Known in the industry as an OEM supplier to other access ... IS2000 Overview.pdf · 1997 1998 1999...

51
Founded in 1997 Known in the industry as an OEM supplier to other access control manufacturers Over 8,000 systems in the field Installed in over 33 countries One of the broadest based platforms in the industry

Transcript of Known in the industry as an OEM supplier to other access ... IS2000 Overview.pdf · 1997 1998 1999...

• Founded in 1997• Known in the industry as an OEM supplier to other access control manufacturers• Over 8,000 systems in the field• Installed in over 33 countries• One of the broadest based platforms in the industry

AX

IS-A

10

01

Software Supplier to:

Timeline

Op

en O

ptio

ns-

NPo

wer

Vid

eo In

sight-

Mo

nito

rCast

Qu

intro

n-

AccessN

Site

dvTel-

Lon

gitud

e

Bo

sch

Matrix System

s

PAC

-V

ision

Over 8,000 Systems in 33 Countries

1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Rad

ion

ics-P

C9

00

0

Blick-

Prism

• An open system platform with the most comprehensive access control solution

• Leverages legacy hardware platforms to maximize the end-users investment

• Minimizes risk by allowing the dealer to pick and choose the right hardware platform to fit their customers needs

• No end-of-life / No dead-end solutions allows for product migration

Benefits

• AXIS A1001 Network Door Controller• Mercury Controllers• HID VertX EVO / Edge EVO Controllers• Honeywell Win-Pak / Pro-Watch Controllers• ReadyKey Pro Controllers• ACP/inBio Controllers• Bosch G Series Alarm Controllers• DMP XR Series Alarm Controllers• ELK M1 Series Alarm Controllers• Schlage Wireless Locks• Assa Abloy (Aperio and POE) Wireless Locks

• Milestone VMS• Video Insight VMS• ipConfigure VMS• OnSSI VMS• Salient Systems• Edwards Fire panels • Inovonics Temperature Sensors

Supported Hardware Platforms

Vertical Markets

Commercial Schools Healthcare Factories

Airports Community Centers Museums and Municipalities

Sports Facilities

Power Plants

Law Offices

IS2000 Architecture

IS2000 Security Management Software• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

The Three Components of IS2000

Database• Tables: Personnel, Access Levels, Time Schedules, Hardware,

Events, Alarms• Database Types: Microsoft SQL Server, Microsoft Access,

Oracle mySQL

Graphical User Interface• Type: Server or Client with 1 server per region and virtually

unlimited number of clients.• Modules: Personnel, Access Levels, Time Schedules, Door

Schedules, Triggers/Macros, Events, Alarms, Reports, Operators, Profile Editor, Graphic Maps, Hardware, Guard Tour, Attendance, Video, Watch Window

• Utilities: Database Import Utility, Access to SQL, Archive Utility

• Configuration: • Software Development Kit: Client Tester Tool• Requirements: Windows, .NET Framework 4.0, and Database

Driver Services• Web Service: For thin client support• Access Control: Mercury, Axis, HID VertX/Edge, ACP, inBIO• Alarm Systems: Bosch, DMP, ELK• Video Management Systems- Milestone, Video Insight, DVTel,

ipConfigure, Exacq• HVAC Systems: Inovonics Temperature Sensor

Dedicated Server• Supported OS: Windows XP/Vista/7/8/2003/2008/2012• Minimum Requirements: 1 Ghz CPU, 4 GB RAM, 2 GB HDD

IS2000 Server Requirements

Virtual Server• Microsoft Hyper-V• VMWare • Minimum of 2 Virtual CPUs• Minimum RAM 256 MB

OR

IS2000 Server• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

IS2000 Standalone

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

LAN

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Client• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

IS2000 Network Topology of Client Server

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

IS2000 Network Topology

LAN

IS2000 Server (Active)• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).

• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

IS2000 Redundant Standby Server

IS2000 Redundant Standby Server• Remains in Standby Mode until the Active Server fails.• Contains a mirrored version of the IS2000 Server

application and database.• Automatic failover capability is maintained by a third party

application: NeverFail, DoubleTake, etc…• License cost is 50% of complete software license cost of

the site that is being managed.

High Availability/Disaster Recovery Solution:Eliminate the Single Point of Failure for Improved Data Protection and Disaster Recovery.By leveraging Microsoft Clustering technology and the GeoCluster feature of Double-Take Availability software, you can eliminate the single point of failure for your IS2000 Server for improved data protection, high availability server and disaster recovery.

Benefits:• Data Protection: Reduces exposure to data loss and eliminate the single point of failure. A copy of the

IS2000 database and IS2000 data folder are always stored in both servers and replicated in real-time

• High Availability: Reduces downtime of IS2000 services with automatic failover driven by Microsoft Clustering technologies to achieve the highest possible availability of IS2000 services

• Disaster Recovery: Ensures that IS2000 applications and data can be quickly recovered through real-time, offsite data protection and failover

How it Works:1. Each IS2000 Server cluster node maintains local copies of IS2000 Database and Data folder.2. GeoCluster Replicated Disk resource controls data access, replication and flow between the server

nodes.3. ‘Read-only’ access to replicated disks on the inactive (standby) node ensures data integrity4. Failure of node or manual user intervention moves IS2000 virtual server and all its resources to remaining

server node with very minimal downtime.5. IS2000 Clients continue to access server resources using the virtual server identities.

IS2000 Server Cluster

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed

Mode).

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

IS2000 Network Topology with Separate Data Server

LANIS2000 Server (Active)• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).

• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Data Server (Active)• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate

SQL Users (Mixed Mode).

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

IS2000 Redundant Standby Serverwith Separate Data Servers

IS2000 Redundant Standby Server• Remains in Standby Mode until the Active Server fails.• Contains a mirrored version of the IS2000 Server application.• Automatic failover capability is maintained by a third party application:

NeverFail, DoubleTake, etc…• License cost is 50% of complete software license cost of the site that is being

managed.

Backup Data Server• Replicated database from Active Data Server• Automatic failover capability is maintained by a third party

application: NeverFail, DoubleTake, etc…

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed

Mode).

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

IS2000 Network Topology with Separate Data Server and HR Database Integration

HR Database Integration• Data from an HR Management System can be pushed / pulled to or from the

IS2000 Data server• Batch or real-time processing• Card Management in near real-time to the access control reader(s)• Support for Active Directory, PeopleSoft, and Workday

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed

Mode).

Mobile Device• MUST have TCP/IP access to the IS2000 Server.• Uses https with optional certificate.• Uses IS2000 to Authenticate Operators.• Limited feature set when compared to thick GUI.

WAN

AXIS Network Door Controller• MUST have TCP/IP access to the IS2000 Server.• Connects using http or https.• Uses TCP ports 80 or 443 for host connection.• Uses TCP Port 554 for real-time event streaming• Local User Authentication.

Mercury Controller• MUST have TCP/IP access to the IS2000 Server.• Uses TCP Port 3001• Local User Authentication

IS2000 with Hybrid Access Control Systems

HID VertX / Edge EVO Controller• MUST have TCP/IP access to the IS2000 Server.• Uses TCP Port 4070 and 4071• Local User Authentication

ZK ACP / inBIO Controller• MUST have TCP/IP access to the IS2000 Server.• Uses TCP Port 4370• Local User Authentication

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed

Mode).

Mobile Device• MUST have TCP/IP access to the IS2000 Server.• Uses https with optional certificate.• Uses IS2000 to Authenticate Operators.• Limited feature set when compared to thick GUI.

WAN

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

Alarm System• MUST have TCP/IP access to the IS2000 Server.• Bosch uses UDP port 7700 and TCP 3001• ELK uses TCP port 2101• Local User Authentication

Video Hardware• MUST have TCP/IP access to the IS2000 Server.• Local User Authentication

IS2000 Managing Access Control, Video, Alarm Systems and Temperature Control

Temperature Control• Communicates to wireless gateway.• Monitor Temperature Sensors and send notifications when certain

thresholds are reached.

IS2000 Multi-Site Configurations

LAN

IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges

to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).

IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using

either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.

Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed

Mode).

Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web

server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.

IS2000 Single Site Definition

IS2000 Multiple Independent Sites

LAN LAN

LAN

Site 1 Site 2

Site 3

IS2000 Multiple Independent Siteswith Data Replication

LAN LAN

LAN

WAN

Site 1 Site 2

Site 3

LAN

IS2000 ServerIS2000 Clients

Data ServerWAN

IS2000 Multiple Connected Sites

Database Replication Across WAN• Each site has the same replicated database.• Database partitioning is done via IS2000 profile and

permission view settings.• IS2000 regional servers process commands for the local

clients and access the local database, thus maintaining performance across the enterprise.

LAN

IS2000 Clients

Data Server

IS2000 Server

LAN

IS2000 Clients

Data Server

IS2000 Server

Site 1 Site 2

Site 3

LAN

IS2000 ServerIS2000 Clients

Data Server

IS2000 Thin Client• MUST have TCP/IP access to the IS2000 Server.• Browser Agnostic• Uses https with optional certificate.• Uses IS2000 to Authenticate Operators.• Limited feature set when compared to thick GUI.

WAN

Site 1

IS2000 Hosted Environment

IS2000 Clients

Site 2

IS2000 Clients

Site N…

IS2000 Clients

Central Station• Hosts IS2000 Server and the IS2000 Data Server.• Site visibility is based on Profile and Permission

settings

IS2000 Thick Clients• MUST have TCP/IP access to the IS2000 Server.• Uses https with optional certificate.• Uses IS2000 or Windows Active Directory to Authenticate

Operators.• Network speed affects application performance.

IS2000 GUI Overview

IS2000 Logon

IS2000 Logon

• There are 2 modes to the IS2000 interface:

1. Desktop Mode- Runs as a desktop and allows customized Tiles to be associated to security modules as well as other third party software applications that are already installed. Desktop Mode acts as an extension to the Windows Desktop and works with the Windows Taskbar. Desktop Mode does NOT allow IS2000 to be resized and always remains maximized on the screen. IS2000 cannot be minimized in this mode.

2. Application Mode- Runs like an application with fixed positions for the main modules and toolbars. Very little customizations are allowed, and the application can be resized, maximized or minimized.

• Logon using ‘Admin’ for the Operator and ‘a’ for the Password. Select ‘Application’ and click Logon.

IS2000 Profile Editor

IS2000 GUI- Application Mode

NavigationToolbar

CommandToolbar

SoftwareModule

InformationWindow

CustomCommands

Help

Operator that iscurrently logged in

Custom Tile thatis referencing

a website

System Dateand Time

Custom Tiles thatare referencing the

same modules as the Navigation Toolbar

Custom Wallpaperfor background

Help

IS2000 GUI- Desktop Mode

The Desktop Designer allows the operator to customize all aspects of the GUI, including: background and foreground colors, desktop wallpaper, adding/removing of any Windows applications, documents, files, etc.., adding/removing any of the natively written security and building management modules.

• Drag and Drop IS2000 modules and commands to the IS2000 desktop.

• Drag and Drop Windows applications to the IS2000 desktop.

• Drag and Drop Windows Documents, Apps, Media Files from Windows to the IS2000 Desktop.

• Drag and Drop Windows Shell commands including BAT, CMD Files and websites to the IS2000 Desktop.

• Drag and Drop web applets to the IS2000 Desktop.

• Customize Tiles by size, placement, caption, icon representation, function, and color on a per user profile basis.

• Customize the wallpaper and background/foreground colors (gradients and solids).

Desktop Designer- Overview

IS2000 Hardware Manager

HardwareTree

HardwareProperties

StatusScreen

IS2000 Controller Groups

Time Schedules / Holidays- Used to define when someone has access to the facility or when doors should unlock.

IS2000 Time Schedules / Holidays

• Access Levels- Used to define when and where someone has access. Pairing of Reader(s) and Time Schedules.• Readers- Access Levels can contain individual reader(s) or a group of readers called ACRGs.• ACRGs- Access Control Reader Groups; Virtually unlimited; Right mouse click reminder.

IS2000 Access Levels

IS2000 Personnel Manager

Used to administer and provision credentials in the system.

IS2000 Report Manager

Status Window for status and device control in a list format

IS2000 Point Status

Used to manage and integrate to Video Management Systems and/or IP Cameras

IS2000 Video Manager

IS2000 Graphic Maps

IS2000 Device Groups/Areas

IS2000 Door Schedules

IS2000 Alarm Manager

IS2000 Log Manager

Define custom Profile specific commands for doing a variety of functions such as lockdowns, email notification, report generation, running a third party application, etc…

IS2000 Custom Commands

IS2000 Triggers and Macros

• Backups and Archives are done automatically according to a schedule

• Data Import Utility• Used to import from an ODBC, Active Directory, or CSV data source.• Imports can be set to occur periodically or initiated manually.• Ideal for HR database integration.

• Access to SQL Utility• Will convert the default MS Access database to a SQL Server database and configure IS2000

to look at the SQL Server database. • Supports all versions of SQL Server including SQL Server Express

IS2000 Data Tools

IS2000 Configuration Utility

• Thick Clients • Windows based IS2000 clients• Requires software to be pre-installed.• Requires an IS2000 license and works based on concurrent licensing.• Rich GUI with all of the functionality available from an IS2000 Server.

• Thin Clients• Supports desktop, laptop, tablet, smart phone• Browser agnostic• No need to load any software on the client• Limited functionality: Supports Personnel Manager, Time Schedules, Event Manger, Door Control, Report

Manager, Access Levels, Holidays, Video Manager, Triggers and Macros (VertX Only)• Requires the IS2000 Web Service in order to run.• Requires an IS2000 license and works based on concurrent licensing.

• SDK Client• 3rd Party software development application that was developed using the IS2000 SDK• Requires the IS2000 Web Service in order to run.• Custom GUI interface that can potentially perform all of the commands and functions of an IS2000 Client.• Professional Services Team can help in making custom applications.

IS2000 Clients

Total Systems Design, Configuration and DeploymentLet our Professional Services team of security and systems expert do the work for you. We will work closely with your partners to provide a complete access control solution that includes server commissioning, installation, configuration, deployment and total systems training.

High Availability and Disaster Recovery Servers (IS2000 Server Cluster)When your system simply cannot go down, IS2000 Server Cluster is the ultimate solution. By leveraging Microsoft’s Windows and SQL Server clustering and third-party data replication software, this solution provides high availability for your applications and added data redundancy in the event of a disaster or server failure.

API/SDK/XML Interoperability and IntegrationsBy leveraging the common programming language, our team of expert software engineers can help you seamlessly integrate systems. From Active Directory and HR to Visitor Management and Video Management Systems, the flexibility to integrate is our specialty.

Database ServicesAt the core of every system is the database, where all of your important data is housed. Let our team of experts provide the expertise to install and upgrade database servers, optimization, maintenance, and customized reports.

Systems Migration and UpgradeLet our team of expert systems engineer provide you with that sound piece of mind to migrate/upgrade your legacy and older systems.

Programming and CustomizationNeed a custom application to integrate to your Time and Attendance, or how about the Airport No-Fly database, or a custom report? Our team of software engineers can develop the right application for you.

Maintenance and SupportIMRON Corporation’s maintenance and support services are designed to maximize your security investments. We offer email and phone support as well as on-site maintenance visit to check on the overall health of your system, so you can be sure that your system is running optimally.

IMRON Professional Services Offerings

IMRON Corporation Website