Access Control Softwares (649)
Store access credentials for multiple sites Use long range access with Bluetooth® wireless technology Store their fingerprint or PIN data on the mobile device, privately and securely using FIDO open standard authentication security Interact with building systems Receive important site notifications
Add to CompareProvides integration with Intrusion Detection Panels from Radionics (D9412 and D7412) and Detection Systems(7400xi and 7400xi 4+) allowing customers to monitor intrusion detection devices, view intrusion alarms inside OnGuard central alarm monitoring, and have full command and control of supported intrusion detection devices (such as arming and disarming an area). OnGuard Intrusion's integration into Lenel's Total Security Knowledge Management Solution provides extensive system integration opportunities, including the ability to link intrusion activity to digital video, global I/O commands, and e-mail/paging systems.
Add to CompareIdentity Management On / Off Boarding Custom approvals workflow Policy creation Role based permissions Door Access provisioning Access Group management HR system integration Symmetry access control integration Automated Access Audits Compliance dashboards Compliance reports Badge Template Creation Photo ID Processing Self Service photo ID Self Service access provisioning
Add to CompareAccess PE provides self contained access control for small and medium-sized companies. Its installation is extremely simple and fast. There is no need to install and administer a database system. The system is easy to use and enables a person with minimal training to create badges and administer access rights in a very short time. Specific event logging and reporting allows you to trace who was when and where on your company’s grounds.
Add to CompareThis application provides all the functionality to monitor or control the access of vehicles to a site. A typical system would comprise of a camera monitoring thea ccess road, a number plate recognition computer with Talon ANPR and access control software installed, and optional barriers and traffic lighting.The software can be configured to meet your requirements and contains the abilityto set up separate sub-databases e.g. White list (vehicles that have authorised entry) & Black list (vehicles that are refused entry). It will allow only authorised vehicles to enter, keep track of the number of spaces available and deny access to unrecognised vehicles. These features improve safety and security for both car park and vehicle owners. Frequent visitor lists can also be used for marketing and statistical data. The software can also be used to control hardware such as barriers and traffic lights through the simple addition of Input / Output cards to be fitted into the recognition computer.
Add to CompareAdministers system with a simple to use interface in a web-browser without having to install additional software View live and archived footage with a powerful built in video management system Create a system spanning multiple sites and/or subnets, for control and management from a single remote user interface Scalable up to 100 sites on a single system with up to 1,000 doors, 1,000 cameras and 50,000 users Log into the system from a web-browser anywhere in the world with an internet connection Administer system on mobile devices with the free Paxton Connect app that can be used off site Use smartphone or smartwatch in place of traditional tokens with the free Paxton Key app Customise view of Paxton10, create widgets and build dashboard, combining video, site plans, events and building controls Fully customisable software permissions allow to give tailored access to particular areas of the software, reports, dashboards or users Create effective landlord/tenant scenarios with customisable building permissions and folder structures, with access only for specific user Use the software to control devices on the system; for example, open a door Import images for a visual representation of site, to monitor access, control devices or view video simply and easily Easily create rules based on system events, including controlling other doors, devices or arm/disarm the intruder alarm Prevent a user from passing their token back to a second person to gain entry into the same controlled area Create reports listing all users currently within a specified area. In the event of an emergency this helps to confirm all users have evacuated safely
Add to CompareLenel has partnered with ActivIdentity to jointly market a solution for physical access to facilities and logical access to networks. The joint solution offers many benefits, including increased security and lower total cost of operation. In addition, the Lenel-ActivIdentity solution will be a primary component for a corporation’s efforts to achieve compliance with regulations such as Sarbanes-Oxley and HSPD-12. The ActivIdentity Enterprise Access Card consolidates employee logical credentials onto a single, secure smart card. This provides a photo ID as well as a security device that enables secure Windows and network login, PC 'locking', secure remote access (VPN), secure email with digital signatures, and single sign-on to enterprise and desktop applications.The Lenel OnGuard® ID CredentialCenter™ application consolidates employee physical credentials, biometrics, and demographic information onto a single secure smart card, captures photo ID and prints the card. The Lenel OnGuard security platform offers seamlessly integrated access control, alarm monitoring, identity management, digital video, intrusion detection, asset management, card production, and visitor management.The joint solution integrates the issuance and administration of cards and credentials for both physical and logical domains, and combines a photo ID, smart card and proximity card onto a single, easy to use device. With the importance of physical and logical security, the integration of the Lenel and ActivIdentity products allows complete life cycle management of the credential.See the ActivIdentity Architecture diagram
Add to CompareIncluding interface advancements, enlarged vendor independency and compatibility with the latest Windows Internet Explorer 9, Bosch Security Systems introduces a number of updates to its Building Integration System (BIS). The new version 2.5, which is available from early May 2012, increases the range of supported devices to more than 1,000 different third party cameras and encoders, making it suitable for even the most complex integration projects. The new system allows further optimized security, safety and communication management in one front-end system with customized user interface. The range of video devices supported by BIS 2.5 is unmatched in the industry. It seamlessly interoperates with virtually any video camera, connecting to the latest IP cameras on the market with HD and H.264 encoding technology. The Divar 700 and Bosch Recording Station are supported in their most recent versions. BIS 2.5 benefits installers and end users alike: certified BIS partners and systems integrators enjoy an upgraded level of customization options, such as new layout formats for a wide range of monitor sizes (including 16:9 and 16:10). Thanks to numerous handy improvements, such as useful additions to the symbol libraries, it is now even easier to personalize the system. BIS 2.5 is interoperable with the large variety of ONVIF-compatible, modern IP-based video products supplied by all major manufacturers. ONVIF ensures a uniform standard, allowing customers to choose the product that best fits their individual needs, without having to worry about compatibility. It thereby saves costs and allows long term planning. The ONVIF standard was first introduced by a consortium of companies, including founding member Bosch, in 2008.
Add to CompareInstant access to Symmetry Security Management System from a web enabled device Available for Symmetry Professional and Enterprise Card Holder Enrollment and Management Configure access codes Tablet and smart phone support Alarm Management Real time alarm updates View, add comments to, and clear alarms Prioritise Alarms Granular User Based Permissions Badge Capture Capability Runs on standard web browsers Integrated Web Server HTTPS Security
Add to CompareApollo Security introduces its new APACS 3.4 access control and security integration software.Apollo Security's Access Control and Alarm Monitoring System (APACS) is the result of years of research and design coupled with real-world input from security professionals working at the most secure sites around the globe. APACS comprises the basis for a flexible and robust system that meets the needs of systems ranging from perimeter systems up to fully integrated enterprise-level installations.APACS 3.4 features include:Support for FIPS 201 compliant credentialsOPC Integration: Alarm & Event Support; OPC value writing via reactions, including OPC wrapper around data server to generate eventsSupport for Suprema BioMini enrollment readerSupport for L-1 Bioscrypt 4G readersReaction for Archive Video PlaybackStop unconditional reactionCopy feature for reactionsComments for message acknowledgmentsCustom Message Columns for event display in Alarm ModeCustom configuration file locationCommand line execution for ReportsButton to easily create temporary card and deactivate/activate permanent cardSupport for Samsung, Panasonic and Bosch video recordersImage support for Advanced FieldsSupport for SQL Server 2008Faster loading and closing of Guard Drag and drop icons onto APACS maps
Add to CompareAccess PE provides self contained access control for small and medium-sized companies. Its installation is extremely simple and fast. There is no need to install and administer a database system. The system is easy to use and enables a person with minimal training to create badges and administer access rights in a very short time. Specific event logging and reporting allows you to trace who was when and where on your company’s grounds.
Add to CompareLiNC-Ez / NRX Kit manages access control, alarm monitoring and building needs. All in one box! The ease begins right at installation with a self guided wizard to help load and configure system. With its enhanced preprogrammed access parameters and schedules, LiNC-Ez is ready to use immediately after installation. A complete two-door package that allows up to 12,000 cardholders and up to 64 doors.
Add to CompareMorse Watchmans has designed and developed Tour Pro Guard Tour Software to offer extended functionality for guard management system. This unique security guard software allows to download tour information, program the data recorder, generate custom reports and manage files using one simple program. It converts stored data from officers’ tours into useful, detailed, printable reports. By choosing a fixed or variable set of criteria, you may customise the reports by time, day, week and month for numerous types of transactions.
Add to CompareKeyscan K-BADGE photo badging & verification module integrates with System VII for a streamlined badging operation and offers the added benefit of greater security. It supports and prints a variety of industry-standard barcode types. It creates unlimited template designs to distinguish departments or areas of authorisation as well as shares cardholder images with other departments such as human resources. It displays cardholder image and transaction details immediately following site activity and has an “Always On Top” setting for constant monitoring of photo verification window even if other programs are open.
Add to CompareSoftware Maintenance ensures you receive regular software updates, giving you access to the most recent enhancements, features, and improved functionality the Gallagher Command Centre security platform has to offer. Having the latest software reduces your cyber risk, enhances system performance and guarantees continued compliance with government standards.
Add to CompareKeyscan K-VIS is a SYSTEM VII visitor management module. Retains a complete history of all visits Has a wide array of report capabilities including all visitors currently on site Interfaces with Keyscan’s business card scanner (P/N BIZSCAN) for quickly adding new visitor records Includes Keyscan’s Photo Badge Template Editor for designing visitor badge templates and parking permits Assigns visitor access cards for independent but regulated and monitored access at reader-controlled doors Maintains individual visitor files with user-defined fields for basic or detailed records
Add to CompareGuard Tours are an optional licensed feature of Command Centre and enable the configuration, live operation and reporting of on-site guard tours. Each tour can be identified with a unique name and operators can stop and start tours from any checkpoint.
Add to CompareSymmetry Mobile is a web credential application designed to be used with AMAG Technology’s Symmetry Bluetooth readers. Symmetry Mobile is a convenient solution for organizations using mobile devices or in conjunction with physical credentials for users who are transitioning to a mobile system to gain access to secured doors. It works with AMAG’s Symmetry Access Control system, as well as other access control systems, providing a seamless, efficient and cost-effective solution for enterprise users deploying more than one system. The touchless solution supports multi-factor authentication when used with a PIN or biometric (fingerprint or facial recognition) on both Android and Apple iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in support of COVID-19 guidelines. The frictionless setup of a credential eliminates the need to physically interact with the security team. Organizations can centrally issue and manage mobile credentials, photos and devices to their entire user base from a remote location, eliminating the need to buy and carry a physical credential and come into the badge office. The virtual credential in Symmetry Mobile displays a person’s name and photo. An unlimited number of credentials can be stored within their digital wallet, allowing people who need to access multiple sites using different access control systems to use the same mobile device. In an effort to support businesses that required employees to be on-site and ensure the health and safety of the labor force, AMAG developed a customizable health screening questionnaire to help reduce the risk of potentially infected employees from entering a building. Upon successful completion of the questionnaire, an employee’s physical access card or mobile credential will be enabled for a specified period of time, for example, one day. If the form is not completed successfully, the access card will expire and the employee will be denied access to the building. The system will send email notifications to managers for visibility. The questionnaire’s functionality operates independently and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile data is highly secure, as all of the data is encrypted when sent to the reader or stored on the phone, ensuring the mobile solution is completely secure. Users can customize the signal strength and read range on a per device and/or per person basis, increasing security and accommodating those who may need a longer read range, such as a person in a wheelchair, to open a door. Door read and unlock time is less than 1.2 seconds. Symmetry Mobile is available as a hosted or on-premise solution. The app is available in English, Spanish, French and Arabic, and is available now in the Apple App Store and Google Play Store.
Add to CompareAccess management software for small and medium-sized companies Cardholder administration of up to 10.000 cardholders Video verification, video alarm verification, and video monitoring of live and recorded events Alarm management with details via alarm list and animated icons on interactive location maps
Add to CompareLiNC-NXG PIV is the next generation of Federal security solution systems, meeting the control and security objectives requirements of FIPS and HSPD-12 standards. LiNC-NXG PIV utilises identification issued by the Federal departments and agencies for federal employees and contractors for gaining physical access to Federally controlled facilities. LiNC-NXG PIV utilises PIV Cards with Cardholder Unique Identifiers (CHUID) and includes an element of the Federal Agency Smart Credential Number (FASC-N). LiNC-NXG PIV also provides “personal privacy and confidentiality” of the system and user data.LiNC-NXG PIV’s communication architecture is industry unique.
Add to CompareLiNC-XS for Windows Server provides the power to customise complete access control systems to specific needs without requiring advanced technical expertise. This makes it ideal for a wide variety of applications such as multi-tenant office buildings, universities, hospitals, manufacturing facilities, government applications and more. It provides the same high degree of security and control from the most limited implementation to the largest, multi-site solution. LiNC-XS utilises a powerful set of security system integration solutions that provide total flexibility and control over a facilities security infrastructure, while reducing overall operating costs through seamless integration and system reliability. Seamlessly integrates access control, intrusion detection, video surveillance and recording, photo ID badging, smart cards, biometrics, elevator and parking control and the interoperability with other building and business systems.
Add to CompareGallagher elevator integrations control access to floors with a high level interface (HLI) between an elevator system and Command Centre. An HLI achieves intelligent elevator control without relying on the excessive user interaction that a low level interface requires. Gallagher supports all leading elevator manufacturers. IFE Elevator KONE Otis Elevator Company The Schindler Group ThyssenKrupp Elevator
Add to CompareKey features:Taking advantage of core software features within the industry-renowned AC2000 SE system and supporting CEM's range of industry leading hardware products, AC2000 Lite is setting the benchmark as one of the most accomplished security management solutions available for the small to mid-range markets. The AC2000 Lite has a system controller which any client workstation on the network can access to manage the database, monitor alarm activity or configure devices.Supporting up to 128 doors, AC2000 Lite comes fully-loaded with all the software required for performing all system tasks. This includes access control, ID badging, graphical alarms maps, vehicle management, visitor management, time & attendance and much more.Supports Power over Ethernet access control - CEM DIU 220 (Power over Ethernet Door Interface Unit) allows power and comms to be provided at the door via a single Cat 5/6 cable.Using the CEM DCM 300 intelligent two door IP controller, AC2000 Lite supports most third-party read heads conforming to the physical Wiegand interfaces, including support for third-party biometric technology. Supporting CEM's advanced range of IP card readers including the industry first S610e reader and with an on-board database, CEM's readers store transactions and operate offline, with the additional option of card plus PIN control. A graphical LCD display allows messages to be displayed such as ‘wrong zone', ‘lost/stolen card', ‘invalid card', ‘expiring card'.Easy system set-up - web-based configuration tool to perform the basic set-up and configuration of the AC2000 Lite Controller.
Add to CompareSALTO’s JustIN mobile key technology allows you to use your smartphone as your room key. The intuitive SALTO JustIN mobile key app communicates securely via the Cloud and enables you to receive your key online, anytime and anywhere. When you arrive at your hotel, you can choose to go straight to your room and receive the room key on your phone, or you can ask for assistance at reception. It’s your choice. Technologically cutting-edge, SALTO mobile key means the end of lost key hassles, expense and waste. Plus, the technology isn’t limited to hotel rooms -- it can also be used on main entrance doors, elevators, car park barriers, meeting rooms etc. It’s the ideal solution for any door where you need to control access.
Add to CompareStand-alone deployment, with own map viewer and alarm & event viewer, or as integral part of a video management system (e.g. BVMS) Combines high-end access control features, performance and availability with intuitive operation Highly scalable Easy to configure Situation always under control for doors, elevators, car parks and visitors, with alarm list and for different threat scenarios Centralised user and event management of intrusion panels Comprehensive security management: Integrates with intrusion and video systems Robust and Secure: Multi-level architecture for system reliability, comprehensive data security and privacy protection
Add to CompareAccess PE provides self contained access control for small and medium-sized companies. Its installation is extremely simple and fast. There is no need to install and administer a database system. The system is easy to use and enables a person with minimal training to create badges and administer access rights in a very short time. Specific event logging and reporting allows you to trace who was when and where on your company’s grounds.
Add to CompareVelocity Security Management SystemHirsch's Velocity delivers total security in an all-in-one package: Access control: readers, keypads, biometrics, controllers for doors, gates, elevatorsAlarm monitoring, intrusion detection: sensors, alarm routing, automated responses, history/reports Video, CCTV: cameras, DVRs, links to analyticsIdentification management: smart cards, photo badges, integration with IDMS, CMS, watch listsInteroperability: with personnel system, network log-on, provisioning, command & control, central station, parking, HVAC, lighting, other devices, other databasesVelocity is network-ready & IT friendly. Velocity employs IT-centric tools such as integration with directory services, encrypted TCP/IP communications, and support of split server configurations and high-availability environments.The system is highly secure, requires little bandwidth, and is scalable to even the largest organisations. Velocity supports Unified Identity Management with a full line of smart card readers, biometrics and privacy-sensitive keypads. Velocity's open architecture, SDK, and built-in XML interoperability enable you to integrate Velocity with building automation and other systems. Velocity is designed to tightly integrate with personnel and network provisioning systems, allowing it to serve as the physical security component of an overall Role-Based Access Control (RBAC) and policy-based security management system. This approach can help enhance security, improve operational efficiency and reduce administrative and compliance costs.Velocity has earned numerous industry awards including an unprecedented five-time winning of the U.S. Security Industry Association's Product Achievement Award.
Add to CompareAn access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS or Bosch B and G series intrusion panels As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors Intrusion areas can be armed directly from the Map View, and intrusion panel users can be centrally managed Combines high-end access control features, performance and availability with intuitive operation Web-based visitor management Comprehensive security management: Integrates with intrusion and video systems Highly scalable Easy to configure Easy to use: Intuitive GUI for maps and alarm viewer
Add to CompareDistributed access control system with graphical alarm management Seamless integration and interaction with video, fire, intrusion and PA/VA systems via the common BIS platform High resilience thanks to a 4-tier system architecture and redundancy of critical components Integration of third-party products via open and secure protocols and SDK Efficient enrollment process that makes onboarding faster and more secure
Add to CompareLG Iris Technology has been the key developer and driver of the commercialisation of iris recognition technology. LG IrisAccess, now in its third generation, is the world's leading deployed iris recognition platform. LG's biometric solutions, enabling non-contact and highly accurate identification by the iris of the eye, deliver security, convenience, privacy and productivity to millions around the world. The LG IrisAccess platform identifies more people in more places than all other iris recognition products combined.LG IrisAccess 4000 solution is versatile and flexible providing easy integration and expansion. Enrolment and recognition are also easier than ever. An intuitive user interface, with visual and audible prompts, enables users to be quickly enrolled and identified. Dual iris capture and a power, auto-tilt mechanism increases speed and convenience by adjusting for height with one simple touch.Combining LG's IrisAccess 4000 and the new iData SoHo software solution from LG's suite of identity access control applications provides a simple, flexible and robust solution for any environment.Features include:Enrolment: iData SoHo provides the system administrator with a flexible interface to enrol individuals in the database with a simple user interface.Setup: iData SoHo provides a simple configuration solution, as the system has the ability to configure itself via DHCP. Alternatively, the system provides the option to set static IP addresses. An administrator can also control a relay to activate a door strike, or reset permissions. Wiegand formats up to 128 bits are supported.Reporting: iData SoHo is designed to identify individuals as their biometric is presented. All transactions are stored in the system log and can be accessed by the system administrator for download, review and printing.
Add to Compare