SlideShare a Scribd company logo
1 of 18
Introduction to Access Control
Integration
SECURITY ● PRODUCTIVITY ● SAVINGS
Presenters: Mark Phelan, Alan Christie
Start Time: 9.30am
Shortly before the start time shown above, the presenter will arrive
– please hold until then.
 Can you hear me OK?
• If not, please advise via the question panel
 Questions + feedback
• Send in via the panel as you think of them
• Invite input at the end of each section
• Off-line discussions
 Presentation slides: Available on request
AIT Formalities
 Review of access control challenges & benefits
 Core system features & How it works
 System integration
 Getting the right information.
 Database management for initial set-up
 On-going integration
 1-click card printing
 Make your system smarter
 Summary
AIT Agenda
AIT Modernising your system - why not?
• AIT can provide you as much integration
as possible to help the system manage
itself.
No-one to
manage the new
system
• You need a solution that is fully scalable
so you can upgrade at your own paceToo many doors.
• With our unique solution a new system
may be much cheaper than you think.
Very little budget
available.
• AIT experts would visit your site, assess
your requirements and provide you a
range of options.
Unsure where to
start
AIT Modernising your system - benefits
Centrally controlled access
• It is a simple system to set up and manage. It is also a great system to install
as it can be centrally managed, thus cutting down administration and
management times
Increased access security
• There is added security with an access control system in place, only
people with a PIN, ID card or special rights are allowed within your
buildings facilities. Thus restricting any unauthorised access
Saves money
• You can avoid the cost and time implications of lost keys with an access
control system in place. If someone loses a card or forgets their pin, you
can re-issue them with new access details at a fraction of the cost of
replacement locks
Build on to and integrate your system
• Start with access control in one section of your organisation, it is then simple to
add more systems to other areas of your organisation as and when you feel.
Our access control systems allows for systems integration when you need it be
it with AD or other databases.
Core Software Features
 Handles up to 4,000,000 users
 Handles up to 64000 access points
 256 Calendars.
 256 Time periods / shift patterns
 256 Time zone
 Multi workstation available
 Departmental option
 Door zoning and grouping
 Ability to mix of on-line and off-line
 Full audit trail with reporting
 SQL database for easy integration
Who are you?Alan Christie
Are you authorized
into Office 101?
Yes!
What is your shift
and calendar?
Mon-Fri 7am-
4pm
OK, Access granted. I stamp
your key with office #101,
date: 1/6/14 at 2:15pm. ALSO
- Message for Software:
battery power Low.
Message for Lock:
Tim Roberts has lost
his keycard (it is on
the black list) do not
open if it shows up.
It uses distributed intelligence in the off-line e-Handles or e-Cylinders
and in the key card to allow users to manage their access control
requirements.
Networking Via VN (off-line)
Who are you?
Alan Christie
Where have you been?
Office 101 on
1/6/14 at 2:15pm
Yes, Office101
has low
batteries.
Have you got new
information?
OK, recorded
When a card is presented to an updating on-line Networked Reader
point the card will communicate with the central database (software)
and upload/download information.
I Have an updated
blacklist for you.
Networking Via VN (on-line)
 Site Survey / technical review
 What access rights do you want to provide
 Global
 Shift patterns
 Calendar patterns (Mon – Fri)
 Timetable patterns
 Where is your data
 Wherever possible we aim to automate the
extraction of information from your multiple
databases and feed these details into the
Access Control system.
Getting the right information
System Integration
Microsoft SQL
Oracle
MySQL
PostgreSQL
Microsoft Access
CSV file
DB2
ODBC
Active Directory
Ongoing integration
Data is importedA card is printedCard information is storedData is pushed to other systemsAn existing database can be utilised
1 click printing
Smarter Working
Smarter Working
Smarter Working
Smarter Working
In Summary
 Centralised Controlled access
 Increased physical access control
 Highly scalable system
 Very cost effective
 Flexible
 AIT can help
 set-up
 integrate with other system
 automate updates
 We are not a security company - we’re an IT
organisation that knows access control
For more information and FREE site survey
Email: solutions@ait.co.uk
CALL: 0113 273 0300
Thank You, Questions & Answers

More Related Content

What's hot

Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerManageEngine, Zoho Corporation
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveManageEngine, Zoho Corporation
 
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
Largest Mobile Operator from Russia uses opmanager to manage 5000 devicesLargest Mobile Operator from Russia uses opmanager to manage 5000 devices
Largest Mobile Operator from Russia uses opmanager to manage 5000 devicesManageEngine, Zoho Corporation
 
Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...ManageEngine, Zoho Corporation
 
Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!ManageEngine, Zoho Corporation
 
Grab a coffee and take 5 mins out
Grab a coffee and take 5 mins outGrab a coffee and take 5 mins out
Grab a coffee and take 5 mins outDruantia
 
Introduction to computers and its parts with details a semple
Introduction to computers and its parts with details  a semple Introduction to computers and its parts with details  a semple
Introduction to computers and its parts with details a semple Mö Ìñ
 
Grab a coffee and take 5 mins out
Grab a coffee and take 5 mins outGrab a coffee and take 5 mins out
Grab a coffee and take 5 mins outDruantia
 
Leading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerLeading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerManageEngine, Zoho Corporation
 
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...ManageEngine, Zoho Corporation
 
UniCredit Leasing uses Applications Manager to deliver seamless services worl...
UniCredit Leasing uses Applications Manager to deliver seamless services worl...UniCredit Leasing uses Applications Manager to deliver seamless services worl...
UniCredit Leasing uses Applications Manager to deliver seamless services worl...ManageEngine, Zoho Corporation
 
6 reasons to switch to fluidic ui - Network Configuration Manager
6 reasons to switch to fluidic ui - Network Configuration Manager6 reasons to switch to fluidic ui - Network Configuration Manager
6 reasons to switch to fluidic ui - Network Configuration ManagerManageEngine, Zoho Corporation
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems ManagementPanda Security
 

What's hot (20)

Remote Asset Monitoring Solution
Remote Asset Monitoring SolutionRemote Asset Monitoring Solution
Remote Asset Monitoring Solution
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManager
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
 
5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus
 
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
Largest Mobile Operator from Russia uses opmanager to manage 5000 devicesLargest Mobile Operator from Russia uses opmanager to manage 5000 devices
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
 
Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...
 
Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!Global Airline giant's application performance monitoring solution!
Global Airline giant's application performance monitoring solution!
 
Top 5 IT challenges for 2017
Top 5 IT challenges for 2017Top 5 IT challenges for 2017
Top 5 IT challenges for 2017
 
Grab a coffee and take 5 mins out
Grab a coffee and take 5 mins outGrab a coffee and take 5 mins out
Grab a coffee and take 5 mins out
 
Leading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManagerLeading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManager
 
Introduction to computers and its parts with details a semple
Introduction to computers and its parts with details  a semple Introduction to computers and its parts with details  a semple
Introduction to computers and its parts with details a semple
 
Why Configuration Management Matters
Why Configuration Management MattersWhy Configuration Management Matters
Why Configuration Management Matters
 
Grab a coffee and take 5 mins out
Grab a coffee and take 5 mins outGrab a coffee and take 5 mins out
Grab a coffee and take 5 mins out
 
Enterprise network management
Enterprise network managementEnterprise network management
Enterprise network management
 
Leading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerLeading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManager
 
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
 
UniCredit Leasing uses Applications Manager to deliver seamless services worl...
UniCredit Leasing uses Applications Manager to deliver seamless services worl...UniCredit Leasing uses Applications Manager to deliver seamless services worl...
UniCredit Leasing uses Applications Manager to deliver seamless services worl...
 
6 reasons to switch to fluidic ui - Network Configuration Manager
6 reasons to switch to fluidic ui - Network Configuration Manager6 reasons to switch to fluidic ui - Network Configuration Manager
6 reasons to switch to fluidic ui - Network Configuration Manager
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems Management
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 

Similar to Access Control Integration Webinar December 2014

Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Michael Miller
 
Intro of Key Features of Soft CAAT Ent Software
Intro of Key Features of Soft CAAT Ent SoftwareIntro of Key Features of Soft CAAT Ent Software
Intro of Key Features of Soft CAAT Ent Softwarerafeq
 
How to Effectively Migrate Data From Legacy Apps
How to Effectively Migrate Data From Legacy AppsHow to Effectively Migrate Data From Legacy Apps
How to Effectively Migrate Data From Legacy AppsCloverDX
 
Information systems’
Information systems’Information systems’
Information systems’Paige Shirley
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentationAshita Mehra
 
Cloud-HRMS Overview
Cloud-HRMS OverviewCloud-HRMS Overview
Cloud-HRMS OverviewAshim Sikder
 
1C Lehmann-Nielsen ESA Efficient Systems Access EHiN 2014
1C Lehmann-Nielsen ESA Efficient Systems Access EHiN 20141C Lehmann-Nielsen ESA Efficient Systems Access EHiN 2014
1C Lehmann-Nielsen ESA Efficient Systems Access EHiN 2014IKT-Norge
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsInterSystems Corporation
 
TRU Snacks Webinar Series- Restructuring a Financially Distressed Company
TRU Snacks Webinar Series- Restructuring a Financially Distressed CompanyTRU Snacks Webinar Series- Restructuring a Financially Distressed Company
TRU Snacks Webinar Series- Restructuring a Financially Distressed CompanyCitrin Cooperman
 
NetSuite Data Migration: Transferring Your Business Data to a Unified Platform
NetSuite Data Migration: Transferring Your Business Data to a Unified PlatformNetSuite Data Migration: Transferring Your Business Data to a Unified Platform
NetSuite Data Migration: Transferring Your Business Data to a Unified PlatformSrinivasopenteq
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebHelpSystems
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero TrustIvan Dwyer
 
Puppet automated config_mgmt
Puppet automated config_mgmtPuppet automated config_mgmt
Puppet automated config_mgmtuNIX Jim
 
The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
Intro of Key Features of S-CAAT
Intro of Key Features of S-CAATIntro of Key Features of S-CAAT
Intro of Key Features of S-CAATrafeq
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateJeff Thomas
 
Trim HR - experts in payroll and compliance automation services
Trim HR - experts in payroll and compliance automation servicesTrim HR - experts in payroll and compliance automation services
Trim HR - experts in payroll and compliance automation servicesRadhika Kokane
 

Similar to Access Control Integration Webinar December 2014 (20)

Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014Introduction to Access Control Webinar February 2014
Introduction to Access Control Webinar February 2014
 
Intro of Key Features of Soft CAAT Ent Software
Intro of Key Features of Soft CAAT Ent SoftwareIntro of Key Features of Soft CAAT Ent Software
Intro of Key Features of Soft CAAT Ent Software
 
How to Effectively Migrate Data From Legacy Apps
How to Effectively Migrate Data From Legacy AppsHow to Effectively Migrate Data From Legacy Apps
How to Effectively Migrate Data From Legacy Apps
 
Information systems’
Information systems’Information systems’
Information systems’
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
Cloud-HRMS Overview
Cloud-HRMS OverviewCloud-HRMS Overview
Cloud-HRMS Overview
 
1C Lehmann-Nielsen ESA Efficient Systems Access EHiN 2014
1C Lehmann-Nielsen ESA Efficient Systems Access EHiN 20141C Lehmann-Nielsen ESA Efficient Systems Access EHiN 2014
1C Lehmann-Nielsen ESA Efficient Systems Access EHiN 2014
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
 
Welcome pc
Welcome pcWelcome pc
Welcome pc
 
TRU Snacks Webinar Series- Restructuring a Financially Distressed Company
TRU Snacks Webinar Series- Restructuring a Financially Distressed CompanyTRU Snacks Webinar Series- Restructuring a Financially Distressed Company
TRU Snacks Webinar Series- Restructuring a Financially Distressed Company
 
NetSuite Data Migration: Transferring Your Business Data to a Unified Platform
NetSuite Data Migration: Transferring Your Business Data to a Unified PlatformNetSuite Data Migration: Transferring Your Business Data to a Unified Platform
NetSuite Data Migration: Transferring Your Business Data to a Unified Platform
 
Automate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for WebAutomate Data Scraping and Extraction for Web
Automate Data Scraping and Extraction for Web
 
Nikky:RPA
Nikky:RPANikky:RPA
Nikky:RPA
 
BeyondCorp and Zero Trust
BeyondCorp and Zero TrustBeyondCorp and Zero Trust
BeyondCorp and Zero Trust
 
Overview of emandatory.com
Overview of emandatory.comOverview of emandatory.com
Overview of emandatory.com
 
Puppet automated config_mgmt
Puppet automated config_mgmtPuppet automated config_mgmt
Puppet automated config_mgmt
 
The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Intro of Key Features of S-CAAT
Intro of Key Features of S-CAATIntro of Key Features of S-CAAT
Intro of Key Features of S-CAAT
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automate
 
Trim HR - experts in payroll and compliance automation services
Trim HR - experts in payroll and compliance automation servicesTrim HR - experts in payroll and compliance automation services
Trim HR - experts in payroll and compliance automation services
 

More from Michael Miller

SALTO access control and offline doors
SALTO access control and offline doors SALTO access control and offline doors
SALTO access control and offline doors Michael Miller
 
Improving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement WebinarImproving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement WebinarMichael Miller
 
CardExchange Technical Webinar
CardExchange Technical Webinar CardExchange Technical Webinar
CardExchange Technical Webinar Michael Miller
 
Pcounter Print Management - Overview
Pcounter Print Management - OverviewPcounter Print Management - Overview
Pcounter Print Management - OverviewMichael Miller
 
EveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT LtdEveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT LtdMichael Miller
 

More from Michael Miller (7)

SALTO access control and offline doors
SALTO access control and offline doors SALTO access control and offline doors
SALTO access control and offline doors
 
Improving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement WebinarImproving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement Webinar
 
CardExchange Technical Webinar
CardExchange Technical Webinar CardExchange Technical Webinar
CardExchange Technical Webinar
 
Pcounter Diagnostics
Pcounter DiagnosticsPcounter Diagnostics
Pcounter Diagnostics
 
Pcounter Web Reports
Pcounter Web ReportsPcounter Web Reports
Pcounter Web Reports
 
Pcounter Print Management - Overview
Pcounter Print Management - OverviewPcounter Print Management - Overview
Pcounter Print Management - Overview
 
EveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT LtdEveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT Ltd
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Access Control Integration Webinar December 2014

  • 1. Introduction to Access Control Integration SECURITY ● PRODUCTIVITY ● SAVINGS Presenters: Mark Phelan, Alan Christie Start Time: 9.30am Shortly before the start time shown above, the presenter will arrive – please hold until then.
  • 2.  Can you hear me OK? • If not, please advise via the question panel  Questions + feedback • Send in via the panel as you think of them • Invite input at the end of each section • Off-line discussions  Presentation slides: Available on request AIT Formalities
  • 3.  Review of access control challenges & benefits  Core system features & How it works  System integration  Getting the right information.  Database management for initial set-up  On-going integration  1-click card printing  Make your system smarter  Summary AIT Agenda
  • 4. AIT Modernising your system - why not? • AIT can provide you as much integration as possible to help the system manage itself. No-one to manage the new system • You need a solution that is fully scalable so you can upgrade at your own paceToo many doors. • With our unique solution a new system may be much cheaper than you think. Very little budget available. • AIT experts would visit your site, assess your requirements and provide you a range of options. Unsure where to start
  • 5. AIT Modernising your system - benefits Centrally controlled access • It is a simple system to set up and manage. It is also a great system to install as it can be centrally managed, thus cutting down administration and management times Increased access security • There is added security with an access control system in place, only people with a PIN, ID card or special rights are allowed within your buildings facilities. Thus restricting any unauthorised access Saves money • You can avoid the cost and time implications of lost keys with an access control system in place. If someone loses a card or forgets their pin, you can re-issue them with new access details at a fraction of the cost of replacement locks Build on to and integrate your system • Start with access control in one section of your organisation, it is then simple to add more systems to other areas of your organisation as and when you feel. Our access control systems allows for systems integration when you need it be it with AD or other databases.
  • 6. Core Software Features  Handles up to 4,000,000 users  Handles up to 64000 access points  256 Calendars.  256 Time periods / shift patterns  256 Time zone  Multi workstation available  Departmental option  Door zoning and grouping  Ability to mix of on-line and off-line  Full audit trail with reporting  SQL database for easy integration
  • 7. Who are you?Alan Christie Are you authorized into Office 101? Yes! What is your shift and calendar? Mon-Fri 7am- 4pm OK, Access granted. I stamp your key with office #101, date: 1/6/14 at 2:15pm. ALSO - Message for Software: battery power Low. Message for Lock: Tim Roberts has lost his keycard (it is on the black list) do not open if it shows up. It uses distributed intelligence in the off-line e-Handles or e-Cylinders and in the key card to allow users to manage their access control requirements. Networking Via VN (off-line)
  • 8. Who are you? Alan Christie Where have you been? Office 101 on 1/6/14 at 2:15pm Yes, Office101 has low batteries. Have you got new information? OK, recorded When a card is presented to an updating on-line Networked Reader point the card will communicate with the central database (software) and upload/download information. I Have an updated blacklist for you. Networking Via VN (on-line)
  • 9.  Site Survey / technical review  What access rights do you want to provide  Global  Shift patterns  Calendar patterns (Mon – Fri)  Timetable patterns  Where is your data  Wherever possible we aim to automate the extraction of information from your multiple databases and feed these details into the Access Control system. Getting the right information
  • 10. System Integration Microsoft SQL Oracle MySQL PostgreSQL Microsoft Access CSV file DB2 ODBC Active Directory
  • 11. Ongoing integration Data is importedA card is printedCard information is storedData is pushed to other systemsAn existing database can be utilised
  • 17. In Summary  Centralised Controlled access  Increased physical access control  Highly scalable system  Very cost effective  Flexible  AIT can help  set-up  integrate with other system  automate updates  We are not a security company - we’re an IT organisation that knows access control
  • 18. For more information and FREE site survey Email: solutions@ait.co.uk CALL: 0113 273 0300 Thank You, Questions & Answers

Editor's Notes

  1. Good morning everyone, just to let you know that we will be starting shortly, just waiting for everyone to log in.
  2. First and foremost I hope everyone can hear me. CLICK If you can’t hear me clearly then please notify me via the question function in the control panel. CLICK. Due to the large number of people attending today's webinar and for the comfort of other listeners and in order to minimize any background noise we will be running the session in Listen Only mode. If you have any questions please note them down as they come up and submit them via the questions function on the go to webinar panel and we will answer at the end of each section. These will be treated anonymously or alternatively we can take any individual in-depth discussions that may be required offline. CLICK. All of the slides shown today will be available on request. NEXT SLIDE
  3. I’m going to take you through Review of access control challenges & benefits Core system features & How it works Getting the right information. And then I will hand over to Mark who will take you through System integration Database management for initial set-up On-going integration 1-click card printing Make your system smarter
  4. So why don’t you modernise your system? You think you have too many doors and it will cost a fortune. What about a gradual upgrade? A “big bang” approach is not always necessary if the right solution is selected and is scalable. We can look to phase any upgrade over a period of time and upgrade the system area by area, building by building or site by site. Click Very little budget available. There are ways to keep the cost of putting a new system in place to the minimum by being smart about laying your security system out – I’ll explain more about this later. Also if you already have a system in place maybe some of the hardware can be re-used – from the locking mechanism used on the door through to existing car parking barriers What if you just want some advice about where to start? We have a range of field based technical staff who would be happy to visit and discuss your requirements and what options you may have. Sometimes you may not need to do as much as you think. I recently attended a site to discuss access control with at least 15 access points needed to be secured. After inspection they actually need to secure only 6 points with the others either being left as they are or being upgraded in phase 2. Also you may be thinking “who is going to manage this – security, IT, HR, reception?” I can image that some staff might be thinking “If I suggest we get a system like this I’ll have to manage the software and everyone’s access rights and I just don’t have time!!!” As well as reviewing your doors and access points we’ll also discuss where you data is held and how best to access this. With most organisations we can automate or simplify the process to populate and manage your access control system.
  5. The solution we will provide is easy to set up and manage and if it is setup is conducted in an optimal way will greatly cut down on the administration time whether this is against an existing solution or old lock and key. A college we have recently installed at used to get between 10 – 15 access-control related calls to their IT help-desk every day. These would range from students losing their access rights and not being able to get into a building, cards not working at certain readers, students forgetting their cards and requiring a temporary card system or students requiring special assistance due to an injury (like access to lifts etc.). The new system we have introduced ensures all the access rights for both staff and students has been automated. A custom portal now allows the front office to issue temporary cards for students who forget their own. And student support services have been provided a single process to grant special access rights due to injury. This has resulted in the number of IT helpdesk calls relating to access control dropping to 1-2 calls per week. 100% security - Access rights can be automated, or easily managed with various levels available ensure that staff, students, contractors and visitors only go where you want or need them to go providing peace of mind. Save money Management time is very valuable so we can affect savings as previously described. No replacement locks or re-issuing keys. Time and inconvenience of changing pin numbers is no longer necessary. The system is totally scalable so you can upgrade using the big-bang approach or gradually upgrade over time. Both hardware and software are developed to provide you the flexibility you need so the systems works for you and not the other way around. We currently have a customer who has 9 regional offices across the UK. 12 months ago we put the system into their head office, since then we have added 3 more offices and additional access points at their head office. 4 more offices are scheduled for 2014 with the remaining 2 being done when they move in 2015.
  6. The core software offers a fully scalable solution covering more users than you are ever likely to need, enough access points to cover all the major universities in the UK as well as good number of calendar, shift patterns and time zones. Various software options ensure the control can be centralise or delegated down to department level The unique benefit of the Salto solution is the ability to have a mixture of on-line and off-line doors without losing control or the audit trail and I’ll remind you of how that works next. Full audit trails as well as a SQL database back end completes this comprehensive solution
  7. Just to remind you how the communication with the off-line doors works… Note – data encrypted onto card.
  8. All happens in less than 1 sec.
  9. Planning and obtaining all the right information is key to a successful project. We will work with you to ensure we understand who needs what access right and when. The main concern for us is understanding where that data is stored so our integration experts can get to work. Our aim is to automate as much of the initial set up and ongoing management of the solution as possible so your management overhead for this is minimal. I will now hand you over to Mark Phelan who will take you though some of the integration and system enhancement we have already provided to our customers.
  10. Organisations have multiple systems which require common information. This can lead to a lot of manual duplication and the potential for mistakes to be made.   Furthermore, different systems can be built on different database and datasets such as Microsoft SQL, etc. We can simplify the flow of data between these systems to avoid repetitive re-entry of details in to each system. By utilising ID cards for multiple purposes you are able to provide a better user experience
  11. Incremental changes are carried through to other systems as time goes on. New users, replacement cards, changes to user details can all be handled. ---- An existing database contains user information, and is updated periodically throughout the day. #CLICK Key information which is required for the production and use of cards is periodically extracted for use with the card production system. - In some cases a “live link” is possible so that the card printing software queries the database directly #CLICK The information - commonly a user's unique ID, name, and photo, is printed on to a card #CLICK When a card is printed the unique serial number of the chip is stored - Optionally, data can be written to the chip memory (such as a student number) for use with 3rd party systems #CLICK The data can then be processed and updates can be pushed out to other systems #CLICK Door access is one of the most common uses for cards, but other solutions such as #CLICK print accounting and cashless catering can also take advantage of integrated solutions.
  12. 1-click printing is literally “what it says on the tin” Select a card template/design, browse or search for a user, and click print! No need to key in details manually and take photos – we can integrate with existing datasets to reuse information that is already available elsewhere.
  13. Simplify tasks such as capturing visitor details with simple web-based forms. We have created self-service interfaces for visitors to enrol their details, and can be issued a “day pass” granting them access to your building and tracking their movements.
  14. Keeping tabs on people’s whereabouts can be handled via the Salto roll-call functionality – and we expand on this by providing simple interfaces to display this data. We can provide “IN/OUT” boards, lists by buildings/departments as well as the last time a user was seen.
  15. Automatically update access rights for room reservation & booking. We have the ability to permit user access based on our powerful reservation system, so that a user is only granted access during their permitted time slot.
  16. We can keep tabs on unusual activity by providing email and SMS alerts. This can be filtered down to specific doors, zones, users or groups of users, and can also be linked with some CCTV solutions to capture images in the event of unauthorised access attempts or forced entry.