Skip to main content
Bosch Security and Safety Systems I Australia & NZ
Access Control Systems

Access Control Software

Access control is an essential component of building security. You need a truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. Nevertheless, it is extremely stable, offering best-in-class reliability, security and several features found only in high-end security solutions.

Your simple but state-of-the-art access control solution

Business people walking inside an enterprise building

Always available

Always available

Bosch has a unique method to ensure that we can offer increased resilience and high availability. Our ip-based access control solution uses one or more (redundant) Master Access Controllers (MAC’s) between the server and the Access Modular Controllers (AMC). If the server fails, the MAC’s take over and ensure that the AMC’s still communicate with each other. This way, even functionalities that include various controllers such as anti-passback (no second entry with the same access card), guard tour and area control can still be performed. And even in the very improbable case that both MAC’s would fail, the AMC’s remain always active thanks to their tremendous offline capability (internal memory to store 2 million events). This technology provides the end-user with the highest system availability on the market.

Business people walking inside an enterprise building
Business manager standing on a balcony overlooking multi-site skyline

Flexible and scalable

Flexible and scalable

Our access control solution can easily grow with the needs of the customer. The software is offered in three pre-configured software bundles for different sized enterprises: Lite, Plus and Pro. When your organization grows, you can easily upgrade to a more advanced multi-door license. This way, up to 200,000 cardholders and up to 10,000 doors can be administered. Since no hardware needs replacing, increasing the system size is very cost-efficient. This outstanding scalability makes the software a truly future-proof investment.

Business manager standing on a balcony overlooking multi-site skyline
Installer with a laptop under his arm smiling at the camera

Easy to configure

Easy to configure

The configuration of our access control software is easy: existing floor maps are imported into the system and icons are dragged and dropped to represent controllers, doors and building objects on the map view. Onboarding is straightforward: enrollment and assignment of access rights are all implemented in one dialog manager, even the registration of biometric data, for instance facial recognition. The data of several thousand cardholders held in legacy or HR systems can also be quickly imported with just a few clicks, thanks to the importer / exporter tool. The possibility to create access profiles with a certain scope of access privileges makes the assignment of authorizations simple, as it is not necessary to assign every single authorization to the cardholder but just one pre-defined role profile.

Installer with a laptop under his arm smiling at the camera
People standing at a reception desk receiving a key card for access control

Easy to use

Easy to use

Once installed and set up, using our user-friendly access control system is also easy, with an intuitive icon alarm list and color scheme to ensure fast and efficient operator reactions. At all times, the operator has full situational awareness thanks to the instant updates of events at the access points via the comprehensive overview on the on-screen map. The operator sees a constantly updated list of last cardholders who attempted to gain access to selected doors, who was granted access and who was not. In addition, the map view indicates the respective door on the map to allow the operator to quickly see where exactly the event is happening.

People standing at a reception desk receiving a key card for access control
Fingerprint identification, a form of biometric authentication

Multi-factor authentication

Multi-factor authentication

To be able to prove a person’s right to enter, you need to have some form of authentication. There are various identification modes possible such as an access card, a key fob, pin code or biometric data. After authentication, the reader sends information to the controller and the latter verifies with the server if the user is authorized to enter. When only one identification mode is applied, this is called single-factor authentication. Two-factor or multi-factor authentication requires one or more additional identification modes, and access is only granted if all features match. Our systems support the combined use of cards, pin codes, fingerprints, facial recognition, etc. This way you can make sure the protection of the premises meets a high level of security requirements.

Fingerprint identification, a form of biometric authentication
Motion blur shot of people walking on stairs

Threat level management

Threat level management

Threat level management facilitates guaranteeing a high level of safety. Up to 15 configurable threat levels ensure that safety measures or restrictions can be initiated quickly in critical situations such as a fire or terrorist attack. The different threat levels can – in minimum time – make all doors open, all doors locked, or a mix of some open and some blocked. A unique option that Bosch offers to use in threat situations is the possibility to reconfigure certain doors in a second so that only first responders with the highest authorization get permission to enter the area, while all other cardholders are blocked. Besides in high threat situations, threat level management is also useful in case of low threat level situations like sports events, open days, or parents’ evenings at schools.

Motion blur shot of people walking on stairs
Interior view of a car being steered through a parking facility

Parking management

Parking management

If you would like to control the usage of your parking area, using the parking management feature is very helpful. Access to parking lots can be regulated by a long-range reader and ID card, or by a video surveillance camera and license plate. Each parking lot can be divided into logical areas, with a maximum number of cars defined for them. When the parking area has reached its maximum capacity, you can prevent access for arriving cars. Load-balancing of the parking lots is also possible, with current capacity information displayed on the operator’s screen.

Interior view of a car being steered through a parking facility
Physical security guards walking on-site

Guard tour management

Guard tour management

If you want your building to be guarded by a security guard, the feature ‘Guard Tour’ in our access control software is a very useful one: you can indicate a route around the premises, punctuated by card readers, where the guard must present a special guard card to prove that he has physically visited the reader. The guard tour consists of a series of readers with the calculated walking time in seconds. The maximum tolerable delay between readers, and the tolerable deviation (+/-) from the start time, are also attributes of the guard tour. Deviations outside of these defined tolerances can potentially trigger alarms or show real-time video to protect the guard.

Physical security guards walking on-site
Shopping mall protected by access control management software

Division management

Division management

For larger premises it is possible to set up different divisions for the access control system. With our access control software, you can create up to 400 divisions, depending on the license type. For instance, in the case of a multi-company building, companies can share one access control system in the building. When they log in to the system, only information from their own company and possibly shared areas are shown. Also very suitable for building owners, who can buy only one access control system and use individual settings for each of their renters. Divisions can be adjusted and enhanced at any time.

Shopping mall protected by access control management software
Visitor management: Receptionist handing out access key card

Visitor management

Visitor management

You can combine our access control software (Access Management System) with our web-based visitor management software, offering you all the benefits for enhancing the visiting process. Effective visitor management must go beyond meeting and greeting visitors who enter the reception area of any business or public building. It must enhance building security, protect facilities and employees, and improve users' and visitors' overall experience. Bosch's easy-to-use, browser-based visitor management software integrates seamlessly with Access Management System.

Visitor management: Receptionist handing out access key card

Keeping your data safe

Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages. Our access control software also has trusted digital certificates for mutual authentication between server and client and uses secure design principles such as ‘secure-by-default’ and ‘principle of least privilege’. Your data is definitely safe with the industry-leading Bosch products.

Data Privacy

Icon AMS-05

Strict access authorizations to personal data

Icon AMS-01

Only relevant data can be collected

Icon AMS-06

Data storage duration to comply with company policy

Data Security

Icon AMS-03

Secure-by-design: encryption, authentication, certificates

Icon AMS-02

Secure-by-default: all security settings on high per default

Icon AMS-04

Principle of least privilege: assign granular privileges for operators

Schematical representation of an access control system with high-end data security

A system open for integration

Security operator using video management system

Video management integration

Video management integration

You can use our access control software (Access Management System) in combination with video surveillance systems like Bosch Video Management System (BVMS 10.1 or higher) or systems from third parties like Milestone Xprotect. Integration with a video management system offers manual video verification to increase the security level at doors. Here the monitoring operator verifies if the person at the door matches the registered person in the database and if so, allows the person to enter. You can also use it to search for specific events. Moreover, access commands and events can be handled by the video management system, making the operation of the integrated system most efficient.

Security operator using video management system
Woman using pin code to operate intrusion alarm system

Intrusion detection integration

Intrusion detection integration

The integration with B and G Series Intrusion Control Panels facilitates the combination of efficient authorization management and a central overview of all access and intrusion authorizations. Operators can add, delete and modify intrusion-related user passcodes and authorizations directly in our access control software (Access Management System), as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion areas directly in the system's user interface and see their arming status on the system map. This provides operators with a central overview of all access and intrusion states, allowing a remote management to handle intrusion alarms efficiently. Please note: the B Series and G Series panels are not available in European countries.

Woman using pin code to operate intrusion alarm system
Business partners shaking hands

Third party integration

Third party integration

Our software solution for access control is able to connect to non-Bosch reader devices using the open OSDP protocol on RS-485 bus and non-Bosch software. Our latest enhancements allow integration of an increasing number of third-party applications with our access control system, examples ranging from video management systems, IP-based wireless locks to mobile access control (using mobile credentials via API).

Business partners shaking hands

Contact us

If you would like to find out more, or want to know how we can help you with your access control needs, please do not hesitate to contact us.

Downloads

Interactive portfolio

Interactive portfolio

Access Control Systems

Infographic

Infographic

Access Management System

Product overview brochure

Product overview brochure

Access Control Systems

Share this on: