+ All Categories
Home > Documents > Vindicator Overview

Vindicator Overview

Date post: 09-Jun-2015
Category:
Upload: dp3b58
View: 1,201 times
Download: 1 times
Share this document with a friend
Popular Tags:
29
Vindicator Security Solutions Capabilities Overview
Transcript
Page 1: Vindicator Overview

Vindicator Security SolutionsCapabilities Overview

Page 2: Vindicator Overview

Contents

• Honeywell Portfolio Overview• Vindicator Background• Mission Critical Security• Customer Examples• Solutions and Capabilities Overview• Summary

Page 3: Vindicator Overview

The History of Vindicator

• Nearly 30 years of history providing security solutions– Reputation for Results, Customer Focused Philosophy– 100% Success Rate– Employee Commitment

• World Class Products and Technology– Extremely Reliable Products (100,000 hours MTBF)

– Embedded, yet built on open standards

• Acquired in 2004 by the world’s largest Security player– Focused more than ever on Customer Excellence– Benefiting from $100M Annual Security R&D Investment– Delivering the worlds most advanced security solutions

Page 4: Vindicator Overview

How can we help your operation?

• What is your mission?– Let us help you determine how security policy affects

your operation– Let us help you use technology to protect your interests

• Our Goal: Provide the most cost-effective solution for maximizing your up-time while minimizing your time-to-response.– We want to help you save money or make money– We want to help you do more with your resources

The world looks to Vindicator for robust end to end – Mission Critical – integrated security solutions

Page 5: Vindicator Overview

Vindicator – Who are our Customers?

– NSA– Sandia National Labs– Federal Bureau of Prisons– US Army Chemical and

Weapons Depots– DuPont– UK MoD

– International & Nuclear Power Plants

– US Army Corps of Engineers

– US Petroleum Reserve– Dow Chemical– Saudi Aramco– US Gov’t / DoD

100’s of Customers with diverse and demanding requirements

Page 6: Vindicator Overview

Contents

• Honeywell Portfolio Overview• Vindicator Background• Mission Critical Security• Customer Examples• Solutions and Capabilities Overview• Summary

Page 7: Vindicator Overview

What do we do for our customers?

Solution &Concept Design

Program / ProjectManagement

DrawingPackages

System Testing& Commissioning

SystemInstallation

On & Off SiteTech SupportPreventative

Maintenance

MigrationSupportServices

Complete life-cycle support of a customer’s security needs

Page 8: Vindicator Overview

Solution Concept & Design

• Industry-leading security design expertise– Many years of systems design and integration

– Communications system design expertise

– Proper selection of products and technology

• Unmatched capabilities for customer-engineering– Custom interfaces

– 3rd party sensors and systems

– New features and capabilities

• Master Integrator capability to bring together the “best fit” solution and players

Ellis Island, NY

A successful program starts with a good design done early.

Page 9: Vindicator Overview

Vindicator – What is it?

Separate Intrusion Detection and Access Controllers allow maximum application segmentation without “stove-pipes”

V5 ACS V5 IDS

6842

6842

V5 ACS

MR14, MR24, MR50 or PW5k1R2

MR14, MR24, MR50 or PW5k1R2

Admin/Enrollment Event Archive Alarm Monitoring

Cli

ent

UI

and

D

isp

lay

Em

bed

de

dS

erve

rs

Fie

ldN

etw

ork

Video Assessment

Page 10: Vindicator Overview

Intrusion Capabilities we Offer…

• …Interior detection and alarming

• …Exterior detection and alarming

• …Perimeter Intrusion Detection

• …Beyond the Perimeter Detection

• …Centralized alarm reporting

• …Remote alarm reporting & routing

• …Redundant alarm reporting

LAN/

WAN

Vindicator intrusion solutions can meet virtually any IDS need in many, many applications

Page 11: Vindicator Overview

The V5 Intrusion Detection System

• Most powerful enterprise IDS systems available– Over 10,000 Alarm Points– Over 8,000 Inputs– Over 4,000 Outputs

• Has passed “5 in 2” test– Display for ‘ack’ 5 coincident alarms in 2 seconds

• System expansion over many comms media…– Fiber, Ethernet, RS-485, RF, RS-232, etc.– Encrypted up to TDEA

• Extensive testing performed– PL1-4 Nuc and non-Nuc, DCID 6/9, UL1076/294/864

Advanced IDS System meets needs of the world’s most demanding applications

Page 12: Vindicator Overview

PC Smart Pak

• Extremely powerful administration and operator console– Console-based configuration tool– Administer points, rules, network

settings, badge-holders, permissions, etc.

– All V5 and VCN administration can be done from any terminal on the network

Powerful system administration console gives administrators control over the network from any node

PC Smart Pak runs on the V5

locally and is displayed via the

PC. No capability is lost if the

PC or PC-connection fails. This

ensures maximum security and

reliability of the security

solution.

Page 13: Vindicator Overview

VCC – Vindicator Command & Control

• The World’s easiest to use and most powerful Alarm Monitor– Can be learned in minutes with

minimal training– Supports 10’s of 1000’s of points– Sophisticated routing to many

consoles– Redundant monitoring capability– Used by the governments and

militaries to monitor some of the world’s most critical assets

Simple, intuitive Windows-based GUI ensures ease of operation without sacrificing power or capabilities

The VCC GUI receives data

from sends operator

instructions to the V5 IDS

Server, but all logical processing

is done on the V5, ensuring

maximum reliability.

Page 14: Vindicator Overview

Access Capabilities we Offer…

• …Simple and Complex door control

• …Complex Timing Routines (one-time & scheduled holidays)

• …Local and Global Anti-Passback

• …Smart Cards & Biometrics

• …Photo Badging and Access Assignment

• …Tight Integration with Intrusion & Video

• …Autonomous sites Connected to the EnterpriseVindicator access control solutions can scale from

small, single sites to WAN connected Enterprise needs

Page 15: Vindicator Overview

The V5 Access Control System

Advanced ACS System meets a wide array of application needs

• Best in class, ‘next generation’ system– Capabilities today that many ACS systems won’t have in 2 years

• Peer-to-peer communication between servers• Database clustering among servers• Expandable storage capacity• Auto-replication of DB changes

• Intimate integration with V5 IDS– Complete system configuration and admin from any Server– Access events map onto IDS alarms (forced door, invalid PIN, etc.)– I/O points can be shared between IDS and ACS systems

• Easy expansion with modular local and downstream I/O– Fiber, Ethernet, RS-485, RF, RS-232, etc.– All I/O are addressed on the UHS-Net network– Encrypted up to TDEA

• Extensive testing performed– PL1-4 Nuc and non-Nuc, DCID 6/9, UL1076/294/864

Page 16: Vindicator Overview

Vindicator Badge Manager

• Create identities and input Badgeholder information

• Capture photos of badgeholders

• Print badges for issuance into access control system

• Synchronize database information with V5 devices in the field

• All-in-one solution OR• Multi-client solution with

shared credential database

Page 17: Vindicator Overview

The Vindicator Communications Network• Originally Developed for

the Military (11 yr MTBF)

• Creates a private security network

• Addressable nodes for sensor I/O & point processing

• Extensible & changeable with site dynamics

• Encryption via UHS or TDEA

• Many media types supported: RS-485, Fiber, Ethernet, RF

Spec-killer security solution creates foundation for success in complex integrated applications.

Page 18: Vindicator Overview

Vindicator – Key Functions & Benefits

• Autonomous, Local Control– ACS Servers share DB’s and

auto-replicate changes– IDS Servers have local rules

processing on over 20k inputs and 10k alarm points.

– IDS Servers can control of CCTV and other equipment

• Scalable, Easily Expandable Security Network

– IP or RS-485 between Servers– IP, RS-485, Fiber, RF to

downstream I/O– Drop IDS I/O off any server– Encrypted comms if required

• No reliance on central IT server

– Higher reliability– No concerns re: WAN

outages– New Local CCTV

control at remote site.

• Future-proof design– As needs and layouts

change.– As I/O evolves and is

replaced.

Extremely powerful platform with unique features creates difficult specs for competitors to meet.

Page 19: Vindicator Overview

What about legacy devices?

• Re-Use old PIRs, Relays, Microwaves, etc.

• Transponder devices can be programmed and re-programmed

– State definitions for each input can be modified

– Logical combinations of inputs can be modified

• Replace aging sensors without changing network setup.

• Inputs and Outputs totally programmable:

– Inputs:• 0-5 V DC Multi-state Inputs

(255 levels)• 255 count input timing delay

– Outputs:• 115VAC or 24VDC relays

V5 IDS

UHS-Net

Transponder

Strength of Vindicator I/O is its ability to take over legacy sensors and field equipment.

Page 20: Vindicator Overview

VCN: Scalable from Simple to Enterprise

From inexpensive, single-box to enterprise-wide global systems over wire, fiber, Ethernet, RF or serial media

LAN/WAN

Page 21: Vindicator Overview

Advanced Security Capabilities

• Ground-Based Radar– STS integrated to V5

• Fence and Buried Cable– Fiber– Coax

• Long Range Thermal– LOFTI– FLIR

• Video Analytics

• Analog Video– Switchers, matrix– Cameras, keyboards

• Digital Video– DVM software– IP cameras– Streamers

• Mixed Systems– Real-Time switching & control– Digital Storage & retrieval

Detection Assessment

Vindicator can match the right solution to your needs

Page 22: Vindicator Overview

Program Management

• Professional Staff of Program & Project Managers– Experience with Subs, Suppliers, Design-Build, Civil

Construction, etc.

• Logistic Support

• Engineering– Surveys– Designs– Drawings– Installation Plans

Effective Program Management will reduce the chance of false starts and impact to your daily operation

Page 23: Vindicator Overview

Installation Management

• All Vindicator installation teams are certified by Vindicator trainers– Authorized Systems Integrators and Sub-

Contractors– Separate classes for IDS and ACS

• Long history with many in industry ensure strong, positive relationships– History of successful work for Vindicator– Single Shared Goal: End-User Satisfaction

Certified integrators are required for solution deployment

Page 24: Vindicator Overview

System Commissioning & Testing

• Commissioning Management– Vindicator Technical personnel on-site will

ensure an optimal configuration of your solution

• Acceptance Testing– Vindicator will manage the acceptance testing of

your system to meet your original requirements

• Compliance Testing– Periodic performance testing will ensure that

your system meets original specs long after deployment.

Performance management will ensure consistency of your system over time and personnel

Page 25: Vindicator Overview

Drawing Capabilities

• Create ‘as-builts’ of your site and solution

• Update your site plans with the details of the solution just installed

Vindicator can create or update your drawings for an accurate accounting of your system and its configuration

Page 26: Vindicator Overview

Off-Site Technical Support

• Standard Technical Support– Provided for every system installed– 8:00 AM – 5:00 PM EDT; Mon – Friday– Via phone or email to factory personnel– After-hours calls returned next business day

• Advanced Technical Support– Provided on a fee basis – 24x7; 365 Days / Year– Via phone or email to factory personnel

Expert Tech Support resources are available to help you

Page 27: Vindicator Overview

On-Site Technical Support & Maintenance• System Assessment

– 2-day on-site assessment by Vindicator technical staff – Written report provided within two weeks

• Advanced Technical Support– 24x7; Mon – Sunday– Via phone or email to factory personnel– Provided on a annual fee basis

• Configuration Management– Take System Assessment output and target areas of improvement for better

performance and easier management.– Written report with recommendations for system / config enhancements– Provided on a daily engineering fee basis

• Preventative Maintenance– Certified Technical to check status and configuration against original

specifications– Improvements and recommendations made as necessary– Provided on a daily engineering fee basis

Vindicator and Certified technicians can tune your system for best performance over time

Page 28: Vindicator Overview

Migration Expertise

• Backward compatibility of Vindicator hardware

• But, many legacy components don’t have clearly migration plan– Tying into new IT systems – Meeting new specs with old equipment– Analog components in an increasingly

digital world

No solution lives forever – Vindicator can help you plan for the migration forward and reduce your risk

Page 29: Vindicator Overview

Summary: Vindicator Security Solutions

• The world’s most powerful security solution

• A world-class team from concept to ‘as-built’ and after install

• Customer-focused and Customer-driven

Customers driver our business forward – matching our industry-leading capabilities to the needs of each one


Recommended