. The library or API provided by IDTECK are COM or OCX type file and they allow to interface with IDTECK's products. Software developer can develop own software with using Method or API which is opened from OCX.
Add to CompareExtend BIS Access Engine by the ability to control and manage doors that are not continuously online. Enjoy the advantages of centralised door management without the cost of a dedicated network. Choose from a wide range of compatible lock cylinders and door fittings.
Add to CompareThe SIA Intruder Interface with AC2000 SE enables alarms from intruder detection systems to be displayed using a single alarm display screen. Intruder detection panels are added to AC2000 SE as separate devices with alarms generated by the panels forwarded to AC2000 SE over an Ethernet network using the SIA protocol. Each panel is added to the system in groups of 8 or 16 inputs using a user friendly application which simplifies the configuration of larger intruder panel systems by automatically creating and addressing entries in the AC2000 devices table thereby greatly reducing the amount of data the operator must enter.
Add to CompareThe AC2000 Vehicles integrated vehicle management module allows users to produce a professional pass or vehicle tag for all vehicles which require access to secure areas, with the ability to associate cardholders to vehicle records. The AC2000 Vehicles module is used to store details of vehicles on the AC2000 system such as vehicle make, model and registration number.
Add to CompareThe AC2000 DVR suite of applications provides the ability to associate access control alarms with digital video clips. The DVR Configuration Module seamlessly integrates AC2000SE with Digital Video Management Systems (DVMS) giving the operator a range of video imaging facilities to generate alarm reports with associated video, view live video feed, control camera positioning, control image quality and capture images to file.
Add to CompareCEM AC2000 WEB Room Booking system allows users to define and book meeting rooms for a configurable period of time. The AC2000 WEB Room Booking function can be used in conjunction with the emerald™ TS300 touch screen terminal, which now includes Room Booking Remote Applications.
Add to Compare