Investing in the right technology is central to the protection of your employees, site visitors and ultimately the success of your company. While you naturally want your business premises to be as open and welcoming as possible – as well as making it easy for staff and visitors to move around the building – you need to ensure maximum protection against unauthorized intruders.
In the event of an emergency, not only the future of your business but people’s lives hang on the reliable functioning of access control systems. This combination of cutting-edge technology, open access and strict security is precisely what Bosch Access Control solutions offer you.
The system that grows with your needs
Bosch Access Control offers you an expandable system for any project. Thanks to the scalability of the hardware components – Access Modular Controllers, readers and credentials – the system grows according to your security needs. Start with Access Professional Edition (APE) software for entry-level projects and later switch to the Access Management System (AMS) or the BIS Access Engine (BIS-ACE) – the hardware stays the same. The AMS is the ideal software solution for medium to large-sized projects such as offices or healthcare facilities, while the BIS-ACE applies to larger and more complex projects such as airports or stadiums.
Integration with video
The Access Management System 3.0 can be integrated with video management systems such as BVMS (10.1 and higher) and Milestone XProtect. Integration with BVMS offers manual video verification to increase the security level at doors. Here the operator verifies if the person at the door matches the registered person in the database and if so allows the person to enter. BVMS integration also enables searching for cardholder events and events at doors. It can be checked which doors and areas have been entered over a specific time by a specific cardholder and which cardholders have entered and left a certain area during a certain period of time. This can be useful when, for example, something is stolen from a certain area. With the searching functionality, it is possible to quickly check who has entered this area and at what time. Moreover, access commands and events can be handled in BVMS, making the operation of the integrated system most efficient.