29 Aug Analysing Wavesys VMS integration with Access Control
The Growing Demand for Smart Security Solutions
In recent years, the demand for smart security systems has surged. Relying solely on video management systems is no longer sufficient. In today’s environment, these systems must meet a
wider range of customer needs. At Wavesys Global, we prioritize developing software that
seamlessly integrates with various third-party systems. This collaboration enables our video
management system to perform its core functions while interacting with external systems for
immediate and effective responses.
One such integration involves access control systems, and we’ll explore this further.
Seamless Interoperability and System Collaboration
As security systems expand in size and complexity, customers seek centralized control. The increasing availability of technology and stringent security requirements necessitate a user-friendly
architecture. While system components must remain sophisticated, their complexity should be hidden
from the end user, with automation handling the intricate tasks. There is no one-size-fits-all system;
instead, customers combine different software solutions to create tailored security setups that meet
their specific needs.
Software-level cooperation not only unifies the interface, making it more convenient for users, but also allows for proactive security scenarios across the system. Events triggered by one component automatically initiate responses in other areas, often without human intervention, though supervision
or confirmation can be added if needed. This automation reduces response time and minimizes the
risk of human error and security breaches, such as those caused by social engineering tactics.
Given these considerations, integrating video management software with access control systems offers significant benefits. So, what does Wavesys Global WVMS offer in this regard?
Unified Interface and Advanced Security Features
Wavesys Global WVMS software provides two-way integration with multiple access control systems,
including:
- Gallagher Command Centre
- Doors .NET by Keri Systems
- Keep by Feenics
- Roger RACS 5
- Paxton Net2 Access Control
This integration is supported in both WVMS Professional and WVMS Enterprise editions without any limitations.
During the configuration phase, Wavesys servers retrieve reader information from the access control systems and link it to doors in the WVMS setup. The specific messages received from readers may vary depending on the integration, resulting in different available information across systems. These data can
be used to trigger events in the Event & Action Configurator, enabling scenarios like receiving alerts for
unauthorized access attempts. Additionally, triggers can be sent back to the access control software to
modify door statuses.
For larger installations, WVMS’s interactive maps, based on either images or world maps, can reflect door status changes in real time. Door markers on these maps provide an at-a-glance view of door statuses and allow for immediate status changes. Furthermore, system events such as DI triggers, user button
presses, or facial recognition can also be used to control door statuses. Automating these processes
enhances efficiency in routine operations.
The WVMS Monitor application facilitates advanced investigations using reader events and cardholder data. While cardholder details are stored in the access control system, searches can be performed within WVMS, allowing users to view events alongside associated video footage. This eliminates the need to switch interfaces when reviewing event histories.
Set Up, Configure and Use
Setting up the connection between Wavesys Global WVMS and your access control system involves the following steps:
- Ensure the access control software is configured for third-party connections, following its user guide for opening ports, applying licenses, etc.
- Add the access control configuration in WVMS Console.
- Include doors under this configuration for status monitoring, live view, investigation mode, and Event & Action scenarios.
While the initial setup is usually handled by a system administrator or CCTV engineer, the subsequent configuration can be managed by security personnel, desk clerks, or visitor control officers with limited access to the video management system.
CREATE AN ACCESS CONTROL CONNECTION IN WVMS
In the WVMS Console application, navigate to the Access Control section under Configuration to create a new entry. The required parameters will vary depending on the third-party access control engine:
- For Keri Doors .NET, you’ll need to enter the port number.
- For Paxton Net2, the Client ID (provided by Paxton software) is required, with an option to use HTTPS.
- For the Keep server by Feenics, only the instance number is needed, as the connection URL is hard-coded.
After establishing the connection, select readers from the list. When entering details, you can associate video channels with doors, enabling video review in investigation mode within WVMS Monitor.
TRACK DOOR STATUS IN CONSOLE
Once doors are configured, their statuses can be monitored in the Access Control section of WVMS Console. Details such as door open states and lock statuses are displayed here If the connection is still being established, refresh the door list using F5 or the Refresh button.
MAPPING DOOR LOCATIONS
Why use maps? Using the floor drawings, you may design dynamic layouts with all cameras and doors placed on them. Interlinking floors creates a layered construction layout. Furthermore,
operators can simply click on anything on the map to bring them up and initiate corresponding
activities.
The Maps category can be found in the WVMS Console’s Configuration section. From here, you may upload geo- and image-based maps.
Place as many as you want by dragging and dropping them from the panel above the map preview. For each, you may choose how distinct door states should appear: buttons on the right allow you to adjust both. When you utilize this map later in the WVMS Monitor application, the markers will be in your
specified style. Thus, door status monitoring may be done from the client application without obtaining
user authorization for WVMS Console access.
A drop-down menu will appear when you click any door marker on the map. The list will provide three options: lock, unlock, and temporarily unlock the door. This type of activity will be represented not just in WVMS Monitor’s Access Control section, but also, as expected, in the third-party access control module.
IMPLEMENTING PROACTIVE SECURITY MEASURES
Whether you have a multi-building project or a single door installation, access control integration allows you to manage the entire facility from one location. And, with the WVMS Event & Action Configurator tool, a significant portion of these control processes may be automated. Here are just a few of the many conceivable combinations given by WVMS E&A.
- If a certain door is opened after hours (e.g., at night), notify security personnel via text message and sound alert, and send an email notification to the relevant individual.
- When video from a vital camera goes missing, implement partial facility lockout. Manual unlocking (override) is optional and can be accomplished using user buttons.
- When an illegal access attempt is detected, configure a PTZ camera to a specified preset and display its live footage on the screen.
Unauthorized access occurs when someone without access permissions attempts to unlock a door. Also, this could be the consequence of someone attempting to enter a facility with restricted access, where “restricted” refers to specified hours or shifts. Because all door events are recorded, you may later review the facility’s access history to ensure that only authorized staff have entered and/or that no one is using other people’s access tokens.
- If a door to a crucial area (for example, the server room) is pushed open, instantly begin emergency recording for a set period of time, or until the security officer stops it.
- When a door is held open for more than 10 seconds, broadcast a pre-configured audio file containing an announcement to the next camera.
WVMS Event & Action Configurator is available in both WVMS Professional and WVMS Enterprise licensing levels. You can use the WVMS Console’s Events & Actions section to trigger them. There are different setup areas for events and actions. Once they are generated, navigate to the Rules category and build the circumstances you desire.
You can modify any current rule by adding schedules, conditions, and delay times.
- Schedules allow you to limit the days and hours when the rule is active, such as at night or on weekends.
- Conditions allow you to combine two occurrences and trigger a single action. For example, send a notification when two doors are “open” at the same time.
- Delay Timers prevent the consequent action from taking effect for a set amount of time.
SUPERVISE AND INVESTIGATE
When WVMS Monitor connects to a server with an access control configuration, an additional tab for access control investigation becomes available. Investigation modes include:
- Event Search: Filter door events by time, door name, cardholder name, or event type.
- Door Status: View live statuses and control doors manually if needed.
- Cardholder List: Review the list of cardholders, including photos if available.
Clicking on an event allows instant video playback, providing a comprehensive view of the incident.
For example, you can: See which doors were opened during the day. Verify if the user used their own access tag/card by comparing the cardholder photo to the event video. Check the current
door status and physically lock/unlock it if necessary.
After selecting an event from the list, you can see the video footage linked with it. (As previously stated in this article, a channel can be bound to a door during the door creation process in WVMS Console.) Playback displays on the right-hand side in the style of instant playback, with all of the
features you’d expect from that mode.
In the Doors mode, select any door from the list to view its current state. You will also have the option to lock/unlock the door from here. The Cardholders mode, as you might expect, displays a list of all cardholders in the access control module database. If the person entering the cardholders’ list in the
access control program included their images, you will be able to see them in WVMS as well. As a result,
it is straightforward to determine whether the footage matches the card used to unlock doors.
Optimizing Operations for Efficiency
Still unsure if integration is the right choice? Let’s recap. Configuring access control software with WVMS takes only an additional fifteen minutes beyond the usual setup time. In return, your security team gains a unified, user-friendly interface, eliminating the need to switch between multiple software clients. This not only saves time but also reduces the risk of human error.
While the integration may not cover every possible feature, it brings the most essential functionalities to the WVMS interface. If you’re using an access control system not yet on our list, let us know
Sorry, the comment form is closed at this time.