Picture Perfect integration

July 2003 Access Control & Identity Management

GE Interlogix's enterprise edition of the Picture Perfect and Access Vision 2.0 enterprise access control and security management system, lets security management delegate virtually all aspects of the security system to appropriate authorised personnel, resulting in effective distribution while maintaining centralised control of the system.

"In effect, a company can have multiple, separate security systems for administration purposes but still maintain centralised control," says Zev Freidus, senior systems product manager for Picture Perfect. "For instance, a US-based company may want system hosts in the United States, Europe and Asia. The security director for each region can be delegated the task of configuring doors, managing employees access, integrating with specific alarms and other tasks. Yet, the master control in the United States will still have ultimate control of all three servers." Multiple synchronised, geographically dispersed servers are especially important for alarm monitoring, Freidus adds. With the enterprise edition of Picture Perfect, each host or region can do its own alarm monitoring while, from the main server, the head security management team can monitor all regions from a single screen. The networked distributed configuration of Picture Perfect enterprise edition also protects the organisation from total network outages. For instance, if the network in one region suffers a malfunction, it has no bearing on the other regions.

Like previously announced versions of Picture Perfect, the Enterprise Edition features a modular architecture and leverages Web-based clients and Web-based reporting to improve access and provide more detailed reporting capabilities. Its visitor system replaces manual visitor logbooks, freeing up valuable time for security personnel. Picture Perfect Enterprise Edition 2.0 also features eFlash, which allows remote, live upgrades of field panels, without downtime. It also provides e-mail pager alarm routing to help security personnel to identify critical alarms remotely.

For more information contact GE Interlogix, 011 805 1590.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Facial access control for ministry
Issue 1 2020, ZKTeco , Access Control & Identity Management
The Ministry of Culture in Saudi Arabia has adopted ZKTeco’s facial recognition technology and fingerprint biometrics to manage access control into its building.

New Door Pilot app from dormakaba
Issue 1 2020, dormakaba South Africa , Access Control & Identity Management
With new dormakaba Door Pilot, automated doors can also now be operated on the basis of remote control technologies. The system, comprising the Door Pilot app for smartphones and a Wi-Fi interface for ...

Identity lifestyle
Issue 1 2020, Suprema , Access Control & Identity Management
Once the technology of the future, biometrics has quietly snuck into our daily lives through smartphones and access controls into our places of work.

Securing BP’s new head office
Issue 1 2020, ISF SFP , Access Control & Identity Management
ISF SFP was awarded the contract to secure the first development phase for Oxford Parks, the new head office for BP South Africa.

Combining aesthetics and access control
Issue 1 2020, Turnstar Systems , Access Control & Identity Management
Prestigious law firm Bowman Gilfillan recently upgraded its physical security with the addition of four Turnstar Speedgate Express access control lanes.

Video doorbells from Ring
Issue 1 2020 , Access Control & Identity Management
Ring has a number of video doorbells available in South Africa that run off batteries or power and enable users to answer their doors from anywhere.

Centurion to unveil new product
Issue 1 2020, Centurion Systems , Access Control & Identity Management
Centurion Systems will be hosting its third Access Automation Expo this year, with dates confirmed for Durban, Johannesburg and Cape Town.

Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.