SlideShare a Scribd company logo
Vindicator Security Solutions
Capabilities Overview
Contents
•   Honeywell Portfolio Overview
•   Vindicator Background
•   Mission Critical Security
•   Customer Examples
•   Solutions and Capabilities Overview
•   Summary
The History of Vindicator

•   Nearly 30 years of history providing security solutions
    – Reputation for Results, Customer Focused Philosophy
    – 100% Success Rate
    – Employee Commitment



•   World Class Products and Technology
    – Extremely Reliable Products (100,000 hours MTBF)
    – Embedded, yet built on open standards



•   Acquired in 2004 by the world’s largest Security player
    – Focused more than ever on Customer Excellence
    – Benefiting from $100M Annual Security R&D Investment
    – Delivering the worlds most advanced security solutions
How can we help your operation?
•    What is your mission?
      –   Let us help you determine how security policy affects
          your operation
      –   Let us help you use technology to protect your interests

•    Our Goal: Provide the most cost-effective
     solution for maximizing your up-time while
     minimizing your time-to-response.
      –   We want to help you save money or make money
      –   We want to help you do more with your resources


    The world looks to Vindicator for robust end to end
     – Mission Critical – integrated security solutions
Vindicator – Who are our Customers?
    –   International & Nuclear   –   NSA
        Power Plants              –   Sandia National Labs
    –   US Army Corps of          –   Federal Bureau of Prisons
        Engineers                 –   US Army Chemical and
    –   US Petroleum Reserve          Weapons Depots
    –   Dow Chemical              –   DuPont
    –   Saudi Aramco              –   UK MoD
    –   US Gov’t / DoD




    100’s of Customers with diverse and demanding
                    requirements
Contents
•   Honeywell Portfolio Overview
•   Vindicator Background
•   Mission Critical Security
•   Customer Examples
•   Solutions and Capabilities Overview
•   Summary
What do we do for our customers?


                   Program / Project
                                         System
                     Management
                                       Installation
    Solution &                                        Drawing
  Concept Design                                      Packages

                                                              System Testing
                                                             & Commissioning
            Migration
            Support
            Services                                   On & Off Site
                              Preventative             Tech Support
                              Maintenance




 Complete life-cycle support of a customer’s security needs
Solution Concept & Design
•   Industry-leading security design expertise
    –   Many years of systems design and integration
    –   Communications system design expertise
    –   Proper selection of products and technology


•   Unmatched capabilities for customer-engineering
    –   Custom interfaces
    –   3rd party sensors and systems
    –   New features and capabilities


•   Master Integrator capability to bring together the
    “best fit” solution and players

                                                         Ellis Island, NY




A successful program starts with a good design done early.
Vindicator – What is it?
                    Admin/Enrollment     Event Archive       Alarm Monitoring        Video Assessment
Client UI and
   Display




                 V5 ACS                 V5 ACS                              V5 IDS
Embedded
 Servers




                                                                                 6842
Network
 Field




                                                                                6842
                      MR14, MR24,          MR14, MR24,
                      MR50 or PW5k1R2      MR50 or PW5k1R2


                Separate Intrusion Detection and Access Controllers allow
                maximum application segmentation without “stove-pipes”
Intrusion Capabilities we Offer…
 •   …Interior detection and alarming
 •   …Exterior detection and alarming
 •   …Perimeter Intrusion Detection
 •   …Beyond the Perimeter Detection
 •   …Centralized alarm reporting
                                             LAN


     …Remote alarm reporting & routing
                                              /
 •                                           WA
                                              N




 •   …Redundant alarm reporting
Vindicator intrusion solutions can meet virtually any IDS
            need in many, many applications
The V5 Intrusion Detection System

•   Most powerful enterprise IDS systems available
    –   Over 10,000 Alarm Points
    –   Over 8,000 Inputs
    –   Over 4,000 Outputs
•   Has passed “5 in 2” test
    –   Display for ‘ack’ 5 coincident alarms in 2 seconds
•   System expansion over many comms media…
    –   Fiber, Ethernet, RS-485, RF, RS-232, etc.
    –   Encrypted up to TDEA
•   Extensive testing performed
    –   PL1-4 Nuc and non-Nuc, DCID 6/9, UL1076/294/864
Advanced IDS System meets needs of the world’s most
              demanding applications
PC Smart Pak
•    Extremely powerful
     administration and operator
     console
     –   Console-based configuration tool
     –   Administer points, rules, network
         settings, badge-holders,            PC Smart Pak runs on the V5
         permissions, etc.                   locally and is displayed via the
                                             PC. No capability is lost if the
     –   All V5 and VCN administration can   PC or PC-connection fails. This
         be done from any terminal on the    ensures maximum security and
         network                             reliability of the security
                                             solution.



       Powerful system administration console gives
    administrators control over the network from any node
VCC – Vindicator Command & Control
•   The World’s easiest to use and
    most powerful Alarm Monitor
     –   Can be learned in minutes with
         minimal training
     –   Supports 10’s of 1000’s of points
     –   Sophisticated routing to many
         consoles                            The VCC GUI receives data
                                             from sends operator
     –   Redundant monitoring capability     instructions to the V5 IDS
     –   Used by the governments and         Server, but all logical processing
         militaries to monitor some of the   is done on the V5, ensuring
         world’s most critical assets        maximum reliability.


     Simple, intuitive Windows-based GUI ensures ease
    of operation without sacrificing power or capabilities
Access Capabilities we Offer…
•   …Simple and Complex door control
•   …Complex Timing Routines
       (one-time & scheduled holidays)

•   …Local and Global Anti-Passback
•   …Smart Cards & Biometrics
•   …Photo Badging and Access Assignment
•   …Tight Integration with Intrusion & Video
•   …Autonomous sites Connected to the Enterprise
 Vindicator access control solutions can scale from
small, single sites to WAN connected Enterprise needs
The V5 Access Control System
 •   Best in class, ‘next generation’ system
      –   Capabilities today that many ACS systems won’t have in 2 years
           •   Peer-to-peer communication between servers
           •   Database clustering among servers
           •   Expandable storage capacity
           •   Auto-replication of DB changes


 •   Intimate integration with V5 IDS
      – Complete system configuration and admin from any Server
      – Access events map onto IDS alarms (forced door, invalid PIN, etc.)
      – I/O points can be shared between IDS and ACS systems


 •   Easy expansion with modular local and downstream I/O
      – Fiber, Ethernet, RS-485, RF, RS-232, etc.
      – All I/O are addressed on the UHS-Net network
      – Encrypted up to TDEA


 •   Extensive testing performed
      –   PL1-4 Nuc and non-Nuc, DCID 6/9, UL1076/294/864

Advanced ACS System meets a wide array of application needs
Vindicator Badge Manager

•   Create identities and input
    Badgeholder information
•   Capture photos of
    badgeholders
•   Print badges for issuance
    into access control system
•   Synchronize database
    information with V5 devices
    in the field
                                  •   All-in-one solution OR
                                  •   Multi-client solution with
                                      shared credential
                                      database
The Vindicator Communications Network
•    Originally Developed for
     the Military (11 yr
     MTBF)
•    Creates a private
     security network
•    Addressable nodes for
     sensor I/O & point
     processing
•    Extensible & changeable
     with site dynamics
•    Encryption via UHS or
     TDEA
•    Many media types
     supported: RS-485,
     Fiber, Ethernet, RF



     Spec-killer security solution creates foundation for
        success in complex integrated applications.
Vindicator – Key Functions & Benefits
•   Autonomous, Local Control            •   No reliance on central IT
     –   ACS Servers share DB’s and          server
         auto-replicate changes               – Higher reliability
     –   IDS Servers have local rules         – No concerns re: WAN
         processing on over 20k inputs          outages
         and 10k alarm points.
                                              – New Local CCTV
     –   IDS Servers can control of             control at remote site.
         CCTV and other equipment

•   Scalable, Easily Expandable
    Security Network                     •   Future-proof design
     –   IP or RS-485 between Servers         – As needs and layouts
                                                change.
     –   IP, RS-485, Fiber, RF to
         downstream I/O                       – As I/O evolves and is
                                                replaced.
     –   Drop IDS I/O off any server
     –   Encrypted comms if required

    Extremely powerful platform with unique features creates
             difficult specs for competitors to meet.
What about legacy devices?
•   Re-Use old PIRs, Relays,                          V5 IDS
    Microwaves, etc.

•   Transponder devices can                   UHS-Net
    be programmed and re-
    programmed
    – State definitions for each                                  Transponder
      input can be modified        •   Inputs and Outputs totally
    – Logical combinations of
                                       programmable:
      inputs can be modified           –   Inputs:
                                            • 0-5 V DC Multi-state Inputs
•   Replace aging sensors                     (255 levels)
                                            • 255 count input timing delay
    without changing network
                                       –   Outputs:
    setup.                                  • 115VAC or 24VDC relays

    Strength of Vindicator I/O is its ability to take over
          legacy sensors and field equipment.
VCN: Scalable from Simple to Enterprise




                                        LAN/WA
                                          N




From inexpensive, single-box to enterprise-wide global
 systems over wire, fiber, Ethernet, RF or serial media
Advanced Security Capabilities
             Detection                  Assessment
•   Ground-Based Radar          •   Analog Video
     –   STS integrated to V5       – Switchers, matrix
                                    – Cameras, keyboards
•   Fence and Buried Cable
     – Fiber                    •   Digital Video
     – Coax                         – DVM software
                                    – IP cameras

•   Long Range Thermal              – Streamers

     – LOFTI
     – FLIR                     •   Mixed Systems
                                    – Real-Time switching & control
•   Video Analytics                 – Digital Storage & retrieval




    Vindicator can match the right solution to your needs
Program Management

 •   Professional Staff of Program & Project Managers
     –   Experience with Subs, Suppliers, Design-Build, Civil
         Construction, etc.

 •   Logistic Support

 •   Engineering
     – Surveys
     – Designs
     – Drawings
     – Installation Plans




Effective Program Management will reduce the chance of
     false starts and impact to your daily operation
Installation Management

 •   All Vindicator installation teams are
     certified by Vindicator trainers
     –   Authorized Systems Integrators and Sub-
         Contractors
     –   Separate classes for IDS and ACS


 •   Long history with many in industry ensure
     strong, positive relationships
     –   History of successful work for Vindicator
     –   Single Shared Goal: End-User Satisfaction




Certified integrators are required for solution deployment
System Commissioning & Testing

 •   Commissioning Management
     –   Vindicator Technical personnel on-site will
         ensure an optimal configuration of your solution

 •   Acceptance Testing
     –   Vindicator will manage the acceptance testing of
         your system to meet your original requirements

 •   Compliance Testing
     –   Periodic performance testing will ensure that
         your system meets original specs long after
         deployment.

Performance management will ensure consistency of your
           system over time and personnel
Drawing Capabilities

 •   Create ‘as-builts’ of
     your site and solution

 •   Update your site plans
     with the details of the
     solution just installed




  Vindicator can create or update your drawings for an
accurate accounting of your system and its configuration
Off-Site Technical Support
•   Standard Technical Support
    – Provided for every system installed
    – 8:00 AM – 5:00 PM EDT; Mon – Friday
    – Via phone or email to factory personnel
    – After-hours calls returned next business day



•   Advanced Technical Support
    – Provided on a fee basis
    – 24x7; 365 Days / Year
    – Via phone or email to factory personnel




Expert Tech Support resources are available to help you
On-Site Technical Support & Maintenance
 •   System Assessment
      –   2-day on-site assessment by Vindicator technical staff
      –   Written report provided within two weeks

 •   Advanced Technical Support
      –   24x7; Mon – Sunday
      –   Via phone or email to factory personnel
      –   Provided on a annual fee basis

 •   Configuration Management
      –   Take System Assessment output and target areas of improvement for better
          performance and easier management.
      –   Written report with recommendations for system / config enhancements
      –   Provided on a daily engineering fee basis

 •   Preventative Maintenance
      –   Certified Technical to check status and configuration against original
          specifications
      –   Improvements and recommendations made as necessary
      –   Provided on a daily engineering fee basis



Vindicator and Certified technicians can tune your system
             for best performance over time
Migration Expertise

  •   Backward compatibility of Vindicator
      hardware

  •   But, many legacy components don’t
      have clearly migration plan
      –   Tying into new IT systems
      –   Meeting new specs with old equipment
      –   Analog components in an increasingly
          digital world



No solution lives forever – Vindicator can help you plan for
       the migration forward and reduce your risk
Summary: Vindicator Security Solutions
•   The world’s most
    powerful security
    solution

•   A world-class team
    from concept to ‘as-
    built’ and after install

•   Customer-focused and
    Customer-driven

    Customers driver our business forward – matching our
    industry-leading capabilities to the needs of each one

More Related Content

Similar to Vindicator Overview

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingpradeepfdo
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
ThousandEyes
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
Rohit Kumar
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYDESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
iQHub
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
Medley India Infosolution Pvt Ltd
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to Cloud
Rebekah Rodriguez
 
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesGDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
James Anderson
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
Michelle Holley
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
Julius T Chibanga
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
InSource Solutions
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Jason Mashak
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Cisco Enterprise Networks
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Ixia NVS Group
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
5nine
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introductionelisasson
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introductionelisasson
 

Similar to Vindicator Overview (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRYDESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to Cloud
 
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesGDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Why CDW
Why CDWWhy CDW
Why CDW
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introduction
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introduction
 

Vindicator Overview

  • 2. Contents • Honeywell Portfolio Overview • Vindicator Background • Mission Critical Security • Customer Examples • Solutions and Capabilities Overview • Summary
  • 3. The History of Vindicator • Nearly 30 years of history providing security solutions – Reputation for Results, Customer Focused Philosophy – 100% Success Rate – Employee Commitment • World Class Products and Technology – Extremely Reliable Products (100,000 hours MTBF) – Embedded, yet built on open standards • Acquired in 2004 by the world’s largest Security player – Focused more than ever on Customer Excellence – Benefiting from $100M Annual Security R&D Investment – Delivering the worlds most advanced security solutions
  • 4. How can we help your operation? • What is your mission? – Let us help you determine how security policy affects your operation – Let us help you use technology to protect your interests • Our Goal: Provide the most cost-effective solution for maximizing your up-time while minimizing your time-to-response. – We want to help you save money or make money – We want to help you do more with your resources The world looks to Vindicator for robust end to end – Mission Critical – integrated security solutions
  • 5. Vindicator – Who are our Customers? – International & Nuclear – NSA Power Plants – Sandia National Labs – US Army Corps of – Federal Bureau of Prisons Engineers – US Army Chemical and – US Petroleum Reserve Weapons Depots – Dow Chemical – DuPont – Saudi Aramco – UK MoD – US Gov’t / DoD 100’s of Customers with diverse and demanding requirements
  • 6. Contents • Honeywell Portfolio Overview • Vindicator Background • Mission Critical Security • Customer Examples • Solutions and Capabilities Overview • Summary
  • 7. What do we do for our customers? Program / Project System Management Installation Solution & Drawing Concept Design Packages System Testing & Commissioning Migration Support Services On & Off Site Preventative Tech Support Maintenance Complete life-cycle support of a customer’s security needs
  • 8. Solution Concept & Design • Industry-leading security design expertise – Many years of systems design and integration – Communications system design expertise – Proper selection of products and technology • Unmatched capabilities for customer-engineering – Custom interfaces – 3rd party sensors and systems – New features and capabilities • Master Integrator capability to bring together the “best fit” solution and players Ellis Island, NY A successful program starts with a good design done early.
  • 9. Vindicator – What is it? Admin/Enrollment Event Archive Alarm Monitoring Video Assessment Client UI and Display V5 ACS V5 ACS V5 IDS Embedded Servers 6842 Network Field 6842 MR14, MR24, MR14, MR24, MR50 or PW5k1R2 MR50 or PW5k1R2 Separate Intrusion Detection and Access Controllers allow maximum application segmentation without “stove-pipes”
  • 10. Intrusion Capabilities we Offer… • …Interior detection and alarming • …Exterior detection and alarming • …Perimeter Intrusion Detection • …Beyond the Perimeter Detection • …Centralized alarm reporting LAN …Remote alarm reporting & routing / • WA N • …Redundant alarm reporting Vindicator intrusion solutions can meet virtually any IDS need in many, many applications
  • 11. The V5 Intrusion Detection System • Most powerful enterprise IDS systems available – Over 10,000 Alarm Points – Over 8,000 Inputs – Over 4,000 Outputs • Has passed “5 in 2” test – Display for ‘ack’ 5 coincident alarms in 2 seconds • System expansion over many comms media… – Fiber, Ethernet, RS-485, RF, RS-232, etc. – Encrypted up to TDEA • Extensive testing performed – PL1-4 Nuc and non-Nuc, DCID 6/9, UL1076/294/864 Advanced IDS System meets needs of the world’s most demanding applications
  • 12. PC Smart Pak • Extremely powerful administration and operator console – Console-based configuration tool – Administer points, rules, network settings, badge-holders, PC Smart Pak runs on the V5 permissions, etc. locally and is displayed via the PC. No capability is lost if the – All V5 and VCN administration can PC or PC-connection fails. This be done from any terminal on the ensures maximum security and network reliability of the security solution. Powerful system administration console gives administrators control over the network from any node
  • 13. VCC – Vindicator Command & Control • The World’s easiest to use and most powerful Alarm Monitor – Can be learned in minutes with minimal training – Supports 10’s of 1000’s of points – Sophisticated routing to many consoles The VCC GUI receives data from sends operator – Redundant monitoring capability instructions to the V5 IDS – Used by the governments and Server, but all logical processing militaries to monitor some of the is done on the V5, ensuring world’s most critical assets maximum reliability. Simple, intuitive Windows-based GUI ensures ease of operation without sacrificing power or capabilities
  • 14. Access Capabilities we Offer… • …Simple and Complex door control • …Complex Timing Routines (one-time & scheduled holidays) • …Local and Global Anti-Passback • …Smart Cards & Biometrics • …Photo Badging and Access Assignment • …Tight Integration with Intrusion & Video • …Autonomous sites Connected to the Enterprise Vindicator access control solutions can scale from small, single sites to WAN connected Enterprise needs
  • 15. The V5 Access Control System • Best in class, ‘next generation’ system – Capabilities today that many ACS systems won’t have in 2 years • Peer-to-peer communication between servers • Database clustering among servers • Expandable storage capacity • Auto-replication of DB changes • Intimate integration with V5 IDS – Complete system configuration and admin from any Server – Access events map onto IDS alarms (forced door, invalid PIN, etc.) – I/O points can be shared between IDS and ACS systems • Easy expansion with modular local and downstream I/O – Fiber, Ethernet, RS-485, RF, RS-232, etc. – All I/O are addressed on the UHS-Net network – Encrypted up to TDEA • Extensive testing performed – PL1-4 Nuc and non-Nuc, DCID 6/9, UL1076/294/864 Advanced ACS System meets a wide array of application needs
  • 16. Vindicator Badge Manager • Create identities and input Badgeholder information • Capture photos of badgeholders • Print badges for issuance into access control system • Synchronize database information with V5 devices in the field • All-in-one solution OR • Multi-client solution with shared credential database
  • 17. The Vindicator Communications Network • Originally Developed for the Military (11 yr MTBF) • Creates a private security network • Addressable nodes for sensor I/O & point processing • Extensible & changeable with site dynamics • Encryption via UHS or TDEA • Many media types supported: RS-485, Fiber, Ethernet, RF Spec-killer security solution creates foundation for success in complex integrated applications.
  • 18. Vindicator – Key Functions & Benefits • Autonomous, Local Control • No reliance on central IT – ACS Servers share DB’s and server auto-replicate changes – Higher reliability – IDS Servers have local rules – No concerns re: WAN processing on over 20k inputs outages and 10k alarm points. – New Local CCTV – IDS Servers can control of control at remote site. CCTV and other equipment • Scalable, Easily Expandable Security Network • Future-proof design – IP or RS-485 between Servers – As needs and layouts change. – IP, RS-485, Fiber, RF to downstream I/O – As I/O evolves and is replaced. – Drop IDS I/O off any server – Encrypted comms if required Extremely powerful platform with unique features creates difficult specs for competitors to meet.
  • 19. What about legacy devices? • Re-Use old PIRs, Relays, V5 IDS Microwaves, etc. • Transponder devices can UHS-Net be programmed and re- programmed – State definitions for each Transponder input can be modified • Inputs and Outputs totally – Logical combinations of programmable: inputs can be modified – Inputs: • 0-5 V DC Multi-state Inputs • Replace aging sensors (255 levels) • 255 count input timing delay without changing network – Outputs: setup. • 115VAC or 24VDC relays Strength of Vindicator I/O is its ability to take over legacy sensors and field equipment.
  • 20. VCN: Scalable from Simple to Enterprise LAN/WA N From inexpensive, single-box to enterprise-wide global systems over wire, fiber, Ethernet, RF or serial media
  • 21. Advanced Security Capabilities Detection Assessment • Ground-Based Radar • Analog Video – STS integrated to V5 – Switchers, matrix – Cameras, keyboards • Fence and Buried Cable – Fiber • Digital Video – Coax – DVM software – IP cameras • Long Range Thermal – Streamers – LOFTI – FLIR • Mixed Systems – Real-Time switching & control • Video Analytics – Digital Storage & retrieval Vindicator can match the right solution to your needs
  • 22. Program Management • Professional Staff of Program & Project Managers – Experience with Subs, Suppliers, Design-Build, Civil Construction, etc. • Logistic Support • Engineering – Surveys – Designs – Drawings – Installation Plans Effective Program Management will reduce the chance of false starts and impact to your daily operation
  • 23. Installation Management • All Vindicator installation teams are certified by Vindicator trainers – Authorized Systems Integrators and Sub- Contractors – Separate classes for IDS and ACS • Long history with many in industry ensure strong, positive relationships – History of successful work for Vindicator – Single Shared Goal: End-User Satisfaction Certified integrators are required for solution deployment
  • 24. System Commissioning & Testing • Commissioning Management – Vindicator Technical personnel on-site will ensure an optimal configuration of your solution • Acceptance Testing – Vindicator will manage the acceptance testing of your system to meet your original requirements • Compliance Testing – Periodic performance testing will ensure that your system meets original specs long after deployment. Performance management will ensure consistency of your system over time and personnel
  • 25. Drawing Capabilities • Create ‘as-builts’ of your site and solution • Update your site plans with the details of the solution just installed Vindicator can create or update your drawings for an accurate accounting of your system and its configuration
  • 26. Off-Site Technical Support • Standard Technical Support – Provided for every system installed – 8:00 AM – 5:00 PM EDT; Mon – Friday – Via phone or email to factory personnel – After-hours calls returned next business day • Advanced Technical Support – Provided on a fee basis – 24x7; 365 Days / Year – Via phone or email to factory personnel Expert Tech Support resources are available to help you
  • 27. On-Site Technical Support & Maintenance • System Assessment – 2-day on-site assessment by Vindicator technical staff – Written report provided within two weeks • Advanced Technical Support – 24x7; Mon – Sunday – Via phone or email to factory personnel – Provided on a annual fee basis • Configuration Management – Take System Assessment output and target areas of improvement for better performance and easier management. – Written report with recommendations for system / config enhancements – Provided on a daily engineering fee basis • Preventative Maintenance – Certified Technical to check status and configuration against original specifications – Improvements and recommendations made as necessary – Provided on a daily engineering fee basis Vindicator and Certified technicians can tune your system for best performance over time
  • 28. Migration Expertise • Backward compatibility of Vindicator hardware • But, many legacy components don’t have clearly migration plan – Tying into new IT systems – Meeting new specs with old equipment – Analog components in an increasingly digital world No solution lives forever – Vindicator can help you plan for the migration forward and reduce your risk
  • 29. Summary: Vindicator Security Solutions • The world’s most powerful security solution • A world-class team from concept to ‘as- built’ and after install • Customer-focused and Customer-driven Customers driver our business forward – matching our industry-leading capabilities to the needs of each one