SlideShare a Scribd company logo
1 of 19
Introduction to Access Control
Presented by
Friday 2nd October 9:15 a.m.
Shortly before the start time shown above, the presenter will arrive also –
please hold until then.
Steve Blake
Solutions Consultant
Tel: 0113 273 0300
Mob: 07921 775947
Email: steve.blake@ait.co.uk
Formalities
o Can you hear me?
● If not, please advise via the question panel
o Questions + feedback
● Send in via the panel as you think of them
● Verbal input at end of each slide or section
● Off-line discussions
o Webinar is being recorded
● Available via the link included on the post-
webinar survey.
● Current situation
● Modernising your system
● Access control benefits
● Core system features
● How it works
● System integration – getting the right information.
● Summary
AIT Agenda
Your current situation
Still using lock and keys?
● Cost of replacing locks and keys when lost
● Who controls the cutting of duplicate keys?
● Maybe you book specific keys out – who’s controlling who has what
keys
Maybe you have keypad control?
● What do you do when someone leaves?
● What about temporary access?
● Who is managing the pin code changes
● How is this communicated?
● How secure is this?
Maybe you’re running 2 different systems (legacy and a
new-build)
● Do they talk to each other?
● How do you manage support for both systems (2 different contracts?)
AIT Modernising your system - why not?
● AIT can provide you as much integration as
possible to help the system manage itself.
No-one to manage
the new system.
● You need a solution that is fully scalable so
you can upgrade at your own pace.
Too many doors.
● With our unique solution a new system may
be much cheaper than you think.
Very little budget
available.
● AIT experts would visit your site, assess
your requirements and provide you a range
of options.
Unsure where to
start.
Modernising your system - benefits
Centrally controlled access
● Simple to set up and manage.
● Central management – devolved as you wish
● Less management and/or facilities resource
Increased access security
● Added security
● PIN, ID card or fob
● Combination for two factor authentication
Saves money
● Avoid the cost and time implications of lost keys
● Lost cards blacklisted
● Forgotten PIN, re-issued remotely
Build onto and integrate your system
● Start one section add other areas as budgets or procedures allow
● Integration with AD and/or other databases.
● The AIT’s preferred partner for access control is SALTO
● One of the top 5 access control manufacturers worldwide
● The SALTO solution has equipped over 1 million doors in over 10,000
projects worldwide in only 14 years!
● The mix of networked and stand-alone products allows for a cost
efficient access control solution
● Virtual Network system allows stand alone doors to become virtually on
line through Data-on-Card communication.
● AIT in-house development team provide unique support for application
integration and syncing between databases.
● AIT provide full project management of installation and go-live roll out.
AIT Access Control Solution - USP
Core Software Features
● Handles up to 4,000,000 users
● Handles up to 64,000 access points
● 256 Calendars.
● 30 Time periods.
● 256 Time zone
● Multi workstation available
● Departmental option
● Door zoning and grouping
● Visitor control
● Full audit trail with reporting
● SQL database for easy integration
● Smartphone Application
Who are you?
Are you authorized
into Office 101?
What is your shift
and calendar?
OK, Access granted. I stamp
your key with office 101,
date: 2/10/15 at 9:35am.
ALSO - Message for
Software: battery power
Critical.
It uses distributed intelligence in the off-line e-Handles or e-Cylinders
and in the key card to allow users to manage their access control
requirements.
Networking Via VN (off-line)
Mon-Fri 8am-
7pm
Message for Lock:
Tim Roberts has lost
his keycard (it is on
the black list) do not
open if it shows up.
Steve Blake
Yes!
Who are you?
Steve Blake
Where have you been?
Office 101 on
2/10/15 at
9:35am
Yes, Office101 has
low batteries.
Personal Audit Updated.
Have you got new information?
OK, recorded
When a card is presented to an updating on-line networked reader
point the card will communicate with the central database (software)
and upload/download information.
Recorded. I Have an
updated blacklist for
you.
Networking Via VN (on-line)
Imagine Being able to control up to 64,000 doors directly
from your PC with just the click of the mouse.
Wireless Networked Access Control
On-line or off-line?
Site survey / technical review
What access rights do you want to provide
● Global
● Shift patterns
● Calendar patterns (Mon – Fri)
● Timetable patterns
Where is your data
● Wherever possible we aim to automate the extraction of information
from your multiple databases and feed these details into the access
control system.
What hardware do you currently have
● If you already have a system in place we will try and re-use some
of the hardware where viable to keep the cost acceptable.
● Off-line doors can use existing locking mechanisms
Getting the right information
All wire-free electronic handle sets
Product Range
The E-cylinder range
Euro Profile and UK Oval profile
Product Range
The e-Panic Bar range
Product Range
All Wall Reader solutions
Product Range
In Summary
● Added or upgrading access control is not as expensive as
you may think.
● You can install this as a phased project to spread the cost
● Consider how you want to control access to your facility
● Think about where that information is held.
● AIT in-house development team provide unique support for
application integration and syncing between databases.
● AIT provide full project management of installation and go-
live roll out.
Thank you for your time.
Questions & Answers
For download link, demonstration
or more information
Email: solutions@ait.co.uk
CALL: 0113 273 0300

More Related Content

What's hot

Unified Operations Vision
Unified Operations VisionUnified Operations Vision
Unified Operations VisionSteve Mushero
 
Remote Location Printing With OM Plus i-Sat
Remote Location Printing With OM Plus i-SatRemote Location Printing With OM Plus i-Sat
Remote Location Printing With OM Plus i-SatPlus Technologies
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionPrecisely
 
Healthcare presentation
Healthcare presentationHealthcare presentation
Healthcare presentationNicholas Pace
 
Trident ESPS 24 X 7 Support
Trident ESPS 24 X 7 SupportTrident ESPS 24 X 7 Support
Trident ESPS 24 X 7 SupportRalphKling
 
Grab a coffee and take 5 mins out
Grab a coffee and take 5 mins outGrab a coffee and take 5 mins out
Grab a coffee and take 5 mins outDruantia
 
4 Steps and 1 Awesome Customer Experience
4 Steps and 1 Awesome Customer Experience4 Steps and 1 Awesome Customer Experience
4 Steps and 1 Awesome Customer ExperienceNew Relic
 
IWMW 1998 Server Management (4) Security Principles
IWMW 1998 Server Management (4) Security PrinciplesIWMW 1998 Server Management (4) Security Principles
IWMW 1998 Server Management (4) Security PrinciplesIWMW
 
IAY0330 Smarthouse project - remote control & monitoring application
IAY0330 Smarthouse project - remote control & monitoring applicationIAY0330 Smarthouse project - remote control & monitoring application
IAY0330 Smarthouse project - remote control & monitoring applicationErik Kaju
 
Challenges of monitoring distributed systems
Challenges of monitoring distributed systemsChallenges of monitoring distributed systems
Challenges of monitoring distributed systemsNenad Bozic
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 

What's hot (15)

Unified Operations Vision
Unified Operations VisionUnified Operations Vision
Unified Operations Vision
 
Remote Location Printing With OM Plus i-Sat
Remote Location Printing With OM Plus i-SatRemote Location Printing With OM Plus i-Sat
Remote Location Printing With OM Plus i-Sat
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-MotionSecuring Sensitive IBM i Data At-Rest and In-Motion
Securing Sensitive IBM i Data At-Rest and In-Motion
 
Healthcare presentation
Healthcare presentationHealthcare presentation
Healthcare presentation
 
Trident ESPS 24 X 7 Support
Trident ESPS 24 X 7 SupportTrident ESPS 24 X 7 Support
Trident ESPS 24 X 7 Support
 
Flip IT Data Sheet 2015
Flip IT Data Sheet 2015Flip IT Data Sheet 2015
Flip IT Data Sheet 2015
 
Grab a coffee and take 5 mins out
Grab a coffee and take 5 mins outGrab a coffee and take 5 mins out
Grab a coffee and take 5 mins out
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
4 Steps and 1 Awesome Customer Experience
4 Steps and 1 Awesome Customer Experience4 Steps and 1 Awesome Customer Experience
4 Steps and 1 Awesome Customer Experience
 
IWMW 1998 Server Management (4) Security Principles
IWMW 1998 Server Management (4) Security PrinciplesIWMW 1998 Server Management (4) Security Principles
IWMW 1998 Server Management (4) Security Principles
 
IAY0330 Smarthouse project - remote control & monitoring application
IAY0330 Smarthouse project - remote control & monitoring applicationIAY0330 Smarthouse project - remote control & monitoring application
IAY0330 Smarthouse project - remote control & monitoring application
 
Challenges of monitoring distributed systems
Challenges of monitoring distributed systemsChallenges of monitoring distributed systems
Challenges of monitoring distributed systems
 
Front desk-unit
Front desk-unitFront desk-unit
Front desk-unit
 
IOT
IOTIOT
IOT
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 

Similar to Webinar Access Control - October 2015

Access Control Integration Webinar December 2014
Access Control Integration Webinar December 2014Access Control Integration Webinar December 2014
Access Control Integration Webinar December 2014Michael Miller
 
The Secret to an Efficient Accounts Payable Department
The Secret to an Efficient Accounts Payable DepartmentThe Secret to an Efficient Accounts Payable Department
The Secret to an Efficient Accounts Payable DepartmentNicki Laycoax
 
MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019Ieva Navickaite
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemInductive Automation
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Inductive Automation
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemInductive Automation
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422Erik Giles
 
Everything You Need to Know About Home Automation Development
Everything You Need to Know About Home Automation DevelopmentEverything You Need to Know About Home Automation Development
Everything You Need to Know About Home Automation DevelopmentBaek Yongsun
 
Online Crime Management System.ppt.pptx
Online Crime Management System.ppt.pptxOnline Crime Management System.ppt.pptx
Online Crime Management System.ppt.pptxAshutoshmahale3
 
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital TransformationSafetyChain Software
 
Product Sheet - BlueCloudTalk
Product Sheet - BlueCloudTalkProduct Sheet - BlueCloudTalk
Product Sheet - BlueCloudTalkMorten Blomfeldt
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Applications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batchApplications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batchRAHUL GUPTA
 
The Opportunity - Increased Product Quality & Maximized Assembly Efficiency
The Opportunity -  Increased Product Quality & Maximized Assembly EfficiencyThe Opportunity -  Increased Product Quality & Maximized Assembly Efficiency
The Opportunity - Increased Product Quality & Maximized Assembly EfficiencyAnthony Borges
 

Similar to Webinar Access Control - October 2015 (20)

Access Control Integration Webinar December 2014
Access Control Integration Webinar December 2014Access Control Integration Webinar December 2014
Access Control Integration Webinar December 2014
 
The Secret to an Efficient Accounts Payable Department
The Secret to an Efficient Accounts Payable DepartmentThe Secret to an Efficient Accounts Payable Department
The Secret to an Efficient Accounts Payable Department
 
MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
 
Everything You Need to Know About Home Automation Development
Everything You Need to Know About Home Automation DevelopmentEverything You Need to Know About Home Automation Development
Everything You Need to Know About Home Automation Development
 
ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
 
Online Crime Management System.ppt.pptx
Online Crime Management System.ppt.pptxOnline Crime Management System.ppt.pptx
Online Crime Management System.ppt.pptx
 
3 types of monitoring for 2020
3 types of monitoring for 20203 types of monitoring for 2020
3 types of monitoring for 2020
 
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
 
Product Sheet - BlueCloudTalk
Product Sheet - BlueCloudTalkProduct Sheet - BlueCloudTalk
Product Sheet - BlueCloudTalk
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Applications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batchApplications of remote access & its uses- by group 5 ITT july 2014 batch
Applications of remote access & its uses- by group 5 ITT july 2014 batch
 
The Opportunity - Increased Product Quality & Maximized Assembly Efficiency
The Opportunity -  Increased Product Quality & Maximized Assembly EfficiencyThe Opportunity -  Increased Product Quality & Maximized Assembly Efficiency
The Opportunity - Increased Product Quality & Maximized Assembly Efficiency
 

More from Michael Miller

SALTO access control and offline doors
SALTO access control and offline doors SALTO access control and offline doors
SALTO access control and offline doors Michael Miller
 
Improving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement WebinarImproving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement WebinarMichael Miller
 
CardExchange Technical Webinar
CardExchange Technical Webinar CardExchange Technical Webinar
CardExchange Technical Webinar Michael Miller
 
Pcounter Print Management - Overview
Pcounter Print Management - OverviewPcounter Print Management - Overview
Pcounter Print Management - OverviewMichael Miller
 
EveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT LtdEveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT LtdMichael Miller
 

More from Michael Miller (7)

SALTO access control and offline doors
SALTO access control and offline doors SALTO access control and offline doors
SALTO access control and offline doors
 
Improving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement WebinarImproving Student Attendance and Engagement Webinar
Improving Student Attendance and Engagement Webinar
 
CardExchange Technical Webinar
CardExchange Technical Webinar CardExchange Technical Webinar
CardExchange Technical Webinar
 
Pcounter Diagnostics
Pcounter DiagnosticsPcounter Diagnostics
Pcounter Diagnostics
 
Pcounter Web Reports
Pcounter Web ReportsPcounter Web Reports
Pcounter Web Reports
 
Pcounter Print Management - Overview
Pcounter Print Management - OverviewPcounter Print Management - Overview
Pcounter Print Management - Overview
 
EveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT LtdEveryonePrint - Mobile Printing from AIT Ltd
EveryonePrint - Mobile Printing from AIT Ltd
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Webinar Access Control - October 2015

  • 1. Introduction to Access Control Presented by Friday 2nd October 9:15 a.m. Shortly before the start time shown above, the presenter will arrive also – please hold until then. Steve Blake Solutions Consultant Tel: 0113 273 0300 Mob: 07921 775947 Email: steve.blake@ait.co.uk
  • 2. Formalities o Can you hear me? ● If not, please advise via the question panel o Questions + feedback ● Send in via the panel as you think of them ● Verbal input at end of each slide or section ● Off-line discussions o Webinar is being recorded ● Available via the link included on the post- webinar survey.
  • 3. ● Current situation ● Modernising your system ● Access control benefits ● Core system features ● How it works ● System integration – getting the right information. ● Summary AIT Agenda
  • 4. Your current situation Still using lock and keys? ● Cost of replacing locks and keys when lost ● Who controls the cutting of duplicate keys? ● Maybe you book specific keys out – who’s controlling who has what keys Maybe you have keypad control? ● What do you do when someone leaves? ● What about temporary access? ● Who is managing the pin code changes ● How is this communicated? ● How secure is this? Maybe you’re running 2 different systems (legacy and a new-build) ● Do they talk to each other? ● How do you manage support for both systems (2 different contracts?)
  • 5. AIT Modernising your system - why not? ● AIT can provide you as much integration as possible to help the system manage itself. No-one to manage the new system. ● You need a solution that is fully scalable so you can upgrade at your own pace. Too many doors. ● With our unique solution a new system may be much cheaper than you think. Very little budget available. ● AIT experts would visit your site, assess your requirements and provide you a range of options. Unsure where to start.
  • 6. Modernising your system - benefits Centrally controlled access ● Simple to set up and manage. ● Central management – devolved as you wish ● Less management and/or facilities resource Increased access security ● Added security ● PIN, ID card or fob ● Combination for two factor authentication Saves money ● Avoid the cost and time implications of lost keys ● Lost cards blacklisted ● Forgotten PIN, re-issued remotely Build onto and integrate your system ● Start one section add other areas as budgets or procedures allow ● Integration with AD and/or other databases.
  • 7. ● The AIT’s preferred partner for access control is SALTO ● One of the top 5 access control manufacturers worldwide ● The SALTO solution has equipped over 1 million doors in over 10,000 projects worldwide in only 14 years! ● The mix of networked and stand-alone products allows for a cost efficient access control solution ● Virtual Network system allows stand alone doors to become virtually on line through Data-on-Card communication. ● AIT in-house development team provide unique support for application integration and syncing between databases. ● AIT provide full project management of installation and go-live roll out. AIT Access Control Solution - USP
  • 8. Core Software Features ● Handles up to 4,000,000 users ● Handles up to 64,000 access points ● 256 Calendars. ● 30 Time periods. ● 256 Time zone ● Multi workstation available ● Departmental option ● Door zoning and grouping ● Visitor control ● Full audit trail with reporting ● SQL database for easy integration ● Smartphone Application
  • 9. Who are you? Are you authorized into Office 101? What is your shift and calendar? OK, Access granted. I stamp your key with office 101, date: 2/10/15 at 9:35am. ALSO - Message for Software: battery power Critical. It uses distributed intelligence in the off-line e-Handles or e-Cylinders and in the key card to allow users to manage their access control requirements. Networking Via VN (off-line) Mon-Fri 8am- 7pm Message for Lock: Tim Roberts has lost his keycard (it is on the black list) do not open if it shows up. Steve Blake Yes!
  • 10. Who are you? Steve Blake Where have you been? Office 101 on 2/10/15 at 9:35am Yes, Office101 has low batteries. Personal Audit Updated. Have you got new information? OK, recorded When a card is presented to an updating on-line networked reader point the card will communicate with the central database (software) and upload/download information. Recorded. I Have an updated blacklist for you. Networking Via VN (on-line)
  • 11. Imagine Being able to control up to 64,000 doors directly from your PC with just the click of the mouse. Wireless Networked Access Control
  • 13. Site survey / technical review What access rights do you want to provide ● Global ● Shift patterns ● Calendar patterns (Mon – Fri) ● Timetable patterns Where is your data ● Wherever possible we aim to automate the extraction of information from your multiple databases and feed these details into the access control system. What hardware do you currently have ● If you already have a system in place we will try and re-use some of the hardware where viable to keep the cost acceptable. ● Off-line doors can use existing locking mechanisms Getting the right information
  • 14. All wire-free electronic handle sets Product Range
  • 15. The E-cylinder range Euro Profile and UK Oval profile Product Range
  • 16. The e-Panic Bar range Product Range
  • 17. All Wall Reader solutions Product Range
  • 18. In Summary ● Added or upgrading access control is not as expensive as you may think. ● You can install this as a phased project to spread the cost ● Consider how you want to control access to your facility ● Think about where that information is held. ● AIT in-house development team provide unique support for application integration and syncing between databases. ● AIT provide full project management of installation and go- live roll out.
  • 19. Thank you for your time. Questions & Answers For download link, demonstration or more information Email: solutions@ait.co.uk CALL: 0113 273 0300