TDSi’s Comprehensive Product Range Features Extensive Integration And Network Capabilities
TDSi’s Comprehensive Product Range Features Extensive Integration And Network Capabilities

TDSi's extensive suite of products has been designed with integration and network capability to the forefront, with IP connectivity a standard feature across the range.Amongst the company's most recent product developments are the addition of an IP option to the proven MICROgarde range and an updated version of the access management software system, EXgarde PRO, which provides powerful integration capability.MICROgarde IPMICROgarde IP is a powerful addition to TDSi's range of controllers.  Available for both one and two door controller options, this product offers all the functionality of the established MICROgarde system - with the added benefit of being able to be directly connected to a LAN or WAN.MICROgarde offers an extremely cost-effective, entry level controller, containing many of the features that would ordinarily only be found in much larger, more expensive systems. Operating with TDSi or third party readers, the system has an operational capacity of 5,000 card holders and is capable of supporting up to 400 doors - as well as controlling the automatic release of fire doors, upon an active input.Featuring distributed intelligence, MICROgarde controllers can operate as a fully integrated part of a system network, providing users with full control and event reporting - which may be customised to suit specific needs.Integration Capability with EXgarde PROEXgarde PRO is TDSi's market-leading, fully featured access management software application that delivers a wide range of functionality through a user-friendly interface.The new version, V3, offers unparalleled integration capabilities, providing users with a flexible and dynamic platform and the ability for complete building and security management.Through the use of a suite of database tools, EXgarde PRO delivers seamless integration with a wide range of proprietary and bespoke systems - such as Schools Information Management Systems, HR, Payroll, Time and Attendance, CCTV, Fire, Intruder and One-card software applications, offering the potential for considerable resource savings, in both time and cost.Powerful and versatile, EXgarde PRO is capable of controlling a single door at one site with a small number of users, right up to thousands of doors across multiple sites with thousands of users.

Add to Compare
TDSi Offers Combined IP And PSU With Latest Model Of Popular MICROgarde Controllers
TDSi Offers Combined IP And PSU With Latest Model Of Popular MICROgarde Controllers

TDSi is pleased to add a new model to its MICROgarde controller range, offering integrated IP and PSU. The MICROgarde entry level range of networkable access control products give many of the benefits of a bigger system, without the need for a big budget. For organizations exploring the world of access control for the first time, MICROgarde offers easy installation, reduced cost of ownership and highly competitive pricing to offer the best value and most practical access control system available. The addition of this latest model means MICROgarde I and MICROgarde II can be purchased with IP, Power Supply or both, offering customers greater choice. MICROgarde also delivers unrivalled flexibility of system design. Available in one or two door versions, TDSi has designed the product to cater for the diverse range of needs and situations that may arise. All controllers feature distributed intelligence (with a battery backup), meaning the controller operates and makes decisions even when communication to the host PC is lost. Should this happen, events are stored within the controller until communication is restored and this is uploaded with no loss of data. MICROgarde also offers a further money saving and practical advantage by its ability to be integrated with other TDSi or third-party systems such as CCTV, biometrics and photo ID cards - to make the most of other building services investments. TDSi has also designed MICROgarde to make the life of installers easier, with a number of useful features to significantly reduce the effort and time required for installation and/or integration. To find out more about the benefits of installing and using TDSi's MICROgarde controllers please visit: www.tdsi.co.uk/microgarde or contact us on 01202 723535.  

Add to Compare
TDSi Has Launched A Re-designed Power Supply Unit For Its EX Series Access Control Units
TDSi Has Launched A Re-designed Power Supply Unit For Its EX Series Access Control Units

TDSi has launched a re-designed power supply unit for its EX series of access control units.The new unit incorporates a range of key design and performance enhancements, resulting in significant improvements to the ease, speed, and therefore the cost of installation.Key features of the new system include:Low profile case - new design makes the installation less obtrusiveFully accessible mains input connections - allows the incoming supply to be connected without the need to dismantle any part of the caseHigh-quality 3 A output - minimizes noise and maximises reliabilityFused distribution of power - provides individual fused supplies for both the access control unit and the associated locksKnock-outs for interfacing to trunking and conduit - provides multiple installation optionMultiple rear cable entry optionsSimple cable screen termination clamps - provides reliable connection of the cable screensSpace for standby battery with charging facility - provides un-interrupted operation in the event of power failureLEDs to indicate power supply or fuse failure - provides diagnostic aid in the event of a system problem TDSi's range of EX-series units continues to provide users with the widest choice to meet their access control needs, as well as the ability to support future expansion of the system, if required.  The company's EXpert range also provides for more advanced hardware integration - such as lift control and alarm point monitoring.

Add to Compare
Now Available From TDSi, SOLOgarde Is A Dedicated Stand Alone Door Controller
Now Available From TDSi, SOLOgarde Is A Dedicated Stand Alone Door Controller

Now available from TDSi, SOLOgarde is a dedicated stand-alone door controller.  Providing a high-quality, cost-effective access control solution for a wide range of applications, SOLOgarde is fast and easy to install and to program. Capable of supporting up to 1,000 users, SOLOgarde utilizes the highly secure MIFARE® smartcard technology, enabling users to carry and use just a single card for multiple applications.The SOLOgarde controller provides a great deal of flexibility.  For example, the ‘toggle mode' feature allows the system to be used to set or unset an intruder alarm for specific users.  The same functionality may be used to allow specified cardholders to unlock and then lock specific rooms for a period of time, simply by presenting their card to the reader at the start and end of the period. The unit has been developed with the needs of disabled users in mind; a DDA user group automatically applies an extended lock time for card-holders assigned to that preset group. SOLOgarde features an innovative hand-held programmer.  Easy to use, the programmer completely eliminates the need to manage and control shadow cards, allowing not only the easy and clear management of all user cards, but also enabling more advanced functionality - including controller settings and diagnostic features. A second reader may also be connected to the SOLOgarde controller providing true read-in/read-out capability.Installation is quick and straightforward.  SOLOgarde requires just a standard electrical back box - there is no need for a special enclosure and the spring-loaded terminals mean that no special fitting tools are required.

Add to Compare

Access control controllers - Expert commentary

Why Is Key Management So Important?
Why Is Key Management So Important?

More and more business security practices are going digital. Mechanical keys are still the backbone of most corporate security plans, and it can be very expensive for companies to switch to electronic access control on a large scale. Therefore, enterprises need to choose the most suitable access control system. What is key management? Key management is the process of protecting, tracking, and scheduling mechanical keys. Why is this important? Because the key carries access to sensitive locations and assets within the organization, when you increase the security of the key, you can enhance the security of these valuable resources. The key management system also controls the cost of using physical keys. The system reduces the overhead caused by key loss or security breaches. Some smaller companies may be able to adopt a paper-and-pencil key management protocol. Larger companies, or those who want to better understand and control keys, usually choose to use an electronic key management system. Key management systems can store and assign keys securely and increase the efficiency of organization Why use a key management system? The key management system can become the cornerstone of your key control process. At the most basic level, key management systems can accomplish two things that paper and pen systems cannot: they store and assign keys securely, and they increase the efficiency of your organization's use of keys through automation and analysis. What can key management systems do? 1) Improve access control By better protecting the keys, you can improve the access control to the spaces and devices unlocked by these keys. You can use your key management to simplify the process of providing temporary employees with one-time-key access. In addition, the system can record all their key access records, so that everyone's behavior can be traced. 2) Enhanced accountability traceability The software is a good key management system that can generate reports on key usage, user access requests, access exceptions, and loss. In addition, you can track and audit key usage in real-time. Combined with a comprehensive key control strategy, you will implement better accountability for key use to meet any industry or risk management compliance standards. 3) Reduce costs and prevent losses When an employee loses a key, you will incur direct costs for a replacement key or relocking it when it is lost When an employee loses a key, you will incur direct costs, including purchasing a replacement key or relocking it when it is lost. However, the indirect cost of key loss is usually more significant. This is because employees first spend time looking for the lost key and then process the replacement request, all of which time is not spent on production work. 4) Improve workflow As we discussed, keys are often used in important workflows. The key management system allows you to better control these workflows. A passive electronic lock system, also known as a key-centric access control system, has outstanding advantages in key management. Compared with the electronic access control system, the passive electronic lock system's "passive" characteristics have reduced the update cost for many enterprises.

The Automated Future Of Retail And How To Secure It
The Automated Future Of Retail And How To Secure It

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimizing operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilizing data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behavior. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customization while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

‘We Want To Become Better Known For Access Control’ - Q&A With Bosch Building Technologies’ Gregor Schlechtriem
‘We Want To Become Better Known For Access Control’ - Q&A With Bosch Building Technologies’ Gregor Schlechtriem

Gregor Schlechtriem has worked in the access control market for over 20 years and is now responsible for the Access & Intrusion Business Unit at Bosch Building Technologies. In this interview, the expert talks about key industry trends, the impact of the COVID-19 (Coronavirus) pandemic, technical innovations and his company’s strategy. Mr. Schlechtriem, you have many years of experience in the security technology market. What is your background and what are your responsibilities as Senior Vice President at Bosch Building Technologies? Gregor Schlechtriem: I am a trained engineer and electrical technician, and have been involved with access control in the broadest sense, since I started my career in the late 1980s. I started in the field of parking garage technology and then switched to security technology in 2001, as Managing Director of micos GmbH, which specialized in traditional access control. micos GmbH was known for its highly available and highly secure access control systems, for critical infrastructure and government applications. Many systems from that time are still in use today and continue to be supported and upgraded. Bosch is continuing micos’ business here? Gregor Schlechtriem: Exactly, micos was taken over in 2004 by Bosch Security Systems, now known as Bosch Building Technologies. Since then, we have continuously been developing the access control business. Being part of the Bosch Building Technologies division, we benefit a lot from international cooperation with colleagues Being part of the Bosch Building Technologies division, we benefit a lot from international cooperation with colleagues and from overlap with other product lines, such as intrusion detection technology and video security. This gives us the opportunity to implement outstanding project solutions for demanding customers in an international environment. In developing this business, I rely on my experience from other interesting roles at Bosch that I took on, after micos was bought in 2004. For a time, I worked in the European System Integrator Business, which I also had the privilege of managing for several years, as well as being directly responsible for business units. In Fairport, USA, I had the overall responsibility for intrusion detection technology for many years, as I later did in Eindhoven for video systems. Since 2018, the global access control and intrusion detection business has once again been my direct responsibility. At Bosch Building Technologies, we have in the meantime assigned sales to the respective business units, so that we can develop our product and solution portfolio, in close cooperation with sales and our regular customers. Our main task now is to make our access control portfolio accessible to a broader market. We want to make Bosch much better known, as an access control provider, in the international market. After all, with our own access product portfolio, the power of the Bosch Group and over 40 years of experience in this sector, we have a lot to offer. As an expert in access control, how do you see the industry developing? In which direction is it currently evolving? Gregor Schlechtriem: First of all, I see that security requirements are constantly increasing. Whereas there are currently still simple ‘key replacement systems’ that merely record card numbers, such an approach, to a large extent, no longer meets today’s security and user experience requirements.The core task of access control has not changed over the years In the beginning, access control was more or less a kind of key replacement. Later, there was the possibility of increasing security via a pin code, i.e., via verification through simple data inputs. The next step in this direction was biometrics, which is another key step up, because it allows verification by means of unmistakable characteristics. However, the core task of access control has not changed over all the years and has basically always remained the same: access control means determining who has an access request and checking whether this request can be fulfilled. What’s next on this path to greater security? Gregor Schlechtriem: Biometrics-based access control is becoming increasingly powerful and user-friendly through the use of artificial intelligence (AI). Here, data protection plays a major role, as wherever identities are established and movement data is recorded, it is necessary to reconcile the evolving technology with data protection.Biometrics-based access control is becoming increasingly powerful and user-friendly through the use of artificial intelligence The question of data protection is becoming even more significant, as systems increasingly migrate to the Cloud. Bosch puts particular emphasis on ensuring that, even in the cloud, the data generated in access control is always in line with data protection rules, regardless of where it is located. In my opinion, this trend towards the Cloud will continue, because companies are increasingly looking for complete service offerings, so that they can focus on their core business. Also, a system in the Cloud is easier to maintain and always up-to-date with the latest software, which makes cloud solutions even more attractive for providers and users. How can higher security be reconciled with a good user experience? Gregor Schlechtriem: Today, the card still plays a central role in the user experience, as the essential credential. Another current trend is ‘one card for everything’: with the increasing availability of secure multi-function smart cards, the possibility arises to use cards beyond the pure access function, for example, for payment in the canteen, at the catering and coffee machines, and in the parking garage, as well as simple access to other properties and so on.The security of cards has evolved significantly and kept pace with requirements The security of the cards, the reading and encryption processes, has evolved significantly and kept pace with requirements, although we are also facing an installed base that no longer meets these requirements, due to outdated systems. Today, it is standard for communications between reader and card to be encrypted. In some cases, the keys are also only held centrally to further increase security. The security systems industry was also affected by the COVID-19 (Coronavirus) pandemic. How do you think the industry has changed? What technical solutions have emerged during this time? Gregor Schlechtriem: First of all, there is a certain need for retrofitting in the industry due to changes in how buildings are used. For example, American retailers used to be open around the clock and always had staff on site. Now, due to COVID-19, stores are also closed, and this results in a whole new need for intrusion detection and access control systems to protect the buildings. For access control, an obvious task has arisen as a result of the COVID-19 pandemic, namely to track contacts, as far as this is compatible with data protection. We actually expected more to happen here, but in our observation, many companies did quite little, despite clear and simple steps that could have been implemented relatively quickly. The installed access control systems clearly lag behind the technical possibilities. Another topic that the COVID-19 pandemic has brought into focus is hygiene Another topic that the COVID-19 pandemic has brought into focus is hygiene. Companies should actually have invested in contactless systems here and retrofitted speed gates or motorized doors. But in many cases this was not put into practice. The door opener is still often used, which has to be operated manually and therefore, is touched multiple times. But, if everyone presses the same button, that doesn't help hygiene. Surprisingly, this is different in North America. Here, ‘request-to-exit’ proximity detectors are used almost everywhere, which avoids this problem completely and releases the door, when an authorized person approaches it. Mobile access and smartphone-based access control are also growing markets. What kind of developments do you see in these areas? Gregor Schlechtriem: I already mentioned that users increasingly want to be able to use one card for several applications. But, what we are seeing here is that even with the most modern cards, which have a lot of applications loaded on them, we are reaching performance limits and the user experience suffers. If you compare the card with the smartphone as a credential, you have a much more attractive integration platform there, which is significantly faster and delivers much better performance. For us, the mobile credential or the smartphone is the future, because it simply offers more possibilities that the card will not be able to provide in the long term. What is the specific direction Bosch is taking here? Gregor Schlechtriem: We are currently working on a broad implementation. A whole team is working on the user experience around the smartphone, because it’s understood that smartphone-based access has to work just as easily, as it currently does with a card.A whole team is working on the user experience around the smartphone In theory it does, but if you look at some of the actual implementations, this topic is still relatively complex. In terms of user experience and automation, we still have quite a way to go, and we are working hard on that at the moment. The user experience is one side of the coin, the other side concerns establishing security in the smartphone as a whole. In other words: How do I make the smartphone secure enough as a mobile credential, to meet my access control requirements? We are also working intensively on this. That's actually an IT task. Do you do this yourself at Bosch or do you work with external experts here? Gregor Schlechtriem: We have our own powerful Bosch IT, which also manages our company smartphones. If our company smartphones are lost, the data on them is automatically deleted. The devices use biometrics to identify users, before they can access the data. It is a sound security concept that a card cannot offer. Moreover, we are working with other partners in the IDunion project, to create the additional infrastructure around mobile credentials as well. What exactly is the IDunion and what role does Bosch play? Gregor Schlechtriem: Digital identities must be openly accessible, widely usable, interoperable, and secure. This applies not only to access control, but to the digitised economy in general. The IDunion project has set itself the task of creating the infrastructure for this, in the form of an independent wallet, i.e., secure identity storage on smart devices. The project is funded by the German Federal Ministry for Economic Affairs and Energy (BMWI), because digitisation is also a critical social issue. We are intensively involved in the ‘Physical access to the building’ work package in this consortium. Through this involvement, we want to ensure that our access control systems benefit from this infrastructure and are open to future digital business models. Does ‘digital identity management’, which includes biometrics and mobile access, also play a role for Bosch? Yes, it plays an important role for us, and I wouldn’t consider these topics separate Gregor Schlechtriem: Yes, it plays an important role for us, and I wouldn’t consider these topics separate. For me, a mobile device has the advantage that it has already ensured and verified my identity from the moment of interaction. That’s the fascinating thing about it. If I only allow the device to communicate with the access control system, if I have identified myself first, I have implemented biometrics and access control together in a widely accepted process. From my point of view, this is a very interesting perspective, in terms of security and user experience, because the biometrics procedures in smartphones are, I think, the best currently available. In my view, the smartphone has the potential to take over central functions in access control in the future. What are your goals for the access control business of Bosch Building Technologies in the near future? Gregor Schlechtriem: We will continue to focus on specific solutions for large customers. That is the continuation of our current strategy. In these projects, we will introduce new topics as I have just described, i.e., primarily new technology elements. I believe that, precisely because of the longevity of access control, a long-term migration capability is also of particular importance. We want to reach out to the broader market and make more widely available, what we have developed in terms of technology and innovation. We are currently in the process of setting up and optimising our sales organization, so that it becomes much more widely known that we at Bosch have our own powerful access control portfolio, which can be used for all kinds of applications. In addition, we want to differentiate ourselves in the market with our systems, in line with the motto of our founder, Robert Bosch: ‘Technology for life’. The user experience with Mobile Access should be simple, straightforward, and secure: You hold your smartphone in front of the reader and the door opens.

Latest TDSi news

TDSi To Showcase Their Range Of Integrated Access Control Solutions At Intersec Dubai 2022
TDSi To Showcase Their Range Of Integrated Access Control Solutions At Intersec Dubai 2022

Integrated security manufacturer TDSi is proud to announce it will be showcasing its range of integrated access control solutions at Intersec in Dubai, 16th-18th January 2022. Joining TDSi on Stand SA-F37 in the Saeed Arena will be its VITAPROTECH sister company, SORHEA, which will also be showing its innovative perimeter intrusion detection solutions. Delivering impressive cybersecurity John Davies, Managing Director of TDSi commented, “We are very excited to be appearing back at Intersec again for 2022, which is being held slightly earlier this time. We will be sharing a bigger stand than last time to ensure we can include TDSi’s and SORHEA’s latest market-leading solutions and are able to accommodate as many visitors as possible. Both TDSi and SORHEA see the Middle East as a region for growth, having brought onboard a lot of new partners in 2021.” TDSi will also be talking about its forthcoming long-range smartphone reader capability Stand SA-F37 will focus on TDSi’s new GARDiS controllers and readers, specifically the OSDP and BLE readers which deliver impressive cybersecurity and ease of use. TDSi will also be talking about its forthcoming long-range smartphone reader capability, which addresses the ongoing need for the safety and flexibility of minimum-touch access control solutions. Access control systems Another key aspect of the TDSi stand at Intersec 2022 will be the cloud-based security abilities of the GARDiS range, which can be fully deployed in the cloud. John elaborated, “We will be giving demonstrations of how the GARDiS software can be deployed in the cloud, using our sites in the UK and France to show people how they can interact and control access control systems at remote locations.” SORHEA, a manufacturer of perimeter intrusion detection systems for critical infrastructure, will be demonstrating several of its emblematic products. Active infrared barrier SORHEA protects many Oil & Gas sites with its PIRAMID ATEX microwave detector" Benjamin Tate, International Sales Manager at SORHEA commented, “INTERSEC is a major event in our diaries as we continue to develop our business throughout the Middle East and Asia-Pacific regions. This year we will be demonstrating our MAXIRIS active infrared barrier with remote access and zoning functionality as well as our new shock detection cable the G-FENCE 2400 with IP connectivity.” “In the Middle East, SORHEA protects many Oil & Gas sites with its PIRAMID ATEX microwave detector, which will also be on show in Dubai. Finally, integration with VMS is key to our success and we shall be demonstrating our integration with MILESTONE, one of our Technology Partners and another major player in the Middle East.” Best security solutions As well as demonstrating the considerable abilities of their products, TDSi will also be providing technical training to its local partners and installers off-site from the exhibition. As well as training in Dubai, the TDSi training team will also be training further groups in Bahrain as well. Intersec Dubai 2022 is another important appearance for TDSi and SORHEA, as John and Benjamin concluded, “With the considerable global disruptions of the last couple of years, we are particularly excited to be meeting with our partners and customers from the Middle East and beyond. Intersec is an excellent opportunity to experience the latest and best security solutions and if you are attending the show, we look forward to welcoming you on our stand!”

TDSi Launches New Additions To Its Powerful GARDiS Integrated Access Management Software, With The New Version 2.2
TDSi Launches New Additions To Its Powerful GARDiS Integrated Access Management Software, With The New Version 2.2

Integrated security systems manufacturer, TDSi is proud to announce the launch of exciting new additions to its powerful GARDiS integrated access management software, in the new Version 2.2. New features added to the GARDiS platform Version 2.2 include integration with the STid BLE (Bluetooth Low Energy) mobile device authentication portal, integration with the RS485 wireless locks from ASSA Abloy and SimonsVoss, integration with the new TDSi GARDiS VU VMS software, and a new Cause and Effect Engine. GARDiS platform Version 2.2 The latest additions add valuable features to the ever-evolving GARDiS platform The latest additions add valuable features to the ever-evolving GARDiS platform, as Tina Baker, Software Project Manager at TDSi comments, “GARDiS is designed to evolve, anticipate and cater for a rapidly changing security/safety landscape. Both integration with the STid BLE portal and support for RS485 wireless locks provide greater flexibility in deploying highly secure touch-free access control.” Tina Baker adds, “Integration with our new GARDiS VU VMS solution, which is powered by our fellow VITAPROTECH Group partner and specialist in intelligent cloud video surveillance RECAS, enables customers to benefit from this next-generation solution.” STid BLE Portal integration Integration with the STid Portal provides easy, but highly secure use of a mobile device as access control authentication. By utilizing the ubiquitous mobile phone, organizations can easily share or rescind access approval. GARDiS v2.2’s integration ensures easy administration of this function (using a STid login). GARDiS v2.2 now features RS485 integration with ASSA Abloy and SimonsVoss wireless locks. This adds further resilience, by enabling them to communicate directly with the controller, even if the IP network is interrupted, in order to ensure continuous secure access control. TDSi GARDiS VU VMS software integration The latest version of the GARDiS software now features integration with TDSi’s new GARDiS VU VMS solution, which has been developed in partnership with RECAS. This ensures full and seamless integration of access control and the video surveillance network, all from a single central portal. The all-new Cause and Effect module fully automates a response to one or multiple inputs (such as an intruder panel for example), so the security operator is assured that the system will enact the required action, without the need for human intervention. Cause and Effect engine The Cause and Effect engine operates on both the main security server and the local controller To meet any eventuality or situation, the Cause and Effect engine operates on both the main security server and the local controller. This ensures that even if there is a communications loss between the two, the access control function remains fully operational. It also provides easy to create and update Cause and Effect records that are bespoke to the security needs of the organization/facility, with detailed report generation on-hand, whenever required. GARDiS Pro v2.2 also now includes a widget that enables a visual check of an access event (be it via a card, mobile or biometric credential), delivering an image of the authorized person for verification. Unlimited additional fields and new interface To add even greater flexibility to the GARDiS system, v2.2 also provides unlimited additional fields per user record. This enables the creation of bespoke fields and additional space to log notes, as required. Additionally, v2.2 also provides a revised user interface, which centralizes operations and makes rapid navigation easier. Tina Baker concludes, “All these new functions are the result of close consultation with our installation partners and customers, adding true value-add features that help to improve and refine secure access control operations, and the user experience, benefitting any organization or business that needs them.” The new features are available to download and install now through v2.2 of the GARDiS integrated access management software.

TDSi’s GARDiS Access Control Solution Now Fully Integrates With Milestone’s XProtect Access Platform Through ORBNET Systems’ New Integration Module
TDSi’s GARDiS Access Control Solution Now Fully Integrates With Milestone’s XProtect Access Platform Through ORBNET Systems’ New Integration Module

Integrated security manufacturer TDSi announces the powerful access control features of its GARDiS software can be incorporated into Milestone’s XProtect Access solution through ORBNET Systems’ new Access Control module. This enables security operators to harness the benefits of combining both solutions to manage their access control needs from one portal. Benefits of XProtect access By using the Milestone MIPSDK and GARDiS RESTAPI for expert compatibility, this updated solution enables Milestone Smart Clients to receive GARDiS Events and to acknowledge alarms back to GARDiS. The ORBNET Plugin to XProtect Access enables several key benefits: Cameras can be associated with doors as they are viewed in the Smart Client - both live and playback. Access Monitor in the Milestone Smart Client shows cardholder details in real-time as door events are triggered. A pop-up feature is enabled in the Smart Client so that users are notified of access requests. Interactive icons on the Milestone Map show Release, Set Barred, Set Unlocked, and return doors to Controlled Access with acknowledging alarms. Search on events/doors and Cardholders are displayed in the Access Control Tab. Alarms can be closed in GARDiS from the Milestone Smart Client. Flexible integration Tina Baker, Software Project Manager at TDSi stated, “We are delighted to be working with ORBNET Systems to enable this new integration of our GARDiS solution with Milestone’s XProtect Access. This collaboration provides security operators with additional choices on the best way to utilize their security system resources.” Tina added, “For those already using or planning to install and use both GARDiS and XProtect Access, this is a highly flexible and powerful way to combine the considerable abilities of both systems. This module delivers the levels of integration that security operators need to continue tackling threats while maximizing the performance of their security budget.”

Related white papers

10 Top Insights In Access, Cloud And More

Protecting Dormitory Residents and Assets

Top 5 Ways to Ensure Visitor Safety and Security