
|
 |
 |
DIY
|
Cloud
|
Mobile
|
- Distributed security administration
- Manage your access, visitors, photos, credentials, & reporting
- One set of credentials for everywhere
- Share data between systems
- Self-administer tasks
- Quicker response & no waiting for confirmation
|
- Hosted and protected in Microsoft Azure
- Browser-based applications
- Real-time communication, control and notification
- Cross-system, multi-site, partitioned architecture
- Immense cloud computing processing power applied as-needed for analytics or artificial intelligence
- Easily-configurable data displays and reports
- Simple or complex “if this then that” rules across any or all systems, to trigger system actions and notifications
- Simple data import & export available throughout the applications
- VPN-based access to site physical security infrastructure
- Integrated User Guide and Learning Management System
- Remote diagnostics and health and status monitoring
- Multi-layer security and data protection
- Seamless automatic software updates keep current with advancing technology
- Third-party data integration through an open RESTful API
|
- Take your security system with you no matter where you go
- Quickly review and respond to any security event
- View live video
- Review events with recorded video
- Monitor activity across multiple sites simultaneously
- Unlock doors remotely
- Suspend or reinstate user credentials
- Take Photo-IDs pictures with a smartphone or tablet
- Remotely verify and admit users and visitors
|
 |
 |
 |
Frictionless Security
|
Intelligent Readers
|
Artificial Intelligence
|
- Your mobile device grants access through doors, turnstiles, and to floors
- A frictionless visitor and vendor experience
- Reduce visitor and vendor queuing at the security desk
- Reduce the burden on security desk staff
- Provide a secure identification, transaction and audit trail for every visitor and vendor
- Work independently of any reader that is installed at the access point
- Does not require proprietary Bluetooth or NFC credentials
- Provide a platform for many advanced access features
|
- As a multi-biometric, multi-factor intelligent reader it can identify a person based on their biometrics, name, card, Bluetooth credential, bar or QR code, PIN and Cloud Credential
- Simple, fast and natural to use.
- There is also no distinctive enrollment procedure. It learns what you look like by your first arrival, and how you change over time.
- As an intercom, it's a two-way audio/video communication device.
- It is SIP-based and can integrate with most intercom systems.
- It is deeply integrated with Cloud Station which enables answering from anywhere, on any device, as well as control the end devices from the same interface.
- As a visitor entry device, it can be used as a self-check-in visitor station at a door, gate, security desk, reception area or loading dock.
- Visitors can find their pre-registered record by name, bar or QR code. The Intelligent Reader can read and assign credentials, take photos, and check in and announce visitors.
- It functions in both attended or unattended modes.
- As a camera, the Intelligent Reader can associate a photo or video with every entry attempt.
- Future versions will include video streaming to third-party video recorders and video and audio analytics.
|
- All events and data from the local security system are sent in real time
- All user database changes, configurations, and operator activities are also captured in real time.
- All events and data are processed by Intelligent Analytics to create a summary, statistical information, and new events.
- Some analytics are performed by the local security system while other analytics are performed by in the Cloud
- Intelligent analytics are constantly changing and adapting based on the constant flow of new data and events
- Intelligent Analytics are modular and extract specific information for specific applications enabling tailored system intelligence.
|
 |
 |
 |
Analytics
|
Situational Awareness
|
Mobile/Biometric/
Virtual Credentials
|
- Uses Big Data to create Big Analytics
- Detects, characterizes and reports unusual events
- Employs automated pattern recognition
- Determines correlations and trends
- Provides meta-data reports
- Fuses data within and across applications
- Displays interactive dashboards and dashlets
|
-
Access summary situational awareness reports
-
Observe real-time situational awareness details
-
Simple descriptive text, numbers and visualizations
|
- Only shows the doors, turnstiles, and floors to which you have access
- Location sensitive - you must be close to the door, turnstile or elevator that you want to access
- Person and Access-based control - choose the person and the access level groups, access levels, readers and floors for which you want to enable
- Provide destination dispatch elevator assignment right on your mobile device
- Enable relay elevator floor selection on an elevator by elevator basis
- Feedback messages indicate access granted or why access is denied
- An audit trail is created just as if a physical credential was used
|