IDenticard Systems The experienced leader in the world

Slides:



Advertisements
Similar presentations
ASURE ID SALES TRAINING PRESENTED BY: DAVID ODRISCOLL JULY 18, 2007.
Advertisements

Ego Id Ticket Instructions Personality Identification.
Your Introduction to… SYSTEM VII - Built to Impress Vista Business Capability Designed to run on the very latest in Operating Systems.
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
NexSentry Imaging Solutions
RFID Access Control System March, 2003 Softrónica.
John Bailey Feature Updates for IDaxxess. MS SQL & MS Access: ability to load database on Enterprise DBMS Notifications: service will send status.
ACCESS CONTROL SOLUTIONS Since RBH Access Technologies RBH was established in 1995 and released its first Axiom system in the fall of To date.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
OptiShip ® Multi-carrier Shipping System. OptiShip ® customers save on average 13.6% of parcel shipping costs… OptiShip ® is a comprehensive system that.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
In This Day and Age, Physical Access Control Is Not An Option; It Is a Necessity
GALVESTON COUNTY, TX P-CARD TRAINING GALVESTON COUNTY.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
DATA ACQUISITION SmartLog X3 DescoEMIT.com Rev:
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
AXIS Camera Station Flexible surveillance software for your Axis network video products Sales Presentation Welcome to this short presentation of the.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
Advanced Workgroup System. Printer Admin Utility Monitors printers over IP networks Views Sharp and non-Sharp SNMP Devices Provided Standard with Sharp.
Jewelry Inventory Management Software Your Logo Here Welcome to a demonstration of Del Mar Data Systems Jewelry Inventory Management.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Physical Security Information Management (PSIM) AppVision © 2014.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Gateplus Time Attendance and Access Control System.
Vicon Industries Ltd Leading the Security Industry since 1967 Introduction to Vicon industries Ltd By Technical Support Department.
Emergency Personnel Management and Tracking System Tom Giuliano, Director, Sales & Marketing New England Security & Communications.
1 Complete system solutions for access control Synergy of single-systems design philosophy.
1 Past Present Future A Honeywell Company Products and Services.
AMG Attendance System Product Description Copyright © 2009 AMG Employee Management, Inc.AMG Employee Management, Inc.
Structure Commander Technical Presentation. Copyright (C) MCS 2013, All rights reserved. 2 STRUCTURE COMMANDER Introduction Product Overview.
Integrate your people maximize your knowledge Tel SalesBase Customer.
Video Management Control-Bit Technologies video system manages various types of video inputs; analog or digital, originated in both analog & IP cameras,
SmartLog X 3 TEAM Basic SmartLog X 3 TEAM Basic DescoEMIT.com USER STATUS USER EDIT TEST LOG ADMIN TEST MACHINE SCHEDULE INSTALL System Requirements:
AppVision © Integrated approach to system management Building automation Energy Management Security ManagementProcess Management (SCADA) AppVision.
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Infidea, a journey of discovery – that has just begun infidea, a journey of discovery – that has just begun.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
Classroom User Training June 29, 2005 Presented by:
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
10 February Doors Software Overview. 10 February This presentation is an overview of the basic fundamentals of the Doors software. –Host computer.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
WCR 12/2002.
Basic Administration.  Familiarize support staff with basic DSX administrative tasks  Provide expedited service to customers  Minimize the involvement.
1 Reference sites Amgen Puerto Rico Telephone Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal.
Module 7: Fundamentals of Administering Windows Server 2008.
Who is Inner Range? Inner Range is an Australian Electronic Security Manufacturing Company. Established in 1988 with a Major focus on the Australian Security.
1 Capability Set - Detail. 2 Common Campus Problems Old and Outdated Systems –Poor use of current software tools –Hardware incapable of utilizing IP technology.
1 NexSentry Command Center Powerful security management system with UNIX server and Windows NT 4 Operator Stations.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Customer Identification system based on Smart Card for PDA shops.
Registration Solutions for your Event Management.
1 NexSentry 4100 Series Controllers Secure, reliable, fast control with 32-bit technology.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
Vehicle Management System. 2 About BMS Company BMS International Systems Development Ltd. BMS develops and implements sophisticated and easy to use “all-in-one”
Physical Security Information Management (PSIM)
Made in the United States of America DescoEMIT.com EMIT ESD RESULTS AT YOUR FINGERTIPS.
Overview Presentation MKT-DSRV-P- 001E. Product Overview Network based video transmission product with on-board digital recording Allows analogue fixed/PTZ.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Products and Services.
Software Application Overview
ATTENDANCE MANAGEMENT SYSTEM
Access Security Integrator
Point of Sale Sell by UPC, vendor code or unlimited UPC code with case price  Search by description or sub-department  Multiple discount method 
Wavestore Integrates…
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
ITB Identity Solutions.
Presentation transcript:

IDenticard Systems The experienced leader in the world of integrated security ID What are the advantages of an access control system?? (elicit one thing from each person) Advantages for Cardholders There is piece of mind knowing that the working environment is secure; where cardholders can go and when is controlled automatically. Convenience: the same card can be used for entry at multiple locations, and for other integrated systems such as time and attendance, or food debit. When a card is lost, replacement is quick and easy. Lost or stolen cards are made inactive so that security is not compromised, and costly replacement of locksets is not required. Advantages for Security Guards Real-time monitoring of system events: who, what, where, when. Ability to control door locks, and arm or disarm alarm points right in the software. The guard can log into IDentiPASS from any networked PC running the user interface. Advantages for Administrators Add/Edit cardholder information; capture cardholder pictures from any networked PC that has a user interface installed Design and print badges; replace lost badges Assign or change access privileges to cardholders Assign PIN numbers Run customizable reports

Who is IDenticard? A leader in the security ID industry since 1973, with headquarters in Lancaster PA. Specialists in physical access control systems and custom identification. In-house developer and manufacturer of software and hardware. Marketer of products through a certified and trained partner network. A part of Brady Corporation, a world leader in identification solutions.

IDenticard Corporate Philosophy Provide unparalleled quality, service and reliability. Stay close to the customer. Demonstrate fair, ethical dealings with all parties. Strive always to be a leader in our industry. Concentrate on what we know and do best.

Sample of Customer Base New York Hospital Hoag Hospital University of Texas at Dallas Louisville Airport Compuware Amoco Oil Coca-Cola U.S. Embassies Department of Homeland Security U.S. Postal Service North Carolina Dept. of Transportation VISA IKEA

Benefits of Access Control Systems Control and monitor access by individual, door, day and time. Deactivate card quickly and easily without expense of re-coring locks. View audit trail of cardholder activities. Monitor status of doors and other points throughout a facility. Schedule locking and unlocking of doors. Verify claimed identity. Integrate with other systems such as: CCTV Fire and burglar systems Paging systems Lighting and environmental control Intercom Photo Identification

A family of access control products for businesses and organizations of all sizes IDentiPASS LT An economical introduction to access control, LT is rich in features and specifically tailored to meet the access requirements of up to 6,000 cardholders. IDentiPASS An ideal solution for facilities of all sizes – from small independent businesses to Fortune 500 companies. The IDentiPASS system’s superior networking capabilities offer many options for system monitoring, as well as control and database maintenance from multiple locations. IDentiPASS PLUS Packed with advanced capabilities, IDentiPASS PLUS offers a comprehensive, integrated security solution. Its versatile features are designed to harness the power of today’s sophisticated security technologies.

Standard IDentiPASS Features Powerful networking capabilities LAN/WAN Password protection MSDE or Microsoft Access database Customizable screen views Easy system administration Powerful reporting capabilities PASSPort integration module Built-in photo identification software Support for all reader technologies including biometric and smart card integration Networking capabilities – More options for system monitoring, control and database maintenance from multiple locations within the system. Provides the ability to monitor, control and maintain from multiple locations. No matter how large the organization, no matter how many sites the customer has scattered around the city or around the globe... adapts to your customer’s unique requirements. Password Protected – User-authorization access feature for effective system security and integration. Assign passwords per user, limit rights, create an audit trail. 32-bit operating system provides speed in command execution – OS operating system requirements Windows NT 4.0, 2000, or XP. There are three main reasons why NT is becoming today's operating system of choice. First, due to its networkability, it is able to take on an unlimited number of PCs. Second, its 32-bit architecture makes it much faster than older operating systems. Last, it enhances system security. NT's User Manager, for example, allows a system administrator tremendous control over user access and rights. It is possible to restrict access to Word, for instance, or even to specific documents. ODBC compliant – utilizes an open database connectivity format. Allows the system to attach to an existing ODBC database. Eliminates the need for double data entry -- saving time and eliminating the possibility of typing mistakes. (IVIS 2000 required for attaching.) Customizable Screen Layout – multiple layouts can be created based on the needs and roles of the person logged-in. Select the exact information you wish to view. Easy-to-read displays show status of alarms and relays using simplified floor plan graphics. Easy System Administration - User-defined displays helps clarify computer screens, making for less confusing displays, custom-tailored to your specific monitoring requirements. Easily identified functions for assigning Reader Groups, Alarm Points and Relays to simplify programming and database maintenance. Attach Images and/or Sounds to system events - Links sounds to particular events, immediately identifying what has just occurred. Plays WAV files, or displays BMP & JPG images. Powerful report capabilites – generate reports for cardholders, system events, filter/search by time period, device or specific transaction Expandable – both to accommodate more doors and more users and more locations. Adapts to organizations of every size, and grows and expands as your customers’ needs change. Supports basic stand-alone security to the most advanced, integrated networks. Integrates with other systems – Alarm systems, CCTV Systems; Fire Systems; Paging Systems, environmental control systems, etc.

Control up to 40 access control points/doors Door monitoring and control Monitor and control up to 360 alarm points and relays Capacity for 6,000 cardholders 254 time zones 64 holidays 1,023 reader groups Assign up to 3 distinct access groups per cardholder Image capture and ID software included Automatic photo recall PASSPort Automatic card activation and expiration Elevator control Biometric enrollment

Control up to 4,096 access control points/doors Monitor and control up to 36,864 alarm points and relays Capacity for up to 64,000 cardholders 254 time zones 64 holidays 1,023 reader groups Assign up to 3 distinct access groups per cardholder Image capture and ID software included Automatic photo recall PASSPort Partitioning Door monitoring and control Automatic card activation and expiration Elevator control Muster readers/reports Biometric enrollment

Control up to 4,096 access control points/doors Monitor and control up to 36,864 alarm points and relays Capacity for up to 64,000 cardholders 254 time zones 64 holidays 1,023 reader groups Virtually unlimited access group assignment Image capture and ID software included Automatic photo recall Scheduled archiving Dynamic mapping software IP camera integration CCTV- PTZ, DVR and Matrix switch integration Device drivers Partitioning Door monitoring and control Automatic card activation and expiration Advanced elevator control Card copy command Muster readers/reports Biometric enrollment

IDentiPASS Hardware Common hardware for all versions of software Distributed database Supports multiple reader technologies Can communicate over an existing LAN or WAN Has safeguards for system failures Battery backup Event buffering in off-line conditions Panels Polled by PC - Panels do not communicate with each other on the system. Panels make decisions independently. Through the polling process, one event per panel is polled at a time, and then continues on down the line. You can do all 64 panels in less than a second. Utilize a Distributed Database - when the PCs go off line with the panels (its not if but when), you don’t want the system to come to a screeching halt. Panels all have information that is require to make decisions without being on line with the PC. Cause and effect links from one control panel to another will function as long as the PC is online with each panel. Distributed access control devices make their own access decisions, and upload event messages periodically to the host computer for storage. Multiple Reader Technologies Supported – e.g. a proximity user may be used at the gate, and a mag strip at the door. I can mix and match reader technologies on the panel. System Supports Maximum of 512 Panels Maximum of 4,098 Readers Maximum of 36,864 Inputs & 36,864 Relays Maximum 64,000 Cardholders per Panel 4,000 Transaction Buffer - Each panel has an event buffer capable of supporting up to 4,000 transactions. So if a panel goes off line w/PC, the panel still operates. Off line with the PC, panels continue to recognize cardholders, time zones, unlock doors, and and store events until the PC comes on line. At which time, the events are downloaded to the PC for display as well as storage in the history file. 2 Reader & 4 Reader Models Available - If the host PC turns off or the network goes down, which two of these features will protect system information from this type of communication failure? (distributed database, 4,000 transaction buffer) These are the maximums that IDentiPASS supports, what is the cardholder capacity for the IDentiPASS Start-Up Kit?? (Refer to cut sheet)

Readers Mag stripe – flush mount Mag stripe – surface mount Barcode Keypad Proximity Biometric Hand Geometry Fingerprint Iris Scan Smart card serial number Card types are varied. Some cards use multiple technologies, but all encode a card number and optionally a site code. (Page 11) Barcode – a beam of light reads the data; may be effected by environment conditions. Magnetic swipe – contact card; data is encoded in a magnetic strip; subject to wear and tear. IDenticard’s laminated cards are the strongest in the industry. Proximity – contactless card; data is encoded in the card and transmitted by radio frequency antenna. Smart card – contact or contactless card; identification data is stored in a memory chip. IDenticard has a patented contactless Mifare card. durable \Unique multilayer card construction extends life of card. The design features of IDentiSMART cards ensure that they last far longer than traditional smart cards. Secure Custom or standard IDentiGuard™ graphic reduces risk of card fraud Versatile Photo ensures multipurpose identification Available bar code logs time and attendance information Encoded magnetic strip on back providesadditional verification Protected, invisible antenna within card transmits data to and from an integrated circuit You can order as few as 100 – within two weeks from proof approval

Cards Card Technologies Magnetic stripe Proximity Teslin or PVC Barcode Smart card Teslin or PVC Card Uses Photo identification Facility access Time & attendance Biometric identification Customer loyalty Payment Library checkout Card types are varied. Some cards use multiple technologies, but all encode a card number and optionally a site code. (Page 11) Barcode – a beam of light reads the data; may be effected by environment conditions. Magnetic swipe – contact card; data is encoded in a magnetic strip; subject to wear and tear. IDenticard’s laminated cards are the strongest in the industry. Proximity – contactless card; data is encoded in the card and transmitted by radio frequency antenna. Smart card – contact or contactless card; identification data is stored in a memory chip. IDenticard has a patented contactless Mifare card. durable \Unique multilayer card construction extends life of card. The design features of IDentiSMART cards ensure that they last far longer than traditional smart cards. Secure Custom or standard IDentiGuard™ graphic reduces risk of card fraud Versatile Photo ensures multipurpose identification Available bar code logs time and attendance information Encoded magnetic strip on back providesadditional verification Protected, invisible antenna within card transmits data to and from an integrated circuit You can order as few as 100 – within two weeks from proof approval

Featuring …

IDenticard proudly presents: Contactless smart card technology

Why people prefer Proximity Technology Convenient to use (contactless) Readers are low maintenance Multiple technology cards available Credit card size custom printing Wafer cards available

Proximity Technology Convenient to use (contactless) Convenient to use

Low maintenance readers Proximity Technology Convenient to use (contactless) Readers are low maintenance Low maintenance readers

Multiple technology cards Proximity Technology Convenient to use (contactless) Readers are low maintenance Multiple technology cards Multiple technology cards

Proximity Technology More printing options Convenient to use (contactless) Readers are low maintenance Multiple technology cards Credit card size custom printing More printing options

Contactless disc and key Proximity Technology Convenient to use (contactless) Readers are low maintenance Multiple technology cards Credit card size custom printing Wafer cards available Contactless disc and key

Additional Features of IDentiSMART More durable

Additional Features of IDentiSMART More durable More card options

Additional Features of IDentiSMART More durable More card options Printing errors not as costly

Additional Features of IDentiSMART More durable More card options Printing errors not as costly Biometric template storage

Additional Features of IDentiSMART More durable More card options Printing errors not as costly Biometric template storage Potential Future Applications Logical security Read-write capability Physical access control Point of sale Storage of personal information Vending

How IDentiPASS Works

! Color coded event display ! System site tree IDentiPASS Software ! Color coded event display ! System site tree As you look at the User Interface you will notice there are a lot of options on the screen. The purpose in showing you all of this is to show the flexibility and functionality of the system. We are going to look at the Site Tree first. For those of you who use Microsoft® Windows NT the site tree should look familiar. The first item listed in the Site Tree is the computer name on which the database resides. If we click on it and expand the tree we can see the configuration of the system. Here we have the name of the computer which will be polling the 9000 panels. If we expand it we can actually see what COM ports the panels are actually connected to.

Customized event display to meet your requirements Transaction Window Customized event display to meet your requirements Event Monitoring Shows who, what, when, and where This is where transactions are viewed. Transactions consist of card presentations, input and output points, and panel actions. [CLICK] A transaction shows Who presented their card, what Action took place (whether they were granted access or not), what time and date it occurred, and what reader they presented their card too. Filters can be applied to different tab pages to make it easy to manage a busy system. An example; a Card Failure filter has been applied to this tab. Which means it will only show cards that have been presented and weren’t granted access. A filter could be setup for an individual or group of individuals to make tracking employees easier. Or like our third tab page we are only showing Panel actions. You decide what filters are created and how many tab pages you want.

Automatic photo recall Indicates cardholder has a stored photo To the left of a Card Holder transaction is an icon. If the icon is a camera the Guard can click anywhere in the transaction to display the photo. [CLICK] The photo box shows the reader name, Card Holder name, and the photo. These pictures can also be displayed automatically by turning on the ‘Auto Photo Recall’. This window works on the First In First Out premise and can be configured to display any number of photos. A filter can also be applied to the auto photo recall window so only pictures from specific reader(s) are shown.

Door Monitoring Display Lockout with override Normal door Unlocked and opened Door forced When an input point goes into alarm several things can be setup to take place on the screen. The attention of the Guard can be gotten by playing a recorded .wav file. Once the sound has been played the annoying beep will continue until the Guard takes action. [CLICK] A static bitmap can be displayed showing the location of the point in alarm. The color of the point in the monitoring window changes immediately showing real-time status of the input point. And, the alarm transaction is written in the transaction monitoring window.

Alarm Acknowledgement Transaction Alarm icon changes color When an alarm occurs the following can happen… Alarm icon changes color When an input point goes into alarm several things can be setup to take place on the screen. The attention of the Guard can be gotten by playing a recorded .wav file. Once the sound has been played the annoying beep will continue until the Guard takes action. [CLICK] A static bitmap can be displayed showing the location of the point in alarm. The color of the point in the monitoring window changes immediately showing real-time status of the input point. And, the alarm transaction is written in the transaction monitoring window. Alarm transaction shows in transaction window Alarm acknowledgement continuously plays .wav file until guard takes action

Alarm Acknowledgement Transaction Customized instructions for the guard per point, per condition Place for the guard to enter User Name and Password for accountability When an input point goes into alarm several things can be setup to take place on the screen. The attention of the Guard can be gotten by playing a recorded .wav file. Once the sound has been played the annoying beep will continue until the Guard takes action. [CLICK] A static bitmap can be displayed showing the location of the point in alarm. The color of the point in the monitoring window changes immediately showing real-time status of the input point. And, the alarm transaction is written in the transaction monitoring window. Room for the guard to enter notes about the alarm condition

Click here to take picture Click here to import picture Cardholder Record Cardholder Rolodex Card was last used at this time and location Stored picture Here we are looking at the Card Holder Database. We can see the Name of the Card Holder [CLICK] Missy Wolf and we can view the stored photo of Missy The stored picture can be captured through the software with a digital camera… or by importing it from a picture already on file. This picture can also be used as part of an ID badge which you create through the software and print right from this page. This window also makes it easy to see where the Card Holder last used their card by displaying the Last Access Granted information. Card Holder look-up is made simple by the Quick Card Finder rolodex. Let’s look-up Mike Trimble’s record by Clicking on the letter “T”. Click here to take picture Click here to import picture Print ID badge here

Ability to save reports in standard spreadsheet format.

PASSPort Integration Web browser-based application without use of proprietary software on client PCs Designed to allow for monitoring of other systems directly into the access control software. Video Integration IP Cameras PTZ Camera Control Matrix Switch Integration DVR video integration Pre- and Post-alarm recording E-mail annunciation of alarms Paging on alarm conditions Ability to bring disparate systems into a single view

PASSPort Features Comparison

PASSPort – Dynamic Mapping Allows operator to drill-down to appropriate maps.

PASSPort – Dynamic Mapping Easily bring up video based on alarm conditions

Select camera views using drag and drop Camera Quad View Select camera views using drag and drop

Alarm Management Pre- and post-alarm video recording and review Alarm event detail E-mail notification with video clip link

What To Look For in an Access System Advanced technology Proven performance and reliability Ease of use Flexibility Scalability Value Support

What to Look for in choosing your Security System Solution Provider Proven ability to install technical solutions Local support and service Trained technical staff Reliability Understanding of your infrastructure Track record for providing cost-effective, on-time solutions