Access Control

AggreGate Access Control is designed to keep your facility, staff and assets secure by intuitively managing physical access to doors, turnstiles, elevators, vehicles, and other access points. The zone under control may include an unlimited number of areas, gates and cardholders.

The vendor-agnostic approach allows the product to integrate with various access controllers, fire alarm systems, emergency notification systems, and video monitoring/analytics systems.

Intelligent Building Integration

Intelligent Building Integration

AggreGate Access Control is based on the AggreGate Device Management Platform. The unified platform provides natural integration with AggreGate Time and Attendance, AggreGate Network Manager and AggreGate Building Automation to create a smart facility control center. This integration can be planned from scratch or implemented at any time as your infrastructure grows.

Multi-Site Access Control

Multi-Site Access Control

AggreGate has a distributed architecture which provides centralized access control for large organizations with multiple branches located in different parts of the world. Both security devices and operator seats can be located far from the central server. All communications are securely performed via IP networks.

Incident and Situation Management

Incident and Situation Management

AggreGate is widely used as a security incident management middleware. Connecting to numerous physical access control and security systems, it consolidates all alerts and enables the operator-driven incident resolution workflows, as well as centralized remediation and debriefing. Check the Incident and Situation Management for details.

Enterprise Scalability

Enterprise Scalability

The system is based on the AggreGate Device Management Platform which provides a centralized control for hundreds of access points, thousands of cardholders and millions of security events.

Organization Structure Management

Organization Structure Management

Support for a comprehensive cardholder hierarchy, including multiple organizations, subdivisions and departments.

Flexible Timezones

Flexible Timezones

Set up complex access schedules, such as "Monday through Wednesday 10AM-2PM", "second Monday of September", etc. The pre-defined (but still configurable) timezones include Always, Never, Working Hours, and Holidays.

Rule-Based Access Policies

Rule-Based Access Policies

Every policy may include several rules controlling access to a door, group of doors or individual readers (for turnstiles, elevators, etc.) within a certain timezone. Multiple access policies may be assigned to individual cardholders, departments, divisions, and organizations.

Multi-Entrance Areas

Multi-Entrance Areas

An area can be configured for anti-passback, presence control, pass counting, occupancy and exposure time tracking, guard tours.

Custom Expiries

Custom Expiries

Every access policy assigned to a cardholder or department/organization may have several expiration timestamps.

Facility Maps

Facility Maps

Create dynamic floor plans and facility maps in the integrated GUI Builder. View the status of your devices and control them through dynamic maps.

Advanced Connectivity

Advanced Connectivity

Support for a wide range of readers, locks, access control panels, and other security hardware through the hardware controllers or software device drivers.

High Reliability

High Reliability

Installations with multiple operator posts and the server clustering support allow building a highly available system.

Event Monitoring

Event Monitoring

Real-time monitoring of security and system events. Guards may be prompted to acknowledge the certain critical events.

Event Management

Event Management

All historical events can be browsed using the advanced Event Log. Different rules for the event sorting, filtering and color-coding are supported.

Alerting

Alerting

Customizable Alerts supporting different types of notifications (sound, popup messages, e-mail, SMS, etc.).

Alert Escalation

Alert Escalation

Support for pending alerts and alert escalation.

Corrective Actions

Corrective Actions

Alert-to-action bindings allow executing the corrective actions when an alert is raised. Corrective actions can be controlled by an operator or executed in a non-interactive mode with a pre-defined user input.

Reporting

Reporting

Advanced reporting facility, out-of-the-box security audit reports. Scheduled report emailing.

Report Editor

Report Editor

Built-in report editor, report printing and exporting in different formats.

Task Scheduling

Task Scheduling

Advanced job scheduler for a periodic execution of any device-related or system actions.

Grouping

Grouping

Grouping and group operations are available for different system objects (user accounts, alerts, event filters, access policies, etc.) and hardware devices.

Replication

Replication

Advanced replication of configuration between any similar system objects and devices. Configuration can be copied even between devices which use different firmware versions.

Custom Data Storage

Custom Data Storage

Models store any custom data in a user-defined format which makes it possible to associate any asset tracking information with your devices.

Time Conversion

Time Conversion

Multiple time zones support. Automatic time conversion when the server, users and devices are located in different time zones.

Export and Import

Export and Import

Support for export and import of cardholders and other data to numerous formats, including XML, HTML, CSV, XLS, PDF, RTF, etc.

Internal Access Control

Internal Access Control

Hierarchical multi-user environment with different customizable permissions for operators, managers, engineers, and administrators.

Secure Communications

Secure Communications

Server-Device and Server-Client communications are performed using secure channels.

Query Language

Query Language

Integrated SQL-based query language for data mining and batch configuration updates.

Integration

Integration

Web-Service and Java/.NET APIs are available for easy integration with the video surveillance, badging and building automation systems.

Umbrella Sea Port Terminal Supervision

Transportation and Logistics

Huelva Port

Spain

Industrial Automation

Control of a port perimeter secured with the automated control barriers, ultrasonic sensors and video cameras. Parking space and railway spur monitoring. RFID-based container tracking. Planning port operations with respect to the weather forecasts.

Server Room Management

Oil and Gas

Gazprom Neft

Russia

Industrial Automation

Control over server rooms in a corporate HQ. Monitoring of the air temperature, power supply, and more. Access control and physical security management.

Contact Us

Send