Large site security systems based on the hardware and software system “Key-2”.
To ensure security of large military, industrial and administrative sites it is necessary to implement a package of actions due to their activity features, availability of strictly-controlled equipment and/or materials. Such package of actions normally includes the area perimeter external fence, personnel and visitor access control points (ACP), administrative procedure regulating personnel and visitor movement through ACP and inside the site.
System integration software
«Key-2»
Large site security systems based on the hardware and software system “Key-2”.
To ensure security of large military, industrial and administrative sites it is necessary to implement a package of actions due to their activity features, availability of strictly-controlled equipment and/or materials. Such package of actions normally includes the area perimeter external fence, personnel and visitor access control points (ACP), administrative procedure regulating personnel and visitor movement through ACP and inside the site.
In the modern context the tasks of perimeter, indoor rooms security and control over pedestrian movement are normally completed with application of appropriate equipment:
- perimeter and indoor rooms security alarm system;
- site and indoor room personnel and visitor access control system through ACP;
- CCTV system along perimeter, on site and inside some rooms.
The hardware and software system “Key-2” enables to integrate access control facilities, security alarm facilities and CCTV facilities into uniform system and obtain automated interrelated security equipment system.
Integration of the above facilities into uniform security system enables to minimize the number of on-duty operational personnel and provides ultimate objectivity of situation evaluation and efficiency of actions to be taken.
Application of Internet Protocols TCP/IP in package enables to build a security system of any size without technical restrictions by quantity and area layout of its components subject to provision with communication channels including via Internet.
Information on all events taken place in the automated system, including all actions on automated workstations (AWS) of servicing and operational personnel is saved in database, is displayed textually and graphically in operational personnel workstations and is accessible to further analysis.
Automated security (physical protection) equipment systems are created based on the hardware and software system “Key-2”and they are properly operated on a number of industrial, administrative and commercial sites including:
- nuclear power facilities;
- ministries and departments;
- pipelines;
- health resort centers.
The software system “Key-2” includes the following software modules:Administrator – provides adding in the system and assignment to the personnel, servicing security system, the rights to activate the below software modules from automated workstations and the rights to use them;
Configurator - provides creation in database a hardware configuration image reflecting actual hardware configuration of access control system, security and other alarm systems, CCTV and their interconnection;
Card Index File – provides entry in database and support of security system users (personnel and other persons who are required regular access to controlled area to perform functional duties);
Monitoring and Control – provides graphical and textual display of current situation in controlled area including graphic and text information on security system equipment status. It also enables to acquire video images from CCTV cameras both by operator request and automatically upon occurrence of various events. This module is a basic tool for on-duty operational personnel enabling to evaluate real on-scene situation and take appropriate steps to prevent potential adverse effects.
Reports – enables to create templates for various reports and reports themselves according to templates created earlier. Templates are a set and location of criteria according to which reports are generated.
Master Controller – provides communication of the software system with the module equipment S’TERN on which the access control and alarm system hardware of different purpose is built.
Video Master – provides communication of the software system with CCTV equipment.
All above listed software modules are client applications of “ORACLE” data base.
Special features
of the «Key-2» software
The hardware and software system “Key-2” provides a number of special features:
- routing i.e. tracking of correct sequence of movement through access control points within the whole site;
- rapid change of access control point operating modes;
- visitor escorting by a person from appointed escort group;
- personalized visitor escorting by a person appointed by escort;
- temporary rapid change of access rights with their automatic return to basic rights after expiration of the fixed time;
- access mode with validation by operator;
- access mode with validation by room “host” with the use of video intercom;
- display of attendance list for the specified area or particular room;
- search of appropriate person location;
- tracking of the relevant list person movement;
- locking of security violator in the place convenient for detention;
- display of the automated system current configuration "hardware tree” and status of each interrogated element of the system
Software modules Configurator
Submit your review
1
2
3
4
5
Submit
Cancel
Create your own review
Meds (UK) Enterprises Ltd.
Average rating:
0 reviews
Request CallBack
Product : Key-2
Get Quotation
our partners
Quick Contact
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.