iProtect aurora
Transcription
iProtect aurora
iProtect Aurora TM YOUR PARTNER IN THE FIELD OF ALL IP SECURITY SOLUTIONS iProtect™Aurora: High End Security Management In 2001 Keyprocessor B.V. was the first company to launch an entirely web based security management system. Over time the iProtect™ Security Management System has evolved into a fully fledged security system with fully integrated access control, camera surveillance, intrusion detection, personal protection, parking management, intercom and time registration. Keyprocessor B.V. is committed to innovation and is always in search cannot manipulate the security system. In combination with DESFire of technological breakthroughs. As a result Keyprocessor B.V. is cards and the new generation of card readers you can rest assured now introducing the next generation Security Management that your security management system is optimally protected. System: iProtect™ Aurora. End to End Security Security often fragmented Users who prefer an electronic security system are usually Given the fact that security systems currently form an integral confronted with the choice of separate system solutions. part of the ICT network, data flow security needs to be optimized. Whether it is about access management, intrusion detection or With an access control system, the data flow starts with the camera surveillance: from an organisational point of view for a reading of the smart card, and ends at the web client, which is company these are all the same type of security issues. Because where the system is controlled. Securing applications from the of this fragmented approach users are often confronted with source to the end point is called ‘end to end security’. Hackers inefficient and expensive security management. Manage 7 disciplines with just 1 security system Complete and location independent Multi-site applications iProtect™ Aurora offers the solution for a highly reliable and iProtect™ Aurora is extremely well suited for multi-site applications; fully integrated security management system. This is achieved by several offices or branches can be managed centrally using just the integrated management of access control, camera surveillance, one iProtect™ Aurora system. Thanks to the use of TCP/IP intrusion detection, time & attendance, parking management, communication, practically every connection between the intercom and people protection. iProtect™ Aurora is web based, various locations is possible: the possibilities range from LAN which means that all screens are presented as web pages (in HTML) to WAN and include the use of ADSL, ISDN and UMTS. by, among other programmes, Internet Explorer. This obviates the need for user software to be installed locally, as a result of which the user enjoys considerable cost savings. Moreover, Integrated Intelligent Video Analysis thanks to the use of web techniques, iProtect™ Aurora is fully location-independent. System administration can be carried out from any workstation, anywhere in the world. Unique report generator Good reporting is important. That’s why iProtect™ Aurora offers extensive possibilities in this area. Reports are easy to compile End to End Security with the help of the unique report generator and are presented in a clear, well organised style. Their PDF format makes the reports easy to save, and they can be filed, printed or e-mailed iProtect™ Aurora offers comprehensive security for: - Access control later as required. - Camera surveillance Buffering - Intrusion detection Running a system that is capable of losing transactions is not - People protection acceptable. This is why the Polyx network controller provides - Intercom 100% certainty that the buffered transactions actually reach - Parking management the exchange. Also the Polyx has a facility for connecting an - Time & attendance emergency power battery so that under all circumstances operational reliability is guaranteed. Safe workstation management All the data traffic between the iProtect™ Aurora system hub and the workstations is encrypted by means of Secure Socket Personal user interface for employees Layer (SSL). Intelligent data encryption is used, which makes the PoE / PoE+ likelihood of someone hacking into the encrypted information Power over Ethernet or PoE is an emerging technology for minimal. This is the standard for secure communication over supplying power and data over a standard UTP cable in an the internet. The most secure websites, such as e-banking and Ethernet network. This technology is used to supply power to e-commerce sites, use SSL. In addition iProtect™ Aurora now the network devices, and within our security concept these also provides the ‘My iProtect’ functionality which means that would be the video cameras and network controller (and from all employees can be given their own personal user interface. here the card readers and locks). ➊ Access Control ➌ Intrusion Detection Extensive access management for up to 100,000 users. Standard This module provides the administration of one or more security features include attendance registration, I/O management, alarm keypads. Integration with access control, among other functionalities, handler, interactive maps and visitor registration. The integration can prevent false alarms and intrusion reports are verified of the iProtect™ Keybadge software module is optional; with immediately with video upon each event (transaction). this module cards can be personalised in-company with a passport photo, logo and texts. By using the Polyx network controller the iProtect™ Aurora can combine an alarm group that is based communication between the card readers and the central server on various alarm points for a specific group of people. These largely takes place over IP. Because of the unique and encrypted alarm groups can also be bundled into a collection that can be communication between these field components, there are collectively switched on and off. The different alarm points and substantial savings on cables and installation costs and the ‘end groups, in combination with the corresponding status, can be to end security’ concept applied by Keyprocessor is easily realised. visualised on the interactive floor plan. Furthermore, because of the way the Polyx has been designed, Keyprocessor can also focus on the energy consumption. The ➍ People Protection Polyx has an energy consumption of 1.5W, which is definitely a iProtect™ Aurora people protection ensures proper alarm very low energy consumption. registration. By means of active tags, iProtect™ Aurora knows ➋ Camera Surveillance A further option we provide is the configuration of a camera exactly which individuals are located in specific areas and in the event of an alarm, iProtect™ Aurora can initiate the right processes (such as camera observation) and generate reports. observation and registration system, fully IP based. The surveillance camera images are permanently displayed at reception and Alarm management for all disciplines from here access can be granted to video verification or it can be granted based on number plate recognition. This is one of the many functionalities within iProtect™ Aurora. The complete ➎ Intercom integration with the other iProtect™ Aurora modules guarantees The Intercom module is part of Keyprocessor’s integrated that for example in transaction overviews the correct video security solution. This allows you to control and switch to the images of the surveillance cameras are displayed. Within a few correct camera images for an intercom call. There is also the seconds camera shots of a specific event can be displayed, for option to visualize the location on the interactive floor plans example if someone has used a stolen card, if there is an intruder and to have these fully included in the unique alarm handler of alarm or verification request. the iProtect™ Aurora Security Management System. YOUR PARTNER IN THE FIELD OF ALL IP SECURITY SOLUTIONS Power over Ethernet ➏ Parking Management Open standards create flexibility This module offers extensive functionality for company parking. iProtect™ Aurora can be very flexibly integrated with systems Because of the module’s scope for allocating parking spaces in and applications from third parties. Keyprocessor has based blocks, iProtect™ Aurora is also extremely well suited for use iProtect™ Aurora on open standards such as TCP/IP, JDBC, JSP with shared commercial buildings. In this way, the parking space and XML. One advantage of using these open standards is actually used can be charged to the appropriate tenant. In addition, that links can be made quickly and easily with the databases the module offers ‘paid access’, the option of introducing paid of other applications such as personnel information, building parking in your car park, with or without a ticket machine. administration, and the like. Intercom with 16kHz techniques ➐ Time Registration In-house development Keyprocessor develops both its hardware and software in house. Owing to our many years of expertise in the security field, we can support iProtect™ Aurora users with expert advice. Our user The time registration module is used to register the hours. Start support is twofold. We are able to assist the project planning and end times are recorded and the hours absent are specified. and provide technical guidance when a proper security system This gives you detailed information about the work hours is being set up, and we can provide training and consultancy accounted for by employees. The time registration module can related to the system’s use. easily deal with a number of different collective labour agreements and different shifts. The different hourly employee contracts are also taken into account (0 hours, part timers and full timers). The time registration system is able to process data from a staff information system. 8822-E Paasheuvelweg 20 - 1105 BJ Amsterdam Zuid Oost - The Netherlands - T +31 (0)20 462 07 00 - F +31 (0)20 462 07 99 ccc@keyprocessor.com - www.keyprocessor.com