Security Management has increasing concerns for modern enterprises. This management system helps customers to integrate operation of safety procedures on one platform, making access control management easier and more practical so as to improve efficiency.
u System Features
1. Powerful data processing capacity, allowing the management of the access control data for 30,000 people.
2. Visible and reasonable work flows come from abundant experience in access control management.
3. Automatic user name list management.
4. Multilevel management role-based level management secures user data confidentiality.
5. Real-time data acquisition system ensures prompt feedback of access control data to the management.
u Configuration Requirements:
CPU: Master frequency of 2.0G or above;
Memory: 1G or above;
Hardware: Available space of 10G or above. We recommend using NTFS hard disk partition as the software installation directory (NTFS hard disk partition has the better performance and higher security).
u Operating System:
Supported Operating Systems:
Windows XP/Windows 2003/Windows Vista/Windows7
Supported Databases:
MySQL/MS SQL Server2005 or later version
Recommended browser version:
IE 8.0 or later version (Using fingerprint registration, matching, and visit video related page, you must use IE browser and Firfox5.0 or later version.)
u System Modules:
The system includes five major functional modules:
Personnel System: Primarily two parts: first, Department Management settings, used to set the Company’s organizational chart; second, Personnel Management settings, used to input personnel information, assign departments, maintain and manage personnel.
Device System: Set communication parameters for device connection, including system settings and machine settings. After successful communication, the information of connected devices can be viewed and operations such as remote monitoring, uploading and downloading can be performed in the system.
Access Control System: WEB-based management system, enabling normal access control functions, management of networked access control panel via computer, and unified personnel access management. The access control system sets door opening time and levels for registered users, so that some users are permitted to unlock some doors through verification during certain intervals.
Video System (for professional version): The system provides the video linkage function, to manage the network video recorder, view the real-time video, and query the video records. It opens the Real-time Video when the linkage events happen.
Elevator control system (function in the professional edition): The elevator control function is added to the system and it helps manage network elevator controllers over the computer network. In the elevator control system, the time and rights are set for registered users to use elevator controllers so that only certain users can reach the specified floor within a period of time after authentication.
Visitor system (function in the professional edition): The visitor management function is added to the system. The visitor system, a web-based management system, implements functions such as certificate registration, card registration, on-site snapshot capture, and visitor quantity statistics. It is highly integrated with the access control system and elevator control system to manage visitors safely and efficiently.
System Settings: Primarily used to assign system users and configure the roles of corresponding modules; database management such as backup, initialization and recovery; and set system parameters and manage system operation logs.