1 / 27

Nedap AEOS

Nedap AEOS. Security Scenarios. Vitani primary business area. Non-propritary, customized and scalable security systems Integrated systems covering alarm and event management lifecycle ID management intrusion and access control video management biometric security systems

Download Presentation

Nedap AEOS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Nedap AEOS Security Scenarios

  2. Vitani primary business area • Non-propritary, customized and scalable security systems • Integrated systems covering • alarm and event management • lifecycle ID management • intrusion and access control • video management • biometric security systems • SCADA – Supervision Control And Data Aquisition

  3. Technology partners • Worldwide award winning, market leaders • Nedap • Rockwell Software • HID Corporation • Bioscrypt • Panasonic • Bosch • cieffe • Suprema • IDESCO • Zvetco

  4. Flexibility – Security on Demand • Scenario based security • Ever changing regulations and rules from governments, customers, suppliers • Shorter response/reaction time • Changes in security based on business structure • Easy and modular expansion

  5. The true value of AEOS is providing customized solutions using standard building blocks.

  6. Case: Corridor monitoring • Functional Specs • Technical Solution • Case: Airport gate • Functional Specs • Technical Solution • Case: Locker vault • Functional Specs • Technical Solution • Live demo ‘Locker vault’

  7. Case: Corridor monitoring Camera is aimed at the corridor Interlock on all doors Only one way traffic

  8. Case: Corridor monitoring • Access card is presented to reader • Camera turns to door

  9. Case: Corridor monitoring 3. Door only opens when camera turn is complete

  10. Case: Corridor monitoring 4. With door closed camera returns to starting position 5. Other doors are released and can be opened

  11. Case: Corridor monitoring 6. Camera records corridor when door is opened

  12. Konfiguration – Corridor Monitoring • Konfiguration foretages grafisk i Nedap konfigurationsværktøj • Tid: Ca. 10 minutter!!!!

  13. Case: Airport gate

  14. Case: Airport gate Door is locked Motion detector inactive

  15. Case: Airport gate • Access card is presented to reader • Double doors can be pushed open (manually

  16. Case: Airport gate 3. Magnets are activated after 5 seconds 4. Doors are pushed onto magnets and held in place

  17. Case: Airport gate 5. After 7 minutes the motion detector is activated 6. Motion detector takes over control of magnet locks

  18. Case: Airport gate 5. No motion detected for 3 minutes the doors are released 6. At all times magnet hold can be overridden by pushbutton

  19. Konfiguration – Airport Gate • Konfiguration foretages grafisk i Nedap konfigurationsværktøj • Tid: Ca. 5 minutter!!!!

  20. Case: Locker vault Status light is green (vault available for use) Entrance door is unlocked

  21. Case: Locker vault 1. Access card is presented to reader 2. Entrance door is locked and status light turns red

  22. Case: Locker vault 3. Weight platform is activated and weight is verified (single occupation is checked)

  23. Case: Locker vault 4. After weight verification the finger verification is activated

  24. Case: Locker vault 5. Depending on authorization Locker 1 or 2 is unlocked

  25. Case: Locker vault 6. When entrance door is opened the vault is reset 7. Status light turns green

  26. Software - administration • Corporate Security Policies • monitoring compliancy • Simple and intuitive user interfaces • webbased • rolebased • Portal technologies • building the personalized security operator screen

  27. Software – Security Management • Single point of alarm and event management • Integration with 3rd party sub-systems • No vendor specific development = vendors are likely to support with API • Intuitive user interfaces reduces alarm handling cost • Reduces errors

More Related