Access Easy from Bosch

July 2011 Access Control & Identity Management, Products & Solutions

All-in-one solution to manage access in any location with a built-in Web-server.

Bosch Security Systems has launched the next generation of its Access Easy Control System. It is an easy-to-use, Web-based access control solution that uses a built-in Web server for access management. The system enables a range of sophisticated security features to be integrated into a system even by users with relatively little IT knowledge.

The Access Easy Control System is an all-in-one box that can be accessed via a standard IP network or the Internet. There is no additional software needed.

With an intuitive graphical user interface, the controller is easy to set up and operate. Bosch video devices can also be seamlessly integrated into the system to provide a wide range of features, such as verification of alarm-related images and guided playback of archives, without losing the system’s inherent ease of use.

Additional security features can be customised by the operator such as display of photo ID and notification or alerts via e-mail/SMS. More advanced I/O programming is available for additional security functions, such as integration of third-party intrusion systems for arming/disarming the system via a standard access credential.

The Access Easy Control System can be used to manage door access, control elevators, monitor intrusion-alarms and keep time logs. It can support up to 16 readers, monitor up to 32 input points and control up to 32 output points per controller.

Pro version

The Access Professional Edition is a scalable entry-level access-control solution for small and medium-sized companies that are capable of growing with their needs. The system covers not only simple access requirements, but also comprehensive video verification features.

Access Professional Edition offers a broad range of access and security functions including integration to video surveillance, intrusion, and elevator control systems. Among the new features available, users are better able to secure their perimeter with the assistance of up to five cameras around a door to ensure that the right person is entering the secured area. Archived recordings originally triggered by alarm events (eg, forced entry, exceeded opening time or use of false credentials) can be provided by the system to clarify past occurrences. The software also supports authorisation management for standalone offline readers.

Beyond the new supported hardware and integration, operator functions were also enhanced allowing additional customisation and flexibility for the end user. The system supports up to 16 simultaneous users with different profiles to assure data is available at all times to all users. The system’s increased flexibility offers an individual to hold credentials in different formats and technologies, eg, a key-fob, a card or a long–range UHF token (ultra high frequency). This allows new and legacy equipment to coexist, and hence allows a gradual, budget-friendly migration from one reader technology to another.

For more information contact Bosch Security Systems - South Africa & Sub-Sahara Africa, +27 (0)11 651 9818, [email protected], www.boschsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management Transport (Industry) Videos
Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Towards a global digital passport?
Access Control & Identity Management
In a world where borders are more connected and closely monitored, the idea of a universal digital passport could revolutionise how we travel, work, and even perceive citizenship.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
A platform for access and identity at Securex 2025
Securex South Africa Access Control & Identity Management Facilities & Building Management
South African companies involved in supplying access control technology, security services, and data management are well-positioned to tap into the expanding access control market at Securex 2025.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...