Access Control Softwares (563)
OnGuard Multi-Server Enterprise for Microsoft Windows 2000 Server is the industry’s first multi-server, synchronized database solution designed for use by enterprises that have multiple facilities in multiple geographical locations. OnGuard Multi-Server Enterprise enables corporate security and IT managers to have central control over the entire integrated security system. At the same time, regional offices are able to maintain independence and operate their individual regional security systems autonomously.
Add to CompareIncluding interface advancements, enlarged vendor independency and compatibility with the latest Windows Internet Explorer 9, Bosch Security Systems introduces a number of updates to its Building Integration System (BIS). The new version 2.5, which is available from early May 2012, increases the range of supported devices to more than 1,000 different third party cameras and encoders, making it suitable for even the most complex integration projects. The new system allows further optimized security, safety and communication management in one front-end system with customized user interface. The range of video devices supported by BIS 2.5 is unmatched in the industry. It seamlessly interoperates with virtually any video camera, connecting to the latest IP cameras on the market with HD and H.264 encoding technology. The Divar 700 and Bosch Recording Station are supported in their most recent versions. BIS 2.5 benefits installers and end users alike: certified BIS partners and systems integrators enjoy an upgraded level of customization options, such as new layout formats for a wide range of monitor sizes (including 16:9 and 16:10). Thanks to numerous handy improvements, such as useful additions to the symbol libraries, it is now even easier to personalize the system. BIS 2.5 is interoperable with the large variety of ONVIF-compatible, modern IP-based video products supplied by all major manufacturers. ONVIF ensures a uniform standard, allowing customers to choose the product that best fits their individual needs, without having to worry about compatibility. It thereby saves costs and allows long term planning. The ONVIF standard was first introduced by a consortium of companies, including founding member Bosch, in 2008.
Add to CompareAdministers system with a simple to use interface in a web-browser without having to install additional software View live and archived footage with a powerful built in video management system Create a system spanning multiple sites and/or subnets, for control and management from a single remote user interface Scalable up to 100 sites on a single system with up to 1,000 doors, 1,000 cameras and 50,000 users Log into the system from a web-browser anywhere in the world with an internet connection Administer system on mobile devices with the free Paxton Connect app that can be used off site Use smartphone or smartwatch in place of traditional tokens with the free Paxton Key app Customise view of Paxton10, create widgets and build dashboard, combining video, site plans, events and building controls Fully customisable software permissions allow to give tailored access to particular areas of the software, reports, dashboards or users Create effective landlord/tenant scenarios with customisable building permissions and folder structures, with access only for specific user Use the software to control devices on the system; for example, open a door Import images for a visual representation of site, to monitor access, control devices or view video simply and easily Easily create rules based on system events, including controlling other doors, devices or arm/disarm the intruder alarm Prevent a user from passing their token back to a second person to gain entry into the same controlled area Create reports listing all users currently within a specified area. In the event of an emergency this helps to confirm all users have evacuated safely
Add to CompareSoftware Maintenance ensures you receive regular software updates, giving you access to the most recent enhancements, features, and improved functionality the Gallagher Command Centre security platform has to offer. Having the latest software reduces your cyber risk, enhances system performance and guarantees continued compliance with government standards.
Add to CompareAccess management software for small and medium-sized companies Cardholder administration of up to 10.000 cardholders Video verification, video alarm verification, and video monitoring of live and recorded events Alarm management with details via alarm list and animated icons on interactive location maps
Add to CompareAccess PE provides self contained access control for small and medium-sized companies. Its installation is extremely simple and fast. There is no need to install and administer a database system. The system is easy to use and enables a person with minimal training to create badges and administer access rights in a very short time. Specific event logging and reporting allows you to trace who was when and where on your company’s grounds.
Add to CompareLiNC-Ez / NRX Kit manages access control, alarm monitoring and building needs. All in one box! The ease begins right at installation with a self guided wizard to help load and configure system. With its enhanced preprogrammed access parameters and schedules, LiNC-Ez is ready to use immediately after installation. A complete two-door package that allows up to 12,000 cardholders and up to 64 doors.
Add to CompareKeyscan K-BADGE photo badging & verification module integrates with System VII for a streamlined badging operation and offers the added benefit of greater security. It supports and prints a variety of industry-standard barcode types. It creates unlimited template designs to distinguish departments or areas of authorisation as well as shares cardholder images with other departments such as human resources. It displays cardholder image and transaction details immediately following site activity and has an “Always On Top” setting for constant monitoring of photo verification window even if other programs are open.
Add to CompareSymmetry Mobile is a web credential application designed to be used with AMAG Technology’s Symmetry Bluetooth readers. Symmetry Mobile is a convenient solution for organizations using mobile devices or in conjunction with physical credentials for users who are transitioning to a mobile system to gain access to secured doors. It works with AMAG’s Symmetry Access Control system, as well as other access control systems, providing a seamless, efficient and cost-effective solution for enterprise users deploying more than one system. The touchless solution supports multi-factor authentication when used with a PIN or biometric (fingerprint or facial recognition) on both Android and Apple iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in support of COVID-19 guidelines. The frictionless setup of a credential eliminates the need to physically interact with the security team. Organizations can centrally issue and manage mobile credentials, photos and devices to their entire user base from a remote location, eliminating the need to buy and carry a physical credential and come into the badge office. The virtual credential in Symmetry Mobile displays a person’s name and photo. An unlimited number of credentials can be stored within their digital wallet, allowing people who need to access multiple sites using different access control systems to use the same mobile device. In an effort to support businesses that required employees to be on-site and ensure the health and safety of the labor force, AMAG developed a customizable health screening questionnaire to help reduce the risk of potentially infected employees from entering a building. Upon successful completion of the questionnaire, an employee’s physical access card or mobile credential will be enabled for a specified period of time, for example, one day. If the form is not completed successfully, the access card will expire and the employee will be denied access to the building. The system will send email notifications to managers for visibility. The questionnaire’s functionality operates independently and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile data is highly secure, as all of the data is encrypted when sent to the reader or stored on the phone, ensuring the mobile solution is completely secure. Users can customize the signal strength and read range on a per device and/or per person basis, increasing security and accommodating those who may need a longer read range, such as a person in a wheelchair, to open a door. Door read and unlock time is less than 1.2 seconds. Symmetry Mobile is available as a hosted or on-premise solution. The app is available in English, Spanish, French and Arabic, and is available now in the Apple App Store and Google Play Store.
Add to CompareGallagher elevator integrations control access to floors with a high level interface (HLI) between an elevator system and Command Centre. An HLI achieves intelligent elevator control without relying on the excessive user interaction that a low level interface requires. Gallagher supports all leading elevator manufacturers. IFE Elevator KONE Otis Elevator Company The Schindler Group ThyssenKrupp Elevator
Add to CompareGuard Tours are an optional licensed feature of Command Centre and enable the configuration, live operation and reporting of on-site guard tours. Each tour can be identified with a unique name and operators can stop and start tours from any checkpoint.
Add to CompareLiNC-NXG PIV is the next generation of Federal security solution systems, meeting the control and security objectives requirements of FIPS and HSPD-12 standards. LiNC-NXG PIV utilises identification issued by the Federal departments and agencies for federal employees and contractors for gaining physical access to Federally controlled facilities. LiNC-NXG PIV utilises PIV Cards with Cardholder Unique Identifiers (CHUID) and includes an element of the Federal Agency Smart Credential Number (FASC-N). LiNC-NXG PIV also provides “personal privacy and confidentiality” of the system and user data.LiNC-NXG PIV’s communication architecture is industry unique.
Add to CompareOnGuard Visitor is a dependable and cost effective visitor management application that enables an organization to manage and track visitors throughout its facilities, using standard desktop technology. Whether it is implemented as a standalone system or seamlessly integrated with other OnGuard application modules to create a total security management environment, OnGuard Visitor offers unlimited flexibility by allowing IT and security managers to further capitalize on existing IT investments in their facilities.
Add to CompareApollo Security introduces its new APACS 3.4 access control and security integration software.Apollo Security's Access Control and Alarm Monitoring System (APACS) is the result of years of research and design coupled with real-world input from security professionals working at the most secure sites around the globe. APACS comprises the basis for a flexible and robust system that meets the needs of systems ranging from perimeter systems up to fully integrated enterprise-level installations.APACS 3.4 features include:Support for FIPS 201 compliant credentialsOPC Integration: Alarm & Event Support; OPC value writing via reactions, including OPC wrapper around data server to generate eventsSupport for Suprema BioMini enrollment readerSupport for L-1 Bioscrypt 4G readersReaction for Archive Video PlaybackStop unconditional reactionCopy feature for reactionsComments for message acknowledgmentsCustom Message Columns for event display in Alarm ModeCustom configuration file locationCommand line execution for ReportsButton to easily create temporary card and deactivate/activate permanent cardSupport for Samsung, Panasonic and Bosch video recordersImage support for Advanced FieldsSupport for SQL Server 2008Faster loading and closing of Guard Drag and drop icons onto APACS maps
Add to CompareStand-alone deployment, with own map viewer and alarm & event viewer, or as integral part of a video management system (e.g. BVMS) Combines high-end access control features, performance and availability with intuitive operation Highly scalable Easy to configure Situation always under control for doors, elevators, car parks and visitors, with alarm list and for different threat scenarios Centralised user and event management of intrusion panels Comprehensive security management: Integrates with intrusion and video systems Robust and Secure: Multi-level architecture for system reliability, comprehensive data security and privacy protection
Add to CompareMorse Watchmans KeyPro III Key Management Software can run activity reports, sort based on different criteria, view and print reports, and more. Its system managers can generate practical management reports, which trace key movements by time, date and user code. An audit trail report indicates the time and date of every key accessed by a user for a given time parameter. It now offers the capability to send priority email alerts to security managers, keeping them informed of the whereabouts of Smart Keys.
Add to CompareKey features:Taking advantage of core software features within the industry-renowned AC2000 SE system and supporting CEM's range of industry leading hardware products, AC2000 Lite is setting the benchmark as one of the most accomplished security management solutions available for the small to mid-range markets. The AC2000 Lite has a system controller which any client workstation on the network can access to manage the database, monitor alarm activity or configure devices.Supporting up to 128 doors, AC2000 Lite comes fully-loaded with all the software required for performing all system tasks. This includes access control, ID badging, graphical alarms maps, vehicle management, visitor management, time & attendance and much more.Supports Power over Ethernet access control - CEM DIU 220 (Power over Ethernet Door Interface Unit) allows power and comms to be provided at the door via a single Cat 5/6 cable.Using the CEM DCM 300 intelligent two door IP controller, AC2000 Lite supports most third-party read heads conforming to the physical Wiegand interfaces, including support for third-party biometric technology. Supporting CEM's advanced range of IP card readers including the industry first S610e reader and with an on-board database, CEM's readers store transactions and operate offline, with the additional option of card plus PIN control. A graphical LCD display allows messages to be displayed such as ‘wrong zone', ‘lost/stolen card', ‘invalid card', ‘expiring card'.Easy system set-up - web-based configuration tool to perform the basic set-up and configuration of the AC2000 Lite Controller.
Add to CompareKeyscan K-VIS is a SYSTEM VII visitor management module. Retains a complete history of all visits Has a wide array of report capabilities including all visitors currently on site Interfaces with Keyscan’s business card scanner (P/N BIZSCAN) for quickly adding new visitor records Includes Keyscan’s Photo Badge Template Editor for designing visitor badge templates and parking permits Assigns visitor access cards for independent but regulated and monitored access at reader-controlled doors Maintains individual visitor files with user-defined fields for basic or detailed records
Add to CompareVelocity Security Management SystemHirsch's Velocity delivers total security in an all-in-one package: Access control: readers, keypads, biometrics, controllers for doors, gates, elevatorsAlarm monitoring, intrusion detection: sensors, alarm routing, automated responses, history/reports Video, CCTV: cameras, DVRs, links to analyticsIdentification management: smart cards, photo badges, integration with IDMS, CMS, watch listsInteroperability: with personnel system, network log-on, provisioning, command & control, central station, parking, HVAC, lighting, other devices, other databasesVelocity is network-ready & IT friendly. Velocity employs IT-centric tools such as integration with directory services, encrypted TCP/IP communications, and support of split server configurations and high-availability environments.The system is highly secure, requires little bandwidth, and is scalable to even the largest organisations. Velocity supports Unified Identity Management with a full line of smart card readers, biometrics and privacy-sensitive keypads. Velocity's open architecture, SDK, and built-in XML interoperability enable you to integrate Velocity with building automation and other systems. Velocity is designed to tightly integrate with personnel and network provisioning systems, allowing it to serve as the physical security component of an overall Role-Based Access Control (RBAC) and policy-based security management system. This approach can help enhance security, improve operational efficiency and reduce administrative and compliance costs.Velocity has earned numerous industry awards including an unprecedented five-time winning of the U.S. Security Industry Association's Product Achievement Award.
Add to CompareLiNC-XS for Windows Server provides the power to customise complete access control systems to specific needs without requiring advanced technical expertise. This makes it ideal for a wide variety of applications such as multi-tenant office buildings, universities, hospitals, manufacturing facilities, government applications and more. It provides the same high degree of security and control from the most limited implementation to the largest, multi-site solution. LiNC-XS utilises a powerful set of security system integration solutions that provide total flexibility and control over a facilities security infrastructure, while reducing overall operating costs through seamless integration and system reliability. Seamlessly integrates access control, intrusion detection, video surveillance and recording, photo ID badging, smart cards, biometrics, elevator and parking control and the interoperability with other building and business systems.
Add to CompareAccess PE provides self contained access control for small and medium-sized companies. Its installation is extremely simple and fast. There is no need to install and administer a database system. The system is easy to use and enables a person with minimal training to create badges and administer access rights in a very short time. Specific event logging and reporting allows you to trace who was when and where on your company’s grounds.
Add to CompareDistributed access control system with graphical alarm management Seamless integration and interaction with video, fire, intrusion and PA/VA systems via the common BIS platform High resilience thanks to a 4-tier system architecture and redundancy of critical components Integration of third-party products via open and secure protocols and SDK Efficient enrollment process that makes onboarding faster and more secure
Add to CompareNet2 software is designed to run on a PC with a Windows 2000 or XP operating system. It is designed to feel immediately familiar to any Windows user. It will organise and report on up to 10,000 users and hundreds of doors. Net2 standard software contains all of the basic access control features to control access privileges and report on users. Other features include multiple workstations, TCP/IP camera integration and remote sites using TCP/IP or modems. Net2 professional software contains all of the features of Net2 standard software with the addition of fi re alarm integration, roll call/muster reporting, anti-passback and Timesheet.
Add to CompareLG Iris Technology has been the key developer and driver of the commercialisation of iris recognition technology. LG IrisAccess, now in its third generation, is the world's leading deployed iris recognition platform. LG's biometric solutions, enabling non-contact and highly accurate identification by the iris of the eye, deliver security, convenience, privacy and productivity to millions around the world. The LG IrisAccess platform identifies more people in more places than all other iris recognition products combined.LG IrisAccess 4000 solution is versatile and flexible providing easy integration and expansion. Enrolment and recognition are also easier than ever. An intuitive user interface, with visual and audible prompts, enables users to be quickly enrolled and identified. Dual iris capture and a power, auto-tilt mechanism increases speed and convenience by adjusting for height with one simple touch.Combining LG's IrisAccess 4000 and the new iData SoHo software solution from LG's suite of identity access control applications provides a simple, flexible and robust solution for any environment.Features include:Enrolment: iData SoHo provides the system administrator with a flexible interface to enrol individuals in the database with a simple user interface.Setup: iData SoHo provides a simple configuration solution, as the system has the ability to configure itself via DHCP. Alternatively, the system provides the option to set static IP addresses. An administrator can also control a relay to activate a door strike, or reset permissions. Wiegand formats up to 128 bits are supported.Reporting: iData SoHo is designed to identify individuals as their biometric is presented. All transactions are stored in the system log and can be accessed by the system administrator for download, review and printing.
Add to CompareAdvanced, scalable visitor management system Web client software compatible with the latest browsers Supports any computing device with browser and internet Full functionality on tablet and smart phone devices Suitable for visitors, contractors and visiting employees Integrates to Outlook and Google mail systems On-line record of all previous visits Retains visitors photo with configurable expiration date User defined fields for any data collection Supports USB or tablet webcams for photo capture Touch-screen self-registration capability Multi-tenant building capabilities Supports standard visitor badge printers Supports drivers license and passport scanners Optionally integrates with AMAG Symmetry software Simple import of employee details using spreadsheets
Add to CompareOnGuard 2006 seamlessly integrates access control, ID credential issuance and management, alarm monitoring, digital video surveillance and management, intelligent video, biometric technology integration, intrusion detection, visitor management and smart card functionality. OnGuard 2006 marks Lenel’s entry into an XML Web Services architectural platform, with the introduction of web-enabled applications. The web platform offers ease of deployment and maintenance, and system users can launch the applications from a PC using a standard web browser. Another new component is Lenel IntelligentAudio™, an automated digital audio content analysis tool that can recognize, analyse and classify objects (information) in recorded audio files. OnGuard 2006 is the first offering in the marketplace that enables biometric data to be used for both physical and logical access control. OnGuard 2006 offers the first digital video management software that includes a suite of seamlessly integrated intelligent video tools that can be used for forensic video analysis. Lenel is the first company to include these tools for all users without charge, as a basic component of the software. OnGuard 2006 integrates with the Otis Compass destination dispatching system to provide secure access to banks of elevators.Other important capabilities include automatic rerouting of an alarm to an alternate workstation, integrated support for Integrated Engineering smart card encoders and biometric-smart card readers, digital video watermarking and authentication, and video matrix display on large-format video walls.Click here to download corporate brochure
Add to CompareApollo Security will be demonstrating advanced Universal Video Integration, OPC support, FIPS 201 and TWIC support at ISC West. Contact Apollo if you would like to schedule a private demonstration of these developments.Among the products on show will be Apollo Security's APACS software. The APACS software is designed for Apollo-based integrated security systems. It provides management of the access control system and performs information exchange and coordination between all subsystems, including: alarm monitoring, fire protection, analogue / IP live and recorded video, HVAC, paging, lighting, elevator control, visitor management and badging. In addition, APACS also provides data exchange with third party human resources, time and attendance and visitor management packages. Using PC with the Windows based operating system; APACS effectively performs in both small single computer systems and large-scale integrated client-server systems using TCP/IP protocol. In multi-user applications a powerful computer is used as a dedicated database server to process queries from all APACS workstations. Users can select between Firebird, Interbase, Oracle and MS SQL databases. APACS software is available in three packages: Pro, Standard and Lite. APACS Lite provides basic reliable access control. If features text-based on-line event display, alarm linkage on hardware level, event retrieval and sorting, elevator control and other functions.APACS Standard includes graphic maps, alarm display, live video, hardware status tree and badging.APACS Pro is an advanced security management software package. It integrates access control with digital and analogue video equipment, visitor management systems, HVAC and lighting control systems, public announcement and paging systems. Distinctive feature of APACS Pro is built in reaction mechanism. Any event, time zone, card or PIN read can trigger a reaction. Possible reactions can be DVR/CCTV control by signals from readers or alarm inputs, HVAC and lightning system control by time zones, audible alarms to operator, transmission of alarm messages to pagers, roll call, execution of external programs or activation of external systems. Reactions can be unconditional - immediate response to specified event, or conditional - an operator will be prompted with a list of possible reactions; default reaction will be executed if operator does not respond to the prompt. Reaction mechanism removes some of the operator workload and increases security, ensuring that important events will be noted. For example, APACS Pro can automatically arm the building as the last person leaves, and turn on the lights and air conditioning as the first person is granted access in the morning, or it can be configured so that personnel can use a special PIN (i.e. 911) to notify guards of emergency situations from the nearest reader with a keypad.Other APACS Pro features include live video verification, roll call and extended personnel reports. With its flexible modular structure, user friendly design, single and multi-user capabilities, and three different options, APACS can provide a solution that meets the customer's requirements today and in the future. The APACS software package consists of six modules: Alarm Mode, System Configuration, Cardholder Database, Report Generation, Visitor Management Web Interface, and External Reports. This special modular structure provides additional security and convenience by distributing tasks to difference operators. The systems can be monitored, controlled and configured from any workstation, provided the required module is installed and the operator has the appropriate permission.Features:Windows 2000/XP/2003/Vista/Windows 7 operating systemsFirebird, Oracle or MS SQL (including MS SQL 2008) database management systemSingle and multi-user applicationsMore than 50 workstationsIntuitive, user-friendly interfaceUnrestricted number of controllers, readers, and alarm panelsModular structureMultiple card formatsOnline help255 access levels, 6 access levels per card, individual access levels (precision)Elevator ControlDuress communicationDatabase conversion utilities
Add to CompareIn today's multilingual society, many of the access control and time & attendance management software users request the software to be translated into different language other than English. IDTECK's professional access control and time & attendance management software line-ups, STARWATCH STANDARD, STARWATCH TIME PRO and STARWATCH ENTERPRISE, are based on Unicode structure, which allows the users to directly enter text for all the scripts in their own languages. It does not require additional patch or downloads to enter and render the texts of the scripts as it flawlessly processes, stores and renders multilingual texts. In management systems such as this, it makes it easy to convert one language to another language, even for one of a kind, rarely used, distinctive language. In return, it eliminates the complicated process of learning some new software to convert languages in the software.STARWATCH STANDARD is efficient access control and time & attendance management software, suitable for small and medium sized business. This user-friendly software includes setup wizard and diagram function for easy installation and provides helpful tool tip information to increase the user convenience. The software guarantees flawless compatibility with all of IDTECK's standalone and network access controller.Specialized for extensive time & attendance management, STARWATCH TIME PRO is a perfect solution for all your HR administration needs. Not only it ensures accurate time and attendance management, but also keeps track of overtime work, multi-shift, and various work rules to accommodate any kind of work environments. STARWATCH TIME PRO is equipped with various report generation feature, which is also available on the web browser for viewing and printing.STARWATCH ENTERPRISE boasts advanced security integration as the powerful software security features has been maximized to enhance the efficiency and high-level security with easy operation and management of the large sized enterprises. This top of the line management software is capable of controlling and managing multiple buildings and sites in different locations via LAN or WAN communication.Long experience in biometric access control and time & attendance field, IDTECK products assure the most reliable technology out in the security market. IDTECK offers wide range of security products, to provide the best security solution to suit your needs. All of IDTECK products are certified by UL, CE, FCC, MIC, and RoHS to satisfy the standards for international exports.
Add to CompareBorer has released Fusion SE, a PC based access control software package for users of small-to-medium access control systems. Fusion SE Access Control Software runs on a PC workstation operating under Windows XP, Vista and Windows 7. Fusion SE provides similar functionality to the Enterprise and Profession versions of Fusion. The Fusion SE software is free and there are no restrictions as to the numbers of doors you can connect to the system or the number of people you are entitled to enrol onto the Fusion database. The system is made easy to deploy because all door controllers and field devices communicate with the PC hosting Fusion software via the users LAN and structured cabling infrastructure. It is also simple to commission as new field devices (card readers and controllers) log on and self configure on power up. Fusion has an intuitive easy-to-use GUI and Wizard style operator interface enabling full management and control of the Security Access System. Fusion supports many combinations of access level and time zone operation. It supports both profile and role based access rules making the planning, administration and management of access rights simpler. Fusion provides the operator with a comprehensive set of tools to support the remote operation of door locking/unlocking and alarm setting and resetting. In addition a powerful field Programmable Scripting Engine enables Fusion to support the integration of Camera and Intruder systems to access control enabling many complex functions, such as out-of-hour key holder access, to be supported on even the most basic system. Uniquely, in the security industry, the delivery of power to field devices, door controllers and door locks is controlled and monitored by the Fusion software. This enables users to monitor and manage the energy consumed by each door lock and door controller connected to the system providing cost savings amounting to tens of pounds per door per year. Fusion also provides a graphical view of almost every element of the system down to the status of each individual input such as a magnetic door monitor or tamper sensors. This is an invaluable aid for both on-site and remote over the Internet problem identification and solving.
Add to Compare