1 / 47

Enterprise Security 2.2

Enterprise Security 2.2. New Features New Products How to Order. December 12, 2011. Agenda. New Enterprise Security 2.2 Features Integrated Photo ID Video Integration Enhancements Remote I/O Appliance Configuration Threat Management Door Override Schedules Door Override Inputs

gram
Download Presentation

Enterprise Security 2.2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enterprise Security 2.2 New Features New Products How to Order December 12, 2011

  2. Agenda • New Enterprise Security 2.2 Features • Integrated Photo ID • Video Integration Enhancements • Remote I/O Appliance Configuration • Threat Management • Door Override Schedules • Door Override Inputs • New Products • Photo ID Printer and Accessories • Digital camera and Accessories • How to order

  3. Integrated Photo ID

  4. Integrated Photo ID features/benefits

  5. Create Badge Templates • HID Asure ID software is used to create badge templates and print badges. The software must be licensed for each station used for printing badges. • HID software is available through Vykon. If a customer has existing HID Asure ID Exchange, they may use their existing software.

  6. Import Badge Templates Badge Templates are imported from the HID database and managed by the Enterprise Security Supervisor

  7. Configure Templates Badge Template data fields are linked to fields in the Enterprise Security Database

  8. Import or Capture Photo Import or Capture Photos From Personnel Entry View Crop Photos by freehand, or select an aspect ratio

  9. Print Badges Print Preview Rebennack Roger

  10. Photo ID Viewer Compare photo of person presenting badge with live video

  11. Photo Display from Alarm Page Display Photo from Alarm Details

  12. Photo ID Licensing * HID Asure ID Exchange software must be at version 7 Examples: Customer requires 2 Photo ID Stations with photo capture and printing capabilities. Purchase (2) DR-SEC-S-ASURE and (2) SEC-ASURE-ID licenses. Customer has HID Asure ID Exchange software installed for 3 Photo ID Stations with photo capture and printing capabilities. Purchase (3) DR-SEC-S-ASURE licenses. Customer wants to import photos and display them with personnel records and recall them from alarm and report views. No printing or photo capture is required. Purchase (1) DR-SEC-S-ASURE license. (Only one license per server required for this functionality.)

  13. Video Integration Enhancements

  14. Configure Video from the Appliance Workbench programming is no longer needed to set up video networks and cameras.

  15. Video Display on Alarm Option to enable automatic display of video on alarm. Option is enabled on a per user basis.

  16. New Alarm Console Options • Enable Automatic Alarm Console Pop-up option on a per user basis. Display options include: • Console • Instructions • Console and Instructions • Console and Playback • Console Live and Playback • Console, Instructions, Live and Playback • Live • Playback • Live and Playback*Live and Playback refer to video display for most current alarm

  17. Remote IO-16-485 Configuration • IO-16-485 modules (8 universal inputs, 4 form A relay outputs, and 4 0-10V analog outputs) can now be configured using the security appliance. • Monitor temperatures and other points using the security JACE platform. • Control Lighting, HVAC, or other BAS points – easy integration with no additional licenses required! • Requires one port on an NPB-2X-485 card. • Maximum of 4 modules may be added to the SEC-J-601. (Remote IO-16-485 modules are not supported on the SEC-J-201 platform)

  18. Remote IO-16-485 Configuration • Configure Network • *COM3 is default for SmartKey Network • COM4 is the 2nd port on the NPB-2X-485 card. Use trunk 2 for the NRIO (trunk 1 is the access network) • Configure Points • Select Point Type, Alarm Limits • Link to and From other Points • Set Alarm classes • Set Video actions

  19. Threat Level Management The growing threat of terrorism and school violence have created a demand for security systems that can respond quickly to emergencies and help protect building occupants.

  20. Threat Level Management Threat Level management provides a way to quickly initiate broad scale changes to building access based on one or more predefined “Threat Levels” and facility “Threat Level Groups”. Authorized persons can use the application interface, an activation badge, or emergency station to change the active level in response to a situation that requires a change to the scheduled access requirements for one or more specific facility areas.

  21. Threat Levels / Priorities Threat Levels –Enterprise Security is set up with 3 default Threat Levels (Priorities) – Low (0), Normal (5), and High (10). These levels can be renamed, deleted, or supplemented with additional levels up to a maximum of 255 levels. Generally each successively higher level priority is more restrictive.

  22. Threat Level Groups • Threat Level Groups include: • Activation Badges • Activation Badges are special badges that are used to activate a specific Threat Level priority for a specific Threat Level Group. • Threat Level Access Rights • Access Rights may be assigned to only one Threat Level Group. A Threat Level Priority is assigned to each access right. The Access right be active depending on the Active Threat Level and the specified action assigned: • Normal: Access Right is active when Active level is less than or equal to the assigned Threat Level Priority. • Specific: Access Right is active at a specific Threat Level • Reverse: Access Right is active when Active level is greater than or equal to the assigned Threat Level Priority.

  23. Threat Level Groups (cont.) • Activation Inputs (digital inputs) • Activation inputs are physical inputs assigned to a Threat Level Group. When activated, the input sets the Threat Level Group to a specific Threat Level. Activation inputs are programmed at the JACE. • Activation Outputs (digital outputs) • Activation outputs are relay outputs assigned to a Threat Level Group. The output is set to activate at a certain Threat Level. When the Threat Level is equal to or greater than the assigned Threat Level, the output is activated. Activation outputs are programmed at the JACE.

  24. Threat Level Groups (cont.) • Door Locks may be overridden based on Threat Level. • Reader configuration may be changed based on Threat Level.

  25. Threat Level Groups (cont.) Access Access Access Access Access Parent Hierarchical Design A Threat Level may be set up as subordinate or Child to another Threat Level (Parent). This allows a single activation at the Parent to activate several Child groups. All changes at the Parent are pushed to the Child groups. Changes may be made at the Child group, but these changes are not pushed up to the Parent. Control Control Control Control Control Child Child Child Child

  26. Door Override Schedule • Door override schedules allow you to schedule a specific door without disrupting the permanent door schedule assignment. This is useful when a group of doors has a common schedule, but the user only wants to override a single door.

  27. Door Unlock Input • Door override inputs may be added to any security module or JACE. • A list of door strikes may be assigned to the input. • Override may be reset using the input or by commanding • Useful for unlocking large numbers of doors quickly based on a physical input or manual override.

  28. New Products

  29. New Products - FARGO® DTC4500

  30. FARGO® DTC4500 Benefits • High Capacity for higher efficiency • Unique dual-input card hoppers (200 cards) • High image count ribbons • Quick change ink cartridges • Simple connectivity with printing and encoding through one USB or Ethernet connection • USB and Ethernet standard • Modular design to expand functionality as needs grow • Secure card printing • Standard printer password protection • UV printing for cost effective dynamic card security • Lamination for increased card security and durability • Guaranteed with a two year warranty • Including On-Call Express for the first year (US only)

  31. FARGO® DTC4500 Versatility Dual-Sided Single-Sided Technology Card Upgrades Dual-Sided with Lamination

  32. New Products – Digital Camera and Background Screen • Digital camera – 720p, 5 MP camera for quick photo capture and download. • Camera Tripod • Background Screen and stand for professional looking photos. Everything you need for professional results

  33. Printers and Field Upgrades

  34. Ink Cartridges

  35. Print Head, Cleaning Supplies, Photography Equipment

  36. Enterprise Security – Base Server SoftwareNo Change in Part Numbers/Pricing

  37. Enterprise Security – Reader PacksNo Change in Part Numbers/Pricing

  38. Enterprise Security – Upgrade PartsNo Change in Part Numbers/Pricing

  39. Enterprise Security – Video Drivers

  40. Enterprise Security – Photo ID Drivers

  41. Security JACEs and Accessories No Change in Part Numbers/Pricing See the Vykon Price list for a full listing of Card Readers, Keypads, and Credentials

  42. Security JACE Enclosures No Change in Part Numbers/Pricing

  43. JACE Video Drivers SEC-J-601, J-600, J-602-xx, J-700 16 cameras maximum per JACE

  44. SEC-J-601 BAS Drivers Building Integration on a Single Platform – No one else does this! Licenses reduce reader count to 16 readers per JACE

  45. Security Revision Upgrades New Parts and Pricing

  46. Contact Information • Sales: • Roger Rebennack roger.rebennack@honeywell.com • Technical: • Richard Boglerichard.bogle@honeywell.com • Product Management: • Laura Kevittlaura.kevitt@vykon.com

  47. www.Vykon.com

More Related