Dear Valued Customer,
INTEGRATED IP Access Control & IP Video Surveillance

 Vol. 095 / October 2020

> LATEST NEWS

HOME     SOLUTIONS      PRODUCTS      SUPPORT      SALES      ABOUT US      CONTACT US

Enterprise Security Management with Support for Server Failover, 2-way HR Database Integration and Single Sign-On Active Directory Authentications
1. What server hosting options are available for the Security Management System (SMS)?

The SMS server can be hosted by an on-premise server for maximum security and local control. This option is suited to organisations with in-house IT support and isolated security LAN. On-premise hosting can be via a physical server or a VM to fully optimise on corporate shared IT resources. Increasingly corporates are outsourcing such hosting services to data centres. In such cases, the option to host the SMS in a cloud server is ideal....Tell me more
 
2. How can a Security Management System (SMS) survive a server failure?

There are many parts of any server hardware that can fail. For example, the CPU can overheat, or the hard disk drives can crash, etc. In order for the SMS to survive a server failure due such hardware fault, the Server Failover module is required. The Server Failover is a software module that performs periodic functions such as database replication, heart-beat monitoring and automatic switchover from a primary server to the secondary server, just to name a few. Upon failure of the primary server, the secondary server is immediately activated and takes over control of all the key services. The secondary assumes the role of the primary and re-establishes all connections with the access controllers and operator workstations so that the entire system continues to operate as normal...Tell me more

3. How can a Security Management System (SMS) handle multiple locations?
 
A corporate with multiple functions or branches with a centrally hosted server can delegate operational responsibility to each function/branch with the Security Area (SA) module.  Each area (function/branch) may be defined to operate as a virtual autonomous security centre with its administrator in complete control of the defined area. Key applications include corporates with a HQ and multiple branches/subsidiaries, as well as corporates with distributed functions (manufacturing, warehouse, workshop, retail, etc.)...Tell me more

4. How can the Security Management System (SMS) integrate with SAP or other HR systems?

The HR Database Integrator (HRDI) module facilitates the synchronization of employee data in most human resource management system (HRMS) with the IBSS.web, so that any change in employee data made in the HRMS is seamlessly registered to the IBSS.web database. When any employee data is received from the HRMS, the HRDI automatically assigns predefined access rights to new employees according to its HR policy and/or removes the access rights of employees who have resigned. The HRDI will bring about significant productivity improvements with automation in managing employee movements and payroll administration. Operational efficiency is enhanced with significant improvements in productivity...Tell me more

5. How to ensure login access is automatically disabled when a user resigns?
 
The Security Management System (SMS) supports Active Directory (AD) for Single Sign-on (SSO). When a staff logs on to his workstation, the system checks his online active directory and uses his credential to map the corresponding access rights in the SMS. When the rights of the staff in the active directory is removed upon resignation, all corresponding assigned rights including access to the SMS software is removed automatically...Tell me more
System Architecture
Products
IBSS.web Web-Based Enterprise Security Management Software
It is a browser based security management system software that provides scalability from access control only applications to a comprehensive suite of fully integrated security solutions.

Product Enquiry
HR Database Integrator (HRDI)
HRDI is a module to facilitates the synchronization of employee data in most human resource management system (HRMS) with the IBSS.web, so that any change in employee data made in the HRMS will be seamlessly registered to the IBSS.web database.

Product Enquiry
Secret Key Management System (SKeyMa)
It is an integrated approach for managing secret key, personalise Secure Access Module (SAM), readers and also contactless card.

Product Enquiry
Server Failover Service (SFO)
The Server Failover (SFO) module performs server redundancy and continuously performs data synchronization between 2 servers while monitoring the operational status of both. The IBSS.web software is built with an automatic failover architecture.

Product Enquiry
Time Clock Report (TCR)
The TCR module is designed to log and report selected transactions of an access control system as a time clocking records.

Product Enquiry
Visitor Management System (VMS)
It is a complete solution for managing visitors within a premise. Visitor information can be easily captured and stored by the computerized system.

Product Enquiry

Contact our Sales Team @ (065) 6844 2141 or enquiry1@asis-technologies.com for more information.

Regards,

Sales Team @ ASIS Technologies