Intelligent Building Integration
AggreGate Access Control is based on the AggreGate Device Management Platform. The unified platform provides natural integration with AggreGate Time and Attendance, AggreGate Network Manager and AggreGate Building Automation to create a smart facility control center. This integration can be planned from scratch or implemented at any time as your infrastructure grows.
Multi-Site Access Control
AggreGate has a distributed architecture which provides centralized access control for large organizations with multiple branches located in different parts of the world. Both security devices and operator seats can be located far from the central server. All communications are securely performed via IP networks.
Incident and Situation Management
AggreGate is widely used as a security incident management middleware. Connecting to numerous physical access control and security systems, it consolidates all alerts and enables the operator-driven incident resolution workflows, as well as centralized remediation and debriefing. Check the Incident and Situation Management for details.
The system is based on the AggreGate Device Management Platform which provides a centralized control for hundreds of access points, thousands of cardholders and millions of security events.
Organization Structure Management
Support for a comprehensive cardholder hierarchy, including multiple organizations, subdivisions and departments.
Set up complex access schedules, such as "Monday through Wednesday 10AM-2PM", "second Monday of September", etc. The pre-defined (but still configurable) timezones include Always, Never, Working Hours, and Holidays.
Rule-Based Access Policies
Every policy may include several rules controlling access to a door, group of doors or individual readers (for turnstiles, elevators, etc.) within a certain timezone. Multiple access policies may be assigned to individual cardholders, departments, divisions, and organizations.
An area can be configured for anti-passback, presence control, pass counting, occupancy and exposure time tracking, guard tours.
Every access policy assigned to a cardholder or department/organization may have several expiration timestamps.
Create dynamic floor plans and facility maps in the integrated GUI Builder. View the status of your devices and control them through dynamic maps.
Installations with multiple operator posts and the server clustering support allow building a highly available system.
Real-time monitoring of security and system events. Guards may be prompted to acknowledge the certain critical events.
All historical events can be browsed using the advanced Event Log. Different rules for the event sorting, filtering and color-coding are supported.
Customizable Alerts supporting different types of notifications (sound, popup messages, e-mail, SMS, etc.).
Support for pending alerts and alert escalation.
Alert-to-action bindings allow executing the corrective actions when an alert is raised. Corrective actions can be controlled by an operator or executed in a non-interactive mode with a pre-defined user input.
Advanced reporting facility, out-of-the-box security audit reports. Scheduled report emailing.
Built-in report editor, report printing and exporting in different formats.
Advanced job scheduler for a periodic execution of any device-related or system actions.
Grouping and group operations are available for different system objects (user accounts, alerts, event filters, access policies, etc.) and hardware devices.
Advanced replication of configuration between any similar system objects and devices. Configuration can be copied even between devices which use different firmware versions.
Custom Data Storage
Models store any custom data in a user-defined format which makes it possible to associate any asset tracking information with your devices.
Multiple time zones support. Automatic time conversion when the server, users and devices are located in different time zones.
Export and Import
Support for export and import of cardholders and other data to numerous formats, including XML, HTML, CSV, XLS, PDF, RTF, etc.
Internal Access Control
Hierarchical multi-user environment with different customizable permissions for operators, managers, engineers, and administrators.
Server-Device and Server-Client communications are performed using secure channels.