We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrielle Inlow
Modified about 1 year ago
NEDAP AEOS Security Scenarios
© Vitani A/S, 2007 Vitani primary business area Non-propritary, customized and scalable security systems Integrated systems covering – alarm and event management – lifecycle ID management – intrusion and access control – video management – biometric security systems – SCADA – Supervision Control And Data Aquisition
© Vitani A/S, 2007 Technology partners Worldwide award winning, market leaders – Nedap – Rockwell Software – HID Corporation – Bioscrypt – Panasonic – Bosch – cieffe – Suprema – IDESCO – Zvetco
© Vitani A/S, 2007 Flexibility – Security on Demand Scenario based security Ever changing regulations and rules from governments, customers, suppliers Shorter response/reaction time Changes in security based on business structure Easy and modular expansion
The true value of AEOS is providing customized solutions using standard building blocks.
© Vitani A/S, 2007 Case: Corridor monitoring Functional Specs Technical Solution Case: Airport gate Functional Specs Technical Solution Case: Locker vault Functional Specs Technical Solution Live demo ‘Locker vault’
Camera is aimed at the corridor Interlock on all doors Only one way traffic Case: Corridor monitoring
1.Access card is presented to reader 2.Camera turns to door Case: Corridor monitoring
3. Door only opens when camera turn is complete Case: Corridor monitoring
4. With door closed camera returns to starting position 5. Other doors are released and can be opened Case: Corridor monitoring
6. Camera records corridor when door is opened Case: Corridor monitoring
© Vitani A/S, 2007 Konfiguration – Corridor Monitoring Konfiguration foretages grafisk i Nedap konfigurationsværktøj Tid: Ca. 10 minutter!!!!
Case: Airport gate
Door is locked Motion detector inactive
Case: Airport gate 1.Access card is presented to reader 2.Double doors can be pushed open (manually
Case: Airport gate 3. Magnets are activated after 5 seconds 4. Doors are pushed onto magnets and held in place
Case: Airport gate 5. After 7 minutes the motion detector is activated 6. Motion detector takes over control of magnet locks
Case: Airport gate 5. No motion detected for 3 minutes the doors are released 6. At all times magnet hold can be overridden by pushbutton
© Vitani A/S, 2007 Konfiguration – Airport Gate Konfiguration foretages grafisk i Nedap konfigurationsværktøj Tid: Ca. 5 minutter!!!!
Case: Locker vault Status light is green (vault available for use) Entrance door is unlocked
Case: Locker vault 1. Access card is presented to reader 2. Entrance door is locked and status light turns red
Case: Locker vault 3. Weight platform is activated and weight is verified (single occupation is checked)
Case: Locker vault 4. After weight verification the finger verification is activated
Case: Locker vault 5. Depending on authorization Locker 1 or 2 is unlocked
Case: Locker vault 6. When entrance door is opened the vault is reset 7. Status light turns green
© Vitani A/S, 2007 Software - administration Corporate Security Policies monitoring compliancy Simple and intuitive user interfaces webbased rolebased Portal technologies building the personalized security operator screen
© Vitani A/S, 2007 Software – Security Management Single point of alarm and event management Integration with 3rd party sub-systems No vendor specific development = vendors are likely to support with API Intuitive user interfaces reduces alarm handling cost Reduces errors
Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
ACCESS CONTROL SOLUTIONS Since RBH Access Technologies RBH was established in 1995 and released its first Axiom system in the fall of To date.
RFID Access Control System March, 2003 Softrónica.
Enterprise Security June 2009 Scott Muench – Senior Applications Engineer Steve Lucas – Security Business Manager Rick Weisensale – Security Product Manager.
1300 ARTSEC The Challenge Medical Practitioners today face the challenge of protecting: their personal safety the safety of their staff.
SCENARIO EXPLORER Introduction Basic Design Scenario Graphic Navigation Pane Content Area The Scenario Explorer provides you with comprehensive information.
Narita International Airport Corporation All Rights Reserved. Yoshihiro Ozawa Planning Department Narita International Airport Corporation 21 April 2005.
Integrated Systems -Egress Control -Access Control Reliable, Trouble-Free Systems in Easy-to-Order Configurable EasyKits.
SK-NET™ 4.0 Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of Secura Key SK-ACP 2-door control panels.
SK-NET Tutorial SK-NET is a Windows® based software program designed to monitor and control a network of up to 100 Secura Key SK-ACP 2-door control panels.
© ASSA ABLOY. All rights reserved. Data Connectors HID Global January 2010.
ViPNt ViPNet Product Presentation Infotecs GmbH 2008.
BabyMatch 4.7 Nurse Guide March 2011, Rev 3.m. Introduction BabyMatch is a comprehensive system for infant protection in maternity wards monitoring infants.
Physical Security. Objectives Understand the conceptual need for physical security Identify threats to information security that are unique to physical.
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Partnering to Provide A Single Platform Visitor Management Solution Nationwide.
WITH INGRESSUS CONTROLLER AND BIOMETRICS/CARD SLAVES IMPLEMENTATION.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application.
Session 1 Intruder Alarm Systems CCTV (Closed Circuit Television) Systems Access Control/Door Entry Systems Questions & Answers Tea Break (approx. 10:30am)
1 Expanding Access in an Academic Environment John Rotunni, Lisa Rotunni & Edward Hohmann California State Polytechnic University, Pomona.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Quality Bytes - Cryoserver Mail Archiving June 2011.
Authorized Dealer. GEOTAB Overview Considered to be one of the top 5 enterprise solution providers in the location-based services industry, Geotab has.
IBM Rational Requirements Management Tools Achieving better control over your requirements.
Building Portals to access Grid Middleware National Technical University of Athens Konstantinos Dolkas, On behalf of Andreas Menychtas.
Access Control with Advanced Facial Recognition Technology The Face ID 3 gives users a contactless and hassle-free verification option. SALES TRAINING|
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Workflow Product Overview.
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
© 2016 SlidePlayer.com Inc. All rights reserved.