Presentation is loading. Please wait.

Presentation is loading. Please wait.

Geoffrey Version 5.1.4: Cutting Edge Security Technology

Similar presentations


Presentation on theme: "Geoffrey Version 5.1.4: Cutting Edge Security Technology"— Presentation transcript:

1 Geoffrey Version 5.1.4: Cutting Edge Security Technology
16th-17th June 2003 Carmel Indiana

2 CCTV/Universal Interface
Geoffrey Hardware Alarms Quick Install Areas & Area Sets Redundant Recovery CCTV/Universal Interface Sample System Configurations Cardholders Time Zones & Holidays Elevator Control Security Tour Program Flash Offline Lock Integration Guest Pass/Vistitor Tracking VIP Online Integration GURI - Universal Reader Interface Software Only Presentation Click here to exit show

3 How Geoffrey Handles Alarms
16th-17th June 2003 Carmel Indiana

4 Time Zone Cardholder Files Alarm Label Devices Transaction Groups
Examples of Time Zones: 5pm – 8am, M-F; 24 hours Sa/Su 24 hours, M-F, Sa/Su Cardholder Files Time Zone Gary D’Aries Bruce White Jason Palleschi Jack Kahn Alarm Label Examples of Transaction Groups: Valid Access Invalid Access Contact Conditions Communications User Info Examples of Alarm Labels: Emergency Exit Door Alarms Specific Employee w/ Valid Access to Server Room from 9am-5pm attempting after hours access All Invalid Access Attempt into IT Area from 8pm – 6am M-F, 24/7 Sa/Su Communication Failure with Area Controller Examples of Devices: Readers Contacts Relays Devices Transaction Groups

5 Alarm Display: Workstation by User Login
Alarm Label Alarm Groups Alarm Display: Workstation by Computer Name Alarm Display: Sent to Address Alarm Display: Workstation by User Login

6 Management Alarm Group
Alarm Label: Specific Employee w/ Valid Access to Server Room from 9am-5pm attempting after hours access Transaction Type: Cardholder Time Zone: 7 p.m. Tuesday Area: 3rd Floor IT Server Room, East Wing Priority: Level 3 Priority Alarm Workstation: Floor 3 Security Desk, East Wing User: Joseph Smith, Security Officer User: Beth Jones, Security Officer John Porter, Asst. Security Supervisor East Wing Alarm Group Workstation: Floor 3 Security Desk East Wing Workstation: Floor 3 Security Desk West Wing User: Brian Fields, Security Manager John Porter, Asst. Security Supervisor James Walker, Security Supervisor 3rd Floor Alarm Group If no response in pre-programmed time, reroute to: Workstation: Main Security Desk User: Brian Fields, Security Manager Brian Fields, Security Manager James Walker, Security Supervisor Management Alarm Group If no response in pre-programmed time, reroute to:

7 Management Alarm Group
Alarm Label: Communication Failure to IT Area Controller Transaction Type: Communication Time Zone: 2 a.m. Tuesday Area: 3rd Floor IT Server Room Priority: Level 2 Priority Alarm Workstation: Floor 3 Security Desk, East Wing User: Joseph Smith, Security Officer User: Beth Jones, Security Officer John Porter, Asst. Security Supervisor East Wing Alarm Group Workstation: Floor 3 Security Desk East Wing Workstation: Floor 3 Security Desk West Wing User: Brian Fields, Security Manager John Porter, Asst. Security Supervisor James Walker, Security Supervisor 3rd Floor Alarm Group Workstation: Main Security Desk User: Brian Fields, Security Manager Brian Fields, Security Manager James Walker, Security Supervisor Management Alarm Group If no response in pre-programmed time, reroute to:

8 Management Alarm Group
Alarm Label: Door Forced Open Transaction Type: Contact Active Time Zone: 8 p.m. Tuesday Area: 3rd Floor IT Server Room Priority: Level 1 Priority Alarm Workstation: Floor 3 Security Desk, East Wing User: Joseph Smith, Security Officer User: Beth Jones, Security Officer John Porter, Asst. Security Supervisor East Wing Alarm Group Workstation: Floor 3 Security Desk East Wing Workstation: Floor 3 Security Desk West Wing User: Brian Fields, Security Manager John Porter, Asst. Security Supervisor James Walker, Security Supervisor 3rd Floor Alarm Group Workstation: Main Security Desk User: Brian Fields, Security Manager Brian Fields, Security Manager James Walker, Security Supervisor Management Alarm Group

9 Version 5.1: Default templates included in software
Customize layouts to your company’s floor plans Customize .WAV files to match language or accent of operators

10 Alarm Graphic Examples

11 Alarm Graphic Examples
Normal Status Alarm Status

12 Alarm Graphic Examples

13 Alarm Details: Instructions

14 Alarm Details: Comments

15 Alarm Details: Live Video*
*Live video is achieved through the optional GVTR integration.

16 Version 5.1: Transaction Monitor
Cardholder Transactions Device & Operator Transactions

17 Areas & Area Sets 16th-17th June 2003 Carmel Indiana

18 What is an Area? An Area is a space or group of spaces that have secured entry ways (e.g. door, gate, turnstile, etc.). An area can consist of one reader or a number of readers and can be identified at one location or over several locations consisting of “Door Types” and “Area States”.

19 What is a Door Type? A Door Type is the particular model or kind of door which a cardholder is granted access to use Pedestrian Vehicular Handicapped Turnstile

20 What is an Area State? Each area has one of 8 user defined state options (e.g. normal, lockdown, strike, etc.) Area State determines who has access to that area during a specific condition or state. For example, if an area is placed in “Strike” state then only those cardholders with access during Strike will be granted access to that area while in Strike state. Cardholders are given permission to access areas in various states when they are added to the cardholder database.

21 Example: Main Lobby Area
Northeast Entrance Turnstiles Main Lobby Building A West Entrance Turnstiles South Disabled Entrance

22 Example: IT Area New York Office Comm Closet on Floor 2 Dallas Office
Los Angeles Office Comm Closets on Floor 6 and Floor 10 Dallas Office Comm Closets on Floor 2 and Floor 7

23 What is an Area Set? An Area Set is a group of Areas.
For example, a company can set up an “IT Set” to grant IT employees access to the Perimeter Area, Lobby Area, Common Area, IT area and Comm Closets.

24

25 Area Sets Administration Area Set Perimeter Area Administration Area
HR Area Set HR Area Accounting Area Set Accounting Area Manufacturing Area Set Manufacturing Area Manufacturing Administration Area Set Manufacturing Office Area  IT Area Set Perimeter Area Lobby Area Common Area IT area Comm Closet Handicapped Admin Area Set Perimeter Area – Handicapped Administration Area Executive Area Set HR Area Accounting Area Comm Closet Area Manufacturing Area Manufacturing Office Area Executive/IT Lobby Area Executive/IT Common Area Executive Area IT Area Perimeter Area – Pedestrian/Vehicular Handicapped Executive Area Set Perimeter Area (Handicapped/Pedestrian/Vehicular) Administration Area HR Area Accounting Area Comm Closet Area Manufacturing Area Manufacturing Office Area Executive/IT Lobby Area - Handicapped Executive/IT Common Area Executive Area IT Area

26 IT Area Set

27 Manufacturing Area Set

28 CCTV Universal Interface
16th-17th June 2003 Carmel Indiana

29 CCTV Universal Interface
Workstation #1 CCTV Universal Interface Video Switcher #1 RS-232 ASCII Card, Contact, User Transactions System Host Workstation #25 CCTV Universal Interface LCD Display Panel RS-232 ASCII

30 How Geoffrey Handles Cardholders
16th-17th June 2003 Carmel Indiana

31 Accounting Department Cardholder Access
Normal work day for an Accounting Clerk is 9am-6pm. All other employees have a normal workday of 9am-5pm During the annual audit the daily workday changes to 8am-7pm and Saturdays from 9am-noon

32 Cardholders: Status Levels (Acct Clerk Normal Workday)
System Readers Standard System Time Zones Perimeter Reader #1 Administration Area Reader #1 Administration Area Reader #2 H.R. Area Reader #1 9am-5pm M-F 5pm-10pm M-Th 7am-9am 9am-Noon Sat

33 Cardholders: Status Levels (Acct Clerk During Annual Audit)
System Readers Standard System Time Zones Perimeter Reader #1 Administration Area Reader #1 Administration Area Reader #2 H.R. Area Reader #1 9am-5pm M-F 5pm-10pm M-Th 7am-9am 9am-Noon Sat

34 Status Level Issues Limited number of time zones programmed into some systems Using time zones defined in the system may grant unnecessary access for times when administrators don’t really want the employee to have access (e.g. granting access from 5-10pm when access is only really needed until 6pm) Extending or temporarily changing access requires the creation of a new status level Administrators must remember to change that extended access back to normal access after time has passed

35 Cardholders: Area Sets
Time Zones Cardholder Access Area Sets

36 Cardholder Access Options in Geoffrey
Change Area State to “Audit” Extend access with expiration at end of audit Create “Accounting Department Time Zone” (Geoffrey has unlimited time zones)

37 Elevator Control 16th-17th June 2003 Carmel Indiana

38 GIONX24 is used with a GRCNX 8 or 16 Controller to for elevator control
Elevator Cab #1 5 Floors Reader

39 GIONX24 can be used to control multiple elevator cabs
Elevator Cab #1 10 Floors Elevator Cab #2 10 Floors Reader

40 GIONX24 can be used to control multiple elevator cabs
Elevator Cab #1 5 Floors Elevator Cab #2 5 Floors Elevator Cab #3 5 Floors Reader

41 Elevator Cab #1 3 Floors Elevator Cab #2 3 Floors GIONX24 when used for elevator control can be used in conjunction with other devices on the system.

42 Program Flash 16th-17th June 2003 Carmel Indiana

43 Program Flash Enables firmware to be flashed to Controllers and Interfaces Minimizes trips/time at customer sites No need to change chips for new or updated features

44 Guest Pass/Visitor Tracking
16th-17th June 2003 Carmel Indiana

45 Guest Pass Setting Options
Fully integrates with Geoffrey Access Control Software Operators can assign access control privileges to authorized guests Operators can be allowed to authorize guests for sign-in or sign guests in automatically Guest Pass System can require portrait and/or signature capture

46 Guest Pass Setting Options
Guest Pass System can send to the host upon their guest’s sign-in or sign-out; this can include their portrait if captured Enable label or photo ID badge to be printed or generic visitor badge to be recorded in guest record Guest Pass System requires a Primary Contact and can be configured to require a Secondary Contact as well Sign-In/Sign-Out instructions can be defined per guest Define color codes for Valid Guests, Guests about to Expire and Expired Guests

47 What is a Guest Pass Location?
A Location is any place(s) where the Geoffrey Guest Pass System is running A Location is defined as some place or places that are going to be responsible for guest acceptance. Each location defines its own Guest Pass Settings. A Guest Pass System can be installed and operated in any location where Geoffrey is running

48 Location Examples: 4 Separate Guest Pass Systems/Licenses
Office Bldg on Cabot Place West Office Bldg on The South Colonnade Office Bldg on Columbus Courtyard Office Bldg on Cabot Place East

49 Location Examples: 1 Guest Pass System/License
Office Bldg on Cabot Place West Office Bldg on The South Colonnade Office Bldg on Columbus Courtyard Office Bldg on Cabot Place East

50 Guest Pass Run Through… These examples show the Guest Pass System with all options turned on. The system can be tailored to meet your specific needs. ADD A NEW GUEST - Add a new guest to Pending, Not Authorized AUTHORIZE A GUEST - Add guest to Pending, Authorized SIGN A GUEST IN SIGN A GUEST OUT Web Interface Click here to return to the Main Menu

51

52

53

54

55

56

57

58 These are user defined fields.

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82 Guest Pass: Web Interface
Using the Geoffrey Web Interface, users can authorize guests ahead of time remotely. Using the web interface is a quick and convenient way to alert security officials of anticipated guests.

83 Geoffrey Universal Reader Interface
16th-17th June 2003 Carmel Indiana

84 Geoffrey Universal Reader Interface
A Solution for Building Owners or Property Managers Use up to Four Different Access Control Systems and Share Readers in Common Areas

85 GURI: Specifications Specialized Firmware
Use Any Wiegand Signal Output Device LED Control for Each Access Control System

86 Old Way:Here’s How It Works
Access Control System A (access granted) Access Control System B (access denied; not in controller memory) Access Control System C (access denied; not in controller memory) Present Card

87 Geoffrey Way: Here’s How It Works
Access Control System A Access Control System B X Access Control System C X GURI interprets Bit Pattern and sends the transaction to only the corresponding access control system Access Control System D X Present Card with Encoded Bit Pattern A at any Wiegand Signal Output Device No transaction is sent to the other Access Control Systems

88 One Last Note… The GURI interprets bit patterns and site codes only from Wiegand signal output devices Sample encoded cards are required for GURI setup

89 Geoffrey Hardware 16th-17th June 2003 Carmel Indiana

90 Geoffrey Hardware: How it Works for You
Compatibility Complete firmware library can interface with any readers, biometric device or access control card in the market today Economic Stability Multiple site codes and multiple bit formats Communication interface – Multiple communication channels to peripheral devices Direct connect u to 16 controllers per hardwired channel IP Addressable – virtually connect over WAN Dial up modem 254 remote locations Retrofit Hardware can be used with most current cards & existing installed card reader heads Features Reader controllers with up to 8MB of dynamically allocated memory Elevator control Copy monitor Advanced configurations to include complete hardware redundancy

91 GRCNX 8/16 – Geoffrey Reader Controller

92 Geoffrey GRCNX What does the GRCNX do? GRINX
The GRCNX contains the customer’s database, card population and access rules. It monitors the contact inputs and relay controls. The GRCNX is “blind” to the actual access device as it has already been decoded by the GRINX.

93 Geoffrey GRCNX-8/16 Features
Standard Features Up to 16 Card Reader configurations Using 8 Communication Channels (2 Readers Per Channel) Standard 1 MB Memory dynamically allocates 1000s of cardholders and transactions Two 3-Amp SP/DT Outputs and 8 Supervised or Unsupervised Inputs 7-Amp Hour Gel Cell Battery Backup for Standby Operation Flash Memory Provides Firmware Upgrades via Software Communication Link Built-In Noise Suppression Built-In Surge Suppression

94 Geoffrey GRCNX-8/16 Features
Optional Features Up to 7MB of Additional Memory (8MB Total) for Larger Databases (GMEMNX-3, GMEMNX-7) I/O Expansion Module Allows 8 Additional Supervised or Unsupervised Inputs and 12 3 AMP SP/DT Outputs for a Total 16 Inputs and 14 Relays (GIONX) Plug-in IP Addressable Board Allows Communications over Local or Wide Area Networks (TCP/IP) (GIPRCNX) Plug-in Modem can be used for Primary Dial-Up Communications or as Secondary Alarm Communication when Using Network Connection (GMODNX) GMEMNX-3 GMEMNX-7 GIONX GMODNX GIPRCNX

95 1 MB Memory (Standard) 3 MB Memory Expansion Required 7 MB Memory Expansion Required

96 GRCNX-2 Reader Controller

97 Geoffrey GRCNX-2 Features
Standard Features Standard 1 MB Memory dynamically allocates 1000s of cardholders and transactions 16 Supervised or Unsupervised Inputs, Two 3-Amp SP/DT Outputs and 4 Solid State Relays 2 Card Reader Configuration Direct Connect to Reader Heads Flash Memory Provides Firmware Upgrades via Software Communication Link Built-In Noise Suppression Built-In Surge Suppression Does not require GRINX for reader hook up Optional Features Plug-in IP Addressable Board Allows Communications over Local or Wide Area Networks (TCP/IP) Plug-in Modem Allows Dial Up Connection

98 GRINX

99 The GRINX is the System’s “Decoder”
Geoffrey GRINX The GRINX is the System’s “Decoder” GRCNX The GRINX initially decodes the technology of the Reader (card reader, biometric device, etc. The GRINX then sends all encoded information to the Reader Controller (GRCNX) which verifies user access based on the end user database.

100 GRINX Features Flash Memory Allows Download of Different Firmware Programs from PC to Allow Connection to Different Reader Technologies and Multiple Formats of Bit Patterns of Cards Has 7 Contact Inputs and 1 or 2 Output Relays (GRINX-1, GRINX-2) Can work in “degraded” mode (reads one or more site codes) if Communication Failure occurs between the Reader Controller and the Reader Interface (Note: Software Configurable per device).

101 Geoffrey Pre-Wired Enclosures
3 Choices of Enclosures: 1 GRCNX & 8 GRINXs 8 GRINXs 4 GRCNX2

102 Geoffrey Pre-Wired Enclosures
Advantages: Pre-wired and pre-tested enclosures with on-board power supplies reduce setup times Plug & Use Design – Snap on/off board replacement with pre-wired field connectors (Supports reader heads, door strikes contact inputs, data and power) Excellent solution for consistent regional or nationwide installation Reduces manpower requirements during installation and decreased disruption in client’s daily business Makes service and maintenance easy because the enclosure gives consistency to every site and reduce the training curve for personnel

103 GIONX24 Input/Output Board

104 The GIONX24 is the Easy Way to Expand
Geoffrey GIONX24 The GIONX24 is the Easy Way to Expand GRCNX Elevator or Alarm Control Can Be Integrated Using the GIONX24. GIONX24 Elevator Control is subject to GRCNX Memory Requirements. GIONX24 can attached directly to a Parent GRCNX8/16 or to a Child GRCNX8/16.

105 GIONX24: To Easily Expand A System
Provides 24 supervised contacts and 24 SP/DT Outputs Can be used as a child to a parent GRCNX8/16 in conjunction with other Reader Controllers and Reader Interfaces Any input can be associated with any output response or many output responses One or more GIONX24s can be used to provide alarm control or elevator floor control; each GIONX24 is capable of up to 24 floors (1 contact per floor subject to GRCNX memory requirements)

106 Universal Triggers 16th-17th June 2003 Carmel Indiana

107 Universal Triggers Enables an action or a series of actions to occur in response to a trigger event These trigger/action events can be sent over any or all CIMs Controllers Readers Contacts Relays

108 Quick Install 16th-17th June 2003 Carmel Indiana

109 A two door system can easily be expanded.
Serial connection

110 GXLT2: RS232 to RS485 Translator Features
GXLT2 enables PC to communicate with up to 16 GRCNX2s Ideal, cost effective solution for smaller systems Directly communicates with the PC (Max distance: 50ft) Communication between the CIM and GXLT2 is via RS232 protocol. Communication between GXLT2 and GRCNX2 boards is via RS485 protocol Max distance between GXLT2 and GRCNX2: 4,000 feet

111 Simply put…Geoffrey Quick Install
Saves hours of programming and verification time during setup Is designed exclusively to work with the GXLT translator board and the GRCNX2 Works with magnetic stripe, proximity, stand alone keypad and Wiegand output readers

112 How Quick Install Works:
The user is supplied with a database that has many essential access control features predefined The database is consistent and organized – System Manager, Automatic Override, Manual Override Definition, Manual Override and Cardholder Definition Modules are virtually preprogrammed

113 Quick Install Devices in the hardware map are color coded and easily customized: CIM-green CIM ports-red controllers-gray readers-yellow relays-dark blue contacts-maroon

114 Quick Install To “Activate” a device, simply type in the appropriate information and check “Installed”

115 Quick Install Features
Each predefined override task has all necessary actions predefined as well Example: Door contact open causes an alarm Description field names can be changed by the user to something more meaningful Example: “RCNX2 #1; Reader 1” can be changed to “3rd Floor Computer Room”

116 Quick Install Features
Geoffrey guarantees to not have any programming or typographical errors during the initial setup Cards with encoded IDs are shipped with the system to be used in conjunction with Geoffrey supplied readers for testing.

117 Quick Install Limitations
No Global Anti-Passback (Anti-passback can be obtained by creating one IN and one OUT reader on a GRCNX2) No global transaction across controller board (No triggered event on one controller board can cause an action on another controller board) Door Force Open will only work using the Geoffrey standard definition (The DOD must be defined on Input 2 or Input 4 for the RCNX2 boards. The GRCNX2 can distinguish between Door Open Detect and Door Forced Open and can be an alarmed event)

118 Redundant Recovery Solutions
16th-17th June 2003 Carmel Indiana

119 What is Redundant Recovery (RR)?
An automated method of quickly reconfiguring Reader Controllers and Geoffrey software components to use an alternate SP, Data Directory, Server or CIM when some [catastrophic] failure occurs

120 Why do customers need RR?
Minimize “down time” of Geoffrey system in a catastrophic situation Minimize the loss of data to only a few seconds or minutes instead of all data from failure to last backup which could be hours, days or weeks

121 How does Geoffrey RR work?
Geoffrey has customized Microsoft® SQL Server Replication technology to provide an application that requires little human intervention and allows for automated switchover of CIMs, SPs and/or Servers

122 Workstations 1-25+ Main CIM Cardholder Transactions
Manual Override Commands Alarmed Events Universal Triggers Authorized Operator initiates Geoffrey RR Application to begin automatic switchover Main SP Workstations 1-25+ Main Server

123 All simultaneously re-addressed
Backup CIM correctly rerouted Cardholder Transactions Manual Override Commands Alarmed Events Universal Triggers Authorized Operator initiates Geoffrey RR Application to begin automatic switchover Backup SP All simultaneously re-addressed Workstations 1-25+ Backup Server All simultaneously re-addressed

124 Why is Human Intervention Required?
RR does not monitor the Geoffrey system to determine communication failures and switch to alternate configurations automatically Some failures may not require the system to be switched over to the backup devices temporary network traffic a device rebooting some other non-critical issue

125 How is RR initiated? RR procedures are initiated by a human operator via the RR Application – a separate application from the Geoffrey System Launcher that does not rely on communication with the SP. In an emergency, this communication may be lost.

126 RR Status Monitor

127 RR Application

128 RR Definitions

129 What is the benefit of the RR Application?
The RR Application aids the operator by only having to login to the RR Application. The Operator does not need to login to each individual workstation to change the Geoffrey Registry Settings All Reader Controllers are contacted and redirected to communicate with the alternate CIM

130 Geoffrey Redundant Recovery System Summary
Minimize downtime Minimize loss of data Customized, reliable Microsoft technology Operator initiated to prevent erroneous or unnecessary switchover Reader Controllers and workstations are automatically re-addressed and directed to communicate with backup devices through RR application Alarms, transactions, triggers, etc are automatically rerouted to backup devices

131 Sample System Configurations
16th-17th June 2003 Carmel Indiana

132 Biometric Reader Proximity Reader Mag Stripe Reader Keypad Reader iClass Reader

133 Biometric Reader Proximity Reader Mag Stripe Reader Keypad Reader

134 Biometric Reader Proximity Reader Mag Stripe Reader Keypad Reader
Workstation Geoffrey File Server Biometric Reader Proximity Reader Mag Stripe Reader Keypad Reader iClass Reader

135 Biometric Reader #1 Mag Stripe Reader#4 iClass Reader #6
Proximity Reader #8 Reader #1 Reader #4 Reader #8 Geoffrey File Server Workstation 1 of 50+ ID Badging Station/ Workstation 48 of 50+ Workstation 49 of 50+ Elevator Reader

136 WAN Workstation File Server ID Badging Station/ Workstation 48 of 50+
Redundant File Server File Server

137 Time Zones & Holidays 16th-17th June 2003 Carmel Indiana

138 Local Area Network Wide Area Network European/ African File Server
Americas File Server Far East/ Australian File Server Local Area Network Wide Area Network

139 American Holiday Set: Jan 1 (New Year’s Day) Feb 17 (President’s Day) May 26 (Memorial Day) July 4 (Independence Day) Sept 1 (Labor Day) Oct 12 (Columbus Day) Nov 27 (Thanksgiving Day) Dec 25 (Christmas) Brazilian Holiday Set: March 4 (Carnaval) April 18 (Good Friday) April 21 (Tiradentes) May 1 (Labor Day) Sept 7 (Independence Day) Nov 2 (All Souls Day) English Holiday Set: April 21 (Easter Monday) May 5 (Early May Bank Holiday) May 26 (Spring Bank Holiday) Aug 25 (Summer Bank Holiday) South African Holiday Set: March 21 (Human Rights Day) April 21 (Family Day) April 27 (Freedom Day) May 1 (Workers Day) Sept 24 (Heritage Day) Dec 16 (Day of Reconciliation) Singapore Holiday Set: Feb 1 (Chinese New Year) Feb 12 (Hari Raya Haji) May 1 (Labour Day) Aug 9 (National Day) Oct 24 (Deepavali) Nov 25 (Hari Ray Puasa) Australian Holiday Set: Jan 27 (Australia Day) March 17 (Canberra Day) April 25 (Anzac Day) June 9 (Queen’s Birthday) Dec 26 (Boxing Day)

140 New York – GMT-05:00 Brazil GMT-03:00 London - GMT South African GMT+02:00 Singapore GMT+08:00 Sydney GMT+10:00

141 Main File Server – Dallas GMT-06:00
New York GMT-05:00 Los Angeles GMT-08:00 Denver GMT-07:00 Chicago GMT-06:00 Main File Server – Dallas GMT-06:00

142 Geoffrey Version 5.1 Software
16th-17th June 2003 Carmel Indiana

143 Geoffrey Software: Features that Benefit You
Compatibility Standard Operating Systems – Windows 2000/NT/XP ODBC compliant database (Microsoft SQL) Auto backups available with SQL Agent Software Convenient drag and drop features Outlook bar navigation Expandability Expansion can be over direct wire, dial up communication, local or wide area network Retrofit Import existing personnel from other systems (e.g. Human Resources)

144 Geoffrey Software: Features that Benefit You
Security Standards Meets bank industry data center security standards Secure individual administration rights over part or all of the system Run secure individual reports by login Tools Video imaging/Integrated Badging Global anti-passback Options Visitor tracking software – optional web interface available Digital video retrieval for event/video recall Customized user reports via Crystal Reports Writer Software can run as a single client or multi-client

145 A look into Version 5.1: How Geoffrey Extends Time or Expires Cardholder Access
Real Time or Pre-Set Activation, Extension or Expiration Change Access System Wide by Area By Area Set by Cardholder Category By Individual Cardholder

146 A look into Version 5.1: Wizards Make it Easy
Add new cardholders Duplicate access permissions for new cardholders Create and launch custom reports Easily operate optional guest pass software

147 A look at Version 5.1: Tools & Options
Auto schedule dial up updates to controllers “Advanced Find” allows quick and easy search of the database Optional Guest Pass System with Web Enabled Software and Wizard to easily add new guests

148 Security Tour 16th-17th June 2003 Carmel Indiana

149 Security Tour Checkpoints
Any card swipe or contact active can be a checkpoint Geoffrey allows and unlimited number of checkpoints to be entered into any tour A transaction is generated whether a checkpoint is reached or not

150 Security Tours Geoffrey allows and unlimited number of tours to be defined User Defined Tour Names User Defined number of minutes between each checkpoint – 1 minute minimum, virtually unlimited maximum Set read-only or administrative rights to each view of a tour and see all checkpoint readers/contacts regardless of system security permissions One cardholder walking per tour

151 Security Tour Transactions
Color-coded transactions report: Start/Stop Paused/Resumed Timed out Out of sequence Standard reports available with software All transactions can be alarmed and fully integrated with Geoffrey Graphics Package

152 Security Editor

153 Security Tour

154 Security Tour – Out of Sequence Notification

155 Other Features Window of time (+/-) time for to each checkpoint
Reader Initiated Start or Workstation Initiated Start Advanced find features included Right click to restart tour where “out of sequence” notification appeared allowing tour to continue without starting at initial checkpoint

156 Security Desk Checkpoint #7 Checkpoint #1 Checkpoint #5 Checkpoint #6 Checkpoint #3 Checkpoint #2 Checkpoint #4

157 Security Desk Checkpoint #7 Checkpoint #1 Checkpoint #5 Checkpoint #6 Checkpoint #3 Checkpoint #2 Checkpoint #4

158 Security Desk Checkpoint #7 Checkpoint #1 Checkpoint #5 Checkpoint #6 Checkpoint #3 Checkpoint #2 Checkpoint #4

159 12 min (±2 min) 5 min (±2 min) 15 min (±5 min) 10 min (±5 min)
Security Desk Checkpoint #7 12 min (±2 min) Checkpoint #1 5 min (±2 min) 15 min (±5 min) Checkpoint #5 Checkpoint #6 10 min (±5 min) 20 min (±7 min) Checkpoint #3 25 min (±10 min) Checkpoint #2 Checkpoint #4

160 What Offline Lock Integration Means
Combines the efficient system layout and easy programming with the convenience of offline lock capability No other parent device is required, the operator programs the offline lock into Geoffrey and then downloads the permissions to their PDA as usual and programs the individual offline locks.

161 Benefits: Program the online system and offline devices simultaneously
Relock delay is user definable Unlimited number of credentials to be assigned to each cardholder including online access cards, ibutton or PIN or any combination (e.g. access card & PIN or ibutton & PIN). PIN only or PIN & card vary per offline device Each offline lock can have its own magnetic stripe template.

162 Benefits: Activation and expiration dates are user definable per credential. Offline credential expiration defaults to one year from the date of activation. Schlage offline locks support up to 16 interval time zones and 32 holidays intervals, the operator can create these time zones and holidays in Geoffrey and designate them as “offline”. Holiday function is programmed in Geoffrey as passage, secured, lockout, etc as modeled after LockLink Express®.

163 How programming works:
Program credentials in Geoffrey Program Offline Device Offline Lock Module will indicate that programming is necessary Download credentials to PDA via Uplink

164 How transaction history works:
Using PDA, download transactions from offline device Operator is able to run reports on offline lock device transaction history and archived data Use Uplink to upload data to Geoffrey Offline Lock Module Offline Lock Module will synchronize data

165 Geoffrey Offline Lock Module
PDA Workstation Geoffrey Offline Lock Module Schlage Offline Lock

166 Online Support for the VIP Lock
Complete monitoring of door from the lockset Door position, latch position, valid and invalid credential, request to exit mechanical key override contained in the door hardware Panel interface board connects to third party access control panel Panel interface board accommodates up to 4 VIP locksets Mortise, cylindrical and exit device lock applications Connect interface board directly to panel via RS485

167 Offline Support for the CL Lock
Offline locking solution for college campuses Manage large student and faculty populations Lock and system software can accommodate an unlimited number of key cards and unique PIN codes Define access plan, user types, and campus locks via user-friendly GUI Lock definition feature allows you to restrict access based on gender and allows for ADA-specific timing. Access plan is customizable which allows the user to use their own nomenclature to name properties of their access plan.


Download ppt "Geoffrey Version 5.1.4: Cutting Edge Security Technology"

Similar presentations


Ads by Google