AMS-BASE-LITE30

AMS-BASE-LITE30

AMS-BASE-LITE30

  • Combines high-end access control features, performance and availability with intuitive operation.
  • Highly scalable: Up to 200,000 users and 10,000 doors.
  • Easy to use: Intuitive GUI and built-in map viewer.
  • Easy to configure: Pre-packaged licenses, simple installation and set-up.
  • Comprehensive security management: Integrates with intrusion and video systems.
  • download datasheet AMS-BASE-LITE30

Description

Access Management System (AMS) is an access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS.

•     As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site.

•     As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors.

AMS combines the robustness, performance and features of high-end access control products with a modern UI that makes it faster to install and configure. The existing portfolio of Bosch access control devices can be easily scanned and integrated.

Data privacy and IT security is state-of-the-art, in order to comply with the latest data-protection regulations.

System overview

Access Management Server

The server is the main component for processing all data. It coordinates the activities of all the hardware and software components described below.

Master Access Controller (MAC)

The MAC is an additional security layer to increase system availability. It holds its own database to exchange information between AMCs, even if the main server or the network is down.

Access Modular Controller (AMC)

The AMC is a robust and reliable field controller to connect to up to 8 doors with readers and door strikes. With its large on-board memory the AMC can make autonomous decisions and store hundreds of thousands of access events, regardless of network interruptions.

Access Management Database

The SQL server holds all master data (cardholder, cards, authorizations, schedules, etc.) and also all access events. The latest version provides encryption to protect personal information from misuse or theft.

Access Management Dialog Manager

The Dialog Manager is the main user interface for configuring the system, and for collecting and maintaining access-related information. In particular, its personnel dialogs are used for enrolling new cardholders, and maintaining their access authorizations and credentials.

Access Management Map View

The Map View is a simple-to-use application both to visualize the overall security situation of the premises, and zoom into close detail. It displays access violations, tampering and malfunction alarms, and allows the sending of commands directly from the maps themselves.

Access Management BVMS Interface

The seamless integration with BVMS (version 10.1 or higher) allows the video verification of cardholder identities from the BVMS operator client: a person requesting access with a valid card can be manually verified through camera live stream and the cardholder’s photo from the database. Camera events can trigger door actions. Door events can trigger camera actions.

Access Management Intrusion Interface Management of up to 25 B and G Series intrusion

panels. Shows area states (e.g. armed, ready to arm), detector states and intrusion events on Map View. Allows the sending of commands (e.g. arm, disarm) to panels.

Access Management SDK

This SDK facilitates the integration of 3rd party systems with AMS, for instance an Identity Management or Visitor Management system. A particular advantage is its ability to re-use 3rd party integrations initially written for BIS Access Engine.

Access Importer/Exporter

This tool facilitates data import and export from external systems for 1-time data migration, such as from Access PE systems, or regular data transfer from Active Directory via the LDAP protocol.

Topology diagrams

The following diagrams illustrate AMS configurations without and with BVMS.

Stand-Alone topology

    • AMS server
    • Client workstation for enrollment
    • Client workstation for access control and intrusion monitoring
    • Optional MAC servers (one MAC license is always included, on the AMS server)
    • AMCs for parking lot and door control
    • Intrusion panel with detectors and touch-screen keypad

BVMS Integration

    • AMS server
    • BVMS management server or DIVAR IP all-in-one
    • BVMS Client workstation for access and video management
    • Optional MAC servers (one MAC license is always included, on the AMS server)
    • AMCs

Entrances with cameras

Functions

    • Registration of new cardholders:

– Use fully customizable enrollment dialogs to streamline the process of cardholder enrollment.

– Capture both conventional and biometric characteristics, including photos and signatures.

– Design and produce physical credentials.

– Take advantage of dialogs for the mass import of stored personnel data.

    • Assigning of access authorizations:

– Collect access authorizations into reusable profiles, and assign these to predefined or customized personnel types.

    • Door functions:

– Use a comprehensive set of template door models, including elevators and parking lots, to accelerate the configuration phase of your project.

– Office mode: unlock doors for free access during office or shop hours.

– Combat theft and security threats by random screening of cardholders.

– Verify cardholder identity with biometric checks at entrances, and with additional video-based ID verification powered by BVMS.

– Disarm an intrusion area and grant access with a single card swipe.

– Use the SimonsVoss SmartIntego technology to enhance your system with card-programmable remote online doors, as commonly used in hotels, healthcare, offices and educational establishments.

    • Reporting:

– Take advantage of a large number of predefined template reports.

    • Guard Tours and patrols:

– Define up to 200 guard tours, and monitor up to 8 patrols simultaneously.

    • Monitor car parks, visitors, muster points:

– Display customizable summaries of employees and visitors on site.

– Monitor visiting times, including overstayed visits.

– Monitor the number of available parking spaces.

    • Divisions:

– Provide unified access control for a facility that is shared by any number of independent parties.

– Individual operators can be restricted to manage only the persons, devices and entrances of those divisions assigned to them.

    • Alarm Monitor, Command & Control:

– The Map View supports up to 1000 maps, which can be nested to provide both overviews and close detail.

– Use the Map View to keep control of large numbers of entrances simultaneously.

– Use the Map View to monitor incoming alarms and alerts in real time.

AMS does not buffer intrusion alarms that occur while the network or the system itself is down.

    • BVMS and DIVAR IP Integration:

– Video verification at entrances.

– Camera actions (e.g. start recording, pan/tilt/ zoom) triggered by access events (e.g. unauthorized door opening).

– Door events (e.g. unlock/lock door) triggered by camera events (e.g. Intelligent Video Analytics).

– Requires version 10.1 or higher.

    • Milestone XProtect Integration:

– Use AMS to support XProtect with access events and alarms for further processing on XProtect client.

    • Intrusion Integration:

– Supports up to 25 Bosch B Series (Bx512) and G Series (Bx512G) control panels for central user management and command & control.

– A full contingent of panels provides up to 12,800 intrusion detectors.

    • Mobile Device Integration:

– Supports HID Mobile Access (on MIFARE CSN via NFC and Wiegand) and STid Mobile ID (on MIFARE CSN via Wiegand and OSDP, NFC and BLE).

Installation/configuration notes

The complexity of security systems has increased significantly over the last couple of years. At the same time, you are still relying on your system to mitigate security risks. With Bosch Software Assurance, you can always approach us for help to ensure your system keeps on running.

You can find the terms and conditions of Bosch Software Assurance on the Bosch Building Technologies website: https:// www.boschsecurity.com/xc/en/solutions/ management-software/bosch-software-assurance/

Technical specifications

The following tables specify the dimensions of an AMS access control system from two aspects:

    • As per the respective license bundle: LITEPLUS or PRO.
    • As a maximum, if the necessary licenses are purchased.

License bundle LITE

License bundle PLUS

License bundle PRO

Languages of the user interface

    • AR: Arabic
    • DE: German
    • EN: English
    • ES: Spanish
    • FR: French
    • HU: Hungarian
    • NL: Dutch
    • PL: Polish
    • PT: Portuguese
    • RU: Russian
    • TR: Turkish
    • ZH-CN: Chinese (simplified)
    • ZH-TW: Chinese (traditional)

      Sentafe Technology Egypt

      keeping an eye on your bussines kkc


      contact us

      شركة سنتافي تكنولوجي – العنوان : 54 ش المنتزه – هليوبوليس – مصر الجديدة

      تليفون :  26370092 فاكس:  26370093 المبيعات:  01204700033 المبيعات : 01103901264 المبيعات : 01070747731