Siemens: access in your control

September 2003 Access Control & Identity Management

Enterprise security is a little more complicated than simply stringing a few scanners and alarms together. High-risk, high-value businesses, require professionally integrated, managed security solutions; solutions that offer complete control – allowing administrators to know what is going on everywhere, all the time.

To achieve a system of this quality, one needs a partner who is able to deliver a full spectrum service - from initial process and risk analysis and the formulation of a protection plan, all the way to design, implementation and maintenance of the system itself. Siemens ESS aims to be that partner.

At the heart of its access solutions is Siemens' Autec Babylon NT Kernel - a flexible building management system. This application is completely modular in its design, allowing for a system that uniquely caters to a user's requirements, whilst allowing for easy future expansion, as the security needs of your organisation grow. Babylon is specifically designed to cater for the needs of the security manager who requires one system to monitor and control the whole building from a single interface.

Core system features:

* Access control: online tool that allows/disallows people into and out of areas in an organised manner. Every time a person enters or leaves the building, a 'booking' event is stored in an access logbook, which can be scrutinised at any time. System controllers are also equipped with basic offline functionality, so as to be able to maintain security measures at all times.

* Anti-passback for up to 999 rooms, including two in offline mode. Separate anti-passback is available for parking garages.

- Individual readers and card holders can operate without anti-passback.

- On-line decisions made on the main PC.

- All access transactions logged in the access logbook.

- Four eye control for secure areas.

- 200 access zones with an option of 1000 access zones.

- 256 online and offline profiles available.

- All online profile names are freely definable.

- All profiles can handle up to seven time zones, seven days and nine holiday types.

- Up to 99 card version numbers are allowed.

- Realtime dynamic data can be displayed.

- A separate page for data is attached to each card holder.

- Temporary profiles can be attached to individual card holders.

- Double access control blocking.

- PIN code badging allowed.

- Silent hold-up alarms possible with pin code readers.

- 300 000 card holders possible.

* Time management: complete management of all times generated by employees via card reader bookings. Can be used as a complete shift or time and attendance management system.

* Personal limitation: this feature would be used only where the time spent in a given room has to be limited due to factors such as health hazards. Alarms are generated when the time spent in a room has been exceeded, or when the maximum number of people has been exceeded. Up to 100 rooms can have personal limitations.

* Visitor handling: an electronic solution for keeping track of all visitors entering and leaving a building. The system is able to record visitor name, company and ID number, and offers four different options for the handling of each person. Visitors can be blacklisted on the system. All entries are stored in the visitor logbook.

* Logbooks: every event that occurs within the system, or from one of the attached devices (alarms, controllers, etc) is stored into a digital logbook, from which users can search, sort, retrieve and print events when required. Books are kept within the system for access, alarm, event, time, trend, error, visitor and video logs. The system provides for logbook backup onto any media supported by Windows NT.

* Alarm handling: all 'events' that are required to trigger an alarm are pre-defined in the system, which offers the capacity for up to 26 alarm groups and 100 alarm priorities. When an alarm event occurs, a notification is sent to the operator, who is required to perform certain alarm cancelling tasks (such as the provision of an explanation for the alarm) before it can be removed from the queue. Supervisors have the ability to view logs of all alarm events, in order to monitor the performance and response times of individual guards.

* User passwords: every system operator can be allocated a unique password, to which a profile containing their necessary access permissions can be attached (certain functions can even be set up so as to require two simultaneously logged in users). In sensitive areas, such as publicly accessible operator terminals, the password system can be supplemented with a card reader, ensuring optimal security.

* Operator stations: the inclusion of distributed operator-stations allows for improved management and operation of the system. Any program can be executed from any station, provided that the operator's login profile allows him to do so. Up to 31 stations, connected by RS232 or Ethernet, can be catered for.

* Automatic remote site dialup: this convenient facility allows for the monitoring of remote sites via ordinary dial-up modems. Dial-ups are initiated manually or automatically, from an easy to use graphic screen. Up to 1000 dial-ups are catered for.

* Routines: allow the system to control and manipulate parts of the building or plant. Routines are written in editors on the system and downloaded to the XMP devices while the system is online. Complex control logic is possible.

* Maintenance management: allows the maintenance departments to have an online maintenance and breakdown status of the plant or building. The system allows for 50 000 freely definable data points for daily, weekly or monthly maintenance. Realtime monitoring is possible.

* Tools: tools are provided in order to allow for further system customisation. These include:

- Screen modification program.

- Menu modification program.

- Keyboard modification program.

- Colour modification program.

- Icon menu modification program.

- System monitor program.

- VCI interchange and logbook reset program.

- Graphical font modification program.

- System message modification program.

For more information contact Siemens ESS, 011 652 2000.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.