Access control software for SMEs
Bosch Security Systems, Inc. has introduced a new version of its access control software for small and medium enterprises, the Access Professional Edition (APE) 3.0.The main new features of APE 3.0 are the integrated map viewer support and even more flexible enrollment options.
The integrated map viewer in APE 3.0 increases the situational awareness surrounding alarms and can be combined with video surveillance for an even better overview. The software supports easy navigation between floor plans and photo views via hyperlinks. Interactive graphical maps with integrated alarm lists allow the operator to quickly analyze any alarm situation and take appropriate action. APE 3.0 supports up to 128 maps per system, making it ideal for growing companies and organizations. The map viewer is easy to set up and allows operators to control entrances and view live images directly from the map. Devices with preconfigured device associations and control commands can be added to the map via simple drag and drop. The map viewer uses standard image formats such as .bmp, .jpg and .png.
The new version of APE offers flexible enrollment solutions. Readers attached to the Access Modular Controller (AMC) can be used for the enrollment of all card technologies and allows for flexible end-to-end solutions. A new door model allows any Bosch Wiegand reader to be used as an enrollment reader.
The APE 3.0 easily integrates with video surveillance systems. It features a video verification screen which shows the cardholder database, camera images for fast identification and comparison, surveillance video streams and control buttons for granting or denying access requests. Up to five cameras can be installed at each door, and their images can be recorded in a Digital Video Recorder for easy access anytime with a click in the event log.
APE 3.0 is a highly scalable system and supports up to 10,000 cardholders and 128 readers as well as corresponding inputs and outputs. Up to 128 video channels can be configured. A maximum of 16 operators with individual privileges allows flexible deployments and the ability to limit access of operators to only necessary functions.