ZKAccess recently announced its new all-in-one web-based security platform software—ZKBioSecurity3.0. The software, which supports the ZKAccess Pro Series of panels and readers, contains four integrated modules: access control, video integration, elevator control, and visitor management. Equipped with an optimized system architecture designed for high level biometric identification and a modern user-friendly UI, ZKBioSecurity3.0 provides an advanced solution for a whole new user experience.

Advanced Access Control Functions

ZKBioSecurity3.0 supports up to 8,000 doors (multi-server) and 2,000 doors (single-server) and advanced access control functions include zone control and global anti-passback and linkage. It allows for video software integration with C2P (Milestone, OnSSI, Mirasys) and Arteco, as well as video camera integration with Hikvision and Dahua. Other capabilities include automatic data backup, alarms/events email notifications, and system log monitoring.

"We're pleased to introduce this new advanced security software platform to market," says ZKAccess CEO Larry Reed. "We’ve really taken access control to the next level.”

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...