Overview
Access Monitoring
Access and Security Event Monitoring:
The system logs access control events such as access granted/denied, door statuses, and cardholder data (including photos). These logs are stored alongside video footage, making it easier to verify and track security events.
Configurable Alerts:
Users can set up notifications for specific events, such as unauthorized access attempts or forced door entries, to trigger alerts and alarms, allowing for immediate responses to potential security breaches
The system logs access control events such as access granted/denied, door statuses, and cardholder data (including photos). These logs are stored alongside video footage, making it easier to verify and track security events.
Configurable Alerts:
Users can set up notifications for specific events, such as unauthorized access attempts or forced door entries, to trigger alerts and alarms, allowing for immediate responses to potential security breaches
Customizable Event Responses
Automated Actions:
Users can configure automated responses based on access control triggers, including:
Switching access point cameras to selected screens for visual confirmation
Sending event information to local or off-site control rooms
Sending email or SMS alerts for unauthorized access attempts
Moving PTZ cameras to preset positions related to specific access points
Playing audio alerts to notify operators
Switching outputs based on specific events
Event-Based Controls:
Operators can take actions such as locking/unlocking doors or sending alarms based on access control events, improving security management
Users can configure automated responses based on access control triggers, including:
Switching access point cameras to selected screens for visual confirmation
Sending event information to local or off-site control rooms
Sending email or SMS alerts for unauthorized access attempts
Moving PTZ cameras to preset positions related to specific access points
Playing audio alerts to notify operators
Switching outputs based on specific events
Event-Based Controls:
Operators can take actions such as locking/unlocking doors or sending alarms based on access control events, improving security management
Control Room Optimization
Graphical Map Interface:
TDSi EXgarde devices and events can be displayed on a graphical map, providing operators with real-time updates on access control points and door statuses, ensuring effective monitoring and faster responses to security incidents
Real-Time Monitoring and Alerts:
The system supports real-time monitoring of access control events, enabling operators to respond quickly to alarms, door statuses, and other security incidents
TDSi EXgarde devices and events can be displayed on a graphical map, providing operators with real-time updates on access control points and door statuses, ensuring effective monitoring and faster responses to security incidents
Real-Time Monitoring and Alerts:
The system supports real-time monitoring of access control events, enabling operators to respond quickly to alarms, door statuses, and other security incidents