New Product Announcement: AC2000 v7.1 Integrations

Size: px
Start display at page:

Download "New Product Announcement: AC2000 v7.1 Integrations"

Transcription

1 New Product Announcement: AC2000 v7.1 Integrations CEM Systems is pleased to announce the release of the latest integrations update for AC2000 v7.1 suite of access control and security management software as well as a number of hardware updates. AC2000, AC2000 Airport and AC2000 Lite are now available with a new range of integration interfaces that increase the performance, simplicity and scope of the system. Integration at a glance Aimetis Symphony - AC2000 now supports full integration of Aimetis Symphony. Aimetis Symphony, highly scalable, easy to set up and use, can be used in a single server installation and multi-server deployments. Avigilon Control Center - AC2000 now supports full integration to Avigilon Control Center (CC). Avigilon CC is a simple-to-use video management software that is able to efficiently capture, manage and store high-definition surveillance video while intelligently managing bandwidth and storage. Morpho BioBridge - BioBridge is an enrollment and synchronization middleware that overlays enrollment and demographic synchronization between MorphoManager and AC2000 Visual Image Pass Production (VIPPS). BioBridge is not dependent on the underlying technology platform required for integration. Hardware at a Glance DESFire EV2 - CEM Systems DESFire readers now support DESFire EV2. The second evolution of MIFARE DESFire open architecture platform for smart cards offers superior performance, state-of-the-art security, privacy and enhanced multi-application support. HID Mobile Access - CEM Systems can now supply HID mobile credentails and card readers as part of our overall access control solution. HID readers are connected back to AC2000 via CEM Systems card readers or door controllers, S6x0, emerald, DCM300, and DCM350 (OSDP) range. MorphoAccess & Morpho 3D Face Reader Terminal - The AC2000 system now supports a wider range of MorphoAccess biometric identification terminals and the Morpho 3D Face Reader terminals.

2 AC2000 Integrations Aimetis Symphony - AC2000 features a high level interface with Aimetis Symphony, a softwarebased Video Management System (VMS) with native analytics. Aimetis Symphony is compatible with analog and IP cameras, encoders, DVRs and other video devices from a wide variety of manufacturers. Seamlessly integrate AC2000 with Aimetis Symphony VMS AC2000 high-level interface with Aimetis Symphony supports Preset-on-Alarm, Patternon-Alarm and forced camera recording on video action. These can be enabled and configured via the AC2000 Video Configuration Application or VMS. AC2000 events can trigger VMS video actions. Video actions can be customised using AC2000 video configuration, and are assigned to a camera such that when an AC2000 alarm on a CEM Systems card reader or PIR, AC2000 will trigger a recording on the VMS for the configured record duration and, if needed, trigger a preset or pattern tour on the camera. Associate access control alarms with digital video footage Playback alarm videos, take snapshots and download video clips of recorded and live footage View alarm videos as they occur, control the camera and alarms by priority in Video Popup Define video alarm actions in AC2000 DVR Video Configuration Display up to 16 individual camera feeds simultaneously using the Live Viewer Control pan, tilt, and zoom cameras and move to specific presets via AC2000 Trigger camera patterns on configured PTZ cameras Easy one step import of camera details directly from Aimetis Symphony VMS

3 Avigilon Control Center - The AC2000 Avigilon Control Center (CC) video interface enables AC2000 to act as a flexible and fully integrated Security Management System (SMS). The AC2000 Avigilon CC video interface provides the ability to define video alarm actions, view live footage as alarms occur, control cameras and run camera presets. The AC2000 DVR Video Configuration module seamlessly integrates AC2000 with Avigilon CC NVR s. This will give operators the ability to define video alarm actions, search alarm feeds and playback recorded video from alarms, providing a fully integrated solution. Seamlessly integrate AC2000 with Avigilon Control Center Network Video Recorders (NVR s) Associate access control alarms with digital video footage Playback alarm videos, take snapshots and download video clips of recorded and live footage View alarm videos as they occur, control the camera and alarms by priority in Video Popup Define video alarm actions in AC2000 DVR Video Configuration Display up to 16 individual camera feeds simultaneously using the Live Viewer Control pan, tilt, and zoom (PTZ) cameras and move to specific presets via AC2000 Trigger camera patterns on configured PTZ cameras Easy one-step import of camera details directly from Control Center NVR s

4 Morpho BioBridge - Morpho BioBridge is a synchronisation middleware that enables cardholder details to be seamlessly shared between the AC2000 platform and MorphoManager software. Cardholder data now only needs to be added into your AC2000 database. This information will then automatically be populated within the MorphoManager system, eliminating the need for data duplication. Cards will still be validated on AC2000 but now you can use the MorphoManager to search for AC2000 cardholders and capture their biometric across Morpho s full range of biometric readers. This synchronisation can greatly save on system administration and duplicate data entry between AC2000 and MorphoManager.

5 Hardware Updates DESFire EV2 - The second evolution of the industry-leading MIFARE DESFire open architecture platform for smart cards offers superior performance, state-of-the-art security, privacy and enhanced multi-application support to enable new business models. The new MIFARE DESFire EV2 platform further increases flexibility. Compared to MIFARE DESFire EV1, a MIFARE DESFire EV2 chip can hold as many different applications as the memory size supports and new applications can be loaded after the card has been deployed into the market. A purse (what is a purse?) can even be shared between applications, for greater interoperability. For a truly convenient touch-and-go experience, MIFARE DESFire EV2 offers increased operating distance compared to previous versions. The 70 pf option enables read range optimizations of small antenna form factors. MIFARE DESFire EV2 delivers the perfect balance of speed, performance and cost efficiency. It is also fully compatible with the existing CEM Systems MIFARE/DESFire readers. With MIFARE DESFire EV2, data transfer rates up to 848 Kbit/s can be achieved, making fast data processing possible. HID Mobile Access (SEOS) - HID Mobile Access is a service and centres around a cloud-based portal, provided by HID. This portal enables the provision, revocation and management of all Mobile IDs, the registration of users and of their mobile devices. It allows flexible access via any web-enabled computer or tablet. A Mobile ID is a virtual credential stored on a smartphone. You can store multiple Mobile IDs on a single device, securely. Mobile IDs cannot be copied or transferred. Mobile IDs can be revoked in real time, remotely. HID's Mobile Access App is available for ios 7.0 and above, and Android 4.3 and above. The app is available for free via the respective platform stores and supports all major ios and Android-based smartphones. HID readers have the ability to support Mobile IDs as well as conventional credentials, such as cards. Readers can support HID Mobile Access via both NFC and Bluetooth SMART.

6 Two opening modes: Tap mode for close range Twist and Go gesture for longer range HID Mobile readers can be easily connected back to any CEM Systems card reader or door controller over the Wiegand or OSDP interface. Mobile credentials are enrolled like any other card on AC2000 using online validation reader. Increased flexibility - HID Readers support both cards and Mobile IDs - Mobile Access complements your existing AC2000 solution Platform independence - App available on both ios and Android - Solution works globally across all Mobile Network Operators - Web-based Mobile Access portal interface Ease of use - A single device solution that carries multiple keys - Fewer items to carry - Converged functionality with a device that never leaves your side - Benefit from extended read ranges without the need for obtrusive readers - Works without cellular coverage to authenticate MorphoAccess SIGMA Fingerprint Terminal The MorphoAccess SIGMA Fingerprint Terminal is tailored for both access control and Time & Attendance applications, the MorphoAccess SIGMA Series implements no fewer than 20 patents to master biometric identification and delivers key security features together with a unique user experience. - Time & Attendance features - Tablet-like user experience - 1:10,000 user identification in 1 second - High capacity: 30,000 templates, 250,000 IDs in authorized user list, 1 Million logs - Anti-fraud features: fake finger detection, duress finger, timed anti-pass back - Flexibility: Prox, iclass or MIFARE/DESFire/NFC contactless card reader as an option - IP65-rated design

7 MorphoAccess SIGMA Lite Fingerprint Terminal The MorphoAccess SIGMA Lite terminals are specifically designed to equip narrow mounting surfaces, such as glass/aluminium door mullions, turnstiles, or server rack doors. With two designs and multiple card reader options, there are a variety of models to address the widest range of deployment scenarios, both indoor and outdoor. - 1:10,000 user identification in 1 second - High capacity: 30,000 templates, 250,000 IDs in authorized user list, 1 Million logs - Embedded Web Server for on-device enrolment, terminal configuration and transaction log retrieval - Anti-fraud features: fake finger detection, duress finger, timed anti-pass back - Flexibility: Prox, iclass or MIFARE/DESFire/NFC contactless card reader as an option - Tough design: IP65-rated and vandal resistant (IK08) Morpho 3D Face Reader Terminal The Morpho 3D Face Reader terminals provide hands-free access control that is highly secure and as simple as a quick glance to the terminal. By analyzing the three-dimensional structure of the user s face, it achieves extremely accurate matching while ensuring high throughput. - High capacity: 3,000 users in identification mode, 100,000 users in verification mode, 1 Million transaction log storage - The real-time 3D imaging technology enables sub-second matching - The embedded matching engine analyzes the structure of the face (using over 40,000 data points), thus improving accuracy compared with 2D technologies - Enhanced accuracy enables low False Acceptance Rate while maintaining high throughput and productivity - Conventional 2D facial images can t be used to duplicate a face and spoof the system - Accommodates a range of facial positions (angles, motion) and poor lighting conditions (night & day vision) - The use of invisible light makes the technology non-intrusive - Acquisition is hands-free and contactless, i.e. ideal for environments requiring gloves or where there are hygiene concerns

8 Frequently Asked Questions Aimetis Symphony What version of AC2000 is Aimetis Symphony supported on? Aimetis Symphony is supported on AC2000 v7.1. Please check with your CEM Systems account manager for support on other versions and before upgrading your system to ensure compatibility. What version of Aimetis Symphony does this interface support? CEM Systems wrote this interface against Aimetis SDK v which supports Aimetis Symphony v6.14 software. Please contact your Aimetis account manager before you upgrade your Aimetis software to ensure compatibility. Can I see camera alarms in AC2000 Security Hub? Yes, you can see motion, tampering etc. Note that you can only see Activity events as alarms, the actual video alarms need to be set up as policies for each individual camera. You can also see some alarms from NVR such as Loss/Gain alarms. Do I need a license key to use Aimetis Symphony on AC2000 Video Viewer and Security Hub? Yes, you need to apply a license to your AC2000 server. Please contact your Aimetis Symphony account manager to confirm if any additional license is required on the Aimetis side. Frequently Asked Questions Avigilon Control Center What version of AC2000 is Avigilon Control Center supported on? Avigilon Control Center is supported on AC2000 v7.1. Please check with your CEM Systems account manager for support on other versions and before upgrading your system to ensure compatibility. What version of Avigilon Control Center does this interface support? CEM Systems wrote this interface against Avigilon Control Center SDK v which supports Avigilon Control Center v5 software. Please contact your Avigilon Control Center account manager before you upgrade your Avigilon Control Center software to ensure compatibility. Can I see camera alarms in AC2000 Security Hub? Yes, you can see motion, tampering etc. You also see some alarms from NVR such as Loss/Gain alarms. Do I need a license key to use Avigilon Control Center on AC2000 Video Viewer and Security Hub? Yes, you need to apply a license to your AC2000 server. Please contact your Avigilon Control Center account manager to confirm if any additional license is required on the Avigilon Control Center side.

9 Frequently Asked Questions Morpho BioBridge What version of AC2000 is Morpho Bio Bridge supported? Morpho BioBridge is supported at AC2000 v7.1 and above. What version of Morpho Manager is required for Morpho BioBridge? MorphoManager v9.5.5 and above. Is the information sent from AC2000 to Morpho Manager sent in real time? The Morpho BioBridge interface polls the AC2000 database on a scheduled basis to pull cardholder information directly into the MorphoManager database. The data synchronisation intervals are fully configurable to specify when data is pulled from the AC2000 database via the Morpho BioBridge in one minute intervals. What information is sent to Morpho Manager from AC2000? Information sent across BioBridge is the minimum requirements for Morpho Manager Enrollment: First Name Surname Personnel Serial Number Access Level Card Number Card Status Future record updates Do I need a validation reader for AC2000 and for MorphoManager? Yes, you will need to ensure you have a validation reader for AC2000 enrollment and also a Morpho Biometric desktop enrollment reader for biometric capture. Do I need two separate network points at the door for Morpho readers and CEM Systems readers? Yes, Morpho readers will receive biometric templates directly from the MorphoManager database across TCP/IP network. Once biometric templates have been verified, the card number will be sent to the CEM Systems hardware over Wiegand for identification. The CEM Systems reader/controller will send the card number up to AC2000 database over TCP/IP. Once matched, the CEM Systems reader/controller will deny or allow access through the door. What Moprho biometric terminals are supported? CEM Systems currently can provide the following supported readers: SIGMA Series SIGMA Lite Series 3D Face Reader Can CEM Systems supply MorphoManager and readers to me? Yes, CEM Systems can provide a quotation for a complete solution.

10 Frequently Asked Questions DESFire EV2 What CEM Systems readers support DESFire EV2 cards? All CEM Systems readers can read DESFire EV2 cards. DESFire EV2 is completely backwards compatible with existing DESFire technology readers. Do I need to do anything if I already have existing DESFire EV1 cards? No, CEM Systems will gradually phase out DESFire EV1 cards to DESFire EV2 cards and will have no impact on existing or new customers. Frequently Asked Questions HID Mobile Access What version of AC2000 is HID Mobile Access supported? The CEM Systems HID Mobile Access solution is supported on all versions of AC2000. How do I order HID Mobile Access? You can order HID Mobile Access directly from newly distributed CEM Systems pricelist. As a minimum the following is required: One HID mobile reader One Bluetooth credential One Bluetooth admin card How to I manage the Bluetooth credentials? Bluetooth credentials are managed by the enduser. Once a Bluetooth reader credential is purchased, access to the HID cloud-based portal will be created. HID will send the username and password to access the portal directly to the end user. From the portal the credentials can then be distributed to mobile phones as required. Do I have to pay for the HID mobile portal? No, access to the portal is granted free of charge. How do I enroll my Bluetooth credential on AC2000? Enrollment of Bluetooth credentials is just like any other card, via either online enrollment or a dedicated S610 validation reader with the HID mobile reader connected. Can I re-use my mobile credential once it is returned? No, the HID mobile credentials can only be used once. If a phone is lost, stolen, replaced or an individual s card is no longer required, the credentials will be purged and new credentials must be purchased. Can my mobile reader also read standard smartcards? Yes, if configured to do so.

11 Product Code SWVINT-AIME SWVINT-AVIG CRD/218/204 CRD/218/208 CRD/633/XXXX CRD/634/XXXX HDS/055/10XX HDS/055/15XX HDS/055/40XX HDS/055/K4XX HDS/678/009 HDS/678/008 HDS/678/001 HDS/678/007 Description AC2000 Aimetis Symphony interface AC2000 Avigilon Control Center interface CEM Systems DESFire EV2 card 4k static key CEM Systems DESFire EV2 card 8k static key HID SEOS Mobile Credentials - custom mobile ID (Minimum order quantity is 100) HID SEOS Mobile Credentials - mobile admin card (Used to adjust Bluetooth range settings on mobile enabled iclass SE readers) HID iclass SE R10 Smart Card Bluetooth Reader HID iclass SE R15 Smart Card Bluetooth Reader HID iclass SE R40 Smart Card Bluetooth Reader HID iclass SE RK40 Smart Card Keypad Bluetooth Reader MorphoAccess Sigma Lite Bio-only for 500 users MorphoAccess Sigma Lite iclass with Bio for 500 users MorphoAccess Sigma Lite 125kHz Prox with Bio for 500 users MorphoAccess Sigma Lite Mifare/DESFire with Bio for 500 users For more information or details on ordering MorphoAccess SIGMA, MorphoAccess SIGMA Lite+ or Morpho 3D Face Reader, please cem.info@tycoint.com or contact your account manager.

version: User Manual

version: User Manual version: 11.2.0 User Manual Contents Introduction... 6 Support... 6 Overview... 7 What is a client?... 7 What is a server?... 7 What is a fingerprint enrollment device?... 7 What is a Biometric Device?...

More information

S700e Intelligent IP Reader S700 Exit Reader

S700e Intelligent IP Reader S700 Exit Reader New Product Announcement: S700e Intelligent IP Reader S700 Exit Reader CEM Systems is pleased to announce the release of the S700e and companion S700 Exit Reader for use with the AC2000 suite of access

More information

2N Helios IP Advanced Training

2N Helios IP Advanced Training 2N Helios IP Advanced Training Agenda Licensing Features Use scenarios Software Live demo Configuration training Firmware & Licensing Vario/Force/Safety use the same firmware (same binary file); upgrades

More information

Verwelkoming. 20 September Fort Lent

Verwelkoming. 20 September Fort Lent Verwelkoming 20 September Fort Lent Biometric readers introduction Level of authentication Something you have Key Card or badge Something you know Password PIN A memory unique to you Something you are

More information

ACCESS CONTROL Products 2017

ACCESS CONTROL Products 2017 Page 1 of 8 NESS Access Controllers 101-102 NESS MCP-040 ACCESS CONTROLLER Including 12V 6A power supply and high-tech metal housing Supports 4 x Wiegand Readers Supports 8 x RS-485 Readers 4 Lock Outputs

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a MorphoAccess?... 6 What

More information

New Product Announcement: AC2000 v8.0

New Product Announcement: AC2000 v8.0 New Product Announcement: AC2000 v8.0 CEM Systems is pleased to announce the latest release of the AC2000 suite of access control and security management software. AC2000, AC2000 Airport and AC2000 Lite

More information

BioBridge. Maxxess efusion. Quick Start Guide

BioBridge. Maxxess efusion. Quick Start Guide BioBridge Maxxess efusion Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)... 6 User

More information

BioBridge. MorphoManager Universal. Quick Start Guide

BioBridge. MorphoManager Universal. Quick Start Guide BioBridge MorphoManager Universal Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)...

More information

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer CIVINTEC GLOBAL 01 World Leading OEM/ODM Designer & Manufacturer ABOUT CIVINTEC CIVINTEC is the world leading designer and manufacturer of smart card terminals and devices, established in 2006 and focusing

More information

Connected Buildings. MAXPRO Series Video Redefined Learn One, Know Them All Open, Flexible and Scalable Video Surveillance Platform

Connected Buildings. MAXPRO Series Video Redefined Learn One, Know Them All Open, Flexible and Scalable Video Surveillance Platform Connected Buildings Series Video Redefined Learn One, Know Them All Open, Flexible and Scalable Video Surveillance Platform LEARN ONE, KNOW THEM ALL Are you looking for... systems that are interoperable

More information

BioBridge. IDenticard PremiSys. Quick Start Guide

BioBridge. IDenticard PremiSys. Quick Start Guide BioBridge IDenticard PremiSys Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)... 6 User

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing Lenel BlueDiamond Unmatched experience in mobile credentialing BlueDiamond leverages United Technologies Corporation s 17 years of experience developing

More information

BioBridge. Brivo ACS. Quick Start Guide

BioBridge. Brivo ACS. Quick Start Guide BioBridge Brivo ACS Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)... 6 User Policy...

More information

MAXPRO. IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform

MAXPRO. IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform MAXPRO IP Video Solutions LEARN ONE, KNOW THEM ALL Open, Flexible and Scalable Video Surveillance Platform LEARN ONE, KNOW THEM ALL Are you looking for... systems that are interoperable with a wide range

More information

STid presents the new upgradable range. identify. touch. control

STid presents the new upgradable range. identify. touch. control identify. touch. control 18 STid presents the new upgradable range of High Security card readers that use RFID, MIFARE and Bluetooth Smart (Low Energy) technologies. Architect Blue is a secure and user-friendly

More information

Intelligent Access Terminal

Intelligent Access Terminal Intelligent Access Terminal A world of possibilities at your fingertips emerald is a multi functional touch screen access terminal with fully integrated biometric* that is revolutionizing the security

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a Biometric Device?... 6 Setting

More information

BioBridge. Siemens SiPass. Quick Start Guide

BioBridge. Siemens SiPass. Quick Start Guide BioBridge Siemens SiPass Quick Start Guide Table of Contents Introduction... 3 Support... 3 Before you begin... 4 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric

More information

New Product Announcement

New Product Announcement New Product Announcement EntraPass v7.30 Software Tyco Security Products is pleased to announce version 7.30 of Kantech s flagship EntraPass security management system software. We continue to build upon

More information

BioStar 2. Web-based Open Integrated Security Platform

BioStar 2. Web-based Open Integrated Security Platform BioStar 2 Web-based Open Integrated Security Platform Centralized System I Access Control and Time & Attendance Management With Suprema's CoreStation and readers, you can build a centralized system, which

More information

BioBridge. Kantech EntraPass. Quick Start Guide

BioBridge. Kantech EntraPass. Quick Start Guide BioBridge Kantech EntraPass Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)... 6 User

More information

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019 Powering the trusted identities of the world s people, places & things Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April

More information

BioBridge. Controlsoft Intelligent Access. Quick Start Guide

BioBridge. Controlsoft Intelligent Access. Quick Start Guide BioBridge Controlsoft Intelligent Access Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)...

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing BlueDiamond Mobile Unmatched experience in mobile applications BlueDiamond Mobile leverages United Technologies Corporation s 17 years of experience developing

More information

IN A FAST MOVING WORLD YOU CAN RELY ON AC2000; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM AC2000

IN A FAST MOVING WORLD YOU CAN RELY ON AC2000; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM AC2000 IN A FAST MOVING WORLD YOU CAN RELY ON ; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM WHAT CAN OFFER YOU? CEM MANUFACTURES BOTH THE HARDWARE AND SOFTWARE, OFFERING ONE OF THE MOST COMPREHENSIVE,

More information

ALIBI Witness 2.0 v3 Smartphone App for Apple ios Mobile Devices User Guide

ALIBI Witness 2.0 v3 Smartphone App for Apple ios Mobile Devices User Guide ALIBI Witness 2.0 v3 Smartphone App for Apple ios Mobile Devices User Guide ALIBI Witness 2.0 v3 is a free application (app) for Apple ios (requires ios 7.0 or later). This app is compatible with iphone,

More information

Converge. Connect. Protect Protect people and property with Cisco Safety and Security Solutions

Converge. Connect. Protect Protect people and property with Cisco Safety and Security Solutions Riyadh, Saudi Arabia Feb 4, 2013 Converge. Connect. Protect Protect people and property with Cisco Safety and Security Solutions Hassan Ellaw - EMEAR Customer Solutions Manager Physical Safety and Security

More information

"How-To-Order" Guide - Bioscrypt Biometric Readers

How-To-Order Guide - Bioscrypt Biometric Readers "How-To-Order" Guide - Bioscrypt Biometric Readers Bioscrypt, a world renowned manufacturer of Biometric Access Control devices, has been the market leader for biometrics in access control since 2006,

More information

SYSTEM GALAXY HARDWARE. 635-Series

SYSTEM GALAXY HARDWARE. 635-Series SYSTEM GALAXY HARDWARE 635-Series 635-SERIES CONTROL PANELS Galaxy s 635-series Control Panel provides the most flexible, reliable, and complete access control & security management solution available.

More information

emerald Intelligent Access Terminal

emerald Intelligent Access Terminal emerald Intelligent Access Terminal emerald A world of possibilities at your fingertips emerald is a multi functional intelligent access terminal that is revolutionising the security industry. With its

More information

Corporate Commitment to Excellence

Corporate Commitment to Excellence Corporate Commitment to Excellence Galaxy Control Systems was established to bring innovative solutions to the security market. Since 1984, Galaxy has maintained an unwavering commitment to excellence

More information

Video recorders Series DH

Video recorders Series DH Page: 1 DVRs for analog cameras, 960H, HD-SDI ViewCam Program Manual How to install and use the mobile app Page: 2 Contents of this handbook This manual describes how to install and use the ViewCam program

More information

FACIAL RECOGNITION TERMINAL SYSTEM

FACIAL RECOGNITION TERMINAL SYSTEM StoneLock is a global leader in designing and manufacturing secure access control solutions. We are proud to build and design the most secure, reliable and user-friendly access control products for both

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

BioBridge. Software House C-CURE Quick Start Guide

BioBridge. Software House C-CURE Quick Start Guide BioBridge Software House C-CURE 9000 Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)...

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

How to use a Finger Then Keypad access. Design for: Sigma and Sigma Lite + For Users to use a Finger AND Keyboard access

How to use a Finger Then Keypad access. Design for: Sigma and Sigma Lite + For Users to use a Finger AND Keyboard access How to use a Finger Then Keypad access Design for: Sigma and Sigma Lite + For Users to use a Finger AND Keyboard access Software Screen shots Some screen shots might differ slightly from your version of

More information

Identiv TS Readers. Ordering Guide. October 2016

Identiv TS Readers. Ordering Guide. October 2016 Identiv TS Readers Ordering Guide October 2016 Table of Contents Introduction... 3 Identiv TS Readers Description... 3 TS Reader Ordering Processes... 5 Installation and User Manual... 9 Compliance and

More information

Working with the Sigma series should be done on a Test environment before going *Live*

Working with the Sigma series should be done on a Test environment before going *Live* Working with the Sigma series should be done on a Test environment before going *Live* You just got a Sigma Lite and you need to set it up, here are some basic steps to get you started. **This PDF is only

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

Power LogOn s Features - Check List

Power LogOn s Features - Check List s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version.

More information

Identiv FICAM Readers

Identiv FICAM Readers Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

BioConnect ID Enterprise v4.0

BioConnect ID Enterprise v4.0 BioConnect ID Enterprise v4.0 Software Configuration Guide Revision 1.0 Last Updated: March 2017 Page 1 of 30 Table of Contents 1. Support... 3 2. Software Configuration... 4 2.1 Root Account Login...

More information

OnView Mobile Monitoring

OnView Mobile Monitoring User Manual OnView Mobile Monitoring Table of Contents 1. Introduction...2 1.1 Application Description...2 1.2 Phone Compatibility...2 1.3 Where to Download the App...2 2. Application Function...2 2.1

More information

HID Mobile Access. Simple. Secure. Smart.

HID Mobile Access. Simple. Secure. Smart. HID Mobile Access Simple. Secure. Smart. Physical Access for a Modern Mobile World Physical Access the Smart Way With Mobile Mobile connectivity has changed the way we live, work and play. From smartphones

More information

ivms-4200 Version:V build Release Note ( )

ivms-4200 Version:V build Release Note ( ) ivms-4200 Version:V2.6.2.6 build170719 Release Note (2017-7-24 ) General Information Software Version Network SDK Lib Play Lib VCA Config Lib SADP Lib V2.6.2.6 build20170719 V5.2.7.42build20170629 V7.3.3.61

More information

+ milestone. Milestone Systems. Milestone Mobile client 2017 R3. User Guide

+ milestone. Milestone Systems. Milestone Mobile client 2017 R3. User Guide + milestone Milestone Systems Milestone Mobile client 2017 R3 User Guide Contents Get started... 5 About server and client components of Milestone Mobile... 5 Installing Milestone Mobile server components

More information

L-1 Fingerprint Reader Solutions. V-Station 4G

L-1 Fingerprint Reader Solutions. V-Station 4G L-1 Fingerprint Reader Solutions V-Station 4G Advanced Features Largest Template Capacity in the Industry (100,000 in 1:1; 10,000 in 1:N or up to 50,000 in 1:N with bins) Single-, Two- or Three-factor

More information

MIGRATING FROM ANALOG TO HD MADE EASY

MIGRATING FROM ANALOG TO HD MADE EASY MIGRATING FROM ANALOG TO HD MADE EASY DEERFOOT INN AND CASINO CASE STUDY www.indigovision.com Deerfoot Casino and Inn had an ageing analog security system which was becoming unreliable, with management

More information

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24 Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid

More information

D-Link IP Surveillance Solutions

D-Link IP Surveillance Solutions D-Link IP Surveillance Solutions Cameras Pan & Tilt Indoor Outdoor Indoor Indoor Model DCS-930L DCS-932L DCS-933L DCS-942L DCS-2132L DCS-2136L DCS-6045LKT DCS-2310L DCS-2330L DCS-2332L DCS-5009L DCS-5020L

More information

BioLite Net. Firmware Revision Notes EN BLN V1.43. Biometrics & Security. Version 1.43

BioLite Net. Firmware Revision Notes EN BLN V1.43. Biometrics & Security. Version 1.43 BioLite Net Firmware Revision Notes Version 1.43 Biometrics & Security Firmware Version 1.43 (Build No. 1.43_161010) Release: 2016-10-25 1. Improvements 1.1. The stability of the network communication

More information

Session 2: Understanding the payment ecosystem and the issues Visa Europe

Session 2: Understanding the payment ecosystem and the issues Visa Europe Session 2: Understanding the payment ecosystem and the issues Visa Europe Agnes Revel Martineau VP, Head of Product Specifications, Standards and Industry Liaison ETSI 01st, July, 2014 Agenda You said

More information

Campus Security for the 21 st Century

Campus Security for the 21 st Century L. Thomas Sorrell, RCDD, LEAD BD+C, CHC, CEO, Inc. In lieu of paper evaluations for each session at the Winter Conference, all evaluations may now be taken digitally from your laptop, tablet or smartphone.

More information

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules Modular Access Control System The next generation of the PW-Series family improves on the existing PW technology to offer superior features and benefits. The PW-Series Modular Control System is an advanced

More information

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered The Identity as a Service Suite (IDaaSS) Solutions GUIDE Identity Credentials great looking secure ID credentials delivered www.idconcierge.com.au www.nxient.com nxient s Identity as a Service Suite (IDaaSS)

More information

Milestone Systems Milestone Mobile 2013 (Client)

Milestone Systems Milestone Mobile 2013 (Client) Milestone Systems Milestone Mobile 2013 (Client) Contents INTRODUCTION... 4 WHAT'S NEW... 4 MILESTONE MOBILE... 6 ABOUT MILESTONE MOBILE CLIENT... 6 ABOUT MILESTONE MOBILE SERVER AND PLUG-INS... 6 ABOUT

More information

Introducing 2N 360 Security Shield Helios IP Intercoms

Introducing 2N 360 Security Shield Helios IP Intercoms Introducing 2N 360 Security Shield Helios IP Intercoms S i e T e c S e c u r i t y L t d 0 8 0 0 8 8 3 3 2 8. Page 1 Foreword From ideas to implementation This document highlights the capabilities of the

More information

IP Mini PTZ CAMERA USER GUIDE

IP Mini PTZ CAMERA USER GUIDE IP Mini PTZ CAMERA USER GUIDE TYPE A: To switch the mount style, remove the two screws on the pan bottom and rotate 180 degree to remount. This Mini PTZ cylinder camera can support both wall mount and

More information

User Guide. Avigilon Control Center Mobile Version for Android

User Guide. Avigilon Control Center Mobile Version for Android User Guide Avigilon Control Center Mobile Version 1.4.0.2 for Android 2011-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any

More information

BioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93

BioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93 BioStation Firmware Revision Notes Version 1.93 Biometrics & Security Firmware Version 1.93 (Build No.1.93_140228) Release: 2014-02-28 1. Save logs when card authentication fails 2. Relay Off log added

More information

Multi Card Technology

Multi Card Technology PRX-TSEC tsec Card Reader Sleek and stylish, and with a range of optional features, the tsec series has a solution for everyone. Available in three sizes, multiple card capabilities, with an optional keypad,

More information

**Enclosed are the changes to your existing price list** **Please Do Not discard your existing Price List**

**Enclosed are the changes to your existing price list** **Please Do Not discard your existing Price List** Price List Changes What s New/Changed All Products **Enclosed are the changes to your existing price list** **Please Do Not discard your existing Price List** July 0, 07 Changes to the Price List Price

More information

+ milestone. Milestone Systems. XProtect VMS 2017 R3. System Architecture Document

+ milestone. Milestone Systems. XProtect VMS 2017 R3. System Architecture Document + milestone Milestone Systems XProtect VMS 2017 R3 System Architecture Document XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Contents Introduction... 6 Target audience and

More information

MEDIUM ENTERPRISE SOLUTION. TBS TOUCHLESS BIOMETRIC SYSTEMS SWITZERLAND /

MEDIUM ENTERPRISE SOLUTION. TBS TOUCHLESS BIOMETRIC SYSTEMS SWITZERLAND / MEDIUM ENTERPRISE SOLUTION TBS TOUCHLESS BIOMETRIC SYSTEMS SWITZERLAND tbs@tbs-biometrics.com / www.tbs-biometrics.com 08/2016 MEDIUM ENTERPRISE SOLUTION Requirements for access and time & attendance solutions

More information

Access Control Product Overview

Access Control Product Overview Control Product Overview Flexible, integrated access control solutions security.gallagher.com The Gallagher difference Our innovation is driven by the desire to solve problems, meet your needs and provide

More information

Milestone Systems. XProtect VMS 2017 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+

Milestone Systems. XProtect VMS 2017 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Milestone Systems XProtect VMS 2017 R2 System Architecture Document XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Contents Introduction... 6 Target audience and purpose...

More information

The Medeco Solution for Controlled Access and Accountability

The Medeco Solution for Controlled Access and Accountability Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

MorphoAccess SIGMA Lite Series

MorphoAccess SIGMA Lite Series MorphoAccess SIGMA Lite Series Administration Guide COPYRIGHT MORPHO 2015 Osny, France MorphoAccess SIGMA Lite Series - Administrator Guide Warning WARNING COPYRIGHT MORPHO 2015 All rights reserved. Information

More information

Enabling Compliance for Physical and Cyber Security in Mobile Devices

Enabling Compliance for Physical and Cyber Security in Mobile Devices Enabling Compliance for Physical and Cyber Security in Mobile Devices Brandon Arcement & Chip Epps HID Global Sept 12, 2016 1630-1730 ET Agenda Smart Devices vs. Traditional Cards Mobility Infrastructure

More information

OPEN THE DOOR TO INNOVATION 2N IP INTERCOMS, IP ACCESS & SIP AUDIO SYSTEMS

OPEN THE DOOR TO INNOVATION 2N IP INTERCOMS, IP ACCESS & SIP AUDIO SYSTEMS OPEN THE DOOR TO INNOVATION 2N IP INTERCOMS, IP ACCESS & SIP AUDIO SYSTEMS For 25 years 2N has been on the forefront of access control and telecommunications. We take care to stay on the leading edge with

More information

Complete Video Management Solution, Scalable, Powerful, Integrated and High Security Level

Complete Video Management Solution, Scalable, Powerful, Integrated and High Security Level VisioS@ve, Complete Video Management Solution, Scalable, Powerful, Integrated and High Security Level Archivers, Server Platform, Centralized Management, Video Wall Management Complete Solution, from standalone

More information

Complete Scalable Video Management

Complete Scalable Video Management Complete Scalable Video Management Complete Scable Video Management DW Spectrum IPVMS is an elegantly easy cutting-edge approach to video surveillance, addressing the primary limitations of managing enterprise-level

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

HID Mobile Access Solution Overview

HID Mobile Access Solution Overview HID Mobile Access Solution Overview PLT-02078, Rev. A.1 March 2015 hidglobal.com Contents 1 Introduction... 4 1.1 What is HID Mobile Access?... 4 1.2 Document Purpose and Further Reference... 4 1.3 Legal

More information

Pro71600N3 NVR User Manual

Pro71600N3 NVR User Manual Pro71600N3 NVR User Manual User Information Admin User Name: Admin Password: IP Address: System Name: Table Of Contents 1. Menu Operation...4 1.1 Main Menu...4 2. Start & Shutdown System...5 2.1 Start

More information

INFORMATION TO BE GIVEN(2)

INFORMATION TO BE GIVEN(2) To be filled out in the EDPS' office REGISTER NUMBER: 900 NOTIFICATION FOR PRIOR CHECKING Date of submission: 25/09/2012 Case number: 2012-0824 Institution:European Commission Legal basis: Article 27.2.(a)

More information

8 Channel 1080 Lite HD Analog Video Security System with 1 TB HDD and 4 x 1080p HD Wired Cameras

8 Channel 1080 Lite HD Analog Video Security System with 1 TB HDD and 4 x 1080p HD Wired Cameras 8 Channel 1080 Lite HD Analog Video Security System with 1 TB HDD and 4 x 1080p HD Wired Cameras Modern High Definition technology is amazing for movies and sports, and now, it s even better for video

More information

DMAC-VMS-1CH, 4CH, 8CH, 16CH, 24CH, 32CH, 64CH, 128CH

DMAC-VMS-1CH, 4CH, 8CH, 16CH, 24CH, 32CH, 64CH, 128CH DMAC VMS (DVMS) HD Intelligent Video Management System ` Intelligent Video Management System DMAC-VMS-1CH, 4CH, 8CH, 16CH, 24CH, 32CH, 64CH, 128CH DMAC Security Video Management System (DVMS) is a High-Performance

More information

BioStar. Revision Notes EN BS V1.81. Biometrics & Security. Version 1.81

BioStar. Revision Notes EN BS V1.81. Biometrics & Security. Version 1.81 BioStar Revision Notes Version 1.81 Biometrics & Security Version 1.81 Release: 2015-04-07 1. Others 1.1. BioStar DB Task Program removal from the BioStar 1.81 Installation Package 2. Bug Fixed 2.1. A

More information

Powering the enterprise-grade mobile access experience.

Powering the enterprise-grade mobile access experience. Brochure Mobile Reader Pro The new standard for mobile access. Powering the enterprise-grade mobile access experience. Finally, a mobile access solution that integrates seamlessly with existing access

More information

Zodiac iclass OPERATOR GUIDE

Zodiac iclass OPERATOR GUIDE Zodiac iclass OPERATOR GUIDE June 2008 Page 2 of 19 Table of Contents Introduction... 4 PC Requirements... 4 Installing the USB Fingerprint Scanner (Hamster)... 5 Installing the USB Smartcard Programmer...

More information

The Next Generation of Credential Technology

The Next Generation of Credential Technology The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.

More information

Keyscan Aurora Software

Keyscan Aurora Software Keyscan Aurora Software Advanced Features Multi-Threaded Communication: The dawn of a new age for access control. Aurora's all new communication structure provides simultaneous communication to all IP

More information

Professional Access Control

Professional Access Control Professional Access Control Product Reference Guide Stay connected with all that you love. The all-encompassing surveillance solution Combine access control & CCTV with VIP Vision Scaleable access control

More information

GV-SD2322-IR (22x) Outdoor Low Lux IR IP Speed Dome

GV-SD2322-IR (22x) Outdoor Low Lux IR IP Speed Dome - 1 - GV-SD2322-IR (22x) Outdoor Low Lux IR IP Speed Dome 1/2.8" progressive scan low lux CMOS sensor Min. illumination at 0.01 lux (B/W) and 0.03 lux (color) Triple streams from H.264 and MJEPG Up to

More information

multiclass MHz Contactless and 125 khz Proximity Cards and Readers

multiclass MHz Contactless and 125 khz Proximity Cards and Readers multiclass 13.56 MHz Contactless and 125 khz Proximity Cards and Readers With our unique card technology read selection feature, customers have endless card management flexibility, with security and simplicity.

More information

Pro7804N1 NVR User Manual

Pro7804N1 NVR User Manual Pro7804N1 NVR User Manual Pro7804N1 User Manual BW R6.indd 1 User Information Admin User Name: Admin Password: IP Address: System Name: Table Of Contents 1. Menu Operation...4 1.1 Main Menu...4 2. Start

More information

2010 Product Line Catalog

2010 Product Line Catalog 2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving

More information

STANLEY MANUFACTURED ACCESS CONTROL ACCESS STARTER KIT EASY-TO-USE AND HIGHLY RELIABLE ACCESS CONTROL

STANLEY MANUFACTURED ACCESS CONTROL ACCESS STARTER KIT EASY-TO-USE AND HIGHLY RELIABLE ACCESS CONTROL STANLEY MANUFACTURED ACCESS CONTROL ACCESS STARTER KIT EASY-TO-USE AND HIGHLY RELIABLE ACCESS CONTROL 1 Access Control Starter Kit in-a-box 3 2 5 SIMPLE... EVERYTHING YOU NEED FOR A COMPLETE SYSTEM SCALABLE...

More information

Professional IP Intercoms Product Reference Guide

Professional IP Intercoms Product Reference Guide Professional IP Intercoms Product Reference Guide Stay connected with all that you love. Stay connected with all that you love. It is our mission to keep you in touch with the important things in life,

More information

Readers and credentials

Readers and credentials Readers and Simplifying the security industry like never before. Allegion s aptiq and XceedID readers and not only feature cutting-edge security technology, but are transforming basic access control products

More information

Gladius Video Management Software

Gladius Video Management Software Gladius Video Management Software Overview Gladius is a comprehensive, enterprise grade, open platform video management software solution for enterprise and city surveillance IP surveillance installations

More information

DMAC VMS (DVMS) HD Intelligent Video Management System

DMAC VMS (DVMS) HD Intelligent Video Management System DMAC VMS (DVMS) HD Intelligent Video Management System DMAC-VMS-1CH, 4CH, 8CH, 16CH, 24CH, 32CH, 64CH, 128CH DMAC Security Video Management System (DVMS) is a High-Performance IP Video Surveillance Software

More information

Appendix B EYEON for Android mobile

Appendix B EYEON for Android mobile Appendix. B Appendix B EYEON for Android mobile The EYEON APP allows for you to monitor DVRs. It now supports Live mode. Playback mode will be added soon. It is easy and convenient to use. The functions

More information

Milestone Systems. XProtect VMS 2018 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+

Milestone Systems. XProtect VMS 2018 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Milestone Systems XProtect VMS 2018 R2 System Architecture Document XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Contents Introduction... 6 Target audience and purpose...

More information