Bosch integration with Milestone

August 2015 Access Control & Identity Management

Milestone Systems’ open platform IP video management software (VMS) is integrated with Bosch Access Control and has been certified with full documentation of testing results and best practice for optimal configurations. This means that Bosch and Milestone customers can count on a reliable, interoperable solution, and installing partners can take advantage of the practical information in the certification documents for better implementations.

The integration between the Bosch Access Control system and the Milestone XProtect VMS was achieved earlier with the user interface via the Bosch system, and subsequently upgraded with the XProtect Access Control Module in 2014, with the certification process completed by the end of the year. The combined solution now displays real-time access control events and alarms in the Milestone XProtect Smart Client, also providing control of doors, gates and barriers from within the video interface. Live video and views of recordings are synchronised with all the access control events.

The XProtect Access Control Module is part of the Milestone Integration Platform Software Development Kit (MIP SDK). The XProtect Smart Client provides a unified interface to the Bosch Access Control system with such dedicated functions as monitoring access events with video verification, manually assisting passage (controlling doors, gates, etc.), conducting investigations of specific access points or cardholders, easily exporting video evidence and generating reports.

Video of the Bosch access incidents visually confirms and informs on situations as they happen for verified decision-making and efficient response. The video also provides easily shareable evidential documentation for analysis, rectification or prosecution.

The seamless integration of Bosch Access Control with the XProtect Smart Client means Milestone customers can keep their easy-to-use video interface while adding access control – without having to re-train. The integration delivers real-time monitoring with video verification for fast response to incidents, including locking, unlocking or triggering a system lockdown. Users may also choose to work with the Bosch interface, and the access control main system administration remains within the Bosch system.

For more information contact Milestone Systems, +27 (0)76 811 7495, mme@milestonesys.com, www.milestonesys.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Intelligent access at the gate
Access Control & Identity Management Residential Estate (Industry)
LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.