This page contains a Flash digital edition of a book.
Security & Access Control


New key management system offers real-time control and traceability


Smart Key Manager uses RFID to guarantee high levels of security and productivity


S


ERV Trayvou Interverrouillage (STI) has launched a new security product that combines key


management with real-time traceability. Using RFID technology to guarantee a high level of reliability, the Smart Key Manager can accept up to 16 key modules, controlling a total of 256 keys. As it removes the need to manually sign people in and out or search for missing keys, the Smart Key Manager improves both staff efficiency and security. The product’s webserver interface allows the system to be checked and managed in real-time via a web browser from a PC, tablet or smartphone; no software needs to be installed. The system indicates which keys are present in or absent from the cabinet, who has taken each key and when. Via email, managers can choose to be kept informed of key movement, inform others and monitor several levels of administrators. Full or partial access to keys can be


given remotely via the interface, ensuring that individuals can only access keys relevant to them. The Smart Key Manager offers three levels of security by requiring users to prove their identity with a badge, PIN code or a combination of the two. Aside from peace of mind, the system increases productivity as keys normally held by members of staff who are suddenly taken ill can be transferred to other workers. When a user needs access to a key, they first need to prove their identity


with their badge or PIN code. The control panel then displays the list of keys that the user is authorised to remove. The user chooses the appropriate key, waits for the key movement to be registered, and removes the key that is now free. To return the key, the user holds the key fob in front of the control panel and the Smart Key Manager indicates where the key should be inserted and trapped. Tel: +33 (0)1 48 48 15 15 Email: pr@servtrayvou.com Website: www.servtrayvou.com


Heathrow Airport Install emerald™ Intelligent Access Terminal


C


EM Systems, part of the Security Products business unit of Tyco has announced that the industry renowned emerald™ multi- functional touch screen terminal has been installed in Heathrow Airport, UK. As one of the world’s busiest airports, Heathrow needed a reliable, innovative, intelligent device to ensure the highest levels of security as well as increasing operational efficiency. Heathrow Airport is using emerald to control critical paths and restricted zones that are permanently manned by security personnel. emerald will provide security staff with a clear, visual, colour image indicating the card status i.e. access denied or access granted. emerald will also enhance security at Heathrow’s Campus area where all cargo, staff and crew are processed before gaining access to the airside area. This is a critical part of Heathrow’s security operation where the


Building & Facilities Management – June 2014


highest level of security is required. AC2000 Airport protects staff, aviation equipment such as air bridges and luggage carousels, and millions of passengers each year. As well as utilising AC2000 software modules such as AC2000 AED (Alarm Event Display), AC2000 T&A (Time & Attendance) and AC2000 VIPPS (Visual Imaging Pass Production System) the airport also has over 4000 readers from the CEM S600 range and a number of S3030 portable readers for airport roaming security. Featuring a touch screen reader and controller in one, and built in Voice over IP (VoIP) intercom functionality removing the need for an additional intercom system, emerald uniquely enables data normally only available on the CEM AC2000 access control client PC to be accessed locally and securely at the door through its range of Remote Applications. They display real time security information and


statistics such as card status, scheduled visitors, top system alarms and most recent alarms on the terminal. Additional applications include First and Last swipes that can be used for time and attendance purposes, Card Details for individuals to determine access levels and card expiry date, and Change PIN that allows users to proactively change their own PIN without contacting the system operator. This data can only be accessed by those with the correct cardholder privileges. www.cemsys.com


security & access control


17


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44