Access Control Softwares (649)
C•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications.
Add to CompareC•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications.
Add to CompareDatacard® ID Works® Intro identification software offers a discrete set of features you can use to create and maintain a start-up ID program. When your program needs greater versatility for card creation and image handling, you can easily add new features and capabilities by upgrading to Datacard® ID Works® Basic, Standard or Enterprise identification software.
Add to CompareC•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications.
Add to CompareThe latest release of the AC2000 suite of access control and security management software. AC2000, AC2000 Airport and AC2000 Lite version 7.0 are now available with a range of new features that increase the performance, simplicity and scope of the system along with a number of additions that improve functionality. Card Validation from online readers AC2000 Users can now validate cards using any online reader, either Ethernet or Serial, without the need to have a dedicated validation reader. AC2000 Intercom CEM AC2000 Intercom software can now be deployed as a standalone installation on dedicated intercom workstations where full AC2000 system functionality is not required. AC2000 now also supports the functionality to record emerald intercom (only available in emerald TS200/TS300 terminals) voice communication to audio files and store on the AC2000 central server. Integrations AC2000 now supports full two way integration with Salto off-line locks utilising SHIP (Salto Host Interface Protocol). This bi-directional interface links directly to the Salto database server. With the release of v7, AC2000 now supports a fully featured interface with Genetec Security Center, a unified platform with IP surveillance. This new link allows alarms and video footage from Genetec Security Center to be fully integrated with AC2000. Enhanced emerald functionality In AC2000 v7 a new pre-door mode allows for the display of a configurable personal message to the cardholder on the emerald terminal. This release also enables system administrators to use AC2000 WEB to upload their company logo to display on the emerald home screen.
Add to CompareRetrieve and report on stored information including events, alarms, cardholders, cardholder location, resource utilization, and site items. Configure reports to run on a repeating schedule or in response to events such as a fire alarm. Schedule the generation of reports and email automatically to recipients. Access reports easily through a ‘find reports’ viewer or ‘favorites’ list within Command Centre. Filter report content using parameters such as competency status, card type and cardholder’s last entered zone. Configure the report page layout and file output type (.doc, .xls, .pdf or .csv). Report on visitor data (when used with optional visitor management tools). View additional reports, including evacuation, access, time and contextual reporting. Report on security events from an individual server, or from multiple servers within a multi-server network.
Add to CompareEasy registration and transmission of fingerprint data using wizard interface. Can be seen fingerprint's image and quality of fingerprint using USB fingerprint scanner(Hamster). Fingerprint quality check. Supports serial and TCP/IP communication (Required external converter). Supports step by step workflow for fingerprint data upload and download. ID registration process convenient and easy to enter data. Supports Text, Excel data export. Supports server and client system. Support MS-SQL server database.
Add to CompareAccess Groups is a powerful and efficient cardholder management tool which divides cardholders into groups depending on criteria and determines access privileges. Group information can include: Where and when the group has accessA list of members of the groupPersonal data fields for group membersWhether group members are allowed to act as escorts for visitorsAuthorization to arm and disarm alarm zonesWhether group members can change the state of access zones
Add to CompareLiNC-NXG is a fully integrated physical security information management system (PSIM). PSIM is a category of systems designed to integrate multiple security applications controlling them through a comprehensive user interface (GUI). In a world of choices, LiNC-NXG offers multiple system configurations to fit your exact security needs. In addition to LiNC-NXG’s standard desktop solution, a browser managed interface is an available option. The browser based option eliminates software installation and maintenance requirements of application software. LiNC-NXG’s communication architecture is industry unique.
Add to CompareA mobile app for the AC Series access control system that allows users to unlock doors from a smartphone or tablet Administered by AC Nio, track user and visitor activity Assign users to the entire site or specific partitions Works on the local network or off-site with port forwarding Create favorite lists of frequently used doors Issue temporary Visitor Passes by text or email Available for Apple® iOS and Google Android™ smartphones or tablets
Add to CompareAccess control specialist TDSi has launched its new MIFARE Programmer, which offers users the ability to specify their own sectors and keys on their MIFARE access cards. Together with the ability to re-configure TDSi's standard sector readers to any desired code (without the need for any other parties to be involved), the MIFARE Programmer ensures confidentiality of security data and access control.To make sure it doesn't inadvertently become a weak point of security itself, TDSi's MIFARE Programmer uses a highly secure user login to protect the ability to programme user cards from unauthorised users. Having control of MIFARE security details also offers a number of other key benefits: Use pre-assigned sequential numbers - The MIFARE Programmer provides an effective method of card programming which eliminates potential duplication problems, Read and identify existing cards - users can identify existing cards and sector usage before migrating existing system cards, Log all cards issued - The MIFARE Programmer provides a history of cards which have been issued (for future reference), Multiple card number options - The user can utilise a unique number, custom number or CSN to program a sector, providing increased flexibility, Dual decode options - The MIFARE Programmer allows users to decode the new 7 byte UID using TDSi's format or NXP's format, for increased flexibility, Check which sectors are used - This built-in function allows users to check which sectors have already been used. This is ideal if you want to migrate existing MIFARE CSN cards that may be utilised for other aspects (such as cashless vending) to a more secure sector operation. TDSi's John Davies comments on the MIFARE Programmer, "For companies that need the highest levels of protection; the ability to protect your security codes across the board is a very attractive proposition. Being able to programme your own MIFARE cards and readers means you can close a potential gap in security that comes from pre-programmed systems. We believe this is a unique solution that offers real peace of mind. It has been developed from feedback we have had from installers and users, who advised that it would be highly desirable choice for both security and convenience."
Add to CompareImport cardholder data, photos and access rights from third-party systems using flexible XML interfaces or the simple data mapping tool found within the Enterprise Data Import module. Assign access rights based on the type of day, time of day, area being accessed, validity of the cardholder token and any relevant competencies the cardholder possesses (such as training, licenses, inductions or medical clearances). Access changes are immediately and automatically downloaded to the controllers. Manage cardholder details, view recent cardholder events and track card replacement history. Perform bulk updates of cardholder information, such as a change in department. Design card layouts, and print and encode photo ID cards. Tailor screen layouts for the cardholder management team. Find cardholders in the system via access card presentation, text entry or multi-statement search criteria. Integrate intranet, web or network-based cardholder information directly to Command Centre via in-built browser capability. The integration of access control and intruder alarms allow a person with correct permissions to access a door as well as disarm an associated intruder alarm zone on entry, without requiring a separate keypad.
Add to CompareNet2 software is designed to run on a PC with a Windows 2000 or XP operating system. It is designed to feel immediately familiar to any Windows user. It will organise and report on up to 10,000 users and hundreds of doors. Net2 standard software contains all of the basic access control features to control access privileges and report on users. Other features include multiple workstations, TCP/IP camera integration and remote sites using TCP/IP or modems.
Add to CompareOnGuard Area Access Manager is a business productivity solution that enables authorized managers to control cardholder access to specific physical areas. A manager need only login to the Area Access Manager application through a standard desktop PC. OnGuard Area Access Manager displays a list of areas over which the manager has control, as well as a list of all personnel who have access to those areas. The manager can then assign or remove the access rights of employees to areas within his or her domain.
Add to CompareThe ACURT2 is an integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security system up and running quickly and reliably.
Add to CompareView and process alarms Monitor and override the status of doors and zones Lockdown zones quickly Trigger macros to perform custom functions Log mobile actions and events in Command Centre \ Disable a cardholder’s access QR and Barcode scanning for quick identification Receive notifications from Command Centre (Android devices must have the Google Play App installed)
Add to CompareTDSi EXgarde’s integration with Aperio offers a new level of remote lock functionality with a global leader in door opening solutions. Using Aperio alongside TDSi’s core systems allows greater flexibility in remote areas where access control may be more difficult to implement.
Add to CompareTDSi 4420-2401 is an optional visitor management module to the EXgarde platform with simplified front-end users which makes managing visitors much easier. Visits can be scheduled in advance or on the day with this intuitive module. Providing a cost effective and dependable visitor management function, EXvisitor enables an organisation to manage and track visitors and their hosts across a site.
Add to CompareCEM SYS/101/300 is a PC with SWENET256 software installed. The SWENET256 is required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Add to CompareCEM SWENET256 is an Ethernet reader controller software for 256 doors. It is a software controller required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Add to CompareDistributed access control system with graphical alarm management Seamless integration and interaction with video, fire, intrusion and PA/VA systems via the common BIS platform High resilience thanks to a 4-tier system architecture and redundancy of critical components Integration of third-party products via open and secure protocols and SDK Efficient enrollment process that makes onboarding faster and more secure
Add to CompareCEM AC2000 Data Import Tool allows system administrators to import 3rd party cardholder details into the AC2000 Personnel application, which stores cardholder information on the access control system. It simplifies the bulk loading of data from a 3rd party system which is typically required during a new system installation. This removes the need for duplicate data entry and offers users a quick and efficient method of importing data into the AC2000 system. Using the interface tool, an unlimited number of records, including cardholder photographs, can be easily brought into the AC2000 system, eradicating the requirement for customised software development or time consuming database scripts.
Add to CompareAn easy to use and cost-effective access control system designed for smaller applications Supports Microsoft SQL Server 2016 Express Support for 64 bit operating systems only Designed for up to 16 card readers with Business 16 and up to 64 card readers with Business 64 Robust video capabilities for use with network cameras and market leading video management systems Supports the EN-1DBC+ and EN-2DBC two door controller Up to three PCs can be operated on a single system to enable use from different locations A wide range of card readers are supported, including smart card, biometric, proximity, and magnetic stripe Provides time-efficient software for tasks such as card administration, badging, reporting, visitor management and alarm monitoring Employs an open architecture, giving the ability to import data from personnel or other database
Add to CompareVisitor Management is an optional licensed feature of Gallagher Command Centre, delivering extensive pre-registration and reception-based visitor management functions. Optional visitor self-registration capability is available using the touch-screen enabled Visitor Management Self-Registration Kiosk. The Kiosk allows visitors to sign-in for a visit independently of the receptionist. On completion of sign-in their host is automatically notified of their arrival via email or SMS. Hosts can manage their visitors onto and off-site from the Kiosk, including the ability to issue visitor cards and assign access, update the visit details or reprint visitor labels. Hosts of visitors who are overdue to leave are automatically notified for follow-up action.
Add to CompareCEM SWXML AC2000 XML interface provides a simple and efficient way to import basic cardholder details into the AC2000 access control system. The import process allows incremental updates from a third party source and will support a large single batch import that is typically required during a new system setup. It also provides customers with a frequent data transfer link from many third party systems such as Human Resource systems. The interface enables the bulk adding and updating of personnel records, such as surname and card number.
Add to CompareRicochet Monitor software, when installed on a laptop and connected to a RICOCHET enabled wireless expander, provides greater visibility and control over the wireless system performance than ever before. From a simple, intuitive menu screen all device status is available at a glance, with clear graphics highlighting signalling performance. Device attributes can be configured and distributed across the network in seconds thanks to an innovative ‘global poll' function that communicates to all devices within moments.
Add to CompareApollo Security introduces its new APACS 3.3 access control and security integration software.Apollo Security's Access Control and Alarm Monitoring System (APACS) is the result of years of research and design coupled with real-world input from security professionals working at the most secure sites around the globe. APACS comprises the basis for a flexible and robust system that meets the needs of systems ranging from perimeter systems up to fully integrated enterprise-level installations.APACS 3.3 features include:Apollo Universal Video Interface (following video recorders supported):ApolloVision ApolloVideoPanasonic HD and ND BoschSalient SystemsHikvisionBiometric reader integration L1 and Suprema fingerprint and Schlage hand geometry readers Smart downloads to controllers, reader interfaces and biometric readersMore effective use of device memoryQuicker downloadsAccess Levels increased from 255 per system to 255 per controllerSupport for MS SQL Server 2008Support for Windows 7 operating systemActive Directory / Single sign-on See the image with captions
Add to CompareKeyscan AURORA is an access control management software. The software features support for 45,000 credentials, new multi-threaded communication structure, web interface and more. The new communication structure provides simultaneous communication to all IP nodes. It features robust integration support for many VMS, DVR and NVR systems including Keyscan DVR, Milestone, ONSSI, i3 International, Exacq, Open Eye CCTV and E-Series, Salient Systems, and Avigilon. It also features multi-language support, photobadging, visitor management, as well as system task scheduling.
Add to CompareCEM SWENET128 is an Ethernet reader controller software for 128 doors. It is a software controller required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Add to CompareRetrieve historical events and alarms from the Command Centre database Monitor for live events and alarms as they are logged within the Command Centre database Acknowledge, process, and add notes to alarms Retrieve only the events that are relevant via filters. These filters are Event Group, Event Type, Event Source, Cardholder, Date and Time, and Division
Add to Compare