Access Easy from Bosch

July 2011 Access Control & Identity Management, Products & Solutions

All-in-one solution to manage access in any location with a built-in Web-server.

Bosch Security Systems has launched the next generation of its Access Easy Control System. It is an easy-to-use, Web-based access control solution that uses a built-in Web server for access management. The system enables a range of sophisticated security features to be integrated into a system even by users with relatively little IT knowledge.

The Access Easy Control System is an all-in-one box that can be accessed via a standard IP network or the Internet. There is no additional software needed.

With an intuitive graphical user interface, the controller is easy to set up and operate. Bosch video devices can also be seamlessly integrated into the system to provide a wide range of features, such as verification of alarm-related images and guided playback of archives, without losing the system’s inherent ease of use.

Additional security features can be customised by the operator such as display of photo ID and notification or alerts via e-mail/SMS. More advanced I/O programming is available for additional security functions, such as integration of third-party intrusion systems for arming/disarming the system via a standard access credential.

The Access Easy Control System can be used to manage door access, control elevators, monitor intrusion-alarms and keep time logs. It can support up to 16 readers, monitor up to 32 input points and control up to 32 output points per controller.

Pro version

The Access Professional Edition is a scalable entry-level access-control solution for small and medium-sized companies that are capable of growing with their needs. The system covers not only simple access requirements, but also comprehensive video verification features.

Access Professional Edition offers a broad range of access and security functions including integration to video surveillance, intrusion, and elevator control systems. Among the new features available, users are better able to secure their perimeter with the assistance of up to five cameras around a door to ensure that the right person is entering the secured area. Archived recordings originally triggered by alarm events (eg, forced entry, exceeded opening time or use of false credentials) can be provided by the system to clarify past occurrences. The software also supports authorisation management for standalone offline readers.

Beyond the new supported hardware and integration, operator functions were also enhanced allowing additional customisation and flexibility for the end user. The system supports up to 16 simultaneous users with different profiles to assure data is available at all times to all users. The system’s increased flexibility offers an individual to hold credentials in different formats and technologies, eg, a key-fob, a card or a long–range UHF token (ultra high frequency). This allows new and legacy equipment to coexist, and hence allows a gradual, budget-friendly migration from one reader technology to another.

For more information contact Bosch Security Systems - South Africa & Sub-Sahara Africa, +27 (0)11 651 9818, [email protected], www.boschsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...