Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Access management control and administration

SimonsVoss Technologies : 07 May, 2008  (New Product)
LockingSystemManagement from SimonsVoss provides administrators with the capability of managing all access control and locking systems
SimonsVoss is presenting the LSM LockingSystemManagement software for the administration, control and monitoring of access management and building automation systems. The software has multi-user and client capability, and is easy to administer with its graphical user interface. The LSM is compatible with ODBC, the standard database interface, and with PDA organizers and the EventAgent. Furthermore, the software can send SMS and E-Mail messages. To protect your sensitive data, the LSM Software uses a 160-bit long encryption key.

The LSM software consists of three modules: the graphical user interface (GUI) for administration at one or more workstations, the communication nodes (CommNodes) and the database engine with the database server. The CommNodeServer handles communication via the Internet or intranet.

Transponders and access rights can be edited separately or in groups at different workstations. The LSM software provides three different views - display as a matrix, table, or tree - depending on the user's preference. If there are already locking plans, these can simply be imported into the LSM software.

The LockingSystemManagement software administers all data in tables. Entries can be coordinated and sent via Internet or intranet. This data is also encrypted with a 160-bit code; access to the database is additionally protected by an individual user ID and password.

Diverse log possibilities and a report generator are already integrated into the LSM software. They automatically supply precise information on current events. As a central component, the CommNodeServer can also automatically process tasks and receive commands from modules, and can also pass these on, both to SimonsVoss hardware components and to other facility management or alarm systems.

Each user is identified by a user name and a login password. The user is allocated access rights to the locking plan, areas and transponder groups and to particular tasks by being assigned to a user group. For example, the Director of Development could be authorized to program the transponders of only those employees in his or her department.

Authorisations can be 'inherited' from the lowest path level to the highest path level with a single mouse click within areas (such as buildings) and transponder groups (such as departments). In this way, access paths in buildings and authorisations of individual employees can very easily be depicted and implemented in the locking plan. For example, if an employee receives authorisation for his or her office door, he or she can also automatically receive authorisations for all doors that must be passed through in order to reach this office. If organigrams are shown, an employee in the lowest level can have all employees and supervisors higher up in the hierarchy automatically 'inherit' his or her authorisations.

The GUI makes it possible to display and edit access authorisations for transponders and transponder groups for doors and areas in different views, such as in the matrix.

With the new LSM, SimonsVoss is offering management software for locking systems and access control whose use is intuitive, allowing the client to supervise and edit the system quickly and straightforwardly. Its open concept simplifies its integration into existing environments, even with a mixed infrastructure. Accesses to the intranet and Internet allow networking of different users, databases and communications nodes. The 160-bit password encryption key guarantees maximum security for sensitive information.

Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo