Combined With Non-host Dependant, Fully Distributed Processing Controllers, WinDSX Provides Total Access Control
Combined With Non-host Dependant, Fully Distributed Processing Controllers, WinDSX Provides Total Access Control

WinDSX is a powerful access control and system monitoring application that harnesses the power of the Windows XP, Vista, and 7 Professional™ operating systems. WinDSX combines point monitoring and access control with Photo ID Badging, Time and Attendance, Alarm Graphics, DVR/NVR Integration, Elevator Control, Alarm Email/Text Message Notification, Threat Level Management, HazMat / Emergency Lockdown, and FIPS/TWIC card compatibility.WinDSX can support your access control needs from a single PC or multi-user Local Area Network to an enterprise solution with SQL Server as the database engine. The system utilizes TCP/IP network communications to provide user interaction and real time monitoring to the workstation PC’s located anywhere on the LAN or WAN. Password protection allows for operator specific capabilities at each workstation.There are two Editions of Software. WinDSX comes standard with a Microsoft Access database engine. WinDSX SQL is designed to work with Microsoft SQL Server as the database engine. Both editions of WinDSX have similar features and capabilities. Microsoft SQL Server is user supplied.WinDSX implements Point and Click operation with hierarchical tree views and pop up menus for ease of use. I/O monitoring and control is achieved through animated icons that depict the real time status of each input or output. I/O points can also be assigned to an Override Group to allow for multiple inputs and outputs to be monitored and controlled from a single icon.Scheduled Overrides can be assigned to individual Inputs and Outputs as well as Override Groups. These schedules allow operators to quickly assign time and date sensitive instructions determining the open/secure status of outputs and the armed state of inputs.

Add to Compare

Browse Access control systems & kits

Access control systems & kits - Expert commentary

Providing Fast and Secure Access in Life-Threatening Emergencies
Providing Fast and Secure Access in Life-Threatening Emergencies

A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those precious minutes before an ambulance arrives. There are currently over 10,000 in the UK, located in parks, offices, high streets and sporting venues, and they are especially popular in rural communities, where ambulance response times are longer. Every second counts Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or locked. Leaving them open could lead to theft, vandalism or misuse. Leaving them locked could mean that precious moments are lost waiting for a local guardian to arrive – and could even cost a life. To save as many lives as possible, it’s clear that PADs need to be available 24/7, fully operational and easily accessible to users and local guardians. But there is a solution that can meet all these conditions – a lock that can protect against vandalism while providing convenient instant access when required. Life-saving solutions Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or lockedDigital locks are ideal for securing PADs because they don’t require a key, and anyone can be given access over the phone. In the case of a cardiac arrest, the user calls 999 and the ambulance controller provides them with a simple, easy-to-remember code. The ambulance controller can then advise them, step by step, what to do. Local guardians, who have responsibility for the PAD, can be provided with an override key to enable them to monitor and maintain the defibrillator. The PAD cabinets built by Duchy Defibrillators show exactly how this works in practice. Based in rural Cornwall, Duchy Defibrillators manufactures, supplies and installs monitored PAD cabinets. To provide public access to the defibrillators, it needed a lock that could keep its cabinets secure, make them easily accessible and withstand the stormy Cornish weather. Codelocks recommended a digital electronic lock that could operate on a standalone battery, making it especially suitable for remote areas. As well as offering flexible access, digital locks come with a range of varying options and functions to suit different applications. As Duchy Defibrillator cabinets are installed in a wide variety of locations and sometimes need to withstand outdoor exposure, it opted for a robust electronic digital lock that is both affordable and easy to set up. A digital-access revolution Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end-users The example of Duchy Defibrillators shows how digital locks can be used to keep defibrillator cabinets secure while affording instant access to users when they are needed. But the flexibility of digital locks also makes them suitable for securing property and equipment in a wide variety of situations, especially for shared and public facilities. This is why you’ll increasingly see digital locks used to secure restricted areas in hospitals, schools and offices, as well as shared facilities like hotel and gym lockers, public restrooms and more. Digital locks are available for a number of specific applications, including doors, lockers and cabinets. They can range from simple mechanical locks through to more sophisticated electronic locks and state-of-the-art smart locks. Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end users – making them very popular for contactless entry and with facilities managers that need to manage access to buildings and campuses. One thing is certain – whatever your access control requirements are, there’s a keyless lock solution to suit. The digital access revolution is here.

The New Marriage Between AI and Stadiums
The New Marriage Between AI and Stadiums

Stadiums around the world are still paralyzed from the effects of COVID-19. Fans and spectators in masses have been absent from stadiums since April and there doesn’t seem to be a concrete plan on how or when they’ll be able to return to near capacity. The NBA recently opted to form a bubble philosophy concept in Disney’s facilities, although it’s been a relative success, it’s also been a $200 million temporary solution. This then begs the question: How long can stadiums survive like this without spectator’s present? History tells us that stadiums, venues and sport recover from disasters, so what can stadiums do to speed up the process? This is the catalyst for AI to be integrated on mass level to stadiums around the world. AI is the answer AI’s role in getting fans and spectators back is huge, through capabilities such as: Social Distance Monitoring Crowd Scanning/Metrics Facial Recognition Fever Detection Track & Trace Providing Behavioural Analytics Technologies such as IREX.ai is now working alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. Stadiums around the world are still paralyzed from the effects of COVID-19 AI surveillance software such as IREX.ai when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. Crowd metrics Arming stadiums with AI-powered surveillance tools can detect crowd metrics such as “people counting” and “group statistics”. This ensures stadium personnel can monitor social distancing with precision, accuracy and immediately. Alerts can be set up throughout parts of the stadium to alert senior staff members when overcrowding can appear with real time videos, analytics and photos to their hand-held device, such as a smartphone. Fever detection Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures. What IREX.ai implements is an alert system, coupled with facial recognition of any individual(s) that read an elevated body temperature. This alert system then provides security and health officials with a photo of the individual with the elevated body temperature, meaning staff can react quicker to the situation prevent this individual from entry. Pandemic monitoring by facial recognition  Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures Through facial recognition, staff members will be able to locate individuals through simply uploading a photo. It has never been easier to find a person of interest. With masks becoming an everyday part of society, facial recognition has come under scrutiny regarding the accuracy when a mask is worn. Irex.ai still maintains a 96% accuracy with individuals wearing masks and can set up alerts for any individuals not wearing a mask. Another important aspect of facial recognition is finding persons of interest quickly through technology like IREX.ai’s “searchveillance”. The future is here. Designated staff can track a person from when they enter the stadium by simply uploading their photograph. An example of how this can assist stadium personnel is to help relocate lost children inside the stadium with their guardians/parents when they are separated. Another attribute would be any individuals banned from entering the stadium would trigger alerts once they appear under surveillance, a fantastic collaborative tool to use with Law Enforcement.    Return on investment With security solutions, one of the biggest issues with any security investment is a lack of an ROI. This is where AI security is breaking the mould. The ability to provide business analytics, consumer/fan behaviours, traffic patterns, etc, allows other departments within the organization to gain vital information that can assist with their strategies and practices. Stadium security will never be the same in a post-COVID world, so why will its practices stay the same? AI & Stadiums is no longer the future, it’s the 2020 solution.

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

Latest DSX Access Systems, Inc. news

OnSSI’s Ocularis 5.0 And C2P Integration Enhances Security Systems
OnSSI’s Ocularis 5.0 And C2P Integration Enhances Security Systems

On the heels of the release of Ocularis 5.0, OnSSI has now announced the introduction of several new technology integrations for its recently released VMS with C2P’s software solution. Ocularis 5.0, which is based on a new recorder, maximizes HDD storage effectiveness with dynamic data management for automatic storage load balancing, End-to-End 256 bit AES Encryption and edge recording support. The newly certified integrations with Ocularis 5.0, provide security professionals with valuable situational information across a wide range of applications including banking, access control, asset tracking, license plate recognition and point-of-sale. “The correlation of video and data creates an extremely effective and intelligent security solution,” said Ken LaMarca, VP of Sales and Marketing, OnSSI. “Ocularis’ open architecture not only makes this integration possible, it results in a powerful tool that meets a variety of demanding applications and delivers comprehensive intelligence across multiple platforms. Most important, beyond the power of these integrations, the systems provide vital information, better enabling the operators to assess emerging situations and provide them with information to choose an appropriate course of action.” Details On These Integrations Are As Follows: Banking Integrations with Diebold and Fiserv for teller terminals and ATM deployments allow for TCP/IP text and/or events to be streamed live directly to Ocularis in the form of JPEG images. The TCP/IP data is also stored as texts for forensic searches afterwards. All banking transactions are time synchronized with area video surveillance in real-time and includes real-time charting of specific events. Access Control These integrations with Axis, DMP, DSX, FST21, Hirsch, ISONAS, Keri Systems, Keyscan, and RBH provide for real-time access control activity and user defined, real-time on-screen event annotation. The seamless integration with OnSSI provides real-time analytics which enables users to define rules based on the text received from the access control system. These rules are then used to engage the full power of the Ocularis Event Fusion engine to push video of the event to predefined client screens, lock/unlock doors, blow horns, turn PTZs, send email and SMS alerts, etc. The C2P framework also includes a powerful text search tool, linking all texts received from the access control system with stored surveillance video. Reports are available for export as CSV files and also as video evidence. Asset Tracking Traditional asset tracking is enhanced by this integration, allowing users of Visonic RFID or generic bar code readers to see real-time onscreen notifications of asset activity, as well as email and SMS alerts. The information can be exported for video evidence or as a CSV file for reporting purposes. License Plate Recognition This LPR integration with ELSAG, HTS, Inex/Zamir, Mango, PlateSmart and Vigilant Solutions provides users with real-time onscreen confirmation of LPR activities, the ability to graph specific events, and time synchronization of all license plate reads with area surveillance video. Onscreen event connotation, email and SMS alerts, a powerful search tool for all LPR text, and stored video are included. Exports include reports as a CSV file or video evidence. Point-Of-Sale Integrations with IBM RMS, LOC, Micros, NCR Radiant, and POSitouch provide for all POS transactions to be time-synchronized with all Ocularis surveillance video. Real-time features include onscreen POS terminal activity, time graphing of specific events and POS transaction analytics enabling users to quickly find activities of interest. User-defined event annotation via onscreen messaging and push video, email and SMS alerts are also included. Video evidence can easily be exported as CSV files or displayed onscreen as a camera view. “Working with OnSSI to accomplish this integration has been a smooth and positive experience thanks to the open architecture of Ocularis 5.0,” said Paul Eaton, President and CTO, C2P. “The solution efficiently addresses the complexities of bringing together video and data for highly effective use in security applications.”

DSX And Integrated Biometrics Partner To Provide Access Control Solutions
DSX And Integrated Biometrics Partner To Provide Access Control Solutions

Integrated Biometrics' TRU650 biometric fingerprint readerDSX and Integrated Biometrics have partnered to seamlessly integrate the TRU650 biometric fingerprint reader with the DSX enterprise access control system. Scott Bennett, DSX National Sales Manager said: "DSX Access Systems has selected Integrated Biometrics' TRU650 as our biometric reader of choice." "The ease of use, easy installation and enrolment, virtually non-existent rejection rate, clean aesthetics and great product support, we believe, will provide our dealers with the biometric device that they have been searching for."DSX dealer Arthur Van Zant said: "This is the only biometric solution we will offer to our customers. It does what it is designed to do, it does it well, and it does it every time. The authentication is fast and accurate, and we are very pleased with the equipment, the software, and the company that stands behind it." These endorsements illustrate the unparalleled usability and security of Integrated Biometrics' Light Emitting Sensor fingerprint imaging technology. LES has enabled the TRU650 to overcome problems common with competing products, satisfy customers and deliver profits for DSX dealers.

Avigilon's Control Center Software Integrates With Other Security Management Systems
Avigilon's Control Center Software Integrates With Other Security Management Systems

Avigilon's surveillance software, Control Center's open architecture enables effective interoperabilityAvigilon, the performance and value leader in high definition (HD) and megapixel video surveillance systems, announced at IFSEC 2010 that its award-winning Avigilon Control Center software has been integrated successfully with the industry's leading access control, critical communication, alarm monitoring, intrusion detection, and visitor management systems. Avigilon Control Center now combines the powerful engine of the leading high definition video platform with third party access control and intrusion detection capabilities for improved security management.Expanded partnerships ensure interoperabilityAvigilon Control Center includes a number of integration options that enable the exchange of high definition, IP-based and analog surveillance video with events between Avigilon Control Center and other physical security systems. Avigilon Control Center integrations associate HD and other video information with relevant security events such as forced doors, ID badge swipes, and intercom activation to deliver immediate verification and improved security management.Avigilon Control Center capabilities have now been expanded to integrate with Cardax FT Command Center security management system; GE Facility Commander security management system; RS2 Technologies access management solution; and DSX WinDSX access control software. With the next release, scheduled to be available in Q2 2010, Avigilon Control Center will also integrate with the Stentofon IP intercom management system. As an existing member of the Lenel OpenAccess Alliance Programme, Avigilon is certified to integrate with the OnGuard solution. Avigilon Control Center combines high definition video platform with third party access control and intrusion detection capabilitiesAvigilon Control Center Alarm MonitoringIntegration with third party access control platforms is enhanced by Avigilon Control Center's alarm monitoring feature, which allows the creation of complete end-to-end workflows for the monitoring, assignment, and acknowledgement of alarms. Alarms can be triggered by any internal system event as well as external triggers from third party access control and building management systems. Alarms can be assigned to specific individuals, ranked by priority, and automatically trigger actions on acknowledgement. The Avigilon Control Center Rules Engine presents an effective alternative to hardware switches passing alarms and event notices to third-party devices."The extended flexibility and openness of Avigilon Control Center will enable security professionals to manage integrated security and facility management systems that leverage existing infrastructure and personnel investments," said Dave Tynan, Vice President of global sales and marketing at Avigilon. "These integrations facilitate the association of HD video for immediate confirmation of indisputable details from video to manage alarms effectively, dramatically improve decision making, and effectively deploy resources."Avigilon Control Center Network Video ManagementThe award-winning, enterprise-class Network Video Management platform, Avigilon Control Center was engineered from the ground up to intelligently manage HD video, delivering both situational awareness and complete image detail. Avigilon Control Center captures, transmits, manages, stores, archives, plays back, and exports HD video while efficiently handling bandwidth and storage. Control Center's modular, open architecture allows system designers to integrate Avigilon solutions with existing assets including analog and IP cameras, access control and other intrusion systems. In 2010, Avigilon Control Center won the Frost & Sullivan Surveillance New Product Innovation of the Year award.

Related white papers

11 Considerations For Embedded System RFID Readers

Beyond Security - Access Control For Multi-Tenant Sites

Access Control & Intelligent Vehicle Screening