iProtect aurora

Transcription

iProtect aurora
iProtect Aurora
TM
YOUR PARTNER IN THE FIELD OF ALL IP SECURITY SOLUTIONS
iProtect™Aurora: High End Security Management
In 2001 Keyprocessor B.V. was the first company to launch an entirely web
based security management system. Over time the iProtect™ Security
Management System has evolved into a fully fledged security system with
fully integrated access control, camera surveillance, intrusion detection,
personal protection, parking management, intercom and time registration.
Keyprocessor B.V. is committed to innovation and is always in search
cannot manipulate the security system. In combination with DESFire
of technological breakthroughs. As a result Keyprocessor B.V. is
cards and the new generation of card readers you can rest assured
now introducing the next generation Security Management
that your security management system is optimally protected.
System: iProtect™ Aurora.
End to End Security
Security often fragmented
Users who prefer an electronic security system are usually
Given the fact that security systems currently form an integral
confronted with the choice of separate system solutions.
part of the ICT network, data flow security needs to be optimized.
Whether it is about access management, intrusion detection or
With an access control system, the data flow starts with the
camera surveillance: from an organisational point of view for a
reading of the smart card, and ends at the web client, which is
company these are all the same type of security issues. Because
where the system is controlled. Securing applications from the
of this fragmented approach users are often confronted with
source to the end point is called ‘end to end security’. Hackers
inefficient and expensive security management.
Manage 7 disciplines with just 1 security system
Complete and location independent
Multi-site applications
iProtect™ Aurora offers the solution for a highly reliable and
iProtect™ Aurora is extremely well suited for multi-site applications;
fully integrated security management system. This is achieved by
several offices or branches can be managed centrally using just
the integrated management of access control, camera surveillance,
one iProtect™ Aurora system. Thanks to the use of TCP/IP
intrusion detection, time & attendance, parking management,
communication, practically every connection between the
intercom and people protection. iProtect™ Aurora is web based,
various locations is possible: the possibilities range from LAN
which means that all screens are presented as web pages (in HTML)
to WAN and include the use of ADSL, ISDN and UMTS.
by, among other programmes, Internet Explorer. This obviates
the need for user software to be installed locally, as a result of
which the user enjoys considerable cost savings. Moreover,
Integrated Intelligent Video Analysis
thanks to the use of web techniques, iProtect™ Aurora is fully
location-independent. System administration can be carried out
from any workstation, anywhere in the world.
Unique report generator
Good reporting is important. That’s why iProtect™ Aurora offers
extensive possibilities in this area. Reports are easy to compile
End to End Security
with the help of the unique report generator and are presented
in a clear, well organised style. Their PDF format makes the
reports easy to save, and they can be filed, printed or e-mailed
iProtect™ Aurora offers comprehensive security for:
- Access control
later as required.
- Camera surveillance
Buffering
- Intrusion detection
Running a system that is capable of losing transactions is not
- People protection
acceptable. This is why the Polyx network controller provides
- Intercom
100% certainty that the buffered transactions actually reach
- Parking management
the exchange. Also the Polyx has a facility for connecting an
- Time & attendance
emergency power battery so that under all circumstances
operational reliability is guaranteed.
Safe workstation management
All the data traffic between the iProtect™ Aurora system hub
and the workstations is encrypted by means of Secure Socket
Personal user interface for employees
Layer (SSL). Intelligent data encryption is used, which makes the
PoE / PoE+
likelihood of someone hacking into the encrypted information
Power over Ethernet or PoE is an emerging technology for
minimal. This is the standard for secure communication over
supplying power and data over a standard UTP cable in an
the internet. The most secure websites, such as e-banking and
Ethernet network. This technology is used to supply power to
e-commerce sites, use SSL. In addition iProtect™ Aurora now
the network devices, and within our security concept these
also provides the ‘My iProtect’ functionality which means that
would be the video cameras and network controller (and from
all employees can be given their own personal user interface.
here the card readers and locks).
➊ Access Control
➌ Intrusion Detection
Extensive access management for up to 100,000 users. Standard
This module provides the administration of one or more security
features include attendance registration, I/O management, alarm
keypads. Integration with access control, among other functionalities,
handler, interactive maps and visitor registration. The integration
can prevent false alarms and intrusion reports are verified
of the iProtect™ Keybadge software module is optional; with
immediately with video upon each event (transaction).
this module cards can be personalised in-company with a passport
photo, logo and texts. By using the Polyx network controller the
iProtect™ Aurora can combine an alarm group that is based
communication between the card readers and the central server
on various alarm points for a specific group of people. These
largely takes place over IP. Because of the unique and encrypted
alarm groups can also be bundled into a collection that can be
communication between these field components, there are
collectively switched on and off. The different alarm points and
substantial savings on cables and installation costs and the ‘end
groups, in combination with the corresponding status, can be
to end security’ concept applied by Keyprocessor is easily realised.
visualised on the interactive floor plan.
Furthermore, because of the way the Polyx has been designed,
Keyprocessor can also focus on the energy consumption. The
➍ People Protection
Polyx has an energy consumption of 1.5W, which is definitely a
iProtect™ Aurora people protection ensures proper alarm
very low energy consumption.
registration. By means of active tags, iProtect™ Aurora knows
➋ Camera Surveillance
A further option we provide is the configuration of a camera
exactly which individuals are located in specific areas and in the
event of an alarm, iProtect™ Aurora can initiate the right processes
(such as camera observation) and generate reports.
observation and registration system, fully IP based. The surveillance
camera images are permanently displayed at reception and
Alarm management for all disciplines
from here access can be granted to video verification or it can be
granted based on number plate recognition. This is one of the
many functionalities within iProtect™ Aurora. The complete
➎ Intercom
integration with the other iProtect™ Aurora modules guarantees
The Intercom module is part of Keyprocessor’s integrated
that for example in transaction overviews the correct video
security solution. This allows you to control and switch to the
images of the surveillance cameras are displayed. Within a few
correct camera images for an intercom call. There is also the
seconds camera shots of a specific event can be displayed, for
option to visualize the location on the interactive floor plans
example if someone has used a stolen card, if there is an intruder
and to have these fully included in the unique alarm handler of
alarm or verification request.
the iProtect™ Aurora Security Management System.
YOUR PARTNER IN THE FIELD OF ALL IP SECURITY SOLUTIONS
Power over Ethernet
➏ Parking Management
Open standards create flexibility
This module offers extensive functionality for company parking.
iProtect™ Aurora can be very flexibly integrated with systems
Because of the module’s scope for allocating parking spaces in
and applications from third parties. Keyprocessor has based
blocks, iProtect™ Aurora is also extremely well suited for use
iProtect™ Aurora on open standards such as TCP/IP, JDBC, JSP
with shared commercial buildings. In this way, the parking space
and XML. One advantage of using these open standards is
actually used can be charged to the appropriate tenant. In addition,
that links can be made quickly and easily with the databases
the module offers ‘paid access’, the option of introducing paid
of other applications such as personnel information, building
parking in your car park, with or without a ticket machine.
administration, and the like.
Intercom with 16kHz techniques
➐ Time Registration
In-house development
Keyprocessor develops both its hardware and software in house.
Owing to our many years of expertise in the security field, we
can support iProtect™ Aurora users with expert advice. Our user
The time registration module is used to register the hours. Start
support is twofold. We are able to assist the project planning
and end times are recorded and the hours absent are specified.
and provide technical guidance when a proper security system
This gives you detailed information about the work hours
is being set up, and we can provide training and consultancy
accounted for by employees. The time registration module can
related to the system’s use.
easily deal with a number of different collective labour agreements
and different shifts. The different hourly employee contracts are
also taken into account (0 hours, part timers and full timers).
The time registration system is able to process data from a staff
information system.
8822-E
Paasheuvelweg 20 - 1105 BJ Amsterdam Zuid Oost - The Netherlands - T +31 (0)20 462 07 00 - F +31 (0)20 462 07 99 ccc@keyprocessor.com - www.keyprocessor.com