Download presentation
Published byRaegan Croom Modified over 9 years ago
1
IDenticard Systems The experienced leader in the world
of integrated security ID What are the advantages of an access control system?? (elicit one thing from each person) Advantages for Cardholders There is piece of mind knowing that the working environment is secure; where cardholders can go and when is controlled automatically. Convenience: the same card can be used for entry at multiple locations, and for other integrated systems such as time and attendance, or food debit. When a card is lost, replacement is quick and easy. Lost or stolen cards are made inactive so that security is not compromised, and costly replacement of locksets is not required. Advantages for Security Guards Real-time monitoring of system events: who, what, where, when. Ability to control door locks, and arm or disarm alarm points right in the software. The guard can log into IDentiPASS from any networked PC running the user interface. Advantages for Administrators Add/Edit cardholder information; capture cardholder pictures from any networked PC that has a user interface installed Design and print badges; replace lost badges Assign or change access privileges to cardholders Assign PIN numbers Run customizable reports
2
Who is IDenticard? A leader in the security ID industry since 1973, with headquarters in Lancaster PA. Specialists in physical access control systems and custom identification. In-house developer and manufacturer of software and hardware. Marketer of products through a certified and trained partner network. A part of Brady Corporation, a world leader in identification solutions.
3
IDenticard Corporate Philosophy
Provide unparalleled quality, service and reliability. Stay close to the customer. Demonstrate fair, ethical dealings with all parties. Strive always to be a leader in our industry. Concentrate on what we know and do best.
4
Sample of Customer Base
New York Hospital Hoag Hospital University of Texas at Dallas Louisville Airport Compuware Amoco Oil Coca-Cola U.S. Embassies Department of Homeland Security U.S. Postal Service North Carolina Dept. of Transportation VISA IKEA
5
Benefits of Access Control Systems
Control and monitor access by individual, door, day and time. Deactivate card quickly and easily without expense of re-coring locks. View audit trail of cardholder activities. Monitor status of doors and other points throughout a facility. Schedule locking and unlocking of doors. Verify claimed identity. Integrate with other systems such as: CCTV Fire and burglar systems Paging systems Lighting and environmental control Intercom Photo Identification
7
A family of access control products for businesses and organizations of all sizes
IDentiPASS LT An economical introduction to access control, LT is rich in features and specifically tailored to meet the access requirements of up to 6,000 cardholders. IDentiPASS An ideal solution for facilities of all sizes – from small independent businesses to Fortune 500 companies. The IDentiPASS system’s superior networking capabilities offer many options for system monitoring, as well as control and database maintenance from multiple locations. IDentiPASS PLUS Packed with advanced capabilities, IDentiPASS PLUS offers a comprehensive, integrated security solution. Its versatile features are designed to harness the power of today’s sophisticated security technologies.
8
Standard IDentiPASS Features
Powerful networking capabilities LAN/WAN Password protection MSDE or Microsoft Access database Customizable screen views Easy system administration Powerful reporting capabilities PASSPort integration module Built-in photo identification software Support for all reader technologies including biometric and smart card integration Networking capabilities – More options for system monitoring, control and database maintenance from multiple locations within the system. Provides the ability to monitor, control and maintain from multiple locations. No matter how large the organization, no matter how many sites the customer has scattered around the city or around the globe... adapts to your customer’s unique requirements. Password Protected – User-authorization access feature for effective system security and integration. Assign passwords per user, limit rights, create an audit trail. 32-bit operating system provides speed in command execution – OS operating system requirements Windows NT 4.0, 2000, or XP. There are three main reasons why NT is becoming today's operating system of choice. First, due to its networkability, it is able to take on an unlimited number of PCs. Second, its 32-bit architecture makes it much faster than older operating systems. Last, it enhances system security. NT's User Manager, for example, allows a system administrator tremendous control over user access and rights. It is possible to restrict access to Word, for instance, or even to specific documents. ODBC compliant – utilizes an open database connectivity format. Allows the system to attach to an existing ODBC database. Eliminates the need for double data entry -- saving time and eliminating the possibility of typing mistakes. (IVIS 2000 required for attaching.) Customizable Screen Layout – multiple layouts can be created based on the needs and roles of the person logged-in. Select the exact information you wish to view. Easy-to-read displays show status of alarms and relays using simplified floor plan graphics. Easy System Administration - User-defined displays helps clarify computer screens, making for less confusing displays, custom-tailored to your specific monitoring requirements. Easily identified functions for assigning Reader Groups, Alarm Points and Relays to simplify programming and database maintenance. Attach Images and/or Sounds to system events - Links sounds to particular events, immediately identifying what has just occurred. Plays WAV files, or displays BMP & JPG images. Powerful report capabilites – generate reports for cardholders, system events, filter/search by time period, device or specific transaction Expandable – both to accommodate more doors and more users and more locations. Adapts to organizations of every size, and grows and expands as your customers’ needs change. Supports basic stand-alone security to the most advanced, integrated networks. Integrates with other systems – Alarm systems, CCTV Systems; Fire Systems; Paging Systems, environmental control systems, etc.
9
Control up to 40 access control points/doors
Door monitoring and control Monitor and control up to 360 alarm points and relays Capacity for 6,000 cardholders 254 time zones 64 holidays 1,023 reader groups Assign up to 3 distinct access groups per cardholder Image capture and ID software included Automatic photo recall PASSPort Automatic card activation and expiration Elevator control Biometric enrollment
10
Control up to 4,096 access control points/doors
Monitor and control up to 36,864 alarm points and relays Capacity for up to 64,000 cardholders 254 time zones 64 holidays 1,023 reader groups Assign up to 3 distinct access groups per cardholder Image capture and ID software included Automatic photo recall PASSPort Partitioning Door monitoring and control Automatic card activation and expiration Elevator control Muster readers/reports Biometric enrollment
11
Control up to 4,096 access control points/doors
Monitor and control up to 36,864 alarm points and relays Capacity for up to 64,000 cardholders 254 time zones 64 holidays 1,023 reader groups Virtually unlimited access group assignment Image capture and ID software included Automatic photo recall Scheduled archiving Dynamic mapping software IP camera integration CCTV- PTZ, DVR and Matrix switch integration Device drivers Partitioning Door monitoring and control Automatic card activation and expiration Advanced elevator control Card copy command Muster readers/reports Biometric enrollment
12
IDentiPASS Hardware Common hardware for all versions of software
Distributed database Supports multiple reader technologies Can communicate over an existing LAN or WAN Has safeguards for system failures Battery backup Event buffering in off-line conditions Panels Polled by PC - Panels do not communicate with each other on the system. Panels make decisions independently. Through the polling process, one event per panel is polled at a time, and then continues on down the line. You can do all 64 panels in less than a second. Utilize a Distributed Database - when the PCs go off line with the panels (its not if but when), you don’t want the system to come to a screeching halt. Panels all have information that is require to make decisions without being on line with the PC. Cause and effect links from one control panel to another will function as long as the PC is online with each panel. Distributed access control devices make their own access decisions, and upload event messages periodically to the host computer for storage. Multiple Reader Technologies Supported – e.g. a proximity user may be used at the gate, and a mag strip at the door. I can mix and match reader technologies on the panel. System Supports Maximum of 512 Panels Maximum of 4,098 Readers Maximum of 36,864 Inputs & 36,864 Relays Maximum 64,000 Cardholders per Panel 4,000 Transaction Buffer - Each panel has an event buffer capable of supporting up to 4,000 transactions. So if a panel goes off line w/PC, the panel still operates. Off line with the PC, panels continue to recognize cardholders, time zones, unlock doors, and and store events until the PC comes on line. At which time, the events are downloaded to the PC for display as well as storage in the history file. 2 Reader & 4 Reader Models Available - If the host PC turns off or the network goes down, which two of these features will protect system information from this type of communication failure? (distributed database, 4,000 transaction buffer) These are the maximums that IDentiPASS supports, what is the cardholder capacity for the IDentiPASS Start-Up Kit?? (Refer to cut sheet)
13
Readers Mag stripe – flush mount Mag stripe – surface mount Barcode
Keypad Proximity Biometric Hand Geometry Fingerprint Iris Scan Smart card serial number Card types are varied. Some cards use multiple technologies, but all encode a card number and optionally a site code. (Page 11) Barcode – a beam of light reads the data; may be effected by environment conditions. Magnetic swipe – contact card; data is encoded in a magnetic strip; subject to wear and tear. IDenticard’s laminated cards are the strongest in the industry. Proximity – contactless card; data is encoded in the card and transmitted by radio frequency antenna. Smart card – contact or contactless card; identification data is stored in a memory chip. IDenticard has a patented contactless Mifare card. durable \Unique multilayer card construction extends life of card. The design features of IDentiSMART cards ensure that they last far longer than traditional smart cards. Secure Custom or standard IDentiGuard™ graphic reduces risk of card fraud Versatile Photo ensures multipurpose identification Available bar code logs time and attendance information Encoded magnetic strip on back providesadditional verification Protected, invisible antenna within card transmits data to and from an integrated circuit You can order as few as 100 – within two weeks from proof approval
14
Cards Card Technologies Magnetic stripe Proximity Teslin or PVC
Barcode Smart card Teslin or PVC Card Uses Photo identification Facility access Time & attendance Biometric identification Customer loyalty Payment Library checkout Card types are varied. Some cards use multiple technologies, but all encode a card number and optionally a site code. (Page 11) Barcode – a beam of light reads the data; may be effected by environment conditions. Magnetic swipe – contact card; data is encoded in a magnetic strip; subject to wear and tear. IDenticard’s laminated cards are the strongest in the industry. Proximity – contactless card; data is encoded in the card and transmitted by radio frequency antenna. Smart card – contact or contactless card; identification data is stored in a memory chip. IDenticard has a patented contactless Mifare card. durable \Unique multilayer card construction extends life of card. The design features of IDentiSMART cards ensure that they last far longer than traditional smart cards. Secure Custom or standard IDentiGuard™ graphic reduces risk of card fraud Versatile Photo ensures multipurpose identification Available bar code logs time and attendance information Encoded magnetic strip on back providesadditional verification Protected, invisible antenna within card transmits data to and from an integrated circuit You can order as few as 100 – within two weeks from proof approval
15
Featuring …
16
IDenticard proudly presents: Contactless smart card technology
17
Why people prefer Proximity Technology
Convenient to use (contactless) Readers are low maintenance Multiple technology cards available Credit card size custom printing Wafer cards available
18
Proximity Technology Convenient to use (contactless) Convenient to use
19
Low maintenance readers
Proximity Technology Convenient to use (contactless) Readers are low maintenance Low maintenance readers
20
Multiple technology cards
Proximity Technology Convenient to use (contactless) Readers are low maintenance Multiple technology cards Multiple technology cards
21
Proximity Technology More printing options
Convenient to use (contactless) Readers are low maintenance Multiple technology cards Credit card size custom printing More printing options
22
Contactless disc and key
Proximity Technology Convenient to use (contactless) Readers are low maintenance Multiple technology cards Credit card size custom printing Wafer cards available Contactless disc and key
23
Additional Features of IDentiSMART
More durable
24
Additional Features of IDentiSMART
More durable More card options
25
Additional Features of IDentiSMART
More durable More card options Printing errors not as costly
26
Additional Features of IDentiSMART
More durable More card options Printing errors not as costly Biometric template storage
27
Additional Features of IDentiSMART
More durable More card options Printing errors not as costly Biometric template storage Potential Future Applications Logical security Read-write capability Physical access control Point of sale Storage of personal information Vending
28
How IDentiPASS Works
29
! Color coded event display ! System site tree
IDentiPASS Software ! Color coded event display ! System site tree As you look at the User Interface you will notice there are a lot of options on the screen. The purpose in showing you all of this is to show the flexibility and functionality of the system. We are going to look at the Site Tree first. For those of you who use Microsoft® Windows NT the site tree should look familiar. The first item listed in the Site Tree is the computer name on which the database resides. If we click on it and expand the tree we can see the configuration of the system. Here we have the name of the computer which will be polling the 9000 panels. If we expand it we can actually see what COM ports the panels are actually connected to.
30
Customized event display to meet your requirements
Transaction Window Customized event display to meet your requirements Event Monitoring Shows who, what, when, and where This is where transactions are viewed. Transactions consist of card presentations, input and output points, and panel actions. [CLICK] A transaction shows Who presented their card, what Action took place (whether they were granted access or not), what time and date it occurred, and what reader they presented their card too. Filters can be applied to different tab pages to make it easy to manage a busy system. An example; a Card Failure filter has been applied to this tab. Which means it will only show cards that have been presented and weren’t granted access. A filter could be setup for an individual or group of individuals to make tracking employees easier. Or like our third tab page we are only showing Panel actions. You decide what filters are created and how many tab pages you want.
31
Automatic photo recall
Indicates cardholder has a stored photo To the left of a Card Holder transaction is an icon. If the icon is a camera the Guard can click anywhere in the transaction to display the photo. [CLICK] The photo box shows the reader name, Card Holder name, and the photo. These pictures can also be displayed automatically by turning on the ‘Auto Photo Recall’. This window works on the First In First Out premise and can be configured to display any number of photos. A filter can also be applied to the auto photo recall window so only pictures from specific reader(s) are shown.
32
Door Monitoring Display
Lockout with override Normal door Unlocked and opened Door forced When an input point goes into alarm several things can be setup to take place on the screen. The attention of the Guard can be gotten by playing a recorded .wav file. Once the sound has been played the annoying beep will continue until the Guard takes action. [CLICK] A static bitmap can be displayed showing the location of the point in alarm. The color of the point in the monitoring window changes immediately showing real-time status of the input point. And, the alarm transaction is written in the transaction monitoring window.
33
Alarm Acknowledgement Transaction Alarm icon changes color
When an alarm occurs the following can happen… Alarm icon changes color When an input point goes into alarm several things can be setup to take place on the screen. The attention of the Guard can be gotten by playing a recorded .wav file. Once the sound has been played the annoying beep will continue until the Guard takes action. [CLICK] A static bitmap can be displayed showing the location of the point in alarm. The color of the point in the monitoring window changes immediately showing real-time status of the input point. And, the alarm transaction is written in the transaction monitoring window. Alarm transaction shows in transaction window Alarm acknowledgement continuously plays .wav file until guard takes action
34
Alarm Acknowledgement Transaction
Customized instructions for the guard per point, per condition Place for the guard to enter User Name and Password for accountability When an input point goes into alarm several things can be setup to take place on the screen. The attention of the Guard can be gotten by playing a recorded .wav file. Once the sound has been played the annoying beep will continue until the Guard takes action. [CLICK] A static bitmap can be displayed showing the location of the point in alarm. The color of the point in the monitoring window changes immediately showing real-time status of the input point. And, the alarm transaction is written in the transaction monitoring window. Room for the guard to enter notes about the alarm condition
35
Click here to take picture Click here to import picture
Cardholder Record Cardholder Rolodex Card was last used at this time and location Stored picture Here we are looking at the Card Holder Database. We can see the Name of the Card Holder [CLICK] Missy Wolf and we can view the stored photo of Missy The stored picture can be captured through the software with a digital camera… or by importing it from a picture already on file. This picture can also be used as part of an ID badge which you create through the software and print right from this page. This window also makes it easy to see where the Card Holder last used their card by displaying the Last Access Granted information. Card Holder look-up is made simple by the Quick Card Finder rolodex. Let’s look-up Mike Trimble’s record by Clicking on the letter “T”. Click here to take picture Click here to import picture Print ID badge here
36
Ability to save reports in standard spreadsheet format.
38
PASSPort Integration Web browser-based application without use of proprietary software on client PCs Designed to allow for monitoring of other systems directly into the access control software. Video Integration IP Cameras PTZ Camera Control Matrix Switch Integration DVR video integration Pre- and Post-alarm recording annunciation of alarms Paging on alarm conditions Ability to bring disparate systems into a single view
39
PASSPort Features Comparison
40
PASSPort – Dynamic Mapping
Allows operator to drill-down to appropriate maps.
41
PASSPort – Dynamic Mapping
Easily bring up video based on alarm conditions
42
Select camera views using drag and drop
Camera Quad View Select camera views using drag and drop
43
Alarm Management Pre- and post-alarm video recording and review
Alarm event detail notification with video clip link
44
What To Look For in an Access System
Advanced technology Proven performance and reliability Ease of use Flexibility Scalability Value Support
45
What to Look for in choosing your Security System Solution Provider
Proven ability to install technical solutions Local support and service Trained technical staff Reliability Understanding of your infrastructure Track record for providing cost-effective, on-time solutions
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.