We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrielle Inlow
Modified over 2 years ago
NEDAP AEOS Security Scenarios
© Vitani A/S, 2007 Vitani primary business area Non-propritary, customized and scalable security systems Integrated systems covering – alarm and event management – lifecycle ID management – intrusion and access control – video management – biometric security systems – SCADA – Supervision Control And Data Aquisition
© Vitani A/S, 2007 Technology partners Worldwide award winning, market leaders – Nedap – Rockwell Software – HID Corporation – Bioscrypt – Panasonic – Bosch – cieffe – Suprema – IDESCO – Zvetco
© Vitani A/S, 2007 Flexibility – Security on Demand Scenario based security Ever changing regulations and rules from governments, customers, suppliers Shorter response/reaction time Changes in security based on business structure Easy and modular expansion
The true value of AEOS is providing customized solutions using standard building blocks.
© Vitani A/S, 2007 Case: Corridor monitoring Functional Specs Technical Solution Case: Airport gate Functional Specs Technical Solution Case: Locker vault Functional Specs Technical Solution Live demo ‘Locker vault’
Camera is aimed at the corridor Interlock on all doors Only one way traffic Case: Corridor monitoring
1.Access card is presented to reader 2.Camera turns to door Case: Corridor monitoring
3. Door only opens when camera turn is complete Case: Corridor monitoring
4. With door closed camera returns to starting position 5. Other doors are released and can be opened Case: Corridor monitoring
6. Camera records corridor when door is opened Case: Corridor monitoring
© Vitani A/S, 2007 Konfiguration – Corridor Monitoring Konfiguration foretages grafisk i Nedap konfigurationsværktøj Tid: Ca. 10 minutter!!!!
Case: Airport gate
Door is locked Motion detector inactive
Case: Airport gate 1.Access card is presented to reader 2.Double doors can be pushed open (manually
Case: Airport gate 3. Magnets are activated after 5 seconds 4. Doors are pushed onto magnets and held in place
Case: Airport gate 5. After 7 minutes the motion detector is activated 6. Motion detector takes over control of magnet locks
Case: Airport gate 5. No motion detected for 3 minutes the doors are released 6. At all times magnet hold can be overridden by pushbutton
© Vitani A/S, 2007 Konfiguration – Airport Gate Konfiguration foretages grafisk i Nedap konfigurationsværktøj Tid: Ca. 5 minutter!!!!
Case: Locker vault Status light is green (vault available for use) Entrance door is unlocked
Case: Locker vault 1. Access card is presented to reader 2. Entrance door is locked and status light turns red
Case: Locker vault 3. Weight platform is activated and weight is verified (single occupation is checked)
Case: Locker vault 4. After weight verification the finger verification is activated
Case: Locker vault 5. Depending on authorization Locker 1 or 2 is unlocked
Case: Locker vault 6. When entrance door is opened the vault is reset 7. Status light turns green
© Vitani A/S, 2007 Software - administration Corporate Security Policies monitoring compliancy Simple and intuitive user interfaces webbased rolebased Portal technologies building the personalized security operator screen
© Vitani A/S, 2007 Software – Security Management Single point of alarm and event management Integration with 3rd party sub-systems No vendor specific development = vendors are likely to support with API Intuitive user interfaces reduces alarm handling cost Reduces errors
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software Predefined parameters Scaled down for easy admin Personalised reporting.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
Desigo CCTM Your milestone in building management
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
1 Security Integration and Esgraf sales presentation 01/2015.
Lesson 4-Access Control Solution
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Axis Intelligent Video Intelligence where you need it.
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management.
Digital-watchdog.com Complete Megapixel Surveillance Solution DW-VP9xT4P DW-VP12xT8P DW-VP16xT8P Rev : 04/15 Presenter’s Name Title |
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2 About KoçSistem Current Situation in Base Stations Remote Site Management System: Sitelink Sitelink.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
ACCESS CONTROL SOLUTIONS Since RBH Access Technologies RBH was established in 1995 and released its first Axiom system in the fall of To date.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
In This Day and Age, Physical Access Control Is Not An Option; It Is a Necessity
Biometric Time & Attendance System Biometric Door Lock System Passport Biometrics solution IP Surveillance System Analog camera System Intrusion.
RFID Access Control System March, 2003 Softrónica.
1 Milestone Systems, Inc. Confidential Milestone Systems Open Platform Video Management Software Reinier Tuinzing Strategic Alliance Manager, Americas.
Narita International Airport Corporation All Rights Reserved. Yoshihiro Ozawa Planning Department Narita International Airport Corporation 21 April 2005.
Enterprise Software Solution Lab Pvt Ltd
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Surveon Enterprise SMR8300 Product Introduction Sales & Marketing Department Surveon Technology.
XProtect ® Access Control Module 2014 Product introduction.
Alarm Mode An in-depth guide. Overview Main module for loading configuration and monitoring system – Reader Open/Close – Arm/disarm zones – Control relays.
Access Control Hardware IXP20TOUCH System Controllers iTRT Door Controller 125kHz Antenna Readers FINGKEY Access Plus I mpro provide a wide.
© 2009 PGP Corporation Confidential State of Key Management Brian Tokuyoshi Solution Manager.
Introducing Dream Report Win Worrall Applications and Development Engineer.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
HOME AUTOMATION HMI DEMO Michigan State University College of Engineering Team 3.
Ing. Fernando Clavero Febrero Ing. Fernando Clavero Febrero 2012.
Choosing a Network Camera The top 10 factors for making the right choice.
AXIS Camera Station Flexible surveillance software for your Axis network video products Sales Presentation Welcome to this short presentation of the.
North Shore Schools Security Upgrades
Dan Parish Program Manager Microsoft Session Code: OFC 304.
Using Motion Detection, Alerts and Alarms
RBU-11 Teller Cash Recycler (Presented to) (Date)
BioSENSE I introduction
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Bosch Video Management Systems
© 2001 National Burglar & Fire Alarm Association Chapter 10 The Central Station –24 hour /7day Operation –Receive Signals –Process Signals –React.
AEO COMPLIANCE PROGRAM Authorized Economic Operator Requirements.
Global Solutions For Remote Property Monitoring. Project planning and management Project planning and management Design Installation and Commissioning.
The Challenges of Implementing Multi- platform IT Systems across the AO Function Nicola Cartwright Head of Awarding Systems and Services 1st4sport Qualifications.
SESAM electronic security systems 1. Sesam is a full developer, manufacturer and distributor of - access control systems and related software - intercom.
© 2017 SlidePlayer.com Inc. All rights reserved.