Security Technology Executive

JUL-AUG 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/557126

Contents of this Issue

Navigation

Page 34 of 39

July/August 2015 • SECURITY TECHNOLOGY EXECUTIVE 35 www.SecurityInfoWatch.com administration and use of the asset management solution will help define and assign areas of respon- sibility and enable better control of devices. Simplified Configuration Once installed, asset management solutions are rela- tively easy to configure. The process consists of iden- tifying the needs of the organization and employees and then building the system with the components that meet those needs. The combination of features is entirely up to the organization, ensuring that the system can not only be customized, but can be changed later on to accommodate growth or other specific needs. Configuration can also include additional security features that help enhance the integrity of the sys- tem. If protection of the asset lockers is mission- critical – and in the case of devices, it should be – a remote access panel provides an additional layer of protection by allowing the locker system to be installed within a secure room. A second PIN and verification would then be required for an autho- rized employee to access the contents of a locker. Options for accessing the asset cabinet can also be customized with a built-in keypad, a fingerprint reader or magnetic or proximity card reader. Sys- tems that incorporate card readers often utilize the existing access control cards already in use through- out the organization, making system implementa- tion easier and more convenient. Necessary changes to an individual's access authorization can be made instantly by program administrators. For easy acces- sibility, optional user interfaces can be integrated directly into the cabinet, or an organization may choose to keep them separate. In either case, users have access to only those stored items they have been authorized to remove or return. Integration with Other Systems In most cases, asset management solutions can be integrated with physical security systems without the need for expensive upgrades or complete over- hauls. Asset control systems that feature alarm and relay inputs/outputs, for example, can be integrated with existing video surveillance systems for added security. Ethernet and USB capability help to ensure system compatibility and integration. Compatibility with security and network access systems and integration with existing databases save time and money. For ease of use, Ethernet or TCP/ IP communications ports enable direct connectivity to printers or other devices, as well as network con- nectivity via Ethernet. Tracking and analysis The ability to manage all programming, remote functions and reports with a software-driven solu- tion is one of the biggest factors for successfully implementing an asset management system. Similar in concept to popular access control systems, a PC- based package of management software streamlines and unifies day-to-day operations and activities. Authorized management can add users from a global list, with any specific settings that are added or mod- ified automatically synchronized across the entire system. Profiles can also be assigned for improved user control, and there are various options for tailor- ing administrative access privileges to specific needs, including reporting or alerting. With built-in scheduling capability, systems can be programmed to automatically download all data to a secure PC as required by users. This allows man- agement to better sort and analyzes information to maintain maximum control of devices. Scheduled email reports that detail what devices are in or out, who has or had them and for how long provide the up-to-date information security management needs to ensure the integrity of shared devices within an organization. Should an incident occur, such as a device not being returned on time, management can quickly query the system for specific details that, when combined with audit data, provide a strong evidence trail. ■ Request information: www.SecurityInfoWatch.com/10546499 INCREASE SITUATIONAL AWARENESS 1-800-836-1730 info@vingtor-stentofon.us www.vingtor-stentofon.us CONTACT US TODAY TO LEARN MORE! The TKIS-2 VoIP Intercom Module adapts to any indoor or outdoor enclosure making it an ideal building communication solution for entry/exit doors and gates, emergency help points, stairwells, walkways and more. Vingtor-Stentofon offers a variety of IP audio systems and solutions to ft your large or small building security requirements. CUSTOMIZED IP INTERCOM MAKE YOUR OWN: VoIP SPEAKER VoIP INTERCOM VoIP AMPLIFIER About the Author: Fernando Pires is the Vice President of Sales and Marketing at Morse Watchmans.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2015