Access Management System
Release of Access Management System 2.0
Access Control Software
Simple, scalable and always available
Access management is an essential component of building security. It is the process of granting authorized users the right to enter certain buildings, areas and rooms, while preventing access to non-authorized users. Sounds simple, but today’s market also wants access management systems that are easy to set up and use. Access management systems must also be easily scalable and able to integrate with other security domains like video and intrusion systems. And perhaps most importantly, today’s market wants access management systems that are highly resilient and always available. That’s why Bosch has answered all these needs with the Access Management System (AMS) 2.0.
Simplicity throughout – for everyone
The entire customer journey is designed to be as effortless and as simple as possible. The configuration is easy: existing floor maps are imported into the system and icons are dragged and dropped to represent controllers, doors and building objects on the map view. Onboarding is straightforward: enrolment and assignment of access rights is all implemented in one dialog manager, even the registration of biometric data. The data on several thousand cardholders held in legacy or HR systems can also be quickly imported with just a few clicks, thanks to the importer / exporter tool. The possibility to create access profiles with a certain scope of authorizations makes the assignment of authorizations simple as it is not necessary to assign every single authorization to the cardholder but just one pre-defined role profile. And once set up, using the system is also easy, with an intuitive icon alarm list and color scheme to ensure fast and efficient operator reactions.
Ideal as standalone but capable of growing into a complete security solution
The AMS 2.0 is a flexible access management system for medium- to large-sized organizations. It is easy to set up, operate and expand. It offers very high reliability and several features found only in high-end security solutions. AMS 2.0 can grow with the needs of the customer.The software is offered in three pre-configured software bundles for different sized organizations: Lite, Plus and Professional. All three versions are fully functional and can be used directly “out-of-the-box”, they can also be enhanced with further expansion licenses when needed. In total, up to 200,000 cardholders, up to 10,000 doors and up to 400 divisions can be administered. AMS 2.0 can also be integrated with video systems, and it will soon be able to integrate with the B-/G- Series intrusion system and further Bosch and third party systems. With this integration capability, the Access Management System will serve as the solid platform to mix and match various security systems, depending on the customer’s individual needs. And since it is regularly updated with the latest data security enhancements and because it can easily grow, it is a future-proof investment, ideal for office and governmental buildings, retail environments, educational institutes and hospitals.
For increased resilience and high availability, the AMS 2.0 includes the Master Access Controller (MAC) as an additional layer of resilience between the server and the access controllers. If the server fails in the AMS 2.0, the MAC takes over and ensures that the controllers still communicate with each other and share necessary information from the card readers. Thus, even functionalities which include various controllers such as anti-passback, guard tour and area control can still be performed. And to avoid any disruption in the rare event of the server and the MAC both failing, a second MAC can be configured as a redundant MAC (R-MAC). This concept provides the customer with the highest system availability.
Integration with video
The AMS 2.0 can be integrated with video management systems such as BVMS 9.0 (and higher) and Milestone XProtect. Integration with BVMS offers manual video verification to increase the security level at doors. Here the operator verifies if the person at the door matches the registered person in the database and if so allows the person to enter. BVMS integration also enables searching for cardholder events and events at doors. It can be checked which doors and areas have been entered over a specific time by a specific cardholder and which cardholders have entered and left a certain area during a certain period of time. This can be useful when, for example, something is stolen from a certain area. With the searching functionality, it is possible to quickly check who has entered this area and at what time.
High level of safety thanks to threat level management
Up to 15 configurable threat levels mean that safety measures can be initiated quickly in critical situations such as fire or terrorist attack. The threat level state is implemented by one of three triggers: operator workstation, emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of some open and some blocked. Individual doors can also have their own security profile and allow only certain cardholders access.
Clear situational awareness
At all times, the operator has full situational awareness thanks to the instant updates of events at the doors via the swipe ticker and the comprehensive overview on the on-screen map. The swipe ticker provides the operator with a constantly updated list of last cardholders who attempted to gain access to selected doors, it shows who was granted access and who was not. In addition, the map view indicates the respective door on the map to allow the operator to quickly see where exactly the event is happening.
High data security and privacy protection
To protect against cybercrime and loss of personal data, communication is encrypted at all stages, e.g. through support of the secure OSDP v2 protocol. AMS 2.0 also has trusted digital certificates for mutual authentication between server and client and uses secure design principles such as “secure-by-default” and “principle of least privilege. It has also been certified with the European standard EN 60839-11, which specifies the system and component requirements of an access control system and facilitates compliance with EU-GDPR.