The New Age Of Access Control From Bosch
Moreover, suppliers are more and more often faced with requirements of their customers to supply a documentation of all access attempts, whether successful or not, to protect against industrial espionage. To fulfill this requirement, not only employee access must be captured and recorded, but also the entire visitor traffic.
Video integration for more safety
While modern access control systems allow an efficient management of access rights, they are rather powerless against abuse if operated on their own. In critical environments it is mandatory to add a second layer of security by integrating access control with some kind of video surveillance. To prevent abuse, all access requests can then trigger one or more video cameras.
Integrated systems can provide alarm verification, instantly displaying live video images from nearby cameras when there is an alarm event at a door - such as when a person presents an unauthorized credential or when a door is forced open. Forensics can also benefit from such integration if the video recordings are referenced in the access control system's event log. Such a feature greatly facilitates identification, retrieval and playback of past events and alarms if necessary.
Open standards ease integration
Integrating access control, video monitoring, and intrusion detection can be rather easy when all components come from the same vendor and if this vendor also offers a management platform like the Building Integration System from Bosch for all of them.
Integrated systems "off the shelf" can greatly ease installation and configuration of the security solution. Logical integration eliminates the need for multiple software platform and interfaces -- resulting in fewer complications and greater event-driven functionality as well as reduced installation time and costs. What's more, this kind of integration also promises more efficient operation and a clearly reduced need for training, but above all also a higher security level. An open standards-based management system even makes sense in those cases where one vendor supplies everything, as it opens up the entire installation for future expansion.
User interface is key
An integrated security system is a very complex apparatus, and if this complexity is not hidden from the user, the system will be highly prone to human error and maloperation. Such systems do need very clear and intuitive user interfaces, avoiding information overload while offering all the information that is currently needed.
This is even more important when several components or dialogs are open, which will often be the case if you deal with access control, video surveillance and maybe intrusion detection from the same console.
|Manufacturer||Bosch Security Systems|
|Model code||BIS - Access Engine|
|Max No. of Doors per System||1,200|
|No of Cardholders included||200,000 (2500 included in Basic Package)|
Floor Plan: Yes, Autocad compatible
Parking Lot Management: Yes
Compatible Access Control Hardware: Bosch AMC. Standard wiegand or RS485 readers and common industry card Formats.
Integration to other systems: Bosch CCTV. Bosch Intrusion, Fire, Public Address and 3rd party systems via BIS software.
The Access Engine (ACE) software, in conjunction with Bosch access hardware, is a complete access control system within the building integration system (BIS). It encompasses all the essential features of any standalone access control system on the market today, plus a wide range of optional enhancements.
See other access control products: AMC2 Access Modular Controller | Access Easy Controller 2.1
|Download PDF version Download PDF version|
More Bosch Access control software
You might be interested in these products
Facing the Ever-evolving Hacker Head-on
Four Areas to Consider in Frictionless Access Control
Cloud Video and Smart Cities
Bosch Security Systems Unveil Version 4.8 Of Its Building Integration System To Enable A Safe And Contactless Access Control Environment
ASSA ABLOY Integrates Aperio Wireless Lock Technology With Connect ONE Platform From Connected Technologies