SlideShare a Scribd company logo
1 of 79
Warm Welcome
Presentation Agenda
•COSEC Access Control
•Applications
•COSEC Solution
•Key Features
 Advanced Access Control
 Emergency Handling
 Monitoring and Controlling
 Hardware
•Access Control Reports and Features List
COSEC Access Control
What is Access Control?
• Prevent Unauthorized Entry
• Protects and Preserves Enterprise’s Resources
• Allow Authorized People Entry at Specified Time
• Round the Clock Security
What is COSEC Access Control?
• Advanced Access Control for SOHO, SMB, SME and LE
• Fingerprint, Card and PIN
• Time, Zone and User based Access Control
• Access Zone, Access Level and Time Zone
• Employee-wise Access Rights
• Higher Security in Sensitive Area
• Alarm Monitoring and Supervision
How Access Control Works?
Access

Read

Process

Respond

User Access the
System with
Credentials

Reader Reads
Information from
Card, Biometric
ID or PIN

Compare User
Identity with Its
Database

Respond with
Allow or Deny
Command to
User /Door
Benefits of Access Control System
• Higher Security for Organization and Employees
• Protects Enterprise Assets
• Restricts Unauthorized Access
• Eliminates Lock and Key Problems
• Provides Audit Trail
• Complete History Logging
• Monitor Status of Devices throughout a Facility
•

Reduce Cost of Security Personnel
Why COSEC Access Control?
• Deliver Advanced Security Features
• Centralized Monitoring and Control
• Superior Control over Employees and Visitor Access
• User-wise Access Rights
• User, Zone and Time based Access Control
• Input and Output Port Linking
• Integration with Fire Alarm Panel, Surveillance System etc.
Target Customers...

Hospitals

Government
Organizations

Small Offices

Corporate Offices

Financial Institutes Shopping Malls

R & D Labs

Factories
Target Customers…

Remote Sites

Retail Stores

Clubs

And Many
More…
Hotels

Server Rooms

Educational
Institutes
Applications
Basic Access Control Application
COSEC Application Server

EM Lock

Ethernet

Exit Reader
COSEC
Door Controller
Basic Access Control Application
• Fig Shows COSEC Connectivity with Door Lock and Exit
Reader for an Access Control Application without any
Complex Wiring
• Door Controller is Connected with COSEC Application
Server through Ethernet
• Whole system is Centrally Monitored and Controlled by
COSEC Application Software in Real-time
Multi Floor Application
Campus Application
Canteen

Head Office

COSEC Server

R&D Lab

Door Controller

Factory
COSEC Layered Architecture
COSEC Application Software
• Complete and Powerful Web based Application Software
• Controls up to 1000 PANEL LITE and 65,000 Door Controllers
• Manage up to 1 Million Users
• Time-attendance, Access Control, Leave Management,
Visitor Management, Employee Self Service, Roster
Management and e-Canteen Management
• Real-time Monitoring and Control
• Comprehensive Reports Generation
• Integration with ERP, Active Directory, HRM, Tally and
Payroll
COSEC Hardware Solution
COSEC PANEL LITE
• Controls up to 75 Door Controllers
 Maximum 75 Door Controllers on Ethernet
 Maximum 32 Door Controllers on RS-485
• Ethernet, RS-485, Wi-Fi and 3G Interface
• 25,000 Users Capacity
• Store 1,00,000 Events in Log
• Supervised Alarm Input Port and Auxiliary Output Relay
Contact
• Built-in USB Port
• Audio Visual Indication in terms of LEDs and Buzzer
When COSEC PANEL LITE is Required ?
• When More than 2000 Users per Door Controller are Required
• Greater than 50,000, Local Events Storage is Required
• When below Additional Security Features are Needed:

 Access Groups

 Home Zone

 Access Levels

 Visit Zone

 Day Light Saving

 Input-output Ports Link

 Dead-Man Zone

 Man Trap

 Do Not Disturb

 Soft Override

 Duress Detection

 Time Zone based Access

 Who’s In

 Guard Tour
COSEC PANEL LITE Connectivity
COSEC Door
• 128×64 Dot Matrix Display with Backlit
• 16 Touch Sense Keys
• Fingerprint and Card Reader
• Ethernet, RS-485 and Wi-Fi Interface
• 50,000 Events Storage
• Built-in Auxiliary Input, Auxiliary Output and Relay Port
• 4 LEDs and Buzzer
• USB Port for Data Transfer and 3G Connectivity
COSEC Door Connectivity
COSEC Door Series Models

CAP

FOP

FOW

FOT
COSEC PATH Series Models

DCCX

DCFX

X = E: EM Proximity Card, I: HID iClASS Card, M: Mifare Smart Card
COSEC NGT Series Model

NGT FCX
COSEC Reader
Exit Reader
• Fingerprint or Contactless Card Reader
• Wiegand and RS-232 Interface
• Allowed, Denied, Status and Alarm LEDs
• Built-in Buzzer
• Power Supply from COSEC Door
Card based Readers

COSEC READER CA

COSEC PATH RDCE COSEC PATH RDCM COSEC PATH RDCI
Fingerprint based Readers

COSEC READER FO

COSEC PATH RDFE

COSEC PATH RDFM

COSEC PATH RDFI
COSEC Enrollment Station
• Enrollment Stations for Easy User Enrollment
• Card and Finger Enrollment
• Desktop based Devices
COSEC Card Personality Module
• Pluggable Card Reader Module
• Inserted at the backside of COSEC Door Controller and COSEC
READER CA
• EM PROX
• HID PROX
• HID iCLASS
• Mifare

COSEC CPM
Electronic Lock
• COSEC Door Controller Supports Various Electronic Locks
 Electro Magnetic Lock
 Bolt Lock
 Strike Lock
Key Features
Access Group
• Group of Persons Carrying Similar Work Profile
• Easy to Assign Same Access Policies
• Supports up to 99 Access Groups
Access Group-1

Access Group-2
Access Zone
•
•
•
•

Controlled Area to Keep Out Unauthorized Users
Multiple Zones can be Created on Requirement
Creation of Sub Zones or Logical Zones Inside a Single Zone
Various Time based Access Policies can be Assigned to a Zone
Dispatch

Documentation

Main Zones
Sub Zones

QC
Production

`

Manufacturing

Hardware
R&D

Software
Access Levels
• Give Rights to a User to Enter into a Controlled Area or a Zone
• Up to 15 Access Levels for Zones and Users
• If User Access Level is Higher than or Equal to Zone Access
Level, User is Allowed in that Zone
• Different Access Levels During Working Hours, Break Hours and
Non-working Hours
Access Level based Access
Zone Access Level 8

User Access Level =>8
Home Zone
• Pre-defined Area for an User to Work
• Allow User to Access the Zone without Checking his Access
Level during Working and Break Hours
• User’s Access Level is Checked During Non-Working Hours
Zone Access Mode
• Various Zone Access Modes to Enable Users to Access a Zone
• Administrator can Select more than One Mode for Higher
Security
• Flexibility to Select Zone Access Mode
 Card
Fingerprint
PIN + Card + Fingerprint

 Card + Fingerprint
 Card + PIN
 Fingerprint + PIN
 Any
2-Person Access
• Access is Allowed only when Two Authorized Persons Use
their Access Rights within a Defined Amount of Time
• Maximum 16 Groups with 20 Users in Each Group
• Useful for High Security Areas like ATM, Record Room, Safe
Deposit Vault etc.
First-in User
• Door Opens Only after Designated Person Make the First Entry
• 4 First-in User Lists with 25 Users in Each List
• Useful for Areas where Supervisor needs to Make First Entry
followed by Workers
Occupancy Control
• Controls Number of Users in a Controlled Area or a Zone
• Users are Restricted after Pre-defined Number is Reached
• Great Use in Conference Hall, Canteen, Public Hall etc.,
where Limited Space is Available
Man-Trap
•
•
•
•
•

Useful for Multiple Doors, Arranged in a Sequence
Regulate Opening and Closing of Doors
Second Door will Open only After First Door has Closed
Manage Traffic and Control Dust and Heat
Useful to Restrict Intruder from Escaping the Premises
Quickly
• Mantrap wait & Door Pulse timer limit is 65535 seconds.
Do Not Disturb(DND) Zone
• User Entry is Restricted in a DND Zone
• Administrator can Declare any Zone as a DND Zone
• Zone Access Level is Changed to Highest
• VIP can Override this Zone
• Useful for Business Meeting, Seminar, Operation Theater etc.
where Privacy is Vital

D
N
D
Anti-Pass Back
• Prevent a Card Holder from Passing his Card back to a Second
Person to Gain Entry in a Controlled Area
• Card Holder can Make Re-entry only after Exit Mark
• Useful for Maintaining Accurate Record of the Number of
People in a Controlled Area
• Two Modes:
 Anti-Pass Back Local
 Anti-Pass Back Global
• Two Types:
 Hard Anti-Pass Back: Does not Allow User but Keep Log in
the System
 Soft Anti-Pass Back: Allow User with Log In the System
Blocked User
• Blocked Users are Restricted from using their Access Rights
• Access Privileges are Withdrawn Temporarily, but not the
Deletion of Identity from the Database
• System Blocks User for
• Absentee User
• Consecutive Attempts to Access Unauthorized Zone
• Consecutive Attempts per Minutes in a Authorized Zone
VIP Access
• Empower User to Access any Controlled Area or a Zone
• Any Person Holding VIP Label has Highest Access Level(15)
• Administrator can Assign VIP Access to any User
Guard Tour
• Ensures that Security Guard makes Round of the Facility During
Non- working Hours
• Guard has to Show his Identity on Various Check Points on
Specified Time
• Record can be viewed later by System Administrator
• System can assign up to Four Cards
Facility Code
• Unique Number String Encoded on Card
• Common Code for Entire Organisation
• System Identify User based on his Basic Identity(Facility
Code) to Grant Permission
• Very Useful when System is in a Degraded Mode

Facility Code
DVR Integration
• Matrix/Dahua DVR can be Integrated with COSEC
• Capture Photograph of an User on Allowed or Denied
• Administrator can Check from Software who have Access the
Door
• Very Important for Security and Attendance Purpose
Dead-Man Zone
• Zone or Area where there is a Threat of Person’s Physical
Safety
• Administrator can Declare any Zone as a Dead-Man Zone
• User has to Show his Identity every time before Expiration of
Predefined Time Period
• Once Timer is Expired, Alarm Gets Activated
• Very Useful Feature for Users who are Working in Mines,
Chemical Plants, Nuclear Lab etc.
Tamper Detection
• System Generates Alarm on Detection of any Tampering
• Tamper Detection on Door Controller and Reader
• Generates Alarm on Door Controller
• Can be Disabled Temporarily for Maintenance Purpose
• Useful Security Feature
Smart Identification
• It helps in overcoming limitation of number of users
• Uses information stored in smart card
• No need to store any information in door controller
• Number of users passing through door controller can be
unlimited
Emergency Handling
Degrade Mode

System will Switch
into Degrade Mode
Duress Detection
• Useful Feature when User is Forced to Use his Access Rights
Under Threat
• User Need to Dial his Access Code Followed by a Secret Code
for Duress Detection
• System Opens the Door and at the Same Time Informs
Concerned Person without Giving any Local Alarm
• Great Security Feature
Soft Override Feature
• Deactivate Various Functions Temporary from Monitoring
Window
• Temporally Deactivate Functions
• Features can be Disable like:
 2-Person Rule
 First-In User Rule
 Open Door Lock
 Lock Door
Who’s In
• Generate List of Users Inside a Controlled Area at that
Particular Time
• Useful in Emergency
Monitoring and Controlling
COSEC Live Monitoring Window
• Real-time Events Monitoring and Control
• Live Status of Door Controllers and PANEL LITE
• Alarm Monitoring and Control
• Firmware Up gradation
• Temporary Deactivate Function/Features
• Auxiliary Input and Output Status
• Automatic Events Download
Input-Output Groups and Linking
• Link Input and Output Port of the COSEC Door Controller and
PANEL LITE
• Automatically Activate Output Port on Activation of Input
Port
• Program Various Functions Like:
•

Unlock Door on Fire Detection

•

Capture User Photo when he is Allowed

•

Start Video Recording on any Motion Detected
Alarm
• Various Alarms on the Occurrence of Pre-defined Situations
• Available on both PANEL LITE and Door Controllers
• Built-in Alarm Detection and Management
• Admin can Control, Acknowledge, Clear and Monitor Alarm in a
Real-time
• Various Alarms Like Tamper Alarm, Mains Fail, Battery Fail
Alarm etc.
• Audio Visual Indication in terms of LEDs and Buzzer
Time-Trigger Function
• Automatically Activate Output Port based on Pre-defined Time
• Used for many Time based Applications
• School Bell, Siren, Camera etc. can be Activated without any
Manual Involvement
Hardware Connections
Auxiliary Ports
•
•
•
•
•

Auxiliary Input and Output Port
Input Port for Connecting Smoke Detector, Sensor etc.
Output Port for Connecting Siren, Strobe etc.
Available on both PANEL LITE and Door Controllers
Can be Programmed for Various Applications Like Camera
should Start Recording when any Motion is Detected in the
Premises
USB Connectivity
• Easy Data Transfer from Controller to Server
• Easy Firmware Upgrade of Door Controller and PANEL LITE
• No Physical Connectivity is Required between Door Controller
and Server
• Ideal Application for Remote Applications
• For Connecting Wi-Fi or 3G/GSM/GPRS/CDMA Modems
Wi-Fi Connectivity
• Simple Connectivity between Controller and Server
• No Wiring is Required
• Real-time Events and Report Generation
• Ideal for Applications where Ethernet is not Possible because
of Aesthetic Purpose or Architectural Limitations
3G Connectivity
• Wireless Connectivity between DOORs/PANEL LITE and Server
• Faster Data Transactions over 3G Communication Speed
• Real-time Events and Report Generation
• Perfect for Remote Location Applications where Ethernet or
RS-485 is Not Possible
Access Control Reports
Access Control Reports List
Reports List
• Access Zone
• Access Group
• Access Group-wise Time Zone
• Functional Group
• Time Zone
• 2-Person Rule
• First-In User
• Guard Tour
• Input Port Group
• Output Port Group
• Door Held Open
• Zone Accessed by User
Guard Tour Report
Zone Accessed by User
Door Held Open
I/O Linking Report
Feature List
Feature list

*These features are available with COSEC PANEL LITE
Feature List
For Further Information Please Contact:
Email ID: Security@MatrixComSec.com
Tel: +91 265 2630555
Visit us at www.MatrixComSec.com
Version: V2R1

More Related Content

What's hot

Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
NCS Computech Ltd.
 

What's hot (20)

The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?
 
How Ignition Eases SCADA Pain Points
How Ignition Eases SCADA Pain PointsHow Ignition Eases SCADA Pain Points
How Ignition Eases SCADA Pain Points
 
001 introduction Fortigate Administration Introduction
001 introduction Fortigate Administration  Introduction001 introduction Fortigate Administration  Introduction
001 introduction Fortigate Administration Introduction
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
ClearPass Guest Overview
ClearPass Guest Overview ClearPass Guest Overview
ClearPass Guest Overview
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Single Sign On - The Basics
Single Sign On - The BasicsSingle Sign On - The Basics
Single Sign On - The Basics
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
Hotel network scenario implementation
Hotel network scenario implementation Hotel network scenario implementation
Hotel network scenario implementation
 

Viewers also liked

Auto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scannerAuto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scanner
Subin S.B
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
Trevor Parsons
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
Karmesh Maheshwari
 

Viewers also liked (20)

Slide 5 keys
Slide 5 keysSlide 5 keys
Slide 5 keys
 
Managing Attendance Effectively
Managing Attendance EffectivelyManaging Attendance Effectively
Managing Attendance Effectively
 
Fingerprint Time Attendance Management System Bangalore - 09066656366
Fingerprint Time Attendance Management System Bangalore - 09066656366Fingerprint Time Attendance Management System Bangalore - 09066656366
Fingerprint Time Attendance Management System Bangalore - 09066656366
 
TimeTrax: Biometric Based Attendance System
TimeTrax: Biometric Based Attendance SystemTimeTrax: Biometric Based Attendance System
TimeTrax: Biometric Based Attendance System
 
Attendance Management: Getting Staff to Come to Work
Attendance Management: Getting Staff to Come to WorkAttendance Management: Getting Staff to Come to Work
Attendance Management: Getting Staff to Come to Work
 
Auto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scannerAuto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scanner
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI Technology
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Why Do You Need BIO-METRIC Time and Attendance?
Why Do You Need BIO-METRIC Time and Attendance?Why Do You Need BIO-METRIC Time and Attendance?
Why Do You Need BIO-METRIC Time and Attendance?
 
BAASS Connect 2013 - Time and Attendance
BAASS Connect 2013 - Time and AttendanceBAASS Connect 2013 - Time and Attendance
BAASS Connect 2013 - Time and Attendance
 
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENTENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
 
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
 
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Cuckoo - Time & Attendance by Opportune
Cuckoo - Time & Attendance by OpportuneCuckoo - Time & Attendance by Opportune
Cuckoo - Time & Attendance by Opportune
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door Unlocking
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...
MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...
MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...
 

Similar to Matrix Security Solutions: COSEC - Access Control and Time-Attendance

experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
PawachMetharattanara
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
Walter Sinchak,
 

Similar to Matrix Security Solutions: COSEC - Access Control and Time-Attendance (20)

Access control system
Access control systemAccess control system
Access control system
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Bosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data SheetBosch AIM-AEC21-CVT Data Sheet
Bosch AIM-AEC21-CVT Data Sheet
 
Company Profile 2023 updated.pdf
Company Profile 2023 updated.pdfCompany Profile 2023 updated.pdf
Company Profile 2023 updated.pdf
 
MATRIX Cosec Introduction New
MATRIX Cosec Introduction NewMATRIX Cosec Introduction New
MATRIX Cosec Introduction New
 
Matrix People Mobility Solution
Matrix People Mobility SolutionMatrix People Mobility Solution
Matrix People Mobility Solution
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
System 6000
System 6000System 6000
System 6000
 
Group6 presentation
Group6 presentationGroup6 presentation
Group6 presentation
 
Moxa iologik 2242 brochure
Moxa iologik 2242 brochureMoxa iologik 2242 brochure
Moxa iologik 2242 brochure
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Desklinc cut-sheet
Desklinc cut-sheetDesklinc cut-sheet
Desklinc cut-sheet
 
Gate pass management system ppt
Gate pass  management system pptGate pass  management system ppt
Gate pass management system ppt
 
RFID implementation in libraries
RFID implementation in librariesRFID implementation in libraries
RFID implementation in libraries
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 

More from Matrix Comsec

More from Matrix Comsec (20)

Time Attendance Management System
Time Attendance Management SystemTime Attendance Management System
Time Attendance Management System
 
Video Management Solution Providers India
Video Management Solution Providers IndiaVideo Management Solution Providers India
Video Management Solution Providers India
 
Hybrid Video Surveillance Systems India | Video Surveillance
Hybrid Video Surveillance Systems India | Video SurveillanceHybrid Video Surveillance Systems India | Video Surveillance
Hybrid Video Surveillance Systems India | Video Surveillance
 
Become a Partner: A Few Good Reasons why it Makes Sense to PARTNER WITH MATRIX
Become a  Partner: A Few Good Reasons why it Makes Sense to PARTNER WITH MATRIXBecome a  Partner: A Few Good Reasons why it Makes Sense to PARTNER WITH MATRIX
Become a Partner: A Few Good Reasons why it Makes Sense to PARTNER WITH MATRIX
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 
Matrix Telecom Solutions: SETU VGB - Fixed VoIP to GSM/3G-ISDN BRI Gateway
Matrix Telecom Solutions: SETU VGB - Fixed VoIP to GSM/3G-ISDN BRI GatewayMatrix Telecom Solutions: SETU VGB - Fixed VoIP to GSM/3G-ISDN BRI Gateway
Matrix Telecom Solutions: SETU VGB - Fixed VoIP to GSM/3G-ISDN BRI Gateway
 
Matrix Telecom Solutions: User Terminals Introduction
Matrix Telecom Solutions: User Terminals IntroductionMatrix Telecom Solutions: User Terminals Introduction
Matrix Telecom Solutions: User Terminals Introduction
 
Matrix Telecom Solutions: VISION - The Office Communicator
Matrix Telecom Solutions: VISION - The Office CommunicatorMatrix Telecom Solutions: VISION - The Office Communicator
Matrix Telecom Solutions: VISION - The Office Communicator
 
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
 
Matrix Telecom Solutions: ETERNITY MEX - The ULSB MK III Switch
Matrix Telecom Solutions: ETERNITY MEX - The ULSB MK III SwitchMatrix Telecom Solutions: ETERNITY MEX - The ULSB MK III Switch
Matrix Telecom Solutions: ETERNITY MEX - The ULSB MK III Switch
 
Matrix Telecom Solutions: SPARSH VP248 - Feature-rich SIP Phones
Matrix Telecom Solutions: SPARSH VP248 - Feature-rich SIP PhonesMatrix Telecom Solutions: SPARSH VP248 - Feature-rich SIP Phones
Matrix Telecom Solutions: SPARSH VP248 - Feature-rich SIP Phones
 
Matrix Telecom Solutions: NAVAN CNX200 - Office-in-a-Box Solution for Small B...
Matrix Telecom Solutions: NAVAN CNX200 - Office-in-a-Box Solution for Small B...Matrix Telecom Solutions: NAVAN CNX200 - Office-in-a-Box Solution for Small B...
Matrix Telecom Solutions: NAVAN CNX200 - Office-in-a-Box Solution for Small B...
 
Matrix Security Solutions: SATATYA HVR - Hybrid Video Recorders
Matrix Security Solutions: SATATYA HVR - Hybrid Video RecordersMatrix Security Solutions: SATATYA HVR - Hybrid Video Recorders
Matrix Security Solutions: SATATYA HVR - Hybrid Video Recorders
 
Matrix Security Solutions: SATATYA NVR - Network Video Recorder
Matrix Security Solutions: SATATYA NVR - Network Video RecorderMatrix Security Solutions: SATATYA NVR - Network Video Recorder
Matrix Security Solutions: SATATYA NVR - Network Video Recorder
 
Matrix e-Canteen Management (CMM)
Matrix e-Canteen Management (CMM)Matrix e-Canteen Management (CMM)
Matrix e-Canteen Management (CMM)
 
Roster Management Module (RSM)
Roster Management Module (RSM)Roster Management Module (RSM)
Roster Management Module (RSM)
 
Matrix Security Solutions: SATATYA DVR - Digital Video Recorders
Matrix Security Solutions: SATATYA DVR -  Digital Video RecordersMatrix Security Solutions: SATATYA DVR -  Digital Video Recorders
Matrix Security Solutions: SATATYA DVR - Digital Video Recorders
 
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI GatewayMatrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
 
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VGFX  - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...Matrix Telecom Solutions: SETU VGFX  - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
 
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFXTH  - Fixed VoIP to FXO-FXS GatewaysMatrix Telecom Solutions: SETU VFXTH  - Fixed VoIP to FXO-FXS Gateways
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Matrix Security Solutions: COSEC - Access Control and Time-Attendance

  • 2. Presentation Agenda •COSEC Access Control •Applications •COSEC Solution •Key Features  Advanced Access Control  Emergency Handling  Monitoring and Controlling  Hardware •Access Control Reports and Features List
  • 4. What is Access Control? • Prevent Unauthorized Entry • Protects and Preserves Enterprise’s Resources • Allow Authorized People Entry at Specified Time • Round the Clock Security
  • 5. What is COSEC Access Control? • Advanced Access Control for SOHO, SMB, SME and LE • Fingerprint, Card and PIN • Time, Zone and User based Access Control • Access Zone, Access Level and Time Zone • Employee-wise Access Rights • Higher Security in Sensitive Area • Alarm Monitoring and Supervision
  • 6. How Access Control Works? Access Read Process Respond User Access the System with Credentials Reader Reads Information from Card, Biometric ID or PIN Compare User Identity with Its Database Respond with Allow or Deny Command to User /Door
  • 7. Benefits of Access Control System • Higher Security for Organization and Employees • Protects Enterprise Assets • Restricts Unauthorized Access • Eliminates Lock and Key Problems • Provides Audit Trail • Complete History Logging • Monitor Status of Devices throughout a Facility • Reduce Cost of Security Personnel
  • 8. Why COSEC Access Control? • Deliver Advanced Security Features • Centralized Monitoring and Control • Superior Control over Employees and Visitor Access • User-wise Access Rights • User, Zone and Time based Access Control • Input and Output Port Linking • Integration with Fire Alarm Panel, Surveillance System etc.
  • 9. Target Customers... Hospitals Government Organizations Small Offices Corporate Offices Financial Institutes Shopping Malls R & D Labs Factories
  • 10. Target Customers… Remote Sites Retail Stores Clubs And Many More… Hotels Server Rooms Educational Institutes
  • 12. Basic Access Control Application COSEC Application Server EM Lock Ethernet Exit Reader COSEC Door Controller
  • 13. Basic Access Control Application • Fig Shows COSEC Connectivity with Door Lock and Exit Reader for an Access Control Application without any Complex Wiring • Door Controller is Connected with COSEC Application Server through Ethernet • Whole system is Centrally Monitored and Controlled by COSEC Application Software in Real-time
  • 15. Campus Application Canteen Head Office COSEC Server R&D Lab Door Controller Factory
  • 17. COSEC Application Software • Complete and Powerful Web based Application Software • Controls up to 1000 PANEL LITE and 65,000 Door Controllers • Manage up to 1 Million Users • Time-attendance, Access Control, Leave Management, Visitor Management, Employee Self Service, Roster Management and e-Canteen Management • Real-time Monitoring and Control • Comprehensive Reports Generation • Integration with ERP, Active Directory, HRM, Tally and Payroll
  • 19. COSEC PANEL LITE • Controls up to 75 Door Controllers  Maximum 75 Door Controllers on Ethernet  Maximum 32 Door Controllers on RS-485 • Ethernet, RS-485, Wi-Fi and 3G Interface • 25,000 Users Capacity • Store 1,00,000 Events in Log • Supervised Alarm Input Port and Auxiliary Output Relay Contact • Built-in USB Port • Audio Visual Indication in terms of LEDs and Buzzer
  • 20. When COSEC PANEL LITE is Required ? • When More than 2000 Users per Door Controller are Required • Greater than 50,000, Local Events Storage is Required • When below Additional Security Features are Needed:  Access Groups  Home Zone  Access Levels  Visit Zone  Day Light Saving  Input-output Ports Link  Dead-Man Zone  Man Trap  Do Not Disturb  Soft Override  Duress Detection  Time Zone based Access  Who’s In  Guard Tour
  • 21. COSEC PANEL LITE Connectivity
  • 22. COSEC Door • 128×64 Dot Matrix Display with Backlit • 16 Touch Sense Keys • Fingerprint and Card Reader • Ethernet, RS-485 and Wi-Fi Interface • 50,000 Events Storage • Built-in Auxiliary Input, Auxiliary Output and Relay Port • 4 LEDs and Buzzer • USB Port for Data Transfer and 3G Connectivity
  • 24. COSEC Door Series Models CAP FOP FOW FOT
  • 25. COSEC PATH Series Models DCCX DCFX X = E: EM Proximity Card, I: HID iClASS Card, M: Mifare Smart Card
  • 26. COSEC NGT Series Model NGT FCX
  • 27. COSEC Reader Exit Reader • Fingerprint or Contactless Card Reader • Wiegand and RS-232 Interface • Allowed, Denied, Status and Alarm LEDs • Built-in Buzzer • Power Supply from COSEC Door
  • 28. Card based Readers COSEC READER CA COSEC PATH RDCE COSEC PATH RDCM COSEC PATH RDCI
  • 29. Fingerprint based Readers COSEC READER FO COSEC PATH RDFE COSEC PATH RDFM COSEC PATH RDFI
  • 30. COSEC Enrollment Station • Enrollment Stations for Easy User Enrollment • Card and Finger Enrollment • Desktop based Devices
  • 31. COSEC Card Personality Module • Pluggable Card Reader Module • Inserted at the backside of COSEC Door Controller and COSEC READER CA • EM PROX • HID PROX • HID iCLASS • Mifare COSEC CPM
  • 32. Electronic Lock • COSEC Door Controller Supports Various Electronic Locks  Electro Magnetic Lock  Bolt Lock  Strike Lock
  • 34. Access Group • Group of Persons Carrying Similar Work Profile • Easy to Assign Same Access Policies • Supports up to 99 Access Groups Access Group-1 Access Group-2
  • 35. Access Zone • • • • Controlled Area to Keep Out Unauthorized Users Multiple Zones can be Created on Requirement Creation of Sub Zones or Logical Zones Inside a Single Zone Various Time based Access Policies can be Assigned to a Zone Dispatch Documentation Main Zones Sub Zones QC Production ` Manufacturing Hardware R&D Software
  • 36. Access Levels • Give Rights to a User to Enter into a Controlled Area or a Zone • Up to 15 Access Levels for Zones and Users • If User Access Level is Higher than or Equal to Zone Access Level, User is Allowed in that Zone • Different Access Levels During Working Hours, Break Hours and Non-working Hours
  • 37. Access Level based Access Zone Access Level 8 User Access Level =>8
  • 38. Home Zone • Pre-defined Area for an User to Work • Allow User to Access the Zone without Checking his Access Level during Working and Break Hours • User’s Access Level is Checked During Non-Working Hours
  • 39. Zone Access Mode • Various Zone Access Modes to Enable Users to Access a Zone • Administrator can Select more than One Mode for Higher Security • Flexibility to Select Zone Access Mode  Card Fingerprint PIN + Card + Fingerprint  Card + Fingerprint  Card + PIN  Fingerprint + PIN  Any
  • 40. 2-Person Access • Access is Allowed only when Two Authorized Persons Use their Access Rights within a Defined Amount of Time • Maximum 16 Groups with 20 Users in Each Group • Useful for High Security Areas like ATM, Record Room, Safe Deposit Vault etc.
  • 41. First-in User • Door Opens Only after Designated Person Make the First Entry • 4 First-in User Lists with 25 Users in Each List • Useful for Areas where Supervisor needs to Make First Entry followed by Workers
  • 42. Occupancy Control • Controls Number of Users in a Controlled Area or a Zone • Users are Restricted after Pre-defined Number is Reached • Great Use in Conference Hall, Canteen, Public Hall etc., where Limited Space is Available
  • 43. Man-Trap • • • • • Useful for Multiple Doors, Arranged in a Sequence Regulate Opening and Closing of Doors Second Door will Open only After First Door has Closed Manage Traffic and Control Dust and Heat Useful to Restrict Intruder from Escaping the Premises Quickly • Mantrap wait & Door Pulse timer limit is 65535 seconds.
  • 44. Do Not Disturb(DND) Zone • User Entry is Restricted in a DND Zone • Administrator can Declare any Zone as a DND Zone • Zone Access Level is Changed to Highest • VIP can Override this Zone • Useful for Business Meeting, Seminar, Operation Theater etc. where Privacy is Vital D N D
  • 45. Anti-Pass Back • Prevent a Card Holder from Passing his Card back to a Second Person to Gain Entry in a Controlled Area • Card Holder can Make Re-entry only after Exit Mark • Useful for Maintaining Accurate Record of the Number of People in a Controlled Area • Two Modes:  Anti-Pass Back Local  Anti-Pass Back Global • Two Types:  Hard Anti-Pass Back: Does not Allow User but Keep Log in the System  Soft Anti-Pass Back: Allow User with Log In the System
  • 46. Blocked User • Blocked Users are Restricted from using their Access Rights • Access Privileges are Withdrawn Temporarily, but not the Deletion of Identity from the Database • System Blocks User for • Absentee User • Consecutive Attempts to Access Unauthorized Zone • Consecutive Attempts per Minutes in a Authorized Zone
  • 47. VIP Access • Empower User to Access any Controlled Area or a Zone • Any Person Holding VIP Label has Highest Access Level(15) • Administrator can Assign VIP Access to any User
  • 48. Guard Tour • Ensures that Security Guard makes Round of the Facility During Non- working Hours • Guard has to Show his Identity on Various Check Points on Specified Time • Record can be viewed later by System Administrator • System can assign up to Four Cards
  • 49. Facility Code • Unique Number String Encoded on Card • Common Code for Entire Organisation • System Identify User based on his Basic Identity(Facility Code) to Grant Permission • Very Useful when System is in a Degraded Mode Facility Code
  • 50. DVR Integration • Matrix/Dahua DVR can be Integrated with COSEC • Capture Photograph of an User on Allowed or Denied • Administrator can Check from Software who have Access the Door • Very Important for Security and Attendance Purpose
  • 51. Dead-Man Zone • Zone or Area where there is a Threat of Person’s Physical Safety • Administrator can Declare any Zone as a Dead-Man Zone • User has to Show his Identity every time before Expiration of Predefined Time Period • Once Timer is Expired, Alarm Gets Activated • Very Useful Feature for Users who are Working in Mines, Chemical Plants, Nuclear Lab etc.
  • 52. Tamper Detection • System Generates Alarm on Detection of any Tampering • Tamper Detection on Door Controller and Reader • Generates Alarm on Door Controller • Can be Disabled Temporarily for Maintenance Purpose • Useful Security Feature
  • 53. Smart Identification • It helps in overcoming limitation of number of users • Uses information stored in smart card • No need to store any information in door controller • Number of users passing through door controller can be unlimited
  • 55. Degrade Mode System will Switch into Degrade Mode
  • 56. Duress Detection • Useful Feature when User is Forced to Use his Access Rights Under Threat • User Need to Dial his Access Code Followed by a Secret Code for Duress Detection • System Opens the Door and at the Same Time Informs Concerned Person without Giving any Local Alarm • Great Security Feature
  • 57. Soft Override Feature • Deactivate Various Functions Temporary from Monitoring Window • Temporally Deactivate Functions • Features can be Disable like:  2-Person Rule  First-In User Rule  Open Door Lock  Lock Door
  • 58. Who’s In • Generate List of Users Inside a Controlled Area at that Particular Time • Useful in Emergency
  • 60. COSEC Live Monitoring Window • Real-time Events Monitoring and Control • Live Status of Door Controllers and PANEL LITE • Alarm Monitoring and Control • Firmware Up gradation • Temporary Deactivate Function/Features • Auxiliary Input and Output Status • Automatic Events Download
  • 61. Input-Output Groups and Linking • Link Input and Output Port of the COSEC Door Controller and PANEL LITE • Automatically Activate Output Port on Activation of Input Port • Program Various Functions Like: • Unlock Door on Fire Detection • Capture User Photo when he is Allowed • Start Video Recording on any Motion Detected
  • 62. Alarm • Various Alarms on the Occurrence of Pre-defined Situations • Available on both PANEL LITE and Door Controllers • Built-in Alarm Detection and Management • Admin can Control, Acknowledge, Clear and Monitor Alarm in a Real-time • Various Alarms Like Tamper Alarm, Mains Fail, Battery Fail Alarm etc. • Audio Visual Indication in terms of LEDs and Buzzer
  • 63. Time-Trigger Function • Automatically Activate Output Port based on Pre-defined Time • Used for many Time based Applications • School Bell, Siren, Camera etc. can be Activated without any Manual Involvement
  • 65. Auxiliary Ports • • • • • Auxiliary Input and Output Port Input Port for Connecting Smoke Detector, Sensor etc. Output Port for Connecting Siren, Strobe etc. Available on both PANEL LITE and Door Controllers Can be Programmed for Various Applications Like Camera should Start Recording when any Motion is Detected in the Premises
  • 66. USB Connectivity • Easy Data Transfer from Controller to Server • Easy Firmware Upgrade of Door Controller and PANEL LITE • No Physical Connectivity is Required between Door Controller and Server • Ideal Application for Remote Applications • For Connecting Wi-Fi or 3G/GSM/GPRS/CDMA Modems
  • 67. Wi-Fi Connectivity • Simple Connectivity between Controller and Server • No Wiring is Required • Real-time Events and Report Generation • Ideal for Applications where Ethernet is not Possible because of Aesthetic Purpose or Architectural Limitations
  • 68. 3G Connectivity • Wireless Connectivity between DOORs/PANEL LITE and Server • Faster Data Transactions over 3G Communication Speed • Real-time Events and Report Generation • Perfect for Remote Location Applications where Ethernet or RS-485 is Not Possible
  • 70. Access Control Reports List Reports List • Access Zone • Access Group • Access Group-wise Time Zone • Functional Group • Time Zone • 2-Person Rule • First-In User • Guard Tour • Input Port Group • Output Port Group • Door Held Open • Zone Accessed by User
  • 76. Feature list *These features are available with COSEC PANEL LITE
  • 78.
  • 79. For Further Information Please Contact: Email ID: Security@MatrixComSec.com Tel: +91 265 2630555 Visit us at www.MatrixComSec.com Version: V2R1

Editor's Notes

  1. Prevent Unauthorized Entry – Function Protects and Preserves Enterprise’s Resources Restrict Unauthorized Entry Allow Authorized People Entry at Specified Time Round the Clock Security
  2. Keys can't be regulated and if they are lost or stolen can pose an immense security threat to your organization unless new locks are installed. For large companies, this can be an expensive and time consuming proposition
  3. Fig shows a typical deployment of COSEC in a multi-floor building for access control. Door Controllers are connected with the COSEC PANEL, installed at various floors with exit reader or exit switch to control entry of a person with various access control policies. This complete system is monitored and controlled by COSEC Software in real time.
  4. Fig shows the COSEC installation in an organization campus for access control. Door controllers are installed at various divisions of the organization and they are centrally connected with a PANEL. This complete system is monitored and controlled by COSEC application software. Various access control and time-attendance policies can be applied for each door controller.
  5. Above Diagram shows basic master-Slave architecture of COSEC where all Door Controllers(Slave) are connected with Master Controller either through Ethernet or RS-485. Master Controller supports up to 75 door controllers. Maximum 32 door controllers are Possible with RS-485 All 75 door controllers can be connected with Ethernet Computers are used for programming, monitoring and controlling application