Extended set of benefits: new version of Building Integration System from Bosch to be launched
Extended set of benefits: new version of Building Integration System from Bosch to be launched

Including interface advancements, enlarged vendor independency and compatibility with the latest Windows Internet Explorer 9, Bosch Security Systems introduces a number of updates to its Building Integration System (BIS). The new version 2.5, which is available from early May 2012, increases the range of supported devices to more than 1,000 different third party cameras and encoders, making it suitable for even the most complex integration projects. The new system allows further optimized security, safety and communication management in one front-end system with customized user interface. The range of video devices supported by BIS 2.5 is unmatched in the industry. It seamlessly interoperates with virtually any video camera, connecting to the latest IP cameras on the market with HD and H.264 encoding technology. The Divar 700 and Bosch Recording Station are supported in their most recent versions. BIS 2.5 benefits installers and end users alike: certified BIS partners and systems integrators enjoy an upgraded level of customization options, such as new layout formats for a wide range of monitor sizes (including 16:9 and 16:10). Thanks to numerous handy improvements, such as useful additions to the symbol libraries, it is now even easier to personalize the system. BIS 2.5 is interoperable with the large variety of ONVIF-compatible, modern IP-based video products supplied by all major manufacturers. ONVIF ensures a uniform standard, allowing customers to choose the product that best fits their individual needs, without having to worry about compatibility. It thereby saves costs and allows long term planning. The ONVIF standard was first introduced by a consortium of companies, including founding member Bosch, in 2008.

Add to Compare
Paxton Access Paxton10 v4.3 online access control & video management software
Paxton Access Paxton10 v4.3 online access control & video management software

Administers system with a simple to use interface in a web-browser without having to install additional software View live and archived footage with a powerful built in video management system Create a system spanning multiple sites and/or subnets, for control and management from a single remote user interface Scalable up to 100 sites on a single system with up to 1,000 doors, 1,000 cameras and 50,000 users Log into the system from a web-browser anywhere in the world with an internet connection Administer system on mobile devices with the free Paxton Connect app that can be used off site Use smartphone or smartwatch in place of traditional tokens with the free Paxton Key app Customise view of Paxton10, create widgets and build dashboard, combining video, site plans, events and building controls Fully customisable software permissions allow to give tailored access to particular areas of the software, reports, dashboards or users Create effective landlord/tenant scenarios with customisable building permissions and folder structures, with access only for specific user Use the software to control devices on the system; for example, open a door Import images for a visual representation of site, to monitor access, control devices or view video simply and easily Easily create rules based on system events, including controlling other doors, devices or arm/disarm the intruder alarm Prevent a user from passing their token back to a second person to gain entry into the same controlled area Create reports listing all users currently within a specified area. In the event of an emergency this helps to confirm all users have evacuated safely

Add to Compare
AMAG's Symmetry Mobile Offers Frictionless Solution
AMAG's Symmetry Mobile Offers Frictionless Solution

Symmetry Mobile is a web credential application designed to be used with AMAG Technology’s Symmetry Bluetooth readers. Symmetry Mobile is a convenient solution for organizations using mobile devices or in conjunction with physical credentials for users who are transitioning to a mobile system to gain access to secured doors. It works with AMAG’s Symmetry Access Control system, as well as other access control systems, providing a seamless, efficient and cost-effective solution for enterprise users deploying more than one system.  The touchless solution supports multi-factor authentication when used with a PIN or biometric (fingerprint or facial recognition) on both Android and Apple iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in support of COVID-19 guidelines.  The frictionless setup of a credential eliminates the need to physically interact with the security team. Organizations can centrally issue and manage mobile credentials, photos and devices to their entire user base from a remote location, eliminating the need to buy and carry a physical credential and come into the badge office.  The virtual credential in Symmetry Mobile displays a person’s name and photo. An unlimited number of credentials can be stored within their digital wallet, allowing people who need to access multiple sites using different access control systems to use the same mobile device.  In an effort to support businesses that required employees to be on-site and ensure the health and safety of the labor force, AMAG developed a customizable health screening questionnaire to help reduce the risk of potentially infected employees from entering a building. Upon successful completion of the questionnaire, an employee’s physical access card or mobile credential will be enabled for a specified period of time, for example, one day. If the form is not completed successfully, the access card will expire and the employee will be denied access to the building. The system will send email notifications to managers for visibility.  The questionnaire’s functionality operates independently and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile data is highly secure, as all of the data is encrypted when sent to the reader or stored on the phone, ensuring the mobile solution is completely secure.  Users can customize the signal strength and read range on a per device and/or per person basis, increasing security and accommodating those who may need a longer read range, such as a person in a wheelchair, to open a door. Door read and unlock time is less than 1.2 seconds.  Symmetry Mobile is available as a hosted or on-premise solution.  The app is available in English, Spanish, French and Arabic, and is available now in the Apple App Store and Google Play Store.

Add to Compare
Tyco's CEM AC2000 Lite - low cost access control for small to medium sized facilities
Tyco's CEM AC2000 Lite - low cost access control for small to medium sized facilities

Key features:Taking advantage of core software features within the industry-renowned AC2000 SE system and supporting CEM's range of industry leading hardware products, AC2000 Lite is setting the benchmark as one of the most accomplished security management solutions available for the small to mid-range markets. The AC2000 Lite has a system controller which any client workstation on the network can access to manage the database, monitor alarm activity or configure devices.Supporting up to 128 doors, AC2000 Lite comes fully-loaded with all the software required for performing all system tasks. This includes access control, ID badging, graphical alarms maps, vehicle management, visitor management, time & attendance and much more.Supports Power over Ethernet access control - CEM DIU 220 (Power over Ethernet Door Interface Unit) allows power and comms to be provided at the door via a single Cat 5/6 cable.Using the CEM DCM 300 intelligent two door IP controller, AC2000 Lite supports most third-party read heads conforming to the physical Wiegand interfaces, including support for third-party biometric technology. Supporting CEM's advanced range of IP card readers including the industry first S610e reader and with an on-board database, CEM's readers store transactions and operate offline, with the additional option of card plus PIN control. A graphical LCD display allows messages to be displayed such as ‘wrong zone', ‘lost/stolen card', ‘invalid card', ‘expiring card'.Easy system set-up - web-based configuration tool to perform the basic set-up and configuration of the AC2000 Lite Controller.

Add to Compare
Hirsch's Velocity Security Management System on show at ISC West
Hirsch's Velocity Security Management System on show at ISC West

Velocity Security Management SystemHirsch's Velocity delivers total security in an all-in-one package: Access control: readers, keypads, biometrics, controllers for doors, gates, elevatorsAlarm monitoring, intrusion detection: sensors, alarm routing, automated responses, history/reports Video, CCTV: cameras, DVRs, links to analyticsIdentification management: smart cards, photo badges, integration with IDMS, CMS, watch listsInteroperability: with personnel system, network log-on, provisioning, command & control, central station, parking, HVAC, lighting, other devices, other databasesVelocity is network-ready & IT friendly.  Velocity employs IT-centric tools such as integration with directory services, encrypted TCP/IP communications, and support of split server configurations and high-availability environments.The system is highly secure, requires little bandwidth, and is scalable to even the largest organisations.  Velocity supports Unified Identity Management with a full line of smart card readers, biometrics and privacy-sensitive keypads.  Velocity's open architecture, SDK, and built-in XML interoperability enable you to integrate Velocity with building automation and other systems.  Velocity is designed to tightly integrate with personnel and network provisioning systems, allowing it to serve as the physical security component of an overall Role-Based Access Control (RBAC) and policy-based security management system.  This approach can help enhance security, improve operational efficiency and reduce administrative and compliance costs.Velocity has earned numerous industry awards including an unprecedented five-time winning of the U.S. Security Industry Association's Product Achievement Award.

Add to Compare
iData SoHo - the new stand-alone iris recognition platform from LG Iris
iData SoHo - the new stand-alone iris recognition platform from LG Iris

LG Iris Technology has been the key developer and driver of the commercialisation of iris recognition technology.  LG IrisAccess, now in its third generation, is the world's leading deployed iris recognition platform.  LG's biometric solutions, enabling non-contact and highly accurate identification by the iris of the eye, deliver security, convenience, privacy and productivity to millions around the world.  The LG IrisAccess platform identifies more people in more places than all other iris recognition products combined.LG IrisAccess 4000 solution is versatile and flexible providing easy integration and expansion.  Enrolment and recognition are also easier than ever.  An intuitive user interface, with visual and audible prompts, enables users to be quickly enrolled and identified.  Dual iris capture and a power, auto-tilt mechanism increases speed and convenience by adjusting for height with one simple touch.Combining LG's IrisAccess 4000 and the new iData SoHo software solution from LG's suite of identity access control applications provides a simple, flexible and robust solution for any environment.Features include:Enrolment: iData SoHo provides the system administrator with a flexible interface to enrol individuals in the database with a simple user interface.Setup: iData SoHo provides a simple configuration solution, as the system has the ability to configure itself via DHCP.  Alternatively, the system provides the option to set static IP addresses. An administrator can also control a relay to activate a door strike, or reset permissions.  Wiegand formats up to 128 bits are supported.Reporting: iData SoHo is designed to identify individuals as their biometric is presented.  All transactions are stored in the system log and can be accessed by the system administrator for download, review and printing.

Add to Compare
Lenel offers web enabled applications with OnGuard 2006
Lenel offers web enabled applications with OnGuard 2006

OnGuard 2006 seamlessly integrates access control, ID credential issuance and management, alarm monitoring, digital video surveillance and management, intelligent video, biometric technology integration, intrusion detection, visitor management and smart card functionality.  OnGuard 2006 marks Lenel’s entry into an XML Web Services architectural platform, with the introduction of web-enabled applications.  The web platform offers ease of deployment and maintenance, and system users can launch the applications from a PC using a standard web browser.  Another new component is Lenel IntelligentAudio™, an automated digital audio content analysis tool that can recognize, analyse and classify objects (information) in recorded audio files.  OnGuard 2006 is the first offering in the marketplace that enables biometric data to be used for both physical and logical access control.  OnGuard 2006 offers the first digital video management software that includes a suite of seamlessly integrated intelligent video tools that can be used for forensic video analysis.  Lenel is the first company to include these tools for all users without charge, as a basic component of the software.  OnGuard 2006 integrates with the Otis Compass destination dispatching system to provide secure access to banks of elevators.Other important capabilities include automatic rerouting of an alarm to an alternate workstation, integrated support for Integrated Engineering smart card encoders and biometric-smart card readers, digital video watermarking and authentication, and video matrix display on large-format video walls.Click here to download corporate brochure

Add to Compare
Apollo Security showcased integration software at ISC West 2011
Apollo Security showcased integration software at ISC West 2011

Apollo Security will be demonstrating advanced Universal Video Integration, OPC support, FIPS 201 and TWIC support at ISC West. Contact Apollo if you would like to schedule a private demonstration of these developments.Among the products on show will be Apollo Security's APACS software. The APACS software is designed for Apollo-based integrated security systems. It provides management of the access control system and performs information exchange and coordination between all subsystems, including: alarm monitoring, fire protection, analogue / IP live and recorded video, HVAC, paging, lighting, elevator control, visitor management and badging. In addition, APACS also provides data exchange with third party human resources, time and attendance and visitor management packages. Using PC with the Windows based operating system; APACS effectively performs in both small single computer systems and large-scale integrated client-server systems using TCP/IP protocol. In multi-user applications a powerful computer is used as a dedicated database server to process queries from all APACS workstations. Users can select between Firebird, Interbase, Oracle and MS SQL databases. APACS software is available in three packages: Pro, Standard and Lite. APACS Lite provides basic reliable access control. If features text-based on-line event display, alarm linkage on hardware level, event retrieval and sorting, elevator control and other functions.APACS Standard includes graphic maps, alarm display, live video, hardware status tree and badging.APACS Pro is an advanced security management software package. It integrates access control with digital and analogue video equipment, visitor management systems, HVAC and lighting control systems, public announcement and paging systems. Distinctive feature of APACS Pro is built in reaction mechanism. Any event, time zone, card or PIN read can trigger a reaction. Possible reactions can be DVR/CCTV control by signals from readers or alarm inputs, HVAC and lightning system control by time zones, audible alarms to operator, transmission of alarm messages to pagers, roll call, execution of external programs or activation of external systems. Reactions can be unconditional - immediate response to specified event, or conditional - an operator will be prompted with a list of possible reactions; default reaction will be executed if operator does not respond to the prompt. Reaction mechanism removes some of the operator workload and increases security, ensuring that important events will be noted. For example, APACS Pro can automatically arm the building as the last person leaves, and turn on the lights and air conditioning as the first person is granted access in the morning, or it can be configured so that personnel can use a special PIN (i.e. 911) to notify guards of emergency situations from the nearest reader with a keypad.Other APACS Pro features include live video verification, roll call and extended personnel reports. With its flexible modular structure, user friendly design, single and multi-user capabilities, and three different options, APACS can provide a solution that meets the customer's requirements today and in the future. The APACS software package consists of six modules: Alarm Mode, System Configuration, Cardholder Database, Report Generation, Visitor Management Web Interface, and External Reports. This special modular structure provides additional security and convenience by distributing tasks to difference operators. The systems can be monitored, controlled and configured from any workstation, provided the required module is installed and the operator has the appropriate permission.Features:Windows 2000/XP/2003/Vista/Windows 7 operating systemsFirebird, Oracle or MS SQL (including MS SQL 2008) database management systemSingle and multi-user applicationsMore than 50 workstationsIntuitive, user-friendly interfaceUnrestricted number of controllers, readers, and alarm panelsModular structureMultiple card formatsOnline help255 access levels, 6 access levels per card, individual access levels (precision)Elevator ControlDuress communicationDatabase conversion utilities

Add to Compare
Access control and time & attendance management software in your own language
Access control and time & attendance management software in your own language

      In today's multilingual society, many of the access control and time & attendance management software users request the software to be translated into different language other than English. IDTECK's professional access control and time & attendance management software line-ups, STARWATCH STANDARD, STARWATCH TIME PRO and STARWATCH ENTERPRISE, are based on Unicode structure, which allows the users to directly enter text for all the scripts in their own languages. It does not require additional patch or downloads to enter and render the texts of the scripts as it flawlessly processes, stores and renders multilingual texts. In management systems such as this, it makes it easy to convert one language to another language, even for one of a kind, rarely used, distinctive language. In return, it eliminates the complicated process of learning some new software to convert languages in the software.STARWATCH STANDARD is efficient access control and time & attendance management software, suitable for small and medium sized business. This user-friendly software includes setup wizard and diagram function for easy installation and provides helpful tool tip information to increase the user convenience. The software guarantees flawless compatibility with all of IDTECK's standalone and network access controller.Specialized for extensive time & attendance management, STARWATCH TIME PRO is a perfect solution for all your HR administration needs. Not only it ensures accurate time and attendance management, but also keeps track of overtime work, multi-shift, and various work rules to accommodate any kind of work environments. STARWATCH TIME PRO is equipped with various report generation feature, which is also available on the web browser for viewing and printing.STARWATCH ENTERPRISE boasts advanced security integration as the powerful software security features has been maximized to enhance the efficiency and high-level security with easy operation and management of the large sized enterprises. This top of the line management software is capable of controlling and managing multiple buildings and sites in different locations via LAN or WAN communication.Long experience in biometric access control and time & attendance field, IDTECK products assure the most reliable technology out in the security market. IDTECK offers wide range of security products, to provide the best security solution to suit your needs. All of IDTECK products are certified by UL, CE, FCC, MIC, and RoHS to satisfy the standards for international exports.

Add to Compare
No cost IP based access control software from Borer
No cost IP based access control software from Borer

Borer has released Fusion SE, a PC based access control software package for users of small-to-medium access control systems. Fusion SE Access Control Software runs on a PC workstation operating under Windows XP, Vista and Windows 7. Fusion SE provides similar functionality to the Enterprise and Profession versions of Fusion. The Fusion SE software is free and there are no restrictions as to the numbers of doors you can connect to the system or the number of people you are entitled to enrol onto the Fusion database. The system is made easy to deploy because all door controllers and field devices communicate with the PC hosting Fusion software via the users LAN and structured cabling infrastructure. It is also simple to commission as new field devices (card readers and controllers) log on and self configure on power up. Fusion has an intuitive easy-to-use GUI and Wizard style operator interface enabling full management and control of the Security Access System. Fusion supports many combinations of access level and time zone operation. It supports both profile and role based access rules making the planning, administration and management of access rights simpler. Fusion provides the operator with a comprehensive set of tools to support the remote operation of door locking/unlocking and alarm setting and resetting. In addition a powerful field Programmable Scripting Engine enables Fusion to support the integration of Camera and Intruder systems to access control enabling many complex functions, such as out-of-hour key holder access, to be supported on even the most basic system. Uniquely, in the security industry, the delivery of power to field devices, door controllers and door locks is controlled and monitored by the Fusion software. This enables users to monitor and manage the energy consumed by each door lock and door controller connected to the system providing cost savings amounting to tens of pounds per door per year. Fusion also provides a graphical view of almost every element of the system down to the status of each individual input such as a magnetic door monitor or tamper sensors. This is an invaluable aid for both on-site and remote over the Internet problem identification and solving.

Add to Compare