Bosch Building Technologies makes access management simple with Access Management System 2.0

Today’s security and risk managers want access management systems that are easy to set up and use. Those systems must also be easily scaleable and able to integrate with other security solutions like video and intrusion systems. On top of all that, access management systems need to be highly resilient and always available. With the introduction of the Access Management System 2.0, Bosch believes it has addressed all of these needs.

Operation is also easy: the graphical user interface (GUI) is simple and easy to understand. The dark color-scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. In addition, the colours of the Access Management System 2.0 GUI are aligned with the colours of the Bosch video management system (VMS) GUI, so operators enjoy the benefits of an integrated solution, which is easier to operate than two distinct systems.

The entire customer journey is designed to be as effortless and as simple as possible. Specifying the system is easy: the software is offered in three pre-configured software bundles for different sized organisations: Lite (maximum of 144 doors and 200,000 cards), Plus (maximum of 512 doors and 200,000 cards) and Professional (maximum of 10,000 doors and 200,000 cards).

Configuration is easy. Existing floor maps can be imported into the system and icons are dragged and dropped on the map to represent controllers, doors and building objects. On-boarding of end users is straightforward. For example, enrolment and assignment of access profiles are all implemented in one dialogue manager.

Operation is also simplified. The GUI is simple and easy to understand. The dark colour scheme of the GUI reduces eye strain and fatigue such that operators stay fresh and alert. In addition, the colours of the Access Management System 2.0 GUI are aligned with those of the Bosch VMS GUI. Operators therefore enjoy the benefits of an integrated solution which is far easier to operate than two distinct systems.

End users can start small and add extra capacity whenever necessary. The Access Management System 2.0 may be expanded up to 10,000 doors and 200,000 cardholders. No hardware needs replacing when expanding. Users just require software upgrades and possibly additional controllers, readers and cards. Therefore, increasing system size is not only easy, but it’s also cost-efficient. Since it’s regularly updated with the latest data security enhancements, it’s a future-proof investment for office and Government buildings, retail environments, educational concerns and more.

Master Access Controller

For maximised resilience and high availability, the Access Management System 2.0 includes the Master Access Controller (MAC) as an additional layer of resilience between the server and the access controllers. If the server fails in the Access Management System 2.0, the MAC takes over and ensures that the controllers still communicate with each other and share necessary information from the card readers. Thus, even functionalities (which include various controllers such as anti-passback and guard tour) can still be performed.

The anti-passback functionality prevents a card holder from passing back their card to another person and thereby enabling the latter’s unauthorised entry. Guard tour is a safety functionality offered to security officers which uses access readers as checkpoints along a defined route to be passed in a defined period of time. Any deviation of sequence or timing causes an alarm in the Access Management System 2.0. Colleagues or first responders can be notified at once, thereby improving the safety of security personnel.

In the extremely rare event that the Access Management System 2.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the controllers. Thanks to this offline capability, it’s possible to save millions of events even during downtime.

Up to 15 configurable threat levels such as lockdown, controlled lockdown or evacuation mean that safety measures can be initiated quickly in critical situations such as the outbreak of fire or a terrorist attack. The threat level state is activated by one of three triggers: operator workstation, emergency button or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, block all doors or initiate a mix of some open and some blocked. Individual doors can also have their own security profile and allow only certain cardholders access.

To protect against cyber crime and the loss of personal data, the database as well as the communication between server and access controllers is encrypted at all stages (eg through support of the secure Open Supervised Device Protocol v2). Access Management System 2.0 also has trusted digital certificates for mutual authentication between server and client to prevent tampering by unauthorised clients and uses secure design principles.

About the Author
Brian Sims BA (Hons) Hon FSyI, Editor, Risk UK (Pro-Activ Publications) Beginning his career in professional journalism at The Builder Group in March 1992, Brian was appointed Editor of Security Management Today in November 2000 having spent eight years in engineering journalism across two titles: Building Services Journal and Light & Lighting. In 2005, Brian received the BSIA Chairman’s Award for Promoting The Security Industry and, a year later, the Skills for Security Special Award for an Outstanding Contribution to the Security Business Sector. In 2008, Brian was The Security Institute’s nomination for the Association of Security Consultants’ highly prestigious Imbert Prize and, in 2013, was a nominated finalist for the Institute's George van Schalkwyk Award. An Honorary Fellow of The Security Institute, Brian serves as a Judge for the BSIA’s Security Personnel of the Year Awards and the Securitas Good Customer Award. Between 2008 and 2014, Brian pioneered the use of digital media across the security sector, including webinars and Audio Shows. Brian’s actively involved in 50-plus security groups on LinkedIn and hosts the popular Risk UK Twitter site. Brian is a frequent speaker on the conference circuit. He has organised and chaired conference programmes for both IFSEC International and ASIS International and has been published in the national media. Brian was appointed Editor of Risk UK at Pro-Activ Publications in July 2014 and as Editor of The Paper (Pro-Activ Publications' dedicated business newspaper for security professionals) in September 2015. Brian was appointed Editor of Risk Xtra at Pro-Activ Publications in May 2018.

Related Posts