Skip to main content
Bosch Security and Safety Systems I Indonesia
Access Control Systems

Access Control Software

missing

Access control is an essential component of building security. You need a truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. Nevertheless, it is extremely stable, offering best-in-class reliability, security and several features found only in high-end security solutions.

Your simple but state-of-the-art access control solution

Keeping your data safe

Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages. Our access control software also has trusted digital certificates for mutual authentication between server and client and uses secure design principles such as ‘secure-by-default’ and ‘principle of least privilege’. Your data is definitely safe with the industry-leading Bosch products.

Data Privacy

Icon AMS-05

Strict access authorizations to personal data

Icon AMS-01

Only relevant data can be collected

Icon AMS-06

Data storage duration to comply with company policy

Data Security

Icon AMS-03

Secure-by-design: encryption, authentication, certificates

Icon AMS-02

Secure-by-default: all security settings on high per default

Icon AMS-04

Principle of least privilege: assign granular privileges for operators

A system open for integration

Security operator using video management system

Video management integration

You can use our access control software (Access Management System) in combination with video surveillance systems like Bosch Video Management System (BVMS 10.1 or higher) or systems from third parties like Milestone Xprotect. Integration with a video management system offers manual video verification to increase the security level at doors. Here the monitoring operator verifies if the person at the door matches the registered person in the database and if so, allows the person to enter. You can also use it to search for specific events. Moreover, access commands and events can be handled by the video management system, making the operation of the integrated system most efficient.

Woman using pin code to operate intrusion alarm system

Intrusion detection integration

The integration with B and G Series Intrusion Control Panels facilitates the combination of efficient authorization management and a central overview of all access and intrusion authorizations. Operators can add, delete and modify intrusion-related user passcodes and authorizations directly in our access control software (Access Management System), as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion areas directly in the system's user interface and see their arming status on the system map. This provides operators with a central overview of all access and intrusion states, allowing a remote management to handle intrusion alarms efficiently. Please note: the B Series and G Series panels are not available in European countries.

Business partners shaking hands

Third party integration

Our software solution for access control is able to connect to non-Bosch reader devices using the open OSDP protocol on RS-485 bus and non-Bosch software. Our latest enhancements allow integration of an increasing number of third-party applications with our access control system, examples ranging from video management systems, IP-based wireless locks to mobile access control (using mobile credentials via API).

Get in touch

call team icon

 

Click the button to contact your local contact person who can tell you all about our access control software.

Access Management System infographic
Access Management System infographic

Infographic

Download our Access Management System infographic

Share this on: