Card Access Systems
We install Card Access systems that are both HID and non-HID compliant.



WeGuardYou
1234 Astoria Road,
New York, NY 11553
Telephone: +1 732 792 7931 FAX: +1 732 334 9156
E-mail: info@weguardyou.com

Enterprise Security Platform Features











 Data Storage
All the operation data of the system is stored at the Primary Host in a proprietary database. Any workstation is capable of accessing and editing this information, according to the operator’s authorization level. The Secondary Host maintains a copy of all the information in a SQL based database and can be used for generating reports.

The Primary Host provides non-volatile storage of the operating system software, the application systems software, user databases, and alarm, event and transaction files. Various backup procedures are also provided.

 Passwords and Privilege Levels
Each operator on the system is assigned a Login password and a privilege level. A privilege level is made up of any group of specific programming activities of specific options shown on any menu or screen, down to the lowest function levels.

The privilege level defines precisely what an operator may and may not do in the system.

System passwords are encrypted and not displayed on the screen or in the database in a readable manner. The system provides the following password security features:

  • Password expire after a configurable time period
  • Prior to password expiration a warning message is displayed
  • Expired password will not allow access to the system
  • Users may modify their password at any time
  • System Administrators require two password levels to the system
  • The system forces new users to modify their password
  • Three consecutive incorrect Login attempts will lock a user out
  • Password minimum and maximum sizes are configurable
  • Four iterations must take place before a password may be reused
 Graphical User Interface and Graphics Package
WGY-ESP is user-friendly and provides a Graphical User Interface that allows intuitive operation with minimal keystrokes.

The GUI is implemented in Microsoft Windows and provides a flexible, easy-to-use environment for operators by providing graphical objects like menus, color icons, and other symbols that allow the user to “see” the function they want to perform. The GUI provides all necessary functions to configure and control the system.

The graphics package provides a library of dynamic icons that represent events such as fire, smoke, door open, broken window, temperature, cameras, intercom sub-stations, etc.

WGY-ESP provides a dynamic alarm/facility graphics package. The package supports multiple linked hierarchical floor plans, which can be created either via graphical editor or imported from third party drawing applications such as AutoCAD. The alarm/facility graphics run on any workstation. A floor plan is automatically displayed on the screen with each alarm occurrence whose database requires a graphics-based display.

The activation of maps and animation of objects, text and icons on graphic maps is determined and configured by the operator. The display of maps and the animation of objects and icons can be linked to events in the system via the event response programmer. Animation consists of opening or closing maps, changing text, border and/or content colors, blinking text, border and/or content, or any combination thereof.

Icons, such as the optional camera and intercom, are linked to mouse actions such that a left mouse click on a camera icon can be configured to:
  • Open a Live Video Window
  • Switch a specific camera to the Live Video Window
  • Place a specific camera in a preset position
  • Open the switcher control panel
 Scalability
WGY-ESP provides modular expansion capabilities, which allows that additional Remote Processors may be added to the system without the need for software upgrades.

The system provides for both time programmable and real time arming and disarming of alarm points, opening and closing of doors, gates and turnstiles, as well as the activation and deactivation of digital relay outputs. The system also provides opening and closing of network ports.

 Trace Function
WGY-ESP supplies a utility to trace the access transactions of selected users/visitors/vehicles as well as all access transactions at selected reader controlled doors/gates.

These traced transactions appear in a separate trace window on the screen.

The system can route certain trace transactions to specific workstations.

 Data Storage
All the operation data of the system is stored at the Primary Host in a proprietary database. Any workstation is capable of accessing and editing this information, according to the operator’s authorization level. The Secondary Host maintains a copy of all the information in a SQL based database and can be used for generating reports.

The Primary Host provides non-volatile storage of the operating system software, the application systems software, user databases, and alarm, event and transaction files. Various backup procedures are also provided.

 Temporary Access Groups
All the operation data of the system is stored at the Primary Host in a proprietary database. Any workstation is capable of accessing and editing this information, according to the operator’s authorization level. The Secondary Host maintains a copy of all the information in a SQL based database and can be used for generating reports.

The Primary Host provides non-volatile storage of the operating system software, the application systems software, user databases, and alarm, event and transaction files. Various backup procedures are also provided.

 Help
The system features context-sensitive Help as well as a glossary, an index, table of contents, and a Getting Started section on how to use the Help, the mouse and the icons driven GUI. Each individual sub-menu and data entry screen provides context sensitive help to provide the operator with a detailed explanation on the menu screen being viewed.

 Capabilities
  • The System has the capability to control the access to the enterprise workstation.
  • The System has the ability to control the network services each user can use in the TCP/IP. (http, https, ftp, …).
  • The System can support different languages.
US  |  Brazil© 2010 WeGuardYou. All rights reserved