Known in the industry as an OEM supplier to other access ... IS2000 Overview.pdf · 1997 1998 1999...
Transcript of Known in the industry as an OEM supplier to other access ... IS2000 Overview.pdf · 1997 1998 1999...
• Founded in 1997• Known in the industry as an OEM supplier to other access control manufacturers• Over 8,000 systems in the field• Installed in over 33 countries• One of the broadest based platforms in the industry
AX
IS-A
10
01
Software Supplier to:
Timeline
Op
en O
ptio
ns-
NPo
wer
Vid
eo In
sight-
Mo
nito
rCast
Qu
intro
n-
AccessN
Site
dvTel-
Lon
gitud
e
Bo
sch
Matrix System
s
PAC
-V
ision
Over 8,000 Systems in 33 Countries
1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
Rad
ion
ics-P
C9
00
0
Blick-
Prism
• An open system platform with the most comprehensive access control solution
• Leverages legacy hardware platforms to maximize the end-users investment
• Minimizes risk by allowing the dealer to pick and choose the right hardware platform to fit their customers needs
• No end-of-life / No dead-end solutions allows for product migration
Benefits
• AXIS A1001 Network Door Controller• Mercury Controllers• HID VertX EVO / Edge EVO Controllers• Honeywell Win-Pak / Pro-Watch Controllers• ReadyKey Pro Controllers• ACP/inBio Controllers• Bosch G Series Alarm Controllers• DMP XR Series Alarm Controllers• ELK M1 Series Alarm Controllers• Schlage Wireless Locks• Assa Abloy (Aperio and POE) Wireless Locks
• Milestone VMS• Video Insight VMS• ipConfigure VMS• OnSSI VMS• Salient Systems• Edwards Fire panels • Inovonics Temperature Sensors
Supported Hardware Platforms
Vertical Markets
Commercial Schools Healthcare Factories
Airports Community Centers Museums and Municipalities
Sports Facilities
Power Plants
Law Offices
IS2000 Security Management Software• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
The Three Components of IS2000
Database• Tables: Personnel, Access Levels, Time Schedules, Hardware,
Events, Alarms• Database Types: Microsoft SQL Server, Microsoft Access,
Oracle mySQL
Graphical User Interface• Type: Server or Client with 1 server per region and virtually
unlimited number of clients.• Modules: Personnel, Access Levels, Time Schedules, Door
Schedules, Triggers/Macros, Events, Alarms, Reports, Operators, Profile Editor, Graphic Maps, Hardware, Guard Tour, Attendance, Video, Watch Window
• Utilities: Database Import Utility, Access to SQL, Archive Utility
• Configuration: • Software Development Kit: Client Tester Tool• Requirements: Windows, .NET Framework 4.0, and Database
Driver Services• Web Service: For thin client support• Access Control: Mercury, Axis, HID VertX/Edge, ACP, inBIO• Alarm Systems: Bosch, DMP, ELK• Video Management Systems- Milestone, Video Insight, DVTel,
ipConfigure, Exacq• HVAC Systems: Inovonics Temperature Sensor
Dedicated Server• Supported OS: Windows XP/Vista/7/8/2003/2008/2012• Minimum Requirements: 1 Ghz CPU, 4 GB RAM, 2 GB HDD
IS2000 Server Requirements
Virtual Server• Microsoft Hyper-V• VMWare • Minimum of 2 Virtual CPUs• Minimum RAM 256 MB
OR
IS2000 Server• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
IS2000 Standalone
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
LAN
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Client• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
IS2000 Network Topology of Client Server
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
IS2000 Network Topology
LAN
IS2000 Server (Active)• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).
• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
IS2000 Redundant Standby Server
IS2000 Redundant Standby Server• Remains in Standby Mode until the Active Server fails.• Contains a mirrored version of the IS2000 Server
application and database.• Automatic failover capability is maintained by a third party
application: NeverFail, DoubleTake, etc…• License cost is 50% of complete software license cost of
the site that is being managed.
High Availability/Disaster Recovery Solution:Eliminate the Single Point of Failure for Improved Data Protection and Disaster Recovery.By leveraging Microsoft Clustering technology and the GeoCluster feature of Double-Take Availability software, you can eliminate the single point of failure for your IS2000 Server for improved data protection, high availability server and disaster recovery.
Benefits:• Data Protection: Reduces exposure to data loss and eliminate the single point of failure. A copy of the
IS2000 database and IS2000 data folder are always stored in both servers and replicated in real-time
• High Availability: Reduces downtime of IS2000 services with automatic failover driven by Microsoft Clustering technologies to achieve the highest possible availability of IS2000 services
• Disaster Recovery: Ensures that IS2000 applications and data can be quickly recovered through real-time, offsite data protection and failover
How it Works:1. Each IS2000 Server cluster node maintains local copies of IS2000 Database and Data folder.2. GeoCluster Replicated Disk resource controls data access, replication and flow between the server
nodes.3. ‘Read-only’ access to replicated disks on the inactive (standby) node ensures data integrity4. Failure of node or manual user intervention moves IS2000 virtual server and all its resources to remaining
server node with very minimal downtime.5. IS2000 Clients continue to access server resources using the virtual server identities.
IS2000 Server Cluster
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed
Mode).
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
IS2000 Network Topology with Separate Data Server
LANIS2000 Server (Active)• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).
• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Data Server (Active)• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate
SQL Users (Mixed Mode).
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
IS2000 Redundant Standby Serverwith Separate Data Servers
IS2000 Redundant Standby Server• Remains in Standby Mode until the Active Server fails.• Contains a mirrored version of the IS2000 Server application.• Automatic failover capability is maintained by a third party application:
NeverFail, DoubleTake, etc…• License cost is 50% of complete software license cost of the site that is being
managed.
Backup Data Server• Replicated database from Active Data Server• Automatic failover capability is maintained by a third party
application: NeverFail, DoubleTake, etc…
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed
Mode).
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
IS2000 Network Topology with Separate Data Server and HR Database Integration
HR Database Integration• Data from an HR Management System can be pushed / pulled to or from the
IS2000 Data server• Batch or real-time processing• Card Management in near real-time to the access control reader(s)• Support for Active Directory, PeopleSoft, and Workday
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed
Mode).
Mobile Device• MUST have TCP/IP access to the IS2000 Server.• Uses https with optional certificate.• Uses IS2000 to Authenticate Operators.• Limited feature set when compared to thick GUI.
WAN
AXIS Network Door Controller• MUST have TCP/IP access to the IS2000 Server.• Connects using http or https.• Uses TCP ports 80 or 443 for host connection.• Uses TCP Port 554 for real-time event streaming• Local User Authentication.
Mercury Controller• MUST have TCP/IP access to the IS2000 Server.• Uses TCP Port 3001• Local User Authentication
IS2000 with Hybrid Access Control Systems
HID VertX / Edge EVO Controller• MUST have TCP/IP access to the IS2000 Server.• Uses TCP Port 4070 and 4071• Local User Authentication
ZK ACP / inBIO Controller• MUST have TCP/IP access to the IS2000 Server.• Uses TCP Port 4370• Local User Authentication
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed
Mode).
Mobile Device• MUST have TCP/IP access to the IS2000 Server.• Uses https with optional certificate.• Uses IS2000 to Authenticate Operators.• Limited feature set when compared to thick GUI.
WAN
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
Alarm System• MUST have TCP/IP access to the IS2000 Server.• Bosch uses UDP port 7700 and TCP 3001• ELK uses TCP port 2101• Local User Authentication
Video Hardware• MUST have TCP/IP access to the IS2000 Server.• Local User Authentication
IS2000 Managing Access Control, Video, Alarm Systems and Temperature Control
Temperature Control• Communicates to wireless gateway.• Monitor Temperature Sensors and send notifications when certain
thresholds are reached.
LAN
IS2000 Server• IS2000 Data sub-folder MUST be shared with Read/Write privileges
to other IS2000 Clients.• Web Service can run on a configurable TCP Port.• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.• Only 1 server per region (not including redundant standby server).
IS2000 Clients• MUST have Read/Write access to the IS2000 Data sub-folder, using
either a mapped drive letter or Universal Naming Convention (UNC).• Uses Windows or IS2000 to Authenticate Operators.• Uses Windows or SQL Server to Authenticate SQL Users.
Data Server• MS SQL Server (2005, 2008 R2, 2012, 2014)• Uses ports 1433 and 1434.• Uses Windows or SQL Server to Authenticate SQL Users (Mixed
Mode).
Access Control Hardware• MUST have TCP/IP access to the IS2000 Server.• Mercury uses TCP port 3001 and port 80 for web server.• Axis uses TCP port 554 and port 80 for web server.• VertX/Edge uses TCP ports 4050, 4070 and port 80 for web
server.• ACP/inBIO uses TCP port 4370• Wireless Locks via network gateway• Local User Authentication.
IS2000 Single Site Definition
LAN
IS2000 ServerIS2000 Clients
Data ServerWAN
IS2000 Multiple Connected Sites
Database Replication Across WAN• Each site has the same replicated database.• Database partitioning is done via IS2000 profile and
permission view settings.• IS2000 regional servers process commands for the local
clients and access the local database, thus maintaining performance across the enterprise.
LAN
IS2000 Clients
Data Server
IS2000 Server
LAN
IS2000 Clients
Data Server
IS2000 Server
Site 1 Site 2
Site 3
LAN
IS2000 ServerIS2000 Clients
Data Server
IS2000 Thin Client• MUST have TCP/IP access to the IS2000 Server.• Browser Agnostic• Uses https with optional certificate.• Uses IS2000 to Authenticate Operators.• Limited feature set when compared to thick GUI.
WAN
Site 1
IS2000 Hosted Environment
IS2000 Clients
Site 2
IS2000 Clients
Site N…
IS2000 Clients
Central Station• Hosts IS2000 Server and the IS2000 Data Server.• Site visibility is based on Profile and Permission
settings
IS2000 Thick Clients• MUST have TCP/IP access to the IS2000 Server.• Uses https with optional certificate.• Uses IS2000 or Windows Active Directory to Authenticate
Operators.• Network speed affects application performance.
IS2000 Logon
• There are 2 modes to the IS2000 interface:
1. Desktop Mode- Runs as a desktop and allows customized Tiles to be associated to security modules as well as other third party software applications that are already installed. Desktop Mode acts as an extension to the Windows Desktop and works with the Windows Taskbar. Desktop Mode does NOT allow IS2000 to be resized and always remains maximized on the screen. IS2000 cannot be minimized in this mode.
2. Application Mode- Runs like an application with fixed positions for the main modules and toolbars. Very little customizations are allowed, and the application can be resized, maximized or minimized.
• Logon using ‘Admin’ for the Operator and ‘a’ for the Password. Select ‘Application’ and click Logon.
IS2000 GUI- Application Mode
NavigationToolbar
CommandToolbar
SoftwareModule
InformationWindow
CustomCommands
Help
Operator that iscurrently logged in
Custom Tile thatis referencing
a website
System Dateand Time
Custom Tiles thatare referencing the
same modules as the Navigation Toolbar
Custom Wallpaperfor background
Help
IS2000 GUI- Desktop Mode
The Desktop Designer allows the operator to customize all aspects of the GUI, including: background and foreground colors, desktop wallpaper, adding/removing of any Windows applications, documents, files, etc.., adding/removing any of the natively written security and building management modules.
• Drag and Drop IS2000 modules and commands to the IS2000 desktop.
• Drag and Drop Windows applications to the IS2000 desktop.
• Drag and Drop Windows Documents, Apps, Media Files from Windows to the IS2000 Desktop.
• Drag and Drop Windows Shell commands including BAT, CMD Files and websites to the IS2000 Desktop.
• Drag and Drop web applets to the IS2000 Desktop.
• Customize Tiles by size, placement, caption, icon representation, function, and color on a per user profile basis.
• Customize the wallpaper and background/foreground colors (gradients and solids).
Desktop Designer- Overview
Time Schedules / Holidays- Used to define when someone has access to the facility or when doors should unlock.
IS2000 Time Schedules / Holidays
• Access Levels- Used to define when and where someone has access. Pairing of Reader(s) and Time Schedules.• Readers- Access Levels can contain individual reader(s) or a group of readers called ACRGs.• ACRGs- Access Control Reader Groups; Virtually unlimited; Right mouse click reminder.
IS2000 Access Levels
Define custom Profile specific commands for doing a variety of functions such as lockdowns, email notification, report generation, running a third party application, etc…
IS2000 Custom Commands
• Backups and Archives are done automatically according to a schedule
• Data Import Utility• Used to import from an ODBC, Active Directory, or CSV data source.• Imports can be set to occur periodically or initiated manually.• Ideal for HR database integration.
• Access to SQL Utility• Will convert the default MS Access database to a SQL Server database and configure IS2000
to look at the SQL Server database. • Supports all versions of SQL Server including SQL Server Express
IS2000 Data Tools
• Thick Clients • Windows based IS2000 clients• Requires software to be pre-installed.• Requires an IS2000 license and works based on concurrent licensing.• Rich GUI with all of the functionality available from an IS2000 Server.
• Thin Clients• Supports desktop, laptop, tablet, smart phone• Browser agnostic• No need to load any software on the client• Limited functionality: Supports Personnel Manager, Time Schedules, Event Manger, Door Control, Report
Manager, Access Levels, Holidays, Video Manager, Triggers and Macros (VertX Only)• Requires the IS2000 Web Service in order to run.• Requires an IS2000 license and works based on concurrent licensing.
• SDK Client• 3rd Party software development application that was developed using the IS2000 SDK• Requires the IS2000 Web Service in order to run.• Custom GUI interface that can potentially perform all of the commands and functions of an IS2000 Client.• Professional Services Team can help in making custom applications.
IS2000 Clients
Total Systems Design, Configuration and DeploymentLet our Professional Services team of security and systems expert do the work for you. We will work closely with your partners to provide a complete access control solution that includes server commissioning, installation, configuration, deployment and total systems training.
High Availability and Disaster Recovery Servers (IS2000 Server Cluster)When your system simply cannot go down, IS2000 Server Cluster is the ultimate solution. By leveraging Microsoft’s Windows and SQL Server clustering and third-party data replication software, this solution provides high availability for your applications and added data redundancy in the event of a disaster or server failure.
API/SDK/XML Interoperability and IntegrationsBy leveraging the common programming language, our team of expert software engineers can help you seamlessly integrate systems. From Active Directory and HR to Visitor Management and Video Management Systems, the flexibility to integrate is our specialty.
Database ServicesAt the core of every system is the database, where all of your important data is housed. Let our team of experts provide the expertise to install and upgrade database servers, optimization, maintenance, and customized reports.
Systems Migration and UpgradeLet our team of expert systems engineer provide you with that sound piece of mind to migrate/upgrade your legacy and older systems.
Programming and CustomizationNeed a custom application to integrate to your Time and Attendance, or how about the Airport No-Fly database, or a custom report? Our team of software engineers can develop the right application for you.
Maintenance and SupportIMRON Corporation’s maintenance and support services are designed to maximize your security investments. We offer email and phone support as well as on-site maintenance visit to check on the overall health of your system, so you can be sure that your system is running optimally.
IMRON Professional Services Offerings