Access Control System

check-icon
Mix-and-match devices:
Seamlessly use classic HID VertX Evo, Edge Evo or Mercury EP series devices with the latest HID Aero or Mercury LP series controllers and modules or ASB Security panels.

check-icon
 OSDP v2 support: connect readers securely via encrypted communication, customize reader LED and buzzer behavior, manage templates.

check-icon
Vehicle control:
Store vehicle details, track movement, generate reports.

check-icon
Manual verification of permissions:
In case of a lost card verify user permissions for any door by entering name or
employee number.

check-icon
IP controller support:
Enjoy high speed uploads, PoE flexibility, fault tolerance, unlimited expansion, and other benefits of IP-based solutions.

check-icon
Effective use of hardware resources:
Each controller or reader receives only the segment of data that concerns its operation. IOs 

check-icon
Fault tolerance:
No external failures will impact an individual node, and a failure of any node will not impact the rest of the system.

check-icon
Hardware-independent system configuration: replace a failed device with another make without system disruption and use the single interface for their management.

check-icon
Anti-passback:
hard (no re-entry) and soft (re-entry allowed with operator notification) modes supported.

check-icon
ID card design and printing (badging).

check-icon
Elevator management: control elevators up to 128 floors, set schedule-based access rights.

check-icon
Child security:
Send alerts to parents every time their child enters or leaves school territory.

check-icon
Holidays:
multi-day holiday and recurrence settings.

Access Control System

check-icon Use limit: Access rights automatically disabled when allowed number of uses is reached.

check-icon Holiday: multi-day holiday and automatic rescheduling for next year. Up to 4000 holiday dates.

check-icon Vehicle control: Store vehicle details, track movement, generate reports.

check-icon Manual verification of permissions: In case of a lost card verify user permissions for any door by entering name or employee number.

check-icon IP reader support: enjoy high speed uploads, PoE flexibility, fault tolerance, unlimited expansion, and other benefits of IP-based solutions.

check-icon Effective use of hardware resources: Each controller or reader receives only the segment of data that concerns its operation.

check-icon Fault tolerance: No external failures will impact an individual node, and a failure of any node will not impact the rest of the system.

check-icon Hardware-independent system configuration.

check-icon Anti-passback hard and soft.

check-icon ID card design and printing (badging).

check-icon Integrated management of biometric data.

check-icon Child security sends email or SMS alerts to parents every time their child enters or leaves school territory.

check-icon Visitor management: give temporary rights to visiting users and generate visitor reports.

Time and attendence

check-icon Integration with access control: save costs by using the same readers, cards, fingerprints and management software.

check-icon Integration with video: eliminate buddy-punching by capturing snapshots of every work-time related transaction. External IP cameras and built-in reader cameras supported.

check-icon Automatic import of schedules: from ERP, HR or accounting systems.

check-icon Automatic import of users: from ERP, HR or accounting systems.

check-icon Rotating schedules: for companies with 24/7 operations.

check-icon Multi-day absences: with standard and custom reasons.

check-icon Department view: shows the grid of staff schedules.

check-icon Strict schedules: no tolerance for deviations.

check-icon Flextime.

check-icon Regulated hourly breaks.

check-icon Job codes.

check-icon Overtime authorization.

check-icon MS Excel report format: allows manual corrections and further processing.

check-icon Biometric time clocks: all Suprema biometric terminals supported.

Automation & Reporting

check-icon Scheduled database backups. No need to configure anything: system makes backups automatically from the first day.

check-icon Regular database maintenance to ensure top-level performance.

check-icon Advance expiration warning Reduce loss of visitor cards and renew user permissions in a timely manner.

check-icon Report generation based on user-defined templates and schedule.

check-icon Preconfigured reports: system and alarm events, user details, hardware configuration, access permissions, employee time & attendance.

check-icon Adobe PDF and MS Excel formats.

check-icon Emergency reports: last known location of each user, sorted by building zones, and by user groups.

check-icon Eco-friendly printing: fit more data per page and reduce toner and ink costs.

Expansion & Integration

check-icon IP-based video management systems.

check-icon Built-in reader cameras.

check-icon IP-based burglar alarm systems.

check-icon Data links to HR, accounting, ERP and other systems.

check-icon Web service API.

check-icon XML data import & export.

check-icon Automatic import & update of users from CSV files or Active Directory.

check-icon Vehicle License Plate Recognition systems. Application of all access control rules to vehicles, including: access levels, activation/expiration dates, use limit, operator confirmation, occupancy limits and others.

check-icon LPR OCR error compensation. Handle optical license plate recognition errors by using flexible matching and wild-card characters.

check-icon Digital scales support: user/vehicle weight as an additional verification factor.

check-icon Programmable triggers: any event (or double/triple identical events) may be used to trigger automatic actions.

check-icon Support for indoor/outdoor LED display boards: show building or parking occupancy data.

check-icon Unlimited expansion in terms of users, PC workstations, readers, alarm inputs and outputs.

check-icon Unlimited number of cards, finger templates, PIN’s, vehicle license plates per user.

check-icon Smooth growth. Purchase or upgrades of expensive master controllers or software licenses not required.

check-icon Backwards and forwards compatibility: no need to replace old generation readers/controllers in order to add more controlled points.

check-icon Support for major security hardware manufacturers. Ability to mix hardware of different manufacturers in the same system.

check-icon System partitioning. Divide a system into “Locations” or “Sites” for convenient and secure administration by multiple operators.

Easy To Use

check-icon Modern & attractive interface geared towards ease-of-use.

check-icon Access levels assigned to a user not to a card. Issue new cards in a fast and easy manner, without reassigning access levels.

check-icon Operator initiated SMS notifications directly from security management software. Perfect for notifying users about visitors, lost items, car parking problems and other issues.

check-icon Automatic display of photos of users as they pass through selected doors.

check-icon Real-time occupancy information clearly shows location of each user.

check-icon “FriendlyBits” automatic card format detection, raw card data & unlimited card format support.

check-icon Support for USB card readers. Fast and error-free data entry for all major ID card technologies.

check-icon Map zoom control using mouse wheel.

check-icon Automatic face detection and photo cropping when capturing user photos via USB camera.

check-icon Drag & drop map editing.

check-icon Quick add feature for issuing new cards: increments card numbers automatically, without the need to retype.

check-icon Custom map icons for each floor plan in order to help operators identify building zones quickly.

check-icon Messenger-style pop-ups next to devices on maps.

check-icon Filter live event list by text contained in user names, door names and message titles.

check-icon Dynamic search in all software windows: search results shall be narrowed automatically.

check-icon Copy function to reduce manual data entry. Ability to copy users, doors, floor plans, time schedules, access levels, card formats and holidays.

check-icon Remote biometric enrolment: capture finger templates via any door reader.

check-icon Restore function: recovers accidently deleted users.

Monitoring and Security

check-icon Intuitive display of events: game-like animation adds clarity and understanding. An operator can see as a door opens or reader changes mode of operation. Operator training requirements are reduced and response time is improved.

check-icon Alarm acknowledgement: procedures to record detailed history and operator comments of important alarm events. No critical alarms shall be missed.

check-icon Alarm transmission via SMS: (mobile phone text messages) and email.

check-icon “Push” technology: for real-time alarm delivery and reduced network traffic.

check-icon Graphic maps.

check-icon Video integration: automatic display of video from an alarm location, ability to browse video history, storage of snapshots in security database.

check-icon Audible alarm alerts: for operators.

check-icon All popular access control cards supported.

check-icon Authentication modes: Card only, Card & PIN, fingerprint.

check-icon Programmable card removal actions: lock PC automatically, even when stepping away just for a few minutes.

check-icon Emergency access: in case of a lost card.

check-icon Physical access control rules applied in logical access.

check-icon PC logon events: displayed and integrated into security management system.

check-icon Instant deactivation of a user: in physical and logical access control systems.

check-icon Active Directory support.

Localization & Standarts

check-icon Multi-lingual interface: English, Spanish, Japanese, Arabic, Hebrew, Farsi (Persian), Finish, Norwegian, Dutch, Azerbaijani, Lithuanian, Latvian, Polish and Russian.

check-icon Built-in translation tool: add new language in matter of hours.

check-icon Extended regional options including Gregorian and Farsi calendars and ability to configure weekend days

check-icon Mainstream DB engine: MS SQL Server 2008-2019 32/64-bit.

check-icon Industry standard readers: all Wiegand and RS-485 formats supported.

check-icon HID OPIN API

check-icon Web service API

check-icon Suprema v2 SDK

check-icon Mercury Security SDK

logo-white

CredoID – the software suite that integrates hardware from world-leading brands into a robust and powerful system.

g12
Midpoint Security develops integrated solutions for access control and security projects.
© 2020 Midpoint-Security, All Rights Reserved. Terms, Privacy & Accessibility
Worldwide Support & Sales

Subscribe credoID to stay in touch!

© 2020 Midpoint-Security, All Rights Reserved. Terms, Privacy & Accessibility