1. Productivity |
|
|
|
Maintain total control and surveilance of all door access in your secure areas directly from any of the 32 connected client workstations. All door access activity is transmitted directly to your computer screen. You can also give specific commands to doors such as opening and closing them directly, sealing them off from further access, etc. Features include : |
|
|
|
|
|
|
Anti-Passback Options - In order to prevent a single user card from being re-used to allow more than one person through a door access area, Anti-passback forces users who enter a secure area with a card to leave the area before the card may be used to enter that secure area again. |
|
|
|
|
|
|
|
Matrix V System can grant access rights for each user login to restrict functions & data visibility. |
|
|
|
|
|
|
|
Receive and respond to alarms promptly through highlighted pop-up dialog boxes. You may also enable, disable and otherwise give commands to any security device on your network. |
|
|
|
|
|
|
|
Data partitioning feature allows users to view & control of their own jurisdiction, be it floor, section, department, branches or regions. |
|
|
|
|
|
|
Network and Internet Capability |
|
|
|
|
|
Manage your entire security system over a TCP/IP network or even remotely over the Internet through a Telnet client or HTML web browser. Connect together and simultaneously control multiple EL5000 Controllers and their controlled field devices, card readers, alarms, etc. by simply plugging them into your TCP/IP network. Matrix V supports direct control over all readers, field devices and input/output points compatible with Elid's EL5000 Series Controller as well as system access from up to 32 client workstations connected locally or remotely through a TCP/IP network. |
|
|
|
|
|
Operator Decision Support |
|
|
|
|
|
Operator Decision Support is activated upon Matrix V detecting a pre-determined event on the security system, such as, forced door. It suggests courses of action to the guard, such as : |
|
|
|
|
|
|
Summoning the police |
|
|
|
|
|
|
|
Deploying guards at the alert location and along the intruder's possible route(s). |
|
|
|
|
|
|
|
Sealing off nearby doors and alerting/evacuating staff. |
|
|
|
|
|
|
This function is meant to supplement the normal training provided to security personnel when responding to such situations by providing a checklist of critical actions that need to be taken. |