The new age of access control from Bosch
Product Profile
Moreover, suppliers are more and more often faced with requirements of their customers to supply a documentation of all access attempts, whether successful or not, to protect against industrial espionage. To fulfill this requirement, not only employee access must be captured and recorded, but also the entire visitor traffic.
Video integration for more safety
While modern access control systems allow an efficient management of access rights, they are rather powerless against abuse if operated on their own. In critical environments it is mandatory to add a second layer of security by integrating access control with some kind of video surveillance. To prevent abuse, all access requests can then trigger one or more video cameras.
Integrated systems can provide alarm verification, instantly displaying live video images from nearby cameras when there is an alarm event at a door - such as when a person presents an unauthorised credential or when a door is forced open. Forensics can also benefit from such integration if the video recordings are referenced in the access control system's event log. Such a feature greatly facilitates identification, retrieval and playback of past events and alarms if necessary.
Open standards ease integration
Integrating access control, video monitoring, and intrusion detection can be rather easy when all components come from the same vendor and if this vendor also offers a management platform like the Building Integration System from Bosch for all of them.
Integrated systems "off the shelf" can greatly ease installation and configuration of the security solution. Logical integration eliminates the need for multiple software platform and interfaces -- resulting in fewer complications and greater event-driven functionality as well as reduced installation time and costs. What's more, this kind of integration also promises more efficient operation and a clearly reduced need for training, but above all also a higher security level. An open standards-based management system even makes sense in those cases where one vendor supplies everything, as it opens up the entire installation for future expansion.
User interface is key
An integrated security system is a very complex apparatus, and if this complexity is not hidden from the user, the system will be highly prone to human error and maloperation. Such systems do need very clear and intuitive user interfaces, avoiding information overload while offering all the information that is currently needed.
This is even more important when several components or dialogs are open, which will often be the case if you deal with access control, video surveillance and maybe intrusion detection from the same console.
Technical Specification
Make | Bosch |
---|---|
Manufacturer | Bosch Security Systems |
Category | Access Control>Access control software |
Model code | BIS - Access Engine |
Max No. of Doors per System | 1,200 |
No of Cardholders included | 200,000 (2500 included in Basic Package) |
Visitor Management | Yes |
Additional info |
Floor Plan: Yes, Autocad compatible Parking Lot Management: Yes Compatible Access Control Hardware: Bosch AMC. Standard wiegand or RS485 readers and common industry card Formats. Integration to other systems: Bosch CCTV. Bosch Intrusion, Fire, Public Address and 3rd party systems via BIS software. The Access Engine (ACE) software, in conjunction with Bosch access hardware, is a complete access control system within the building integration system (BIS). It encompasses all the essential features of any standalone access control system on the market today, plus a wide range of optional enhancements. See other access control products: AMC2 Access Modular Controller | Access Easy Controller 2.1 |
Download PDF version Download PDF version |
You might be interested in these products
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch Intruder detectors
- Bosch IP cameras
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download