Access Control Softwares (649)
The AS-215 is a self-contained Client/Server application that is ideal and economical solution for managing the Veritrax access control system. AS-215 was developed using 32-bit software architecture, with a variety of drivers for communications including TCP/IP, RS-232 and MODEM. It offers a powerful set of features, including intelligent addressing and configuration of all the parameters. The SERVER PC will function as the control and administration centre for the system. While CLIENT PC can be used for remote terminals to configure and control the system on a real time basis.
Add to CompareMobile-PASS for ATRIUM combines simplicity with robust security, allowing authorised users to unlock doors with their smartphone or other smart device. Offering five different methods for triggering the unlock, Mobile-PASS is a convenient Bluetooth-enabled access solution. Mobile-PASS is compatible with the ATRIUM A22K high security controller and K Series of readers (including K2 and K3). Already equipped with end-to-end military grade encryption technology, the system now adds the flexibility of smartphone credentials to its many security benefits. Use your smartphone as an access credential Five different methods for validating entry No annual subscription fees or cloud storage costs For use with A22K controller only Free ATRIUM app available on iOS and Android
Add to CompareParabit 200-50000 is a single-user database configuration software. It provides an easy to follow user interface for configuration options of the controller and logging capabilities. The configuration of location hours of operations for door locking and unlocking as well as holiday exceptions are clearly laid out. It is designed to be installed on a Windows 2000 or XP-based PC with a minimal foot print to other production applications.
Add to CompareGallagher's fully integrated Locker Management Solution allows a site to manage locker access, automate allocation, and ensure the best utilization of their locker resources all natively from within Command Centre. Flexible allocation times and a dynamic locker viewer combine to make agile locker use a reality for the modern business.
Add to CompareSimplify and automate operator logon to Command Centre or Visitor Management applications. Command Centre can take advantage of the inherent capabilities of Microsoft® Active Directory password management, such as enforced expiry dates and password complexity for Command Centre logon. Password policies set by the IT department via Active Directory can now be effectively inherited by Command Centre. Command Centre also supports the ability for the system to automatically log an operator in to Command Centre when the application is launched using their Windows logon and password validated at logon via Active Directory.
Add to CompareGallagher’s bidirectional Microsoft Active Directory Cardholder Sync enables Active Directory user records to be replicated through to Gallagher Command Centre cardholder records. This includes creation, modification and deletion of both user details and access permissions. Additionally, changes to cardholder details and images within Command Centre can be replicated out to Active Directory or a file share location. Combining the power of both the Cardholder REST API and Cardholder Change Tracking API, the Active Directory Cardholder Sync is packaged in a single installer, and is fully configurable to suit the Active Directory structure of your organization.
Add to CompareGallagher Command Centre server and Controller Application Programming Interfaces (APIs) extend the functionality and flexibility of the Gallagher system as the platform for integration. The Gallagher Controller API is the solution, allowing for events to be sent to and received from third parties such as video, duress, building management, external alarm and fire alarm systems.
Add to CompareThe Gallagher Intercom HLI enables digital intercom systems to be integrated into the Gallagher access system. This allows intercom functionality and related intercom alarms and events to be supported through the Gallagher Command Centre graphical user interface by Gallagher operators. Multiple intercom systems can be supported in the Gallagher system. For each intercom system, individual intercom units are uniquely identified. The Gallagher system becomes the user interface to control calls for the intercom system. The audio communications remain within the originating intercom system.
Add to CompareWith Gallagher Command Centre, the number of workstations or operators is limitless. Operators are subject to system division and are assigned privileges so they can only carry out authorised functions or view content defined for them. A site can be split into divisions and sub-divsions by system division (or partitioning). This is particularly suited to: Multi-tenanted buildings where tenants manage and monitor their own security. Large enterprise-wide systems where it is more practical to divide the site – by geographic zones for example – for ongoing management and monitoring. Site plans are a graphical representation of the site and show the real-time status of remote field devices and logical entities. They display visually rich, configurable elements such as fence lines and buildings with associated alarms and can be used for general site or alarm monitoring and management. Site plans feature touch-screen support and ‘free text’ objects. An unlimited number of site plans can be stored in the system.
Add to CompareWith the CSW-2000 segments can be defined and credentials can be initialised (e.g. as Master-Token or as user credential). The configuration required for a project can be easily administrated. The graphical user interface enables a quick analysis of credentials as well as the configuration of LEGIC advant reader modules. The CSW-2000 can be operated together with the Configurator Hardware CHW-2000, the Development Kit DK-2000 or a LEGIC advant based reader from a LEGIC partner.
Add to CompareActively monitor workers within a zone, on local or remote sites. Ensure blast zones have been cleared before explosives are detonated. Monitor the movement of people to a muster area during an evacuation. Ensure the security control room is aware of workers who are alone on remote sites. Monitor who remains within a high security area at the end of a working day or shift.
Add to CompareGraphic maps allow monitoring and control, extensive event reports, card holder management and badge design. Other features include interbase or MS SQL database management system, single or mult-user applications, 256 work stations, unrestricted number of controllers, readers and alarm panels, modular structure, multicard formats, 255 access levels, elevator control, duress and database conversion.
Add to CompareAccess control administration and reporting software suitable for multi-door applications in commercial and industrial applications. Inova Master for Windows features 40 Door Control Capacity ; Multiple Reporting Formats ; Schedule Door Unlock/Lock ; Manual Door Control ; 14 TimeZones for Card Access ; 15 Fully programmable Holiday Blocks ; and Windows 95' Style Graphical User Interface.
Add to CompareThe AC2000 Time and Attendance module is a reporting method for the office manager/administrator who requires statistics on the in and out movements of staff. Integrated into the AC2000 system, it provides a very powerful, configurable tool that allows the administrator to run reports on the number of hours worked by staff. Rather than installing a separate timekeeping system, existing pass cards and readers can be used for both access control and time and attendance. Any number of readers on the system, at any location, can be configured as designated IN and OUT readers for the purposes of Time and Attendance. As each member of staff presents a card their transactions are populated into the AC2000 database.
Add to CompareMorse Watchmans TrueTouch client software comprises the KeyBank TrueTouch client interface and the KeyBank Server for enhanced administration and control of the KeyBank Touch system. It is designed to run all programming, remote functions and reports for up to 10 KeyBank Touch locations.
Add to CompareKeyMaster Lite communicates with AC-3114 system controllers via direct serial port connections or dial-up modems. Using an Ethernet/RS-232 hardware bridge or software gateway, you can also set up communication with controllers via a corporate LAN or the Internet.
Add to CompareINOVA access control systems ensure that only authorized people have access to facility and only during appropriate time periods. INOVA Master software provides easy administration and activity reporting. INOVA Master software provides a central location from which all required information is distributed to individual doors controllers. The software also retrieves activity data from individual control panels for activity and basic attendance reporting.
Add to CompareGallagher Elevator High Level Interfaces (HLI) allow the Gallagher security system to control access to floors from elevator cars. With a range of high level interfaces, the Gallagher system can be integrated with your new or existing elevator system to provide access control to each individual floor. Destination Based Dispatching HLI enables elevator systems to group passengers travelling to similar destinations for more efficient access control.
Add to CompareSDK stands for Software Development Kit which is set of library file for software development. Generally, SDK provides library file or API which helps to develop users' own software. The library or API provided by IDTECK are COM or OCX type file and they allow to interface with IDTECK's products. Software developer can develop own software with using Method or API which is opened from OCX.
Add to CompareCEM AC2000 Muster Zones application is used for emergency situations where card holders must congregate in a dedicated ‘safe’ location. The application can be used both in the evacuation of card holders to a location away from the site (or zone) or when necessary it can be used to enable card holder’s to move to a particular safe location within the premises
Add to CompareThe AC2000 AED (Alarm and Event Display) is the integrated alarm processing software for AC2000 providing dynamic graphical representation of all system events. The main function of AED is to transmit real-time graphical, audio and textbased information on all alarms and events that occur on the AC2000 system. Operators can choose how they want to view alarms - graphical maps, text alarms list or both. AED provides password protected user access to ensure that only operators with the correct privileges may take certain actions. AED provides the interface between AC2000 and CCTV.
Add to CompareThe AC2000 VIPPS system provides a photo imaging application that is fully and seamlessly integrated with the AC2000 access control software. VIPPS gives the operator a range of video imaging facilities for capturing personnel images, company logos and personnel signatures and incorporating these onto professionally designed passes. VIPPS allows users to design professional quality permanent and temporary ID passes which can include text, logos, multiple colours, graphics, photos, barcodes and signatures.
Add to CompareExtend BIS Access Engine by the ability to control and manage doors that are not continuously online. Enjoy the advantages of centralised door management without the cost of a dedicated network. Choose from a wide range of compatible lock cylinders and door fittings.
Add to CompareThe SIA Intruder Interface with AC2000 SE enables alarms from intruder detection systems to be displayed using a single alarm display screen. Intruder detection panels are added to AC2000 SE as separate devices with alarms generated by the panels forwarded to AC2000 SE over an Ethernet network using the SIA protocol. Each panel is added to the system in groups of 8 or 16 inputs using a user friendly application which simplifies the configuration of larger intruder panel systems by automatically creating and addressing entries in the AC2000 devices table thereby greatly reducing the amount of data the operator must enter.
Add to CompareAccess management can be based on individual competencies allowing business to effectively manage compliance with business policy and government regulations. Access management can be based on individual competencies such as: Safety - is the employee inducted, trained, licensed and fit for work?Equipment - does the employee have the right vehicles or safety equipment?Security - does the employee have the right clearance?Regulatory compliance - are there other requirements the employee has to meet?The platform can also take account of validity periods and competence expiry. Access decisions are delivered to the individual instantly by the door reader or display monitor or via SMS.
Add to CompareReduces IT certification requirements/costs Cellular/Ethernet communication option removes hardware installed on your network Eliminates one-time and annual costs of maintaining servers, network and database admins Supports rapid deployment of software and firmware updates AES 256 Encrypted Communication complies with Federal Banking Regulation requirements on data storage and communication
Add to Compare