Enterprise Security Management with Support for Server Failover, 2-way HR Database Integration and Single Sign-On Active Directory Authentications
1. What server hosting options are available for the Security Management System (SMS)?
The SMS server can be hosted by an on-premise server for maximum security and local control. This option is suited to organisations with in-house IT support and isolated security LAN. On-premise hosting can be via a physical server or a VM to fully optimise on corporate shared IT resources. Increasingly corporates are outsourcing such hosting services to data centres. In such cases, the option to host the SMS in a cloud server is ideal....Tell me more 2. How can a Security Management System (SMS) survive a server failure?
There are many parts of any server hardware that can fail. For example, the CPU can overheat, or the hard disk drives can crash, etc. In order for the SMS to survive a server failure due such hardware fault, the Server Failover module is required. The Server Failover is a software module that performs periodic functions such as database replication, heart-beat monitoring and automatic switchover from a primary server to the secondary server, just to name a few. Upon failure of the primary server, the secondary server is immediately activated and takes over control of all the key services. The secondary assumes the role of the primary and re-establishes all connections with the access controllers and operator workstations so that the entire system continues to operate as normal...Tell me more
3. How can a Security Management System (SMS) handle multiple locations? A corporate with multiple functions or branches with a centrally hosted server can delegate operational responsibility to each function/branch with the Security Area (SA) module. Each area (function/branch) may be defined to operate as a virtual autonomous security centre with its administrator in complete control of the defined area. Key applications include corporates with a HQ and multiple branches/subsidiaries, as well as corporates with distributed functions (manufacturing, warehouse, workshop, retail, etc.)...Tell me more
4. How can the Security Management System (SMS) integrate with SAP or other HR systems?
The HR Database Integrator (HRDI) module facilitates the synchronization of employee data in most human resource management system (HRMS) with the IBSS.web, so that any change in employee data made in the HRMS is seamlessly registered to the IBSS.web database. When any employee data is received from the HRMS, the HRDI automatically assigns predefined access rights to new employees according to its HR policy and/or removes the access rights of employees who have resigned. The HRDI will bring about significant productivity improvements with automation in managing employee movements and payroll administration. Operational efficiency is enhanced with significant improvements in productivity...Tell me more
5. How to ensure login access is automatically disabled when a user resigns?
The Security Management System (SMS) supports Active Directory (AD) for Single Sign-on (SSO). When a staff logs on to his workstation, the system checks his online active directory and uses his credential to map the corresponding access rights in the SMS. When the rights of the staff in the active directory is removed upon resignation, all corresponding assigned rights including access to the SMS software is removed automatically...Tell me more
System Architecture
Products
IBSS.web Web-Based Enterprise Security Management Software It is a browser based security management system software that provides scalability from access control only applications to a comprehensive suite of fully integrated security solutions.
HR Database Integrator (HRDI) HRDI is a module to facilitates the synchronization of employee data in most human resource management system (HRMS) with the IBSS.web, so that any change in employee data made in the HRMS will be seamlessly registered to the IBSS.web database.
Secret Key Management System (SKeyMa) It is an integrated approach for managing secret key, personalise Secure Access Module (SAM), readers and also contactless card.
Server Failover Service (SFO) The Server Failover (SFO) module performs server redundancy and continuously performs data synchronization between 2 servers while monitoring the operational status of both. The IBSS.web software is built with an automatic failover architecture.
Visitor Management System (VMS) It is a complete solution for managing visitors within a premise. Visitor information can be easily captured and stored by the computerized system.
You are receiving this message because you have previously registered with us as our customer. Please click here if you no longer want to receive emails from us.