Enterprise Security Management


Enterprise Security Management Banner

Enterprise Security Management



1. What server hosting options are available for the Security Management System (SMS)?
 
The SMS server can be hosted by an on-premise server for maximum security and local control. This option is suited to organisations with in-house IT support and isolated security LAN. On-premise hosting can be via a physical server or a VM to fully optimise on corporate shared IT resources. Increasingly corporates are outsourcing such hosting services to data centres. In such cases, the option to host the SMS in a cloud server is ideal.

2. How can a Security Management System (SMS) survive a server failure?

There are many parts of any server hardware that can fail. For example, the CPU can overheat, or the hard disk drives can crash, etc. In order for the SMS to survive a server failure due such hardware fault, the Server Failover module is required. The Server Failover is a software module that performs periodic functions such as database replication, heart-beat monitoring and automatic switchover from a primary server to the secondary server, just to name a few. Upon failure of the primary server, the secondary server is immediately activated and takes over control of all the key services. The secondary assumes the role of the primary and re-establishes all connections with the access controllers and operator workstations so that the entire system continues to operate as normal.
 
3. How can a Security Management System (SMS) handle multiple locations?
 
A corporate with multiple functions or branches with a centrally hosted server can delegate operational responsibility to each function/branch with the Security Area (SA) module.  Each area (function/branch) may be defined to operate as a virtual autonomous security centre with its administrator in complete control of the defined area. Key applications include corporates with a HQ and multiple branches/subsidiaries, as well as corporates with distributed functions (manufacturing, warehouse, workshop, retail, etc.).
 
4. How can the Security Management System (SMS) integrate with SAP or other HR systems?
 
The HR Database Integrator (HRDI) module facilitates the synchronization of employee data in most human resource management system (HRMS) with the IBSS.web, so that any change in employee data made in the HRMS is seamlessly registered to the IBSS.web database. When any employee data is received from the HRMS, the HRDI automatically assigns predefined access rights to new employees according to its HR policy and/or removes the access rights of employees who have resigned. The HRDI will bring about significant productivity improvements with automation in managing employee movements and payroll administration. Operational efficiency is enhanced with significant improvements in productivity.

5. How to ensure login access is automatically disabled when a user resigns?
 
The Security Management System (SMS) supports Active Directory (AD) for Single Sign-on (SSO). When a staff logs on to his workstation, the system checks his online active directory and uses his credential to map the corresponding access rights in the SMS. When the rights of the staff in the active directory is removed upon resignation, all corresponding assigned rights including access to the SMS software is removed automatically.

 
Enterprise Security Management Image




 

System Architecture
Enterprise Security Management System Architecture




 

Target Industries & Applications
 
   
Commercial & Residential   Data Centre   Educational Institution
 
   
Financial   Government   Health Care
 
 
 
Hospitality   Industrial   Non-profit Organization
 
   
Petrochemical, Oil & Gas   Transportation & Logistics   Venue Centre
 
Products
 
IBSS.web Web-Based Enterprise Security Management Software     IBSS.web Web-Based Enterprise Security Management Software
It is a browser based security management system software that provides scalability from access control only applications to a comprehensive suite of fully integrated security solutions.
MORE ►
       
       
HR Database Integrator (HRDI)     HR Database Integrator (HRDI)
HRDI is a module to facilitates the synchronization of employee data in most human resource management system (HRMS) with the IBSS.web, so that any change in employee data made in the HRMS will be seamlessly registered to the IBSS.web database.
MORE ►
       
       
Secret Key Management System (SKeyMa)     Secret Key Management System (SKeyMa)
It is an integrated approach for managing secret key, personalise Secure Access Module (SAM), readers and also contactless card.
MORE ►
       
       
Server Failover Service (SFO)     Server Failover Service (SFO)
The Server Failover (SFO) module performs server redundancy and continuously performs data synchronization between 2 servers while monitoring the operational status of both. The IBSS.web software is built with an automatic failover architecture.
MORE ►
       
       
Time Clock Report (TCR)     Time Clock Report (TCR)
The TCR module is designed to log and report selected transactions of an access control system as a time clocking records. 
MORE ►
       
       
Visitor Management System (VMS)     Visitor Management System (VMS)
It is a complete solution for managing visitors within a premise. Visitor information can be easily captured and stored by the computerized system.
MORE ►

    
 

Have a Question?