Access control systems & kits (996)
The Access Control Manager (ACM) system is an IT-friendly Physical Access Control System (PACS) from Avigilon for enterprise-class installations. It’s a complete system that is designed to keep your focus on securing your people, property and assets, and maximizing your time by helping you respond immediately to alerts wherever you are. The ACM™ system is a browser-based solution that can integrate with existing IT/HR systems, minimizing the need for duplicate data entry. It comes with a full set of standard features that not only help to maximize your time, but will reliably safeguard your information.
Add to CompareEvery laptop or iPad can be RFID tagged, so that each one is uniquely identified and individually accounted for. Using the Traka software, you immediately know if a device is in its locker – and with real-time monitoring, you can instantly identify precisely when an item is taken or returned, and more importantly, by whom.
Add to Compare100% browser based application factory installed by Avigilon Simplified programming and navigation IP enabled controller Supports offline mode Removable terminal blocks for easy installation HID VertX V200 input control interface and V300 output control interface supported
Add to CompareAvigilon Access Control Manager (ACM) Professional is a web-based, access control network appliance designed for small- to medium-sized installations, with up to 32 readers. Intuitive and easy to use, ACM Professional simplifies access control with a cost-effective, all-in-one appliance. With a small form factor and powerful performance, ACM Professional installs into compact spaces with limited power consumption requirements.
Add to CompareAvigilon™ Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareBioStar is the name of Suprema's next generation access control system based on IP connectivity and biometric security. Server-client based (32 clients accessible). Network interface: TCP/IP, RS485. Database- MSDE(default), MS SQL, MySQL, Oracle.
Add to CompareOnGuard Access offers unlimited scalability withing a single, seamlessly integrated software solution. It has been designated to meet the needs of any size organization, from one that requires an entry-level, two-reader system to a large corporation with numerous facilities and thousands of card readers located around the world. OnGuard Access supports an unlimited number of card readers, alarm points and cardholders.
Add to CompareAvigilon™ Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareAvigilon™ Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareAvigilon™ Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareAvigilon™ Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareAvigilon™ Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organizations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareThe Access Control Manager (ACM) system is an IT-friendly Physical Access Control System (PACS) from Avigilon for enterprise-class installations. It’s a complete system that is designed to keep your focus on securing your people, property and assets, and maximizing your time by helping you respond immediately to alerts wherever you are. The ACM™ system is a browser-based solution that can integrate with existing IT/HR systems, minimizing the need for duplicate data entry. It comes with a full set of standard features that not only help to maximize your time, but will reliably safeguard your information.
Add to CompareManaging assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case. At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability; wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment. Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist tools
Add to CompareA self-contained access control system that does not require a PC or Windows software to operate The system consists of any number of V5 ACS servers, readers, and door hardware and other I/O Each V5 ACS server houses the necessary credential database to administer complex access routines for predefined regions of a facility by interfacing with its associated credential readers and access control hardware Act as a database server to other V5 ACS servers for centralised access control management using database replication and management technology The system supports configurations for card, card + PIN, PIN-only, and card + PIN + biometric access for flexible user identification Administrator-defined rules processing provides easy maintenance and increased control over user groups All communication among V5 Access Control System servers and the V5 Intrusion Detection System server is encrypted and can be made redundant for added security on a corporate LAN or security network
Add to CompareIncludes a photo badging camera, badge printer and system software for administering all badging needs Badging operators and administrators get a consolidated view into the access control system. Operators are able to view, search for and manage all badgeholders across the system from any one of the installed badging client workstations Badge Builder provides an intuitive and powerful badge-profile creation and management toolkit Badging administrators can view and assign personnel to locations – and vice versa – using Badge Manager. The operator can easily and quickly see which locations are accessible to that badgeholder or group, which schedules are in effect, and what entry rules are being applied Graphical screens are provided to create and manage group rules, authorisation levels and their combinations In addition to pushing and pulling records to or from a V5 server, VBM 3 ensures that locations, authorisation levels, group rules and schedules are reflected on the V5 and vice versa
Add to CompareTraka Touch is the newest addition to our range of integrated Key Management solutions, and it’s probably the most exciting development we’ve made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today. Put simply, when it comes to key management Traka Touch makes your life easier. It gives you an intelligent ‘out of the box’ Key Management solution which operates entirely independently of your IT systems. Everything is managed via the touch screen on the front panel, from the initial administrative set up of users and keys, right through to the day to day user access. What is Traka Touch? Traka Touch is a sophisticated Key Management system which has the intelligence built in. And because it’s a standalone solution, there’s no need for a connection to your IT network and no server requirement to manage the database. Everything you need is embedded in the unit, so all you have to do is plug it in. Full audit capability of all key transactions is retained within the system using internal solid state memory and memory card. Customer comment: “With Traka Touch we have been able to quickly and easily improve our Key Management at store level. We are planning to install a system at every one of our stores throughout the UK. It’s a brilliantly simple but effective solution which makes efficient key management incredibly straightforward for both staff and managers. What’s more, because it’s stand alone, it is easy to deploy locally without having to involve staff from the corporate IT team or head office” Traka Touch at a glance Traka Touch makes keys readily available, but to authorised users only. Gives you control over who can use your keys, with access levels designated for each particular user. Each user must identify themselves at the cabinet using either a PIN code or a magnetic swipe card, or by using biometric fingerprint recognition. To remove any ambiguity, LEDs indicate which keys a user can and can’t take when they access the cabinet. Searching for an ‘out of system’ key is easy and Traka will also indicate who took it and when. Reporting functions enable transaction reports to be displayed on the screen – for example so that you can quickly see who took a key and when it was returned. Great if you need to know who accessed the store room out of hours last Friday, or who was driving the white Transit two weeks ago! For printed reports, simply plug a USB memory stick into the unit and reports can be automatically exported ready for use on a PC. With its touch screen technology and embedded processing, Traka Touch gives you all the Key Management capability that you require, but without the need for any complex integration with your IT systems. Traka Touch is the newest addition to its range of integrated Key Management solutions, and it’s probably the most exciting development Traka made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today.
Add to CompareL-Series is designed to accommodate between 10 and 180 keys (or key sets). The L-Series design allows for starting small and later expanding by adding multiples of 10 key positions (called receptor strips) as required. The L-Series can support any type of access control device required to identify a user to the key system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcode and biometric technologiessuch as fingerprint,hand, vascular and retina scanners are also supported.
Add to CompareAvigilon Access Control Manager Virtual is a physical access control system (PACS) that is VMware® Ready for deployment in a virtual server environment, eliminating the need to maintain a separate, stand-alone server or dedicated network appliance. Access Control Manager Virtual is purpose-built for organisations that have migrated their IT infrastructure to a secure, private cloud environment, allowing them to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Add to CompareThe Access Control Manager (ACM) system is an IT-friendly Physical Access Control System (PACS) from Avigilon for enterprise-class installations. It’s a complete system that is designed to keep your focus on securing your people, property and assets, and maximizing your time by helping you respond immediately to alerts wherever you are. The ACM™ system is a browser-based solution that can integrate with existing IT/HR systems, minimizing the need for duplicate data entry. It comes with a full set of standard features that not only help to maximize your time, but will reliably safeguard your information.
Add to CompareContains devices necessary to secure 4 doors Compatible with multiple credentials (Card, PIN, Biometric, Mobile Access Card) Provides complimentary access control software of ‘BioStar 2’ (up to 5 doors) 1 month free subscription for devices with unlimited Mobile Access Cards or free Mobile Access Cards (50units) Easy network settings, easy to check status of device connections and input/output with the onboard CoreStation Setup Manager Easy to control via BioStar 2 platform
Add to CompareEvaluation Kit is a demonstration system to enable users to evaluate the core functionality of standalone modules quickly and easily. Moreover, the Evaluation Kit provides software tools and technical documents to help users in developing application systems.
Add to CompareThe Access Control Manager (ACM) system is an IT-friendly Physical Access Control System (PACS) from Avigilon for enterprise-class installations. It’s a complete system that is designed to keep your focus on securing your people, property and assets, and maximizing your time by helping you respond immediately to alerts wherever you are. The ACM™ system is a browser-based solution that can integrate with existing IT/HR systems, minimizing the need for duplicate data entry. It comes with a full set of standard features that not only help to maximize your time, but will reliably safeguard your information.
Add to CompareThe Access Control Manager (ACM) system is an IT-friendly Physical Access Control System (PACS) from Avigilon for enterprise-class installations. It’s a complete system that is designed to keep your focus on securing your people, property and assets, and maximizing your time by helping you respond immediately to alerts wherever you are. The ACM™ system is a browser-based solution that can integrate with existing IT/HR systems, minimizing the need for duplicate data entry. It comes with a full set of standard features that not only help to maximize your time, but will reliably safeguard your information.
Add to CompareImage SDK is a software development kit for PC based fingerprint application development. Unlike BioMini SDK that works with Suprema scanners, Image SDK does not depend on a specific scanner hardware but works with general fingerprint images captured by different fingerprint sensor devices.
Add to CompareDesigned to accommodate between 10 and 20 keys (or key sets), the innovative M-Series design allows for starting small and later expanding by adding multiples of 10 key positions (called receptor strips) as required. The M-Series can support any type of access control device required to identify a user to the key system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcodeand biometric technologies such as fingerprint, hand, vascular and retina scanners are also supported.
Add to CompareTraka Single keybox controls who can access, take and return a key at a remote site. It restrict access to their most important keys at unmanned sites or secured areas. It monitor key usage and produce audit reports showing usage by date/time and user. The power behind all Traka solutions lies in the Traka32 software. Running on either a single PC or in a networked server environment at your main office. Using Crystal Reports a comprehensive range of Management Information can be generated quickly and easily.
Add to CompareAvigilon Access Control Manager Enterprise is a web-based, access control solution that enables enterprises of all sizes to secure their facilities, people and assets across multiple offices, buildings or locations from any browser. Avigilon’s revolutionary access control platform is the industry’s first and only physical access control system (PACS) that seamlessly integrates with IT and logical security systems to deliver a new standard in performance, scalability and efficiency that can only be achieved through convergence.
Add to CompareFully integrated access control system. Base 2-door system can be upgraded to a 16-door unit with a simple personality chip change. Intel 32-bit microprocessor provides fastest response time in the industry. Support for multiple access technology: Digital Proximity, Magnetic Stripe and Smart Card. Can monitor 255 inputs and control 96 output with additional MIROs. 2 Weigand ports on-board which can be expanded by additional Wiegand external board. Host communications via RS-232, RS-485, Dial-up or Optional Ethernet LAN module. Elevator control upto 96 floors. Compatible readers: DigiReader, OmniProx, OmniSmart, DR4200K, MSR42, Precise biometric fingerprint reader and Bioscrypt V-Series.
Add to CompareTraka Modular Locker is an intelligent asset management locker ideal for controlling access to portable devices such as: Airwave radios, tablets, phones, printers, guns, etc. It's unique RFID technology ensures that it provides full visibility of assets at all times. It is available in a variety of sizes and functionality options, and are designed to manage and audit the use of assets inside each compartment, either as a standalone system or configured to the client’s network.
Add to CompareTraka Personnel Lockers enable staff, corporate visitors and students to deposit their personal possessions securely in a Personnel Locker, and then retrieve those possessions at some later time – all with the convenience and auditability of Traka Touch locker management system.
Add to CompareWinDSX is a powerful access control and system monitoring application that harnesses the power of the Windows XP, Vista, and 7 Professional™ operating systems. WinDSX combines point monitoring and access control with Photo ID Badging, Time and Attendance, Alarm Graphics, DVR/NVR Integration, Elevator Control, Alarm Email/Text Message Notification, Threat Level Management, HazMat / Emergency Lockdown, and FIPS/TWIC card compatibility.WinDSX can support your access control needs from a single PC or multi-user Local Area Network to an enterprise solution with SQL Server as the database engine. The system utilizes TCP/IP network communications to provide user interaction and real time monitoring to the workstation PC’s located anywhere on the LAN or WAN. Password protection allows for operator specific capabilities at each workstation.There are two Editions of Software. WinDSX comes standard with a Microsoft Access database engine. WinDSX SQL is designed to work with Microsoft SQL Server as the database engine. Both editions of WinDSX have similar features and capabilities. Microsoft SQL Server is user supplied.WinDSX implements Point and Click operation with hierarchical tree views and pop up menus for ease of use. I/O monitoring and control is achieved through animated icons that depict the real time status of each input or output. I/O points can also be assigned to an Override Group to allow for multiple inputs and outputs to be monitored and controlled from a single icon.Scheduled Overrides can be assigned to individual Inputs and Outputs as well as Override Groups. These schedules allow operators to quickly assign time and date sensitive instructions determining the open/secure status of outputs and the armed state of inputs.
Add to CompareSoftware is designed to meet the needs of the most demanding security management applications. Corporate Edition operates in Microsoft WIndows Server environment and uses SQL as the database engine to provide most powerful capabilities in information management and network communications. Integrated VAST and Rapid Eye Digital VIdeo solutions from ADEMCO video. SEEP Hardware support. Multiple database partitioning. Direct import of AutoCAD drawings with layer views. Multiple Database Processing uses the latest Microsoft database engine technology (OLE-DB).
Add to CompareSupports 8 readers Ready to go with pre-installed C•CURE 9000 software and intuitive wizard for easy configuration Includes pre-configured database of readers, doors, controllers, and other standard objects to reduce setup time Can operate as a satellite application server (SAS) in an enterprise environment 256GB solid state drive (SSD) provides enhanced system reliability Intuitive C•CURE 9000 Web Client simplifies operator training Health dashboard to monitor network bandwidth, memory, and other important system functionality
Add to CompareMultiple systems can be networked together over a Local or Wide Area Network to provide accountability for a limitless number of laptops administered from multiple PC workstations running the Traka32 software. User Identification - The Traka lockers can support any type of access control device required to identify a user to the locker system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcode and biometric technologies such as fingerprint and hand, scanners.
Add to Compare