Interface V100

Controller V1000

Doors & Reader

Access Soft Reimagine security platform

Access Soft exerts a computerized control that is well organized to access the resources building, small area or room in building. It provides an easy and operator friendly medium to configure hardware (Controller). Its core functionality is to send the commands, instructions, requests and data to controller and receive the response/logs from controller and notify the same to operator.

Watch demo

ACCESS SOFT OVERVIEW

Access Soft acts as an interface between user and the hardware devices such as access controllers and readers. It allows users to configure their company access system by providing individual access to employees for each door by specifying the time interval for those accesses. Being a very user friendly application ACSsoft helps users to configure the access door devices easily according to their requirements. Using this application customer can keep a complete track of all the employees who are entering or leaving their office premises.

Tap Phone

System Module

System module allows users to view user details of all Access soft users, edit application settings, connect to a database, save backup and also restore the backup files when required.

Security

    HARDWARE

  • HID-VertX

  • V-1000/2000 Controller

  • V-100 Reader Interface

  • V-200 Input Interface

  • V-300 Output Interface

    DOORS

  • 2-Doors or 4 Readers

  • 4 Doors or 8 Readers

  • 16 Door or 32 Readers

  • Multiple of 32 Readers supports up to 1000 Readers

    READER

  • RFID Card (HID)

  • Mobile ID (HID)

  • Finger-Print

  • Palm Scanner

  • Face Recognition

  • IRIS Scanner

Tap Phone

AccesSoft Report

AccessSoft report consists of list of employees,card enrolment details, reader hardware details, roll call as well as head count details.

Security
  • Operator friendly environment to discover controller connected over TCP network or add manually, and discover interfaces connected to controller via RS-485 or add manually and then configure reader/door interfaces, readers and IO device interfaces

  • Access group and Credential management, real-time event and alarm monitoring, reporting, GUI representation, and option for E-mail notification

  • Configure door information, authentication type, entry or exit, protocol, door alarms and other optional configurations

  • IDENTITY INFORMATION
    Door Description, Entry/Exit type Door Location Reader Position

  • PIN OPTIONS
    PIN Length, Attempts, Time Limit, Lockout Time and Suppress Pin

  • MULTIMAN RULE
    Card Count, Entry Type (Soft or Hard), Sequence, Sequence Timeout and Roles(Max 8)

  • DOOR MANGEMENT
    Access Grant Time Extended Access Grant Time Anti-Pass-Back Settings CICO Single door control CIFO Two doors control Door Force Alarm Door Held Open Alarm

  • ANTIPASS BACK ACTION
    Log the Violation (Soft) Do not allow to access (deny Access) Allow Entry & Deny Exit

  • DOOR ALARM ACTION
    None: No Alarm Soft: No Output Only Log Timed: Generate Out for certain time duration Acknowledge: Generate Output till user resets

  • ACCESS TYPE
    Card Only Card OR PIN Card AND PIN PIN Only Permutation and Combination Of Biometric

  • I/O DEVICE INTEGRATION
    Configure IO interfaces (V-200 & V-300) Integrate with IO devices Hooters, Light Indicators Elevator Integration Fire Alarm Integration Other Output-Device (V300) AC Fail Monitor Battery Fail Monitor Enclosure Tamper Other IN-PUT Device (V200)

  • CARD FORMATS
    Set Escort ID Set Card Expiry Date Activate/De-Activate Card Various Card Formats HID Custom Format

Access Soft Version And Features Matrix

Features
Basic
Classic
Professional
Controller V-1000/V2000
No Image
No Image
No Image
Reader Interface V100
2
4
16
Input Interface V-200
No Image
No Image
No Image
Output Interface V-300
No Image
No Image
No Image
Basic IO
No Image
No Image
No Image
MS SQL DB
No Image
No Image
No Image
Windows 8 and 10
No Image
No Image
No Image
Door Status Monitor
No Image
No Image
No Image
AC/Battery Power status
No Image
No Image
No Image
Multi-Factor Authentication
No Image
No Image
No Image
Anti-Pass back
No Image
No Image
No Image
Multi-Man Access
No Image
No Image
No Image
Elevator Integration
No Image
No Image
No Image
Fire Alarm Panel Integration
No Image
No Image
No Image
Custion I/O Rules
No Image
No Image
No Image
Scalable
No Image
No Image
No Image
Report
No Image
No Image
No Image
Integration
No Image
No Image
Feasible
Customization
No Image
No Image
Feasible