Access Control


Software House, From Tyco Security Products

iSTAR Ultra

iSTAR Ultra

Up to 32 readers are supported by iSTAR Ultra, of which 16 may come from the Access Control Module’s (ACM) I/O units; the rest can be made up of ASSA ABLOY Aperio wireless lock sets and devices. iSTAR Ultra communicates with the latest version of C-CURE 9000 security and event management system for a complete access control solution.


    OnSSI

    Ocularis

    Ocularis

    The latest version of OnSSI’s Ocularis changes the landscape in system design, implementation, scalability, functionality and cost-efficiency. Open platform enables integration with leading video and access solutions. Mix & Match architecture allows for flexibility in design and cost savings. New “Powered by OnSSI” NVR Appliances integrate with existing or new Ocularis systems. Critical Camera Failover assures you never lose sight of critical areas, switching automatically to another camera with the same field of view. If a recorder fails, Ocularis can automatically switch to cameras from another recorder as well.


      Yale Locks & Hardware

      Key Free B1L and T1L

      Key Free B1L and T1L

      The Key Free B1L and T1L boast the quality cues of Yale’s current lock line, including fully gasketed installation, ANSI/ BHMA grade 2 certification, motorized tapered deadbolts, and intuitive phone layout keypads. For additional homeowner peace of mind, ample warning is provided before the locks’ batteries lose power, and if connected to a home control system the system may generate “low battery” email or text alerts. Should the batteries drain, terminals on the bottom exterior of the lock accept a nine-volt battery, which provides enough power to enter the code and gain access.


        Galaxy

        System Galaxy Software

        System Galaxy Software

        Galaxy Control Systems’ System Galaxy Software interfaces with all legacy Galaxy hardware and infrastructure. With active directory support for real-time identity management, individualized identity-based door access, and audit reports for each screen view or credential holder. Share data with visitor management, time clocks, parking garages and more. Includes one-minute door open schedules with 100 additional day types. The system has an unconditional two-year warranty, accommodates unlimited users and is accessible from mobile web browsers.


          Frontier Security

          Cylon

          Cylon

          The Cylon controller is built on the Open Supervised Device Protocol (OSDP), a communications specification developed by the Security Industry Association (SIA) and industry providers to encourage interoperability between access control devices and platforms. Cylon’s support of OSDP and its flexible open architecture enable the controller to exceed comparable devices’ life cycles. It also offers an easy upgrade process to further streamline usability and long-term value.


            FEIG Electronics

            ID MAX.U1002

            ID MAX.U1002

            The ID MAX.U1002 standalone system includes the OBID myAXXESS Manager software and a robust UHF RFID reader with a read range of more than 25 feet. User data and access parameters can be easily administered for simplified remote system management and report generation. The easy-to-use OBID myAXXESS Manager enables quick update of authorization data without software expertise.


              AMAG Technology

              Symmetry V8 Access Control Software

              Symmetry V8 Access Control Software

              AMAG Technology releases Symmetry V8 Access Control software. Available in Business, Professional and Enterprise versions, it supports Microsoft Windows Version 8.1, Server 2012 R2 and SQL 2012. Symmetry V8 supports the ONVIF Profile S camera plug-in, which allows dual streaming, providing customers the ability to use a high resolution stream for video recording and a lower resolution stream for live remote viewing of their ONVIF cameras. View video from unlimited locations and record simultaneously. New card holder vacation calendar tracks employee vacations and prevents unauthorized access. Temporary card feature automatically disables the standard card when a temporary one is issued.


                Southco

                Self-contained Electronic Locking System

                Self-contained Electronic Locking System

                Southco, Inc. has launched a fully integrated Self-Contained Electronic Locking System that incorporates an access control device, electronic lock, electrical override and power supply. This AA battery-operated unit is available with keypad or RFID access, features a stylish, drop in assembly and provides full electronic locking functionality for a variety of applications. Southco’s SC Self-Contained Electronic Locking System features a single component design that can be easily mounted into a standard 25x150 panel prep, simplifying the integration of an electronic access solution into a cabinet design, and eliminating the need for the wiring or connecting of separate components.


                  Quantum Secure Inc.

                  SAFE

                  SAFE

                  SAFE for Secure Cloud Physical Identity and Access Management (PIAM) by Quantum Secure is a ready-to-use web-based SaaS solution for PIAM, Visitor Management, Compliance, Security Analytics and more. It integrates with multiple authoritative systems and the PACS for automatic updates of all identity or access change information. All functions of web badging and visitor management are included, along with compliance/risk management enforcement and reporting. Security intelligence analyzes trends and provides actionable insights to reduce risk.


                    ConvergenceTP

                    Connectivity Modules

                    Connectivity Modules

                    ConvergenceTP connectivity modules create a unified security monitoring and analysis solution for your Ocularis platform. Make Ocularis your command center head-end by integrating real time on-screen visual confirmation of asset tracking events seamlessly into OnSSI. All events are time synchronized with the OnSSI surveillance video. Powerful text search tool links all text received with all stored surveillance video. All asset monitoring events are traceable whether its merchandise at the shipping and receiving loading docks or monitoring personnel in hazardous environments - all events are stored and searchable.


                      Free e-News Subscription

                      I agree to this site's Privacy Policy
                      Security Today Academy
                      • Security Products
                      • Environmental Protection
                      • Occupational Health and Safety