The Convergence of Security and IT
|
In today's world, the same person frequently manages IT, physical security and networking. That's because the technologies of encryption, bandwidth, network integrity, firewall access and physical security have converged into a new and powerful networked environment.
Security managers today must understand network edge topology, zero footprint software, high speed networking, and the integration of databases, video and other related subsystems.
The complexities of today's environments also create special opportunity's for a product such as e-Merge, with it's native IP hardware technology. e-Merge simplifies your IT security environment rather than complicating it.
|
Because e-Merge does not require you to install any software of pull new wiring to any computer - you simply connect components to your data network and e-Merge will recognize them - it has a zero footprint and provides control of a complete physical security environment through a web browser that is already on your PC.
e-Merge changes the age-old equation of inflexible low-end security systems or over-featured, expensive high-end systems. Designed from the ground up to de a cost-effective complete solution, e-Merge is a complete, scalable security management system compact enough to fit in a panel-sized box, yet powerful enough to integrate your access control, alarm monitoring and video in one system.
|
This is our third generation system that you control doors with your normal browser (such as Internet Explorer, Netscape & Firefox).
Introducing e-Merge
|
|
Some great features of this system
|
- A user interface securely accessed with a standard web browser under password control.
- Proven Red Hat Linux operating system embedded in the Intel processor ensures a stable platform.
- Integrated management of access control, video, and alarm monitoring from anywhere the Internet is available.
- Communications over existing networks or the Internet using easy to obtain, inexpensive equipment commonly found in most offices.
- Authenticated and encrypted information flow to protect system operation even over public network segments.
- Pre- and post-image video capture at designated access control and alarm monitoring points.
- Alerts delivered via email, and even cell phones.
- Intuitive dynamic floorplans for easy monitoring and control over complex facilities.
- Remote update of software to every level of the system, keeping all components up-to-date.
- Easy-to-configure panel architecture combining access control input and output modules.
- Powerful predefined and ad-hoc reports delivered from the integrated ODBC-compliant embedded database.
- Totally solid state construction for years of trouble-free service.
|
|
System 50 vs. System 5000
|
Access control readers Maximum number of cameras Maximum number of card holders User photo email and SMS NAS backup Burglar alarm interface Video Management System (VMS) Enterprise capable Live Monitoring Bundle (Monitoring desktop, Floor plans Alarm acknowledgement, Photo pop-up) Badging Elevator Control Threat levels
|
e-Merge 50
32 N/A 5,000 No Yes Yes Yes No Optional No Optional Optional No No No
|
e-Merge 5000
140 128 20,000 Yes Yes Yes Yes Optional Yes Yes Yes Yes Optional Yes Yes
|
Hardware and Software Specifications
|
Readers Operating System DBMS compatabillity email support Encryption Network Web Processor
|
Wiegand Red Hat Linux QL, ODBC POP, SMTP SSL, SHA-1 NTP, TCP/IP http, https, xml Intel XScale-IXP425
|
|
|
< Up to 14 Doors per box. Simply Amazing !
|
This is what it used to be like for a 14 door system >
| |
|