Foreign ACS.
We present to the readers the end of the review of access control and management systems of leading foreign manufacturers. The beginning of the material was published in No. 6- 2008 (p. 52).
Access control and management systems Nedap-AEOS (Holland)
AEOS is a powerful, user-friendly access control and security management system based on intelligent network technology. In AEOS, core functionality is shaped by end-user preferences through peer-to-peer information flow and flexible behavioral components. Using the latest information technology, AEOS offers a reliable and future-oriented solution to all your security needs – now and in the future.
Easy to use, accessible without restrictions AEOS is web-based. This means you can connect to the system using a web browser from any computer: from another office, from another workplace, from home, or even when you travel.
Decentralization of information AEOS is based on the principle of decentralized data. All access rights and programmed actions are defined and processed at the lowest level of the system. This means that system management and the required level of security are guaranteed regardless of the availability of the network or server. The AEOS system can function independently of the server. AEOS's own IP controllers (AEpu) can communicate directly with each other and with other IP devices, such as surveillance cameras.
Expandable AEOS is built from a variety of different hardware modules and software components, allowing you to change its configuration according to your requirements using standard components. If the situation changes, you can quickly and easily adapt or expand the hardware modules and behavioral components (embedded software) used.
For data transfer, the AEOS system uses the existing LAN infrastructure. AEOS's own IP controllers can be connected from anywhere to a 10/100 Mbit TCP/IP Ethernet network. A VPN connection is used for communication between the controllers and the server.
AEOS was created to provide the ability to install a security management system with the least effort and cost. That is why the software is licensed directly on the basis of the functionality actually used, i.e. the customer pays only for the functions that he uses.
Standalone/networked access control system from Keri Systems
The access control system from Keri Systems, which has been present on the Russian market for a long time and is constantly updated, has proven itself as a system with high reliability, simple assembly and installation, easy administration and cost-effectiveness in operation. An additional advantage of this system is free Russified software for administering the ACS and the availability of software for recording working hours, adapted to the requirements of Russian labor legislation. In addition, this ACS is integrated with the video surveillance system using the Visions application software.
The low-budget access control system can process information from proximity cards of 50 to 65,000 employees per controller, control up to 256 doors, allowing you to register up to 32 system administrators and assign up to 32 time zones with an unlimited number of access groups. The Doors software included in the delivery set allows you to display photos of employees being identified on the reader on the security monitor and print passes on proximity cards.
The Keri Systems ACS may include the following components:
— PXL-500/510 Tiger II controllers
— Russified Doors software (free)
— Timex time tracking system
— Access card readers, biometric readers, intercoms
— Identification passes (cards or key fobs)
— Integrated video surveillance system Visions.
Multifunctional Doors software for Keri Systems ACS Doors software is fully Russified, works with Windows 9x/2000/ME/XP/NT and provides access to remote system nodes via IP network or modem connection. In autoconfiguration mode, Doors automatically polls controllers and configures the system in accordance with the devices found in the network. As a functional component of the Doors software, the Visions software for the video surveillance system is also integrated into the Keri Systems ACS, the hardware of which is implemented on the basis of a multi-channel video capture card. The Visions program allows you to receive a video image associated with events in the access control system.
WIN-PAK® Professional Edition is the latest version of Honeywell software for access control and management systems and complex integrated security systems. The professional version supports access control controllers of the PW-5000, PRO2200, N-1000, NStar NS2+ series, as well as new controllerswith a built-in NetAXS Web server. Unlike software products from other manufacturers, WIN-PAK is implemented as a set of Windows services running in the background. This ensures exceptional system stability regardless of operator actions. The program has a Web interface for performing all functions and supports operation on multiple monitors.
For each cardholder, it is possible to record in the database not only a photograph, but also images of documents, a car or a laptop. This allows you to control the passage of employees and visitors with equipment. The new version has added functions for working with e-mail, which allows you to automatically generate and send reports and messages about events by e-mail. Reports on the frequency of card use make it possible to identify and deactivate cards that are not used in the system.
The PW-5000 and PRO2200 controllers allow you to implement virtually any control algorithms for actuators thanks to the built-in programmable logic, which makes it possible to link events and actions (procedures) performed in the system at the controller hardware level.
Using the electronic LobbyWorks visitor accounting system, also integrated into WIN-PAK, you can now manage visitor access and issue cards with a limited access level, valid only for the duration of the visit. The cards automatically become inactive after the visitor's visit.
WIN-PAK provides full integration with digital video recorders (for example, Fusion), analog and IP cameras. Events occurring in various security subsystems are linked to video fragments to enable visual monitoring of ongoing or past events. The movement tracking function allows you to display in real time a list of people in any room and count their number.