SlideShare a Scribd company logo
ACCESSCONTROL
AxiomV™ Enterprise Edition
Enterprise Security Management System for large multi-site/multi-tenant applications,
seamlessly integrates Access Control, Alarm Monitoring, and Video Surveillance into an elegant
and versatile building management and security system.
	 Built on multi-server architecture
	 “Hot stand-by” and automatic “Fail-over” features
	 Fully synchronized, up-to date stand-by server ready to take over
	 Highly customizable and flexible user interface
	 Fully integrated with several access manufacturers such as HID
	 Control system from one central station
	 Well supportive of Windows platforms
AxiomV provides a sophisticated yet affordable solution for systems of all sizes.
RESTRICT OR GRANT ACCESSS WITH ENTERPRISE SOLUTIONS
Aatel partnered with RBH-Access, a manufacturer of Enterprise Access Control and Security
Management systems for Canadian and International markets since 1995. RBH continually invests
in research and development to improve manufacturing and distrubtion aspects of their business.
RBH-Access Control Systems have proven to be diverse in its integration, partnering with many
leading manufacturers in the security industry.
Connecting people through technology
Applications & Features
Dynamic Interactive Maps
Interactive Status Display
Reports/Analytics
Event Viewer/Access Point Activity
Cardholder Administration/Card Tracing
Photo ID Badging
Asset Tracking
ACCESSCONTROL
Integra32 Security Management System
Integra32’s advanced .NET architecture is specifically designed to take advantage of
Microsoft Windows operating systems. This user friendly software ensures that security
management needs are met easily and economically with minimal training. Integra 32
seamlessly integrates:
	 Access Control
	 Intrusion Alarms
	 Elevator Control
	 CCTV & DVR
	 Biometric Authentication
	 Photo ID
	 Building Automation
	 ON and Offsite Alarm Monitoring
With a fully featured client or Web browser access to system management, Integra32
addresses all security management needs for small and medium size businesses and
organizations. There is no limit to system expansion with an in-place upgrade path to our
AxiomV Enterprise Security Management System.
MANAGE SECURITY NEEDS FOR SMALL & MEDIUM SIZE BUSNIESSES
Connecting people through technology
Allow control of two access
control points (doors). They
utilize flash firmware for easy
upgrades, and employ fully
distributed intelligence for
off-line operations. Decisions
such as access level changes,
schedule activation, and card
expiration are made by an IRC-
2000 controller without need
of a computer.

More Related Content

What's hot

Fontana fredda20150527
Fontana fredda20150527Fontana fredda20150527
Fontana fredda20150527
PRAGMA PROGETTI
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
Exclusive Networks ME
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
IBMITServicesUS
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
Amir Einav
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
rver21
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
Thierry Matusiak
 
GE Cimplicity
GE CimplicityGE Cimplicity
GE Cimplicity
GE코리아
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
rver21
 
AGORA enables security companies to sell innovative remote services
AGORA enables security companies to sell innovative remote servicesAGORA enables security companies to sell innovative remote services
AGORA enables security companies to sell innovative remote services
AGORA
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
Juan Pablo Coelho
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
Arjun V
 
Missionos maxwell-geo systems - data management system
Missionos maxwell-geo systems - data management systemMissionos maxwell-geo systems - data management system
Missionos maxwell-geo systems - data management system
Olivia Taylor
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
energyvijay
 
TDSi Open Day
TDSi Open DayTDSi Open Day
TDSi Open Day
ericcroberts
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
IBM Security
 

What's hot (15)

Fontana fredda20150527
Fontana fredda20150527Fontana fredda20150527
Fontana fredda20150527
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
 
Product security program slideshare
Product security program slideshareProduct security program slideshare
Product security program slideshare
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
GE Cimplicity
GE CimplicityGE Cimplicity
GE Cimplicity
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
AGORA enables security companies to sell innovative remote services
AGORA enables security companies to sell innovative remote servicesAGORA enables security companies to sell innovative remote services
AGORA enables security companies to sell innovative remote services
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Missionos maxwell-geo systems - data management system
Missionos maxwell-geo systems - data management systemMissionos maxwell-geo systems - data management system
Missionos maxwell-geo systems - data management system
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
 
TDSi Open Day
TDSi Open DayTDSi Open Day
TDSi Open Day
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 

Similar to Access Control

Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
Giovanni Maree
 
Surveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product IntroductionSurveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product Introduction
Surveon Technology Inc.
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
Brochure-HikCentral-Professional-V2.4.pdf.pptx
Brochure-HikCentral-Professional-V2.4.pdf.pptxBrochure-HikCentral-Professional-V2.4.pdf.pptx
Brochure-HikCentral-Professional-V2.4.pdf.pptx
RafaelTrubano1
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
Ericom Software
 
Appvision Presentation 2011
Appvision Presentation 2011Appvision Presentation 2011
Appvision Presentation 2011
Liam Heatley
 
Appvision Presentation 2011
Appvision Presentation 2011Appvision Presentation 2011
Appvision Presentation 2011
Liam Heatley
 
Company Profile
Company ProfileCompany Profile
Company Profile
Shehza Ali
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
Cyber Legend Technologies LLC
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
GE코리아
 
Ilantus brochure
Ilantus brochureIlantus brochure
Ilantus brochure
Nilofar Nigar
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
Wayne Phillips
 
SECHEIM_TRADING
SECHEIM_TRADINGSECHEIM_TRADING
SECHEIM_TRADING
Nuwan Gamage
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
ePlus
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the Enterprise
Jaco Nel
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
Minicom Advanced Systems
 
Remote IT Mangement
Remote IT MangementRemote IT Mangement
Remote IT Mangement
tsilber
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)
Riad MAALOUF
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
AlgoSec
 

Similar to Access Control (20)

Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Surveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product IntroductionSurveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product Introduction
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Brochure-HikCentral-Professional-V2.4.pdf.pptx
Brochure-HikCentral-Professional-V2.4.pdf.pptxBrochure-HikCentral-Professional-V2.4.pdf.pptx
Brochure-HikCentral-Professional-V2.4.pdf.pptx
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 
Appvision Presentation 2011
Appvision Presentation 2011Appvision Presentation 2011
Appvision Presentation 2011
 
Appvision Presentation 2011
Appvision Presentation 2011Appvision Presentation 2011
Appvision Presentation 2011
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
 
Ilantus brochure
Ilantus brochureIlantus brochure
Ilantus brochure
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
SECHEIM_TRADING
SECHEIM_TRADINGSECHEIM_TRADING
SECHEIM_TRADING
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the Enterprise
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
 
Remote IT Mangement
Remote IT MangementRemote IT Mangement
Remote IT Mangement
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 

Access Control

  • 1. ACCESSCONTROL AxiomV™ Enterprise Edition Enterprise Security Management System for large multi-site/multi-tenant applications, seamlessly integrates Access Control, Alarm Monitoring, and Video Surveillance into an elegant and versatile building management and security system. Built on multi-server architecture “Hot stand-by” and automatic “Fail-over” features Fully synchronized, up-to date stand-by server ready to take over Highly customizable and flexible user interface Fully integrated with several access manufacturers such as HID Control system from one central station Well supportive of Windows platforms AxiomV provides a sophisticated yet affordable solution for systems of all sizes. RESTRICT OR GRANT ACCESSS WITH ENTERPRISE SOLUTIONS Aatel partnered with RBH-Access, a manufacturer of Enterprise Access Control and Security Management systems for Canadian and International markets since 1995. RBH continually invests in research and development to improve manufacturing and distrubtion aspects of their business. RBH-Access Control Systems have proven to be diverse in its integration, partnering with many leading manufacturers in the security industry. Connecting people through technology Applications & Features Dynamic Interactive Maps Interactive Status Display Reports/Analytics Event Viewer/Access Point Activity Cardholder Administration/Card Tracing Photo ID Badging Asset Tracking
  • 2. ACCESSCONTROL Integra32 Security Management System Integra32’s advanced .NET architecture is specifically designed to take advantage of Microsoft Windows operating systems. This user friendly software ensures that security management needs are met easily and economically with minimal training. Integra 32 seamlessly integrates: Access Control Intrusion Alarms Elevator Control CCTV & DVR Biometric Authentication Photo ID Building Automation ON and Offsite Alarm Monitoring With a fully featured client or Web browser access to system management, Integra32 addresses all security management needs for small and medium size businesses and organizations. There is no limit to system expansion with an in-place upgrade path to our AxiomV Enterprise Security Management System. MANAGE SECURITY NEEDS FOR SMALL & MEDIUM SIZE BUSNIESSES Connecting people through technology Allow control of two access control points (doors). They utilize flash firmware for easy upgrades, and employ fully distributed intelligence for off-line operations. Decisions such as access level changes, schedule activation, and card expiration are made by an IRC- 2000 controller without need of a computer.