WELCOME Keyscans Access Control KIMA SECURITY INC.

Slides:



Advertisements
Similar presentations
1 Re-Introduction to the Nexgen eration of eCylinders Products ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user.
Advertisements

California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Integrated Systems -Egress Control -Access Control Reliable, Trouble-Free Systems in Easy-to-Order Configurable EasyKits.
RFID Access Control System March, 2003 Softrónica.
bright blue. So Smart, Its Simple! To the Presenter:
INTRUSION ALARM TECHNOLOGY
Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
Introduction to Access Control
Networking: Computer Connections Chapter 7 Data Communications Send and receive information over communications lines.
Readers DigiReader Series Digital Proximity Readers
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Vehicle Access Management System Smart Parking System.
Networks Unit 3 & 4 IP&M JEOPARDY Acknowledgements: VITTA for the jeopardy pro-forma Mark Kelly’s Network slideshow.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
DATA ACQUISITION SmartLog X3 DescoEMIT.com Rev:
Copyright ⓒ 2009, Seoul Commtech Co., Ltd 1 Samsung Security Solutions Digital Keypad Locks & Video Intercom AUGUST 2010 PRESENTED BY POWER TECHNOLGY,
Computer Security Computer Security is defined as:
 Extensive GPS and Telecommunications experience  Specialized Offender Electronic Monitoring Division  Unique Personal Tracking Monitoring Division.
KEYPADS & STAND-ALONE ACCESS CONTROL. Unmatched Breadth of Product UL Listed Models Installer Friendly Advanced Electronic Technology Why IEI Stand-Alones.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
System Components Hardware overview for Apollo ACS.
BAR CODE TECHNOLOGY AND ITS APPLICATION TO LIBRARY SERVICES I R N GOUDAR HEAD, ICAST NATIONAL AEROSPACE LABORATORIES BANGALORE
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
Invision TAC™ Integrated Telephone Entry and Access Control System Product Introduction June 2010.
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
Welcome To The Coconut Creek Fire Marshal’s Office Training Smoke Alarm User’s Manual.
Wired Home Security Technologies Wired alarm systems require basic electrical wiring that extends from the control panel and keypad to door and window.
System Overview The Perfect Solution For Small ‘Entry Level’ Access Control Applications August 2014.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
1 22/09/ Residential Access Control manufacturerResidential Access Control manufacturer –Market leader in France Start-up in 1989Start-up in 1989.
Utility Locating and Mapping Communication Systems to Enhance Public Safety.
Facial Recognition for Access Control
Describe direct data entry and associated devices, e. g
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
1 NexSentry 4100 Series Controllers Secure, reliable, fast control with 32-bit technology.
Lesson 4-Access Control Solution
Stone Lock ® Pro Facial Recognition for Access Control TM.
Access Control Products
Why Use a Professional Locksmith? We’d like to take a few moments of your time to explain the benefits to you, of using the services of a professional.
Access Control Jeff Wicklund Computer Security Fall 2013.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
2N ® DOOR COMMUNICATORS Strategy, Plans and Roadmap
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
Made in the United States of America DescoEMIT.com EMIT ESD RESULTS AT YOUR FINGERTIPS.
ICT Unit 4: Network and the effects of using them
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
COSEC ARC IP based Access Control Panel.
Global KeyAccess Technologies Ltd.
SECURITY FEATURES OF ATM
2N® Access Unit Touch Keypad
Connections Topology of Apollo ACS.
EMIT DescoEMIT.com ESD RESULTS AT YOUR FINGERTIPS
2N® Access Unit Touch Keypad
SECURITY REINVENTEDSM
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
2N Access Unit 2.0 Multi-technology access control readers.
Presentation transcript:

WELCOME Keyscans Access Control KIMA SECURITY INC.

Access Control Market All Market Sectors u Commercial u Institutional u Industrial/Manufacturing u Residential KIMA SECURITY INC.

Market Categories Stand alone systems u operate independently u no transaction records Integrated Systems u inter-connected group of components u produce transaction records KIMA SECURITY INC.

Chapter 3 What Is Electronic Access Control? KIMA SECURITY INC.

Access control is based on... u WHO u WHERE u WHEN KIMA SECURITY INC.

Access control features Controls u doors / elevators / parking gates / garagesOperates u 24 hours / 7 days / 12 monthsSpecifies u individual access at each doorMonitors u access points for alarms KIMA SECURITY INC.

Integrates u with other building systemsCommunicates u via modem or networks for multiple building controlReports u site activity for security management auditing Access control features (contd) KIMA SECURITY INC.

Access Control vs. Keys u better security u avoids re-installing locks Advantages KIMA SECURITY INC.

Access Control vs. Combination Locks u controls access by time u records the credential and access time Advantages KIMA SECURITY INC.

Access Control vs. Security Personnel u access control always on guard at every controlled access point even in a power failure u no HR issues F absenteeism etc. Advantages KIMA SECURITY INC.

Advantages Cost savings u saves on labour costs u saves on cost of replacing lost assets or damaged property u saves time resolving lost assets u saves effort re-acquiring keys on terminations KIMA SECURITY INC.

Chapter 4 How Electronic Access Control Works KIMA SECURITY INC.

Rapid sequence of events between... u access control unit (ACU) u reader u electrically controlled locking device u door contacts u request to exit device u credential – card, token, PIN, human physiological characteristic u personal computer How It Works KIMA SECURITY INC.

The credential is presented to a reader. How It Works KIMA SECURITY INC.

Reader transmits credentials identity to control unit. How It Works KIMA SECURITY INC.

The control unit signals locking device at door. How It Works KIMA SECURITY INC.

The ACU monitors the door contacts. How It Works KIMA SECURITY INC.

Request to Exit device signals control unit on a legitimate exit. How It Works KIMA SECURITY INC.

How It Works The access control unit and the computer transfer data and site activity.

Proximity reader u widely used in medium & high security applications u variety of styles and shapes u indoor and outdoor formats u functions behind glass or drywall u no contact required / hands free u sensitive to metal & voltage interference Hardware Components KIMA SECURITY INC.

Keypad reader u used alone in low security areas u used in tandem for higher security u weather resistant u no expense of a card, tag, or token when used alone u PINs susceptible to viewing or borrowing Hardware Components KIMA SECURITY INC.

Barcode reader u used alone in low security areas u low cost format u cards are programmable & economical cards easy to duplicate u read head susceptible to dirt and moisture Hardware Components KIMA SECURITY INC.

Magnetic stripe reader u used alone in low security areas such as colleges & universities u cards are programmable read head susceptible to dirt and moisture u cards can be de-magnetized Hardware Components KIMA SECURITY INC.

Kwik Key reader u outmoded technology seldom used Hardware Components KIMA SECURITY INC.

Wiegand reader u seldom used, however, Wiegand communication protocol prevalently in use Hardware Components KIMA SECURITY INC.

Radio frequency (RF) reader u low security areas such as parking applications long read range up to 100 feet u transmitters control up to 4 different doors u transmitters multi-functional - RF & proximity u transmitters susceptible to damage Hardware Components KIMA SECURITY INC.

Infrared reader u was used for parking applications u seldom used technology Hardware Components KIMA SECURITY INC.

Biometric reader u used in high security applications u many different formats - finger print, hand scan, retina scan etc. u eliminates unauthorized entry with borrowed credential Hardware Components KIMA SECURITY INC.

Hardware Components Smart card reader u integrates with smart card technology u smart cards store data & values u smart cards are multi-functional KIMA SECURITY INC.

Reader communication protocols u Wiegand communication protocol widely used u generic 26-bit Wiegand protocol - less secure u proprietary Wiegand protocol - more secure u Keyscan uses proprietary 36-bit Wiegand protocol - no duplicate cards Keyscan systems can read multiple Wiegand bit formats Hardware Components KIMA SECURITY INC.

Electric Locking Devices u electric door strikes fail safe & fail secure magnetic locks F fail safe only installation regulated by local building & fire codes All locks must be installed in a fashion to allow free exit in an emergency. Hardware Components KIMA SECURITY INC.

Request to Exit Devices u push button - manually operated when exiting door u motion sensors - automatically signal system when exiting door u crash bar - manually operated when exiting door Hardware Components KIMA SECURITY INC.

Door Monitoring Devices u door contacts F surface mount F concealed mount (preferred) door sensors integrated with locking device Hardware Components KIMA SECURITY INC.

Typical Door Layout Hardware Components KIMA SECURITY INC.

Hardware Components Credentials u proximity cards/tags/tokens u magnetic stripe cards u smart cards u RF transmitters u PINs u biometrics Personal Computer u administer & monitor system KIMA SECURITY INC.

ContactsContacts Kima Security Inc u 85 Marjoram DR, Ajax, Ontario, L1S 7P4 u Phone u Fax u KIMA SECURITY INC.