Enterprise Security Management

Enterprise Security Management

Key Features of Enterprise Security Management:

  • IP Video Surveillance
  • Building Automation
  • Elevator Control
  • Carpark Management
  • Visitor Management
Business Security Management Systems

What Server Hosting Options Are Available for the Enterprise Security Management System?

The SMS server can be hosted on-site for maximum security and local control. This option is ideal for organizations with in-house IT support and a separate security network. On-site hosting can be done using a physical server or a virtual machine (VM) to make the best use of shared IT resources. Moreover, more and more companies are outsourcing these hosting services to data centers. In these cases, hosting the SMS in a cloud server is a great option.

How Can a Security Management System (SMS) Survive a Server Failure?

Server hardware can fail in many ways, like CPU overheating or hard disk crashes. Therefore, to ensure the SMS survives a server failure, the Server Failover module is needed. This software module performs tasks like database copying, heartbeat monitoring, and automatic switching from a primary server to a backup server. If the primary server fails, the backup server is activated right away, taking over all key services. Consequently, it reconnects with access controllers and operator workstations, ensuring the system continues to work normally.

Server Failover for Security System

How Can a Security Management System (SMS) Handle Multiple Locations?

For companies with multiple branches or functions, a centrally hosted server can delegate operational responsibility to each branch using the Security Area (SA) module. Each area can operate as a virtual independent security center with its administrator in full control. This setup is ideal for companies with a headquarters and multiple branches/subsidiaries, as well as those with distributed functions like manufacturing, warehousing, workshops, and retail. Additionally, this modular approach ensures that each branch can manage its security needs independently while still being part of a unified system.

Multiple Location Security Area

How Can the Security Management System (SMS) Integrate with SAP or Other HR Systems?

The HR Database Integrator (HRDI) module syncs employee data from most human resource management systems (HRMS) with the IBSS.web. Any changes in employee data made in the HRMS are seamlessly registered in the IBSS.web database. Furthermore, the HRDI automatically assigns predefined access rights to new employees according to HR policy and removes access rights for resigned employees. As a result, this automation significantly improves productivity in managing employee movements and payroll administration, enhancing operational efficiency.

HR System Integration

How to Ensure Login Access Is Automatically Disabled When a User Resigns?

The Security Management System (SMS) supports Active Directory (AD) for Single Sign-On (SSO). When a staff member logs on to their workstation, the system checks their online active directory and uses their credentials to map corresponding access rights in the SMS. When the staff’s rights in the active directory are removed upon resignation, all corresponding access rights, including access to the SMS software, are automatically removed. Consequently, this ensures that security is maintained without manual intervention.

Login Access

System Architecture

Enterprise security management system architecture
Have a Question?
For assistance... For assistance... 65 6844 2141
General/Sales Enquiry Technical Enquiry