Access control and management systems

Functionality of modern enterprise access control based on Protégé GX/WX platforms

Modern enterprise electronic access control systems are very complicated and functionally reach hardware and software complexes. Correct choice of such a system has to be based on deeper knowledge of identification means and methods, available architectures and topologies, communication infrastructure used, server, client stations and appropriate software usage specificity, as well as 3rd party integration. Course is intended to offer the participant a basic expertise on the mentioned topic.

  • Target audience

    security system designers and architects, presale-engineers, project managers, implementation and operation specialists.

  • Course duration

    25 academic hours, depending on participants’ initial knowledge

  • Cost

    free of charge for Fortisec Ltd partners and customers

Course structure

  • 01. Introduction

    • Site pre-project audit, correct questions the customer to be asked
    • Basic site access procedures formalization, users’ groups and categories definitions, site zoning
  • 02. User and vehicle identification subsystem

    • Cognitive, attributive and biometric identification methods concept
    • 125kHz vs 13,56MHz: RFID identification technologies essence, advantages and disadvantages
    • Mifare range identifiers and their usage on high security sites best practice
    • UHF-identification for vehicle checkpoints control, UHF-technology usage for people identification
    • State vehicle license plates as access control identifiers
    • NFC/BLE mobile identifiers and cloud management
    • Physical biometric identification methods
    • Contact and contactless fingerprint: large/extra-large sites usage challenges and best practice
    • 3D face biometrics: advantages and disadvantages compared to other identification methods
  • 03. Access control information and data collection & processing subsystem design and creation

    • ACS hierarchy and flat architecture essence: choice best practice
    • RS485/Ethernet usage specificity as a communication infrastructure of ICT Protégé platform
    • Clusters and power calculation – important stage of hardware design process
  • 04. Software functionality and adjustment

    • Protégé GX software architecture and licensing model
    • Server & client stations hardware requirements
    • Basic system elements adjustment, customized interfaces creation best practice
    • Reporting options and visitor management possibilities
    • Protégé WX platform functions and adjustment procedures
  • 05. ACS and 3rd party integration

    • WEB SOAP SDK basics
    • CCTV/VMS integration
    • DataSync database synchronization service
    • Biometric identification systems integration
    • Lift and wireless door locks control