Access Control Management

THE EVOLUTION OF VIDEO-BASED SAFETY & SECURITY TECHNOLOGY

Access Control Manager (ACM) is a physical access control system, designed to protect people, property and assets. With advanced alarm and identity management, ACM™ provides superior control of access to facilities. This 100% browser-based solution offers the flexibility to respond to alerts from anywhere. Its unification with Avigilon Control Center (ACC) video management software offers a powerful, end-to-end security solution to monitor and secure sites.

BENEFITS OF ACCESS CONTROL

Investing in access control techniques can transform the security and convenience of building access and deliver important operational and financial benefits. 

  • Stronger security

    Replacing traditional locks and keys with electronic access control mechanisms strengthens security. It eliminates the problem of lost or stolen keys and replaces them with electronic credentials offering different levels of security. Electronic credentials are more difficult to copy and they require validation before a user can gain access, which gives security teams greater ability to control access.

  • Targeted security

    Security professionals can deploy different types of door access control systems or program electronic credentials with different levels of access. This enables security teams to impose the strongest levels of security where they are needed most. For example, smart key cards can be programmed with unique codes to protect highly secure areas, or users can be assigned mobile access permissions based on their titles or work schedules. Mobile or RFID credentials can also be paired with other credentials, such as PIN codes or biometrics, to support two-factor authentication. 

  • Greater convenience for users

    Credentials for security access control systems are available in different forms, all offering users convenient access. Proximity solutions, for example, allow users to enter high-traffic areas quickly and easily, while biometric solutions eliminate the need for separate credentials. Mobile credentials can increase convenience even further by allowing users and visitors to identify themselves using a smartphone app.

  • Simpler user management

    Security teams no longer have to issue, manage and replace large numbers of individual keys, which could prove expensive in a building with many different lockable doors and entrances. Adopting mobile credentials simplifies management even further. Teams do not have to issue key cards or key fobs; they simply send a link to smartphone apps programmed with individual access levels.

  • More flexible property management

    A cloud-connected security access system gives teams greater operational flexibility. They no longer have to be onsite outside normal business hours because they can manage access requests, open or lock doors and monitor alerts from any location with a secure Internet connection.

  • Greater scalability

    Networked access control security systems are easier to scale than conventional lock and key systems or access systems connected by dedicated cabling. A new door reader can be added to an existing data network with no need for the delay or disruption of installing dedicated cabling. In addition, adding new locations to the access control security network in the cloud is just as effortless, with all sites managed from a single dashboard.

  • Consistent security levels

    Cloud-enabled security access systems provide an opportunity to centralize security operations and impose consistent security standards, particularly for organizations with multiple sites. A central security team can monitor and manage all access requests from a single location, or remotely via a secure web browser.

  • Streamlined interoperability

    Access control devices designed and built to open standards can be integrated with other security components such as sensors, alarms, video security cameras, existing access control systems, fire and smoke alarms to create a comprehensive security solution that enables security professionals to monitor and manage all activity through a single pane of glass. 

Access Control Manager (ACM) Accessories

EASY TO DEPLOY AND USE

IDENTITY MANAGEMENT

Display user ID profile pictures with access control events and alarms to know who attempted to enter a door and when. Register visitors and print badges in seconds by scanning an ID via integration with HID Global's EasyLobby Secure Visitor Management software.

image/svg+xml

ALARM MANAGEMENT

Streamline alarm management with audible alerts and colored indicators to visually represent alarm priority. View associated video, enter notes, acknowledge and clear alarms in one place.

image/svg+xml

REMOTE DOOR LOCK/UNLOCK WITH MAPS

Visually pin access-controlled doors spatially on a facility map, view open/close status of doors and remotely lock and unlock doors, including lockdowns during emergencies.

image/svg+xml

BUILT-IN TEMPLATES

Be up and running in minutes with a wide selection of easy-to-use templates to configure doors and wiring.

image/svg+xml

REPLICATION & HOT STANDBY AUTO FAILOVER

Simplify identity management with the ability to replicate identity data on multiple ACM Appliances across sites. Save policies, settings and identities from any one primary appliance to a standby appliance with hot standby-auto failover.

image/svg+xml

CUSTOMIZED REPORTS

Leverage ready-made reports that can be customized to display important access control data suited for your facility.

image/svg+xml

ACM VERIFY VIRTUAL STATIONS

Extend access control to locations where physical doors are not feasible. ACM Verify enables any browser-enabled device to act as a virtual station by recording and confirming an identity with a PIN.

badge icon

FIPS 201-2 CERTIFICATION

ACM is FIPS 201-2 compliant and is on the GSA Approved Product List with pivClass technology, meeting the PIV requirements for U.S. federal employees and contractors.