Integrated and Managed Access Control
Integrated and Managed Access Control Solutions that provide Effective Security
and Value
PSI’s integrated video surveillance and access control solutions offer comprehensive
security that leverage IP
camera technology, network video recorders, premise and cloud access
control integrated with intelligent analytics that result in more effective
security, optimum quality
and most importantly critical and useful information that insure maximum
safety and control of your facilities. Our highly
skilled experts in digital; video, network infrastructure, surveillance
and access control systems allow us to design, deploy and maintain customized system that
meet your unique security needs. By using hybrid technology we can
leverage your current security infrastructure while
integrating effective surveillance and access control technology.
The greatest challenge – and the greatest opportunity – in security today is integration. By integrating all security assets such as intrusion detection, access control, video and telephone entry into one common platform, users can interface with just one system, for greater simplicity and optimum control. But where does integration begin? Well, consider access control. It’s at the center of the security universe. It’s where security meets people and permissions. And it’s the building block upon which to add other systems to make a robust security solution.
More Control at The Door
Start with the simple access
control card. In an integrated system, it can do so much more than just
enable access. The card is the key that opens the security integration
universe to enable such assets as intrusion alarm panel monitoring,
guard tours, visitor management and more.
PSI offers solutions that integrates with alarm panels and can set
permissions to allow authorized cardholders to disarm the alarm system
simply by presenting their card to a reader. In some cases, the card
reader will have an integrated keypad for dual authentication. In those
instances, the system can be armed with the touch of a button on the
reader keypad and by presenting a card to the reader. When using a the
alarm system can also be armed by double or triple swiping the card at
the reader. * And the system can notify the user at the reader
level whether the alarm system is armed or disarmed. Our solution
supports single or multiple alarm partitions. Permission can be assigned
to any partition, combination of partitions, or the whole system. In
each partition, the zones can be assigned to groups enabling different
levels of partial arming/disarming in each partition. Alarm system
programming can be done through any keypad or remotely using a virtual
keypad as described below.
Our Solution puts control in the user’s hands.
The User Experience
Alarm events can be combined into
one easy-to-use graphical user interface. Our solution uses a virtual
alarm keypad which makes it easy for you to arm and disarm the alarm
panel and to configure it in the same way as if it were an actual
physical keypad. All controlled from the desktop application. You can
use the mouse to click on any buttons on the virtual keypad as if you
were using a standard keypad. You can also use the computer keyboard to
simulate pressing keypad buttons. The virtual keypad is easy to install
and does not require any special alarm panel settings.
The access control and alarm panels share data that is recorded on the
system. This makes it is easy to link alarm events such as “motion in
alarm” with the access control system.
Enabling, arming, disarming, programming, viewing…one card does it all.
Monitor, Investigate and Report
Not only do the access panels and intrusion alarm panels talk to each other, the events can be seen on live interactive floor plans on the desktop. Access and intrusion events can be set to trigger visual and audible indication in real-time. These triggers will provide information such as cardholder name/photo, alarm status and the type of event (e.g. window open). See who is arming and disarming the alarm system and make sure that they are authorized to do so.
Our solutions provides a built-in report generator allows users to apply
filters such as door name, cardholder, time, and event type. Reports can
be either manually or automatically generated and can be sent via e-mail
to an administrator to view on their desktop or on a mobile device.
Information delivered when it’s needed, how it’s needed.
Identifiction/Automation
Now that we have control, let’s talk about enhanced capability within the security solution. Real-time monitoring capability is a response to the growing importance of video in access control systems. Integration with Exacqvision, American Dynamics HDVR, VideoEdge NVR*, ADTVR Series and Intellex Digital Video Management Systems provides real-time video monitoring as well as video playback. Access control alarms such as “door forced open” can be attached to the associated video for quick playback. Recorded video of up to 16 cameras can be simultaneously viewed. Presets, sequences, dome control and 1x1, 2x2, 3x3, and 4x4 views are available through the software. Cameras can be called up directly from a floor plan simply by double-clicking on the camera or dome icon. Operators can configure viewing parameters for digital video applications through a user interface.
Video gives the ‘who’ to go along with the ‘what’, ‘when’ and ‘where’.
Combinding Security and Communications
Apartment, condominium and office buildings are just a few of the applications where a combination of security and communications are required for controlling resident and visitor traffic. The Telephone Entry System (KTES) delivers a fully integrated telephone entry and access control solution. The KTES provides visitor/resident registration, tracking and reporting. A simplified version of the access control software is included and allows for fast configuration and firmware updates, live transaction monitoring, detailed event logs and system backup. The KTES uses a touch tone phone style keypad that offers both familiarity and ease of use. Two-way audio is built-in and video verification can be integrated to enhance the solution.
Manage the flow of traffic in, around and through the premises with KTES.
AFFORDABLE MANAGED ACCESS CONTROL
Being responsible for your company’s security is no trivial matter.
Protecting people and property, preventing incidents and criminal
activity, and observing and reporting on suspicious activities are all
in the job description. Backing up servers, updating applications,
configuring hardware…well, those may be in the job description also…but
they don’t have to be.
PSIshield helps you improve security and provide employees with peace of
mind, without the hassles of administering, maintaining and if
applicable hosting your own access control.
PSIshield MAC
is a range of access control solutions,
ranging from a hosted model which empowers companies to remotely control
their own security tasks in real-time via the Internet, to a managed
solution which turns over select security responsibilities to PSI, to
somewhere in between.
E-mail: info@psiits.com