Securing landmark office development

Access & Identity Management Handbook 2011 Access Control & Identity Management

CEM Systems, part of Tyco Security Products, announced that the AC2000 Lite security management system was chosen to provide access control for Manchester’s office development, The Peninsula. The tender to install the system was won by ADT Fire and Security.

The AC2000 Lite system was specified by Graham Dunhill, security consultant with Troup Bywater & Anders, in order to meet the client's requirements. The Peninsula project will use CEM’s range of hardware including the CEM high Power over Ethernet door controller, as well as advanced CEM IP card readers.

The 12 storey, glass-fronted building covers almost 150 000 square feet and has a panoramic view across Manchester. Situated in the centre of Manchester, The Peninsula is in a strategic, prominent position. The ground floor and first six floors have been pre-let to Peninsula, the UK’s top business consultancy firm. Peninsula is a provider of employment law and health and safety services, assisting over 22 000 companies with their legal obligations.

CEM’s AC2000 Lite system is an integrated access control, alarm processing and photo badging security management system for up to 128 doors. The system is feature-rich, yet affordable and encompasses all the core features of the AC2000 SE (Standard Edition) system.

A selection of CEM Ethernet card readers with proximity technology are installed including small and discreet CEM EtherProx readers and CEM S610e readers. Both readers feature a graphical LCD to show meaningful card messages such as Wrong Timezone, as well as feature an internal database for holding card transactions/records offline. This means the CEM card readers provide Peninsula with 24/7 intelligence at the door at all times, even if communications are temporarily lost with the AC2000 Lite system controller. The CEM S610e & EtherProx readers were also suited to this project due to the customer’s requirement for a reader with keypad for additional personal identification number (PIN) security.

“Significant cost savings were made throughout the project by designing the system around the CEM DIU 230 (high power PoE+ door interface unit),” said Dunhill. “Using existing CAT 5/6 Ethernet cable installed at the building, the DIU 230 unit offered the ability to power CEM IP readers and maglocks at the door; therefore eliminating the need for fused mains spurs and local power supplies in the electrical design of the building. This substantially reduced project installation costs.”

“AC2000 Lite is ideal for The Peninsula as it provided an all-inclusive range of security applications on one CD,” said Andrew Fulton, business development director for CEM products. “Security administrators at the Peninsula building can view access control alarms centrally using the CEM AC2000 AED (Alarm Event Display) application.”

AC2000 AED provides the security team with a graphical map to view alarms if a door is forced or held open.

AC2000 VIPPS application allows The Peninsula to produce and design both permanent and temporary ID card badges for staff and visitors. When cardholders present ID cards to CEM readers, the AC2000 RTD (rolling transaction display) application will then provide system administrators with a screen view of the cardholder’s picture and personnel details, ensuring the image stored on the system matches the individual using the card. This is a useful application for a building of this size due to the quantity of people entering and exiting the premises.

With the AC2000 Lite system installed, The Peninsula has a fully integrated IP solution which protects staff and ensure the building is secure at all times.

For more information contact Tyco Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycoacvs.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...