AggreGate Security and Access Control is an suiss-knife Physical Security Information System (PSIM) designed to keep your facility, staff and assets secure by intuitively managing physical access to doors, turnstiles, elevators, vehicles, and other access points. The zone under control may include an unlimited number of areas, gates and cardholders. AggreGate easily integrates with diverse security devices and systems:
Data management and visualization instruments of AggreGate Platform allow quick design and visual development of multi-display dynamic plans, situation center dashboards, security staff mobile UIs and debriefing reports.
Intelligent Building IntegrationAggreGate Access Control is based on the AggreGate Device Management Platform. The unified platform provides natural integration with AggreGate Time and Attendance, AggreGate Network Manager and AggreGate Building Automation in order to create a smart facility control center. This integration can be planned from scratch or implemented at any time as your infractructure grows. |
|
Multi-site Access ControlAggreGate has distributed architecture which provides centralized access control for large organizations with multiple branches located in different parts of the world. Both security devices and operator seats may be located far from the central server. All communications are securely performed via IP networks. |
|
Incident and Situation ManagementAggreGate is widely used as a security incident management middleware. Connecting to numerous physical access control and security system, it consolidates all alerts and enables operator-driven incident resolution workflows, as well as centralized remediation and debriefing. |
Enterprise ScalabilityThe system is based on the AggreGate Device Management Platform which provides centralized control for hundreds of access points, thousands of cardholders and millions of security events. |
Organization Structure ManagementSupport for comprehensive cardholder hierarchy, including multiple organizations, subdivisions and departments. |
||
Flexible TimezonesSet up complex access schedules, such as "Monday through Wednesday 10AM-2PM", "second Monday of September", etc. Pre-defined (but still configurable) timezones include Always, Never, Working Hours, and Holidays. |
Rule-bases Access PoliciesEvery policy may include several rules controlling access to a door, group of doors or individual readers (for turnstiles, elevators, etc.) within a certain timezone. Multiple access policies may be assigned to individual cardholders, departments, divisions, and organizations. |
||
Multi-entrance AreasAn area may be configured for anti-passback, presence control, pass counting, occupancy and exposure time tracking, guard tours. |
Custom ExpiriesEvery access policy assigned to a cardholder or department/organization may have several expiration timestamps. |
||
Facility MapsCreate dynamic floor plans and facility maps in the integrated GUI Builder. View status of your devices and control them throught the dynamic maps. |
Advanced ConnectivitySupport for a wide range of readers, locks, access control panels, and other security hardware through the hardware controllersor software device drivers. |
||
High ReliabilityInstallations with multiple operator posts and server clustering support allow to build a highly available system. |
Event MonitoringReal-time monitoring of security and system events. Guards may be prompted to acknowledge certain critical events. |
||
Event ManagementAll historical events may be browsed using the advanced Event Log. Different rules for event sorting, filtering and color-coding are supported. |
AlertingCustomizable alerts supporting different types of notifications (sound, popup messages, e-mail, SMS, etc.). |
||
Alert EscalationSupport for pending alerts and alert escalation. |
Corrective ActionsAlert-to-action bindings allow to execute corrective actions when an alert is raised. Corrective actions may be controlled by an operator or executed in a non-interactive mode with pre-defined user input. |
||
ReportingAdvanced reporting facility, out-of-the-box security audit reports. Scheduled report emailing. |
Report EditorBuilt-in report editor, report printing and exporting in different formats. |
||
Task SchedulingAdvanced job scheduler for periodic execution of any device-related or system actions. |
GroupingGrouping and group operations are available to different system objects (user accounts, alerts, event filters, access policies, etc.) and hardware devices. |
||
ReplicationAdvanced replication of configurationbetween any similar system objects and devices. Configuration may be copied even between devices which use different firmware versions. |
Custom Data StorageCommon data tables store any custom data in a user defined format which makes it possible to associate any asset tracking information with your devices or set up master-copies of device settings used to configure multiple devices. |
||
Time ConversionMultiple time zones support. Automatic time conversion when a server, users and devices are located in different time zones. |
Export and ImportSupport for export and import of cardholders and other data to numerous formats, including XML, HTML, CSV, XLS, PDF, RTF, etc. |
||
Internal Access ControlHierarchical multi-user environmentwith different customizable permissions for operators, managers, engineers, and administrators. |
Secure CommunicationsServer-Device and Server-Clientcommunications are performed using secure channels. |
||
Query LanguageIntegrated SQL-based query languagefor data mining and batch configuration updates. |
IntegrationWeb-Service and Java and .NET API's are available for easy integration with video surveillance, badging and building automation systems. |