Access Control Softwares (649)

C•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications.
Add to Compare
C•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications.
Add to Compare
C•CURE IQ Microservices is designed to allow smaller components of software (ex: software drivers) to interact with each other over a standard network protocol such as HTTP. With C•CURE IQ Microservices, the business logic is split into individually deployable services that are isolated from other services by network-based interfaces. This re-design allows for increased system scale, resiliency, and improved cybersecurity, by isolating the individual processes into their own containers. C•CURE IQ Microservices are built for the Kubernetes® platform. Kubernetes (also known as K8s®) is an open-source system for automating deployment, scaling, and management of containerized applications.
Add to Compare
Retrieve and report on stored information including events, alarms, cardholders, cardholder location, resource utilization, and site items. Configure reports to run on a repeating schedule or in response to events such as a fire alarm. Schedule the generation of reports and email automatically to recipients. Access reports easily through a ‘find reports’ viewer or ‘favorites’ list within Command Centre. Filter report content using parameters such as competency status, card type and cardholder’s last entered zone. Configure the report page layout and file output type (.doc, .xls, .pdf or .csv). Report on visitor data (when used with optional visitor management tools). View additional reports, including evacuation, access, time and contextual reporting. Report on security events from an individual server, or from multiple servers within a multi-server network.
Add to Compare
The latest release of the AC2000 suite of access control and security management software. AC2000, AC2000 Airport and AC2000 Lite version 7.0 are now available with a range of new features that increase the performance, simplicity and scope of the system along with a number of additions that improve functionality. Card Validation from online readers AC2000 Users can now validate cards using any online reader, either Ethernet or Serial, without the need to have a dedicated validation reader. AC2000 Intercom CEM AC2000 Intercom software can now be deployed as a standalone installation on dedicated intercom workstations where full AC2000 system functionality is not required. AC2000 now also supports the functionality to record emerald intercom (only available in emerald TS200/TS300 terminals) voice communication to audio files and store on the AC2000 central server. Integrations AC2000 now supports full two way integration with Salto off-line locks utilising SHIP (Salto Host Interface Protocol). This bi-directional interface links directly to the Salto database server. With the release of v7, AC2000 now supports a fully featured interface with Genetec Security Center, a unified platform with IP surveillance. This new link allows alarms and video footage from Genetec Security Center to be fully integrated with AC2000. Enhanced emerald functionality In AC2000 v7 a new pre-door mode allows for the display of a configurable personal message to the cardholder on the emerald terminal. This release also enables system administrators to use AC2000 WEB to upload their company logo to display on the emerald home screen.
Add to Compare
Access Groups is a powerful and efficient cardholder management tool which divides cardholders into groups depending on criteria and determines access privileges. Group information can include: Where and when the group has accessA list of members of the groupPersonal data fields for group membersWhether group members are allowed to act as escorts for visitorsAuthorization to arm and disarm alarm zonesWhether group members can change the state of access zones
Add to Compare
Easy registration and transmission of fingerprint data using wizard interface. Can be seen fingerprint's image and quality of fingerprint using USB fingerprint scanner(Hamster). Fingerprint quality check. Supports serial and TCP/IP communication (Required external converter). Supports step by step workflow for fingerprint data upload and download. ID registration process convenient and easy to enter data. Supports Text, Excel data export. Supports server and client system. Support MS-SQL server database.
Add to Compare
A mobile app for the AC Series access control system that allows users to unlock doors from a smartphone or tablet Administered by AC Nio, track user and visitor activity Assign users to the entire site or specific partitions Works on the local network or off-site with port forwarding Create favorite lists of frequently used doors Issue temporary Visitor Passes by text or email Available for Apple® iOS and Google Android™ smartphones or tablets
Add to Compare
Access control specialist TDSi has launched its new MIFARE Programmer, which offers users the ability to specify their own sectors and keys on their MIFARE access cards. Together with the ability to re-configure TDSi's standard sector readers to any desired code (without the need for any other parties to be involved), the MIFARE Programmer ensures confidentiality of security data and access control.To make sure it doesn't inadvertently become a weak point of security itself, TDSi's MIFARE Programmer uses a highly secure user login to protect the ability to programme user cards from unauthorised users. Having control of MIFARE security details also offers a number of other key benefits: Use pre-assigned sequential numbers - The MIFARE Programmer provides an effective method of card programming which eliminates potential duplication problems, Read and identify existing cards - users can identify existing cards and sector usage before migrating existing system cards, Log all cards issued - The MIFARE Programmer provides a history of cards which have been issued (for future reference), Multiple card number options - The user can utilise a unique number, custom number or CSN to program a sector, providing increased flexibility, Dual decode options - The MIFARE Programmer allows users to decode the new 7 byte UID using TDSi's format or NXP's format, for increased flexibility, Check which sectors are used - This built-in function allows users to check which sectors have already been used. This is ideal if you want to migrate existing MIFARE CSN cards that may be utilised for other aspects (such as cashless vending) to a more secure sector operation. TDSi's John Davies comments on the MIFARE Programmer, "For companies that need the highest levels of protection; the ability to protect your security codes across the board is a very attractive proposition. Being able to programme your own MIFARE cards and readers means you can close a potential gap in security that comes from pre-programmed systems. We believe this is a unique solution that offers real peace of mind. It has been developed from feedback we have had from installers and users, who advised that it would be highly desirable choice for both security and convenience."
Add to Compare
LiNC-NXG is a fully integrated physical security information management system (PSIM). PSIM is a category of systems designed to integrate multiple security applications controlling them through a comprehensive user interface (GUI). In a world of choices, LiNC-NXG offers multiple system configurations to fit your exact security needs. In addition to LiNC-NXG’s standard desktop solution, a browser managed interface is an available option. The browser based option eliminates software installation and maintenance requirements of application software. LiNC-NXG’s communication architecture is industry unique.
Add to Compare
Net2 software is designed to run on a PC with a Windows 2000 or XP operating system. It is designed to feel immediately familiar to any Windows user. It will organise and report on up to 10,000 users and hundreds of doors. Net2 standard software contains all of the basic access control features to control access privileges and report on users. Other features include multiple workstations, TCP/IP camera integration and remote sites using TCP/IP or modems.
Add to Compare
The ACURT2 is an integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security system up and running quickly and reliably.
Add to Compare
View and process alarms Monitor and override the status of doors and zones Lockdown zones quickly Trigger macros to perform custom functions Log mobile actions and events in Command Centre \ Disable a cardholder’s access QR and Barcode scanning for quick identification Receive notifications from Command Centre (Android devices must have the Google Play App installed)
Add to Compare
TDSi 4420-2401 is an optional visitor management module to the EXgarde platform with simplified front-end users which makes managing visitors much easier. Visits can be scheduled in advance or on the day with this intuitive module. Providing a cost effective and dependable visitor management function, EXvisitor enables an organisation to manage and track visitors and their hosts across a site.
Add to Compare
CEM SWENET256 is an Ethernet reader controller software for 256 doors. It is a software controller required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Add to Compare
CEM SYS/101/300 is a PC with SWENET256 software installed. The SWENET256 is required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Add to Compare
TDSi EXgarde’s integration with Aperio offers a new level of remote lock functionality with a global leader in door opening solutions. Using Aperio alongside TDSi’s core systems allows greater flexibility in remote areas where access control may be more difficult to implement.
Add to Compare
Datacard® ID Works® Intro identification software offers a discrete set of features you can use to create and maintain a start-up ID program. When your program needs greater versatility for card creation and image handling, you can easily add new features and capabilities by upgrading to Datacard® ID Works® Basic, Standard or Enterprise identification software.
Add to Compare
Import cardholder data, photos and access rights from third-party systems using flexible XML interfaces or the simple data mapping tool found within the Enterprise Data Import module. Assign access rights based on the type of day, time of day, area being accessed, validity of the cardholder token and any relevant competencies the cardholder possesses (such as training, licenses, inductions or medical clearances). Access changes are immediately and automatically downloaded to the controllers. Manage cardholder details, view recent cardholder events and track card replacement history. Perform bulk updates of cardholder information, such as a change in department. Design card layouts, and print and encode photo ID cards. Tailor screen layouts for the cardholder management team. Find cardholders in the system via access card presentation, text entry or multi-statement search criteria. Integrate intranet, web or network-based cardholder information directly to Command Centre via in-built browser capability. The integration of access control and intruder alarms allow a person with correct permissions to access a door as well as disarm an associated intruder alarm zone on entry, without requiring a separate keypad.
Add to Compare
CEM AC2000 Data Import Tool allows system administrators to import 3rd party cardholder details into the AC2000 Personnel application, which stores cardholder information on the access control system. It simplifies the bulk loading of data from a 3rd party system which is typically required during a new system installation. This removes the need for duplicate data entry and offers users a quick and efficient method of importing data into the AC2000 system. Using the interface tool, an unlimited number of records, including cardholder photographs, can be easily brought into the AC2000 system, eradicating the requirement for customised software development or time consuming database scripts.
Add to Compare
CEM SWXML AC2000 XML interface provides a simple and efficient way to import basic cardholder details into the AC2000 access control system. The import process allows incremental updates from a third party source and will support a large single batch import that is typically required during a new system setup. It also provides customers with a frequent data transfer link from many third party systems such as Human Resource systems. The interface enables the bulk adding and updating of personnel records, such as surname and card number.
Add to Compare
Visitor Management is an optional licensed feature of Gallagher Command Centre, delivering extensive pre-registration and reception-based visitor management functions. Optional visitor self-registration capability is available using the touch-screen enabled Visitor Management Self-Registration Kiosk. The Kiosk allows visitors to sign-in for a visit independently of the receptionist. On completion of sign-in their host is automatically notified of their arrival via email or SMS. Hosts can manage their visitors onto and off-site from the Kiosk, including the ability to issue visitor cards and assign access, update the visit details or reprint visitor labels. Hosts of visitors who are overdue to leave are automatically notified for follow-up action.
Add to Compare
Ricochet Monitor software, when installed on a laptop and connected to a RICOCHET enabled wireless expander, provides greater visibility and control over the wireless system performance than ever before. From a simple, intuitive menu screen all device status is available at a glance, with clear graphics highlighting signalling performance. Device attributes can be configured and distributed across the network in seconds thanks to an innovative ‘global poll' function that communicates to all devices within moments.
Add to Compare
CEM SWENET128 is an Ethernet reader controller software for 128 doors. It is a software controller required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Add to Compare
Store access credentials for multiple sites Use long range access with Bluetooth® wireless technology Store their fingerprint or PIN data on the mobile device, privately and securely using FIDO open standard authentication security Interact with building systems Receive important site notifications
Add to Compare
Distributed access control system with graphical alarm management Seamless integration and interaction with video, fire, intrusion and PA/VA systems via the common BIS platform High resilience thanks to a 4-tier system architecture and redundancy of critical components Integration of third-party products via open and secure protocols and SDK Efficient enrollment process that makes onboarding faster and more secure
Add to Compare
Administers system with a simple to use interface in a web-browser without having to install additional software View live and archived footage with a powerful built in video management system Create a system spanning multiple sites and/or subnets, for control and management from a single remote user interface Scalable up to 100 sites on a single system with up to 1,000 doors, 1,000 cameras and 50,000 users Log into the system from a web-browser anywhere in the world with an internet connection Administer system on mobile devices with the free Paxton Connect app that can be used off site Use smartphone or smartwatch in place of traditional tokens with the free Paxton Key app Customise view of Paxton10, create widgets and build dashboard, combining video, site plans, events and building controls Fully customisable software permissions allow to give tailored access to particular areas of the software, reports, dashboards or users Create effective landlord/tenant scenarios with customisable building permissions and folder structures, with access only for specific user Use the software to control devices on the system; for example, open a door Import images for a visual representation of site, to monitor access, control devices or view video simply and easily Easily create rules based on system events, including controlling other doors, devices or arm/disarm the intruder alarm Prevent a user from passing their token back to a second person to gain entry into the same controlled area Create reports listing all users currently within a specified area. In the event of an emergency this helps to confirm all users have evacuated safely
Add to Compare
This application provides all the functionality to monitor or control the access of vehicles to a site. A typical system would comprise of a camera monitoring thea ccess road, a number plate recognition computer with Talon ANPR and access control software installed, and optional barriers and traffic lighting.The software can be configured to meet your requirements and contains the abilityto set up separate sub-databases e.g. White list (vehicles that have authorised entry) & Black list (vehicles that are refused entry). It will allow only authorised vehicles to enter, keep track of the number of spaces available and deny access to unrecognised vehicles. These features improve safety and security for both car park and vehicle owners. Frequent visitor lists can also be used for marketing and statistical data. The software can also be used to control hardware such as barriers and traffic lights through the simple addition of Input / Output cards to be fitted into the recognition computer.
Add to Compare