IN A FAST MOVING WORLD YOU CAN RELY ON AC2000; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM AC2000

Similar documents
Intelligent Access Terminal

AC2000 Technical Training Level 1 & 2 Course Overview

emerald Intelligent Access Terminal

New Product Announcement: AC2000 v8.0

Gallagher Airport Security Solutions. aviation sites around the world trust security management solutions from gallagher

Access Easy Control System From anywhere just a click away!

S700e Intelligent IP Reader S700 Exit Reader

T h e re is an upgrade route to larger configurations. O v e rv i e w

Why is the Maxxess/Salto integration different from all other SALTO integrations?

C CURE 800/8000 Security Management Solution

C CURE 800/8000 Security Management Solution

STANLEY MANUFACTURED ACCESS CONTROL ACCESS STARTER KIT EASY-TO-USE AND HIGHLY RELIABLE ACCESS CONTROL

Airport Security & Safety Thales, Your Trusted Hub Partner

Cardax FT Command Centre

Security and Process Monitoring at Your Fingertips

Professional Access Control

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)

Product Overview. Revision 1.3

New Product Announcement

Company Builds Sustainable, Highly Efficient Headquarters Facility

SiPass Software. Fire & Security Products. SiPass integrated

SYSTEM GALAXY HARDWARE. 635-Series

Smart access control and door entry systems. Product Selection Guide

New Product Announcement: AC2000 v7.1 Integrations

Aged Care Security Solutions. security.gallagher.com

Access Professional Edition Selection Guide

Corporate Commitment to Excellence

Unique access control box. Usage scenarios

INTUS 1600PS Palm Vein Authentication

2010 Product Line Catalog

to that area and whether or not the Cardax FT GBUS URI (Standard or person holds these competencies. Wiegand variant)

Access control software SENATORFX. Quick start guide

Specifications based on the usage

KEY FEATURE GUIDE BioStar 2 English Version 1.00

Cardax FT Series 3 Command Centre

ACTPRO ACCESS CONTROL. Specification Guide

Cardax FT XtraSec. System Catalogue ELM

Access Professional Edition Selection Guide

SMARTPTT PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS

SiPass Entro software

E-Plex Enterprise Access Control System. (Version 3) with Wireless Option

Product Feature Matrix

Ultimate access control solutions for your security needs...

Simple Card Reader for Door Access & Time Attendance System. User Guide

DSX-Soft I/O Integration Software

L-1 Fingerprint Reader Solutions. V-Station 4G

Put Time Back on your Side

ivms-4200 Version:V build Release Note ( )

Pegasus Equipments Export Limited. Local Contact:

Tomorrow s Technology Today.

Gallagher Critical Infrastructure Solutions

USER MANUAL. smartengine 30 RELEASE DATE: 15/06/2010

ROSSLARE SECURITY PRODUCTS ACCESS CONTROL

NEW! Aiphone IX System

Providing converged technology, offering superior & integrated solutions SAFETY & SECURITY SOLUTIONS CO. LLC

Customer service. Multi-tenant, solo hub or branch office solution

INTELLIGENT ACCESS CONTROL AND INTRUDER ALARM SYSTEMS

multinode M2150 INTELLIGENT CONTROLLERS

DSX Access Control. Microsoft Access and SQL Server Editions

Access Control Product Overview

TRBONET PLUS FOR MOTOTRBO PREMIUM CONTROL ROOM SOLUTION FOR MOTOTRBO DIGITAL TWO-WAY RADIO SYSTEMS SOLD AND SUPPORTED BY MOTOROLA SOLUTIONS

Face recognition for enhanced security.

Professional IP Intercoms Product Reference Guide

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Integriti User Guide

The Medeco Solution for Controlled Access and Accountability

QUICK START GUIDE. 2.4 Inch Finger Vein Terminal Time Attendance & Access Control

GENERAL QUICK START GUIDE

Your single source for a safe, secure, and sustainable airport

FREUND R29S Door Phone User Manual. FREUND ELEKTRONIK A/S Fuglebakken Odense NV Denmark Tlf.

BioStar 2. Web-based Open Integrated Security Platform

Installation & User Manual

Biometric Access Control System

Browser Managed Security With No Software Installation

MICROTRAK EVOLUTION.NET USER GUIDE

Securefast SPECIFICATION MANUAL. Entra Access Control. Part of the Securefast Group SECUREFAST DEEDLOCK PINSON TATE COLSON. securefast.co.uk.

TL100C Features: Real-time 1-touch data export 3rd party hosted & non-hosted applications

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

IP Video For Law Enforcement

Run a Smart Workplace Introducing the Digital Building. Digital Building Solutions

Joney Technology Co., Ltd

ENABLING DATA-DRIVEN PHILIPPINE ENTERPRISES VITRO DATA CENTER MAKATI A NEXCENTER-CERTIFIED FACILITY

Excellence Assured Accelerate your business potential with innovative IT Services

uface800 Time Clock User Manual uface800

Keyscan CA150 PoE Single Door Controller

Cornerstone Access Control

IP Intercom Systems for Homes and Apartments

UltraMatch. Standalone Iris Recognition System

W Series. Color Screen Fingerprint & Card Time Attendance and Access Control W 1 W 2

8x8 Virtual Office Government

Access Easy Controller 2.1

World s First. Biometric Access Control System. 100% Touchless Biometric Reader Solution. You Are The Key! CrucialTrak's

ENCRYPTED HIGH SECURITY

System 6000 Delivering Tomorrow s Security Solutions Today

Advanced integrated access control system

ZONE WING ZONE DOOR. Zone Door is an innovative, low-cost point-of-access device for controlling door hardware and door-related peripherals.

Suite Anthony Lopresti T +1 (212) Ethan Silverstein T +1 (212)

NetAXS. Hosted Video Services. Cloud Hosted Access Control. Retail Professional Services Convenience

Net2 Entry. Overview. A door entry system for versatile security and building management

SiPass Entro software

Transcription:

IN A FAST MOVING WORLD YOU CAN RELY ON ; A POWERFUL ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM

WHAT CAN OFFER YOU? CEM MANUFACTURES BOTH THE HARDWARE AND SOFTWARE, OFFERING ONE OF THE MOST COMPREHENSIVE, RESILIENT AND FLEXIBLE SECURITY SYSTEMS AVAILABLE. WHEN SECURITY IS PARAMOUNT ACCESS CONTROL AND SECURITY MANAGEMENT SYSTEM HAS BEEN SUCCESSFULLY INSTALLED AT SOME OF THE LARGEST FACILITIES AROUND THE WORLD INCLUDING OIL REFINERIES, PORTS, AIRPORTS, HOSPITALS, CASINOS, UNIVERSITIES, CORPORATE PREMISES AND MORE. CONTINUOUSLY DEVELOPED TO MEET THE MOST COMPLEX OF SECURITY NEEDS, PROVIDES A HIGHLY STABLE, PROVEN SOLUTION FOR INSTALLATIONS WHERE SECURITY IS OF PARAMOUNT IMPORTANCE. System resilience system architecture features layers of resilience. The server is built on a highly stable operating system that can be further enhanced with a failover/redundant server. The use of distributed intelligence at all levels of the system is also achieved using CEM intelligent card /s with their own database for offline card validation. Typical client system applications are also available at the door using the revolutionary CEM emerald touch screen terminal, which provides users with distributed system intelligence right at the edge. Flexible, customized solution CEM Systems understands that the IT and security needs of all sites are different. As such the software and hardware is highly flexible to meet unique project needs. software also incorporates built-in user definable fields that enable customers to build a self-configured, customized system. Integration provides high levels of by using industry standard interfaces to link with third party security systems. Acting as the Security Management System (SMS), provides one powerful command and control front-end for alarm management of multiple systems, including access control, video, intrusion, fire, perimeter detection and much more. Central/Remote configuration With an internal database offering built-in intelligence, CEM have been designed with ease of installation in mind and can be programmed and managed remotely to receive updates within minutes. can also broadcast messages to card to open doors in emergency situations or to control lighting, PIR burglar alarms, heating or similar external systems at pre-defined times. Future proof Built with the flexibility to grow as user requirements change, software licensing and /s can be easily expanded to support a scalable number of doors. KEY SYSTEM FEATURES Highly stable Linux operating system Windows based operator workstations Hot standby/ redundant server Intelligent CEM card and s Seamless with external systems; CCTV, Intrusion, Perimeter Detection, Fire and more Supports third party read heads and multiple card technologies Supports wireless locks Sophisticated software suite User definable software fields Multi-language support Extensive web-based applications And much more

TYPICAL SYSTEM ARCHITECTURE main server (CDC) Standard Systems Link to remote sites Hot standby (redundant CDC) Camera CCTV ID card printer Intruder detection enrollment workstation (VIPPS) Security Hub workstation Validation Fire detection And many more INDUSTRY LEADING HARDWARE CEM HARDWARE IS HIGHLY INNOVATIVE AND REFLECTS THE LATEST IN SECURITY TECHNOLOGY. SERIAL OPTIONS TCP/IP NETWORK ETHERNET OPTIONS Intelligent card & s The CEM range of features a keypad for card plus PIN control and includes an on-board database to store transactions and operate offline, ensuring zero system downtime and no loss of security or transaction information. The also feature an LCD screen to display meaningful outcome messages and have multiple door operating modes including Turnstile, Interlock and Equipment Enable mode. Using CEM intelligent s, also supports third party read heads, including support for third party biometric and wireless locks. Touch screen card reader/terminal CEM emerald access terminal is a revolutionary edge device. Featuring a touch screen reader and in one, with built in Voice over IP (VoIP) intercom functionality, emerald uniquely enables data normally only available on the client PC to be accessed locally at the door for functions including reader maintenance, room bookings, display of company advertisements, visitor information and much more. Fingerprint card reader Featuring a, card reader and fingerprint solution in one, the CEM fingerprint reader range are fully integrated biometric and access control that are used to control access where an additional biometric layer of security is required. They provide fully integrated fingerprint biometric solutions without the need to use a door or third part biometric equipment and software. ECM ethernet control module S610s serial card reader/ RS485 daisy chain up to 16 doors sdcm 300 serial intelligent Input/output s. Up to 16 inputs & 8 outputs emerald access terminal (Optional) PoE Midspan (Optional) PoE+ Door Interface Unit S610e card reader/ S610f fingerprint card reader/ emerald Intelligent Fingerprint Terminal edcm 350 intelligent S3040 Handheld Portable Reader edcm 300 intelligent RTC Ethernet Controller (Max. 256 Ethernet Readers) Portable card reader CEM portable handheld can be used for cardholder validation at remote sites or temporary entrances that have no power and can be used as a mobile device for random checks within pre-defined zones. 3rd party Wiegand CEM spass reader (encrypted serial) CEM spass keypad reader (encrypted serial) 3rd party Wiegand Wireless locks Power over Ethernet access control The CEM Power over Ethernet Plus (PoE+) solution (used in conjunction with the CEM range of IP card and s), provides power to the door via the same CAT 5/6 Ethernet cable as used for communications. This offers significant savings on infrastructure cost by removing the necessity to provide a local mains power supply for each access controlled door. Wiegand TCP/IP Comms RS485 Comms WIFI or USB connectivity Typical system architecture only. For the full range of CEM products please visit www.cemsys.com

OFFERS A POWERFUL SUITE OF CLIENT AND BROWSER BASED APPLICATIONS INCLUDING CENTRAL ALARM MONITORING, INTEGRATED COMMAND AND CONTROL, SOPHISTICATED ID BADGING, VISITOR MANAGEMENT, WEB REPORTS AND MUCH MORE. Central alarm monitoring Security Hub provides a complete graphical and textual representation of the status of the entire access control system and integrated sub systems. Security Hub responds to all alarm situations in real time providing a dynamic on-screen interface to systems with advanced graphical maps, live video pop-up and remote door broadcasting. Integrated command & control As a powerful security management system, can effectively monitor for a condition in one integrated sub system and cause an action in another. For example, view live video pop-up upon a perimeter breach or intruder alarm. Integrated photo ID badging The CEM Visual Imaging Pass Production System (VIPPS) allows users to produce professional permanent and temporary ID badges. VIPPS can also be used to enroll fingerprint biometric templates directly onto the system. Threat levels Threat Levels application enables building security to be quickly reconfigured during times of heightened security. At the click of a button, authorized system administrators can change the level of security required at the door to include PIN / biometric verification or to remove access permissions from cardholders system wide. Zone monitor Zone Monitor application allows a real time view of all cardholder(s) movements in a selected zone. This provides information on who is present on site, as well as a counter of the total people in a zone for safety and security reasons. Rolling transaction display The Rolling Transaction Display (RTD) application features a split screen view of real-time transaction outcomes and alarms. When a card is swiped at a reader, the cardholder s stored image and associated personnel details are displayed. This allows guards to perform a visual security check that the right person is using the card. WEB The powerful WEB platform offers easy to use browser based applications that can be accessed from any networked location via a PC, tablet or smart phone. Users can respond to alarms online, configure the system remotely, as well as import personnel data and view WEB security dashboard reports, all at the click of a button. WEB applications are ideal for quick and efficient access to functionality without the requirement of installing any software. WEB visitor management WEB visitor management is a powerful tool that enables users to request and manage temporary cardholders (visitors) from any location via a standard web browser. Using an easy to use front-end web application, users can simply add visitor details, photos, sponsor details, reason for visit, visit duration and access level required. Database partitioning The server can be divided into multiple partitions for multi-site operations. Partitioned system administrators have the ability to add personnel cardholders, produce ID badges and manage alarms on their own site, but are prevented from seeing the data of other partitioned databases that reside on the same server. OPERATIONAL APPLICATIONS Central monitoring (Security Hub) Integrated command and control of sub systems Integrated photo ID badging Guard tours Zone monitor / mustering Rolling transaction display Threat levels WEB visitor management WEB dashboard and reports Vehicles management Elevator control Database partitioning Time & attendance reporting Keypad commands Standard system link Time zones & holidays And much more

CEM/B/006 Rev Q SOFTWARE OPTIONS Powerful and fully integrated access control & security management system Supports a scalable number of doors Supports a scalable number of cardholders High level s with leading video, intruder, fire & perimeter detection partners Ideal for medium to large scale complex projects Lite Cost effective access control for smaller sites Supports up to 128 doors Supports up to 5 workstations Supports up to 10,000 cardholders Encompasses core software modules Integration with selected video and intruder systems Ideal for small to medium sized projects Airport Integrated airport-specific access control & security management system Proven in leading airports around the world; including 80% of UK Airports Aviation features include check-in-desk enabling, passenger segregation, air-bridge monitoring And much more. www.cemsys.com 2014 Tyco Security Products