fbpx
24 May 2024

VISO SMS – an advanced tool for monitoring and visualizing security systems

VISO SMS – an advanced tool for monitoring and visualizing security systems

Effective security of facility often requires the simultaneous cooperation of many security systems. It is important to ensure that this process is carried out efficiently and comfortably. Instead of using many tools at once, it is much more convenient to use one. To meet these expectations, Roger has introduced VISO SMS software to its offer, which enables the monitoring and visualization of security systems from a single platform. This makes facility management simpler and more efficient.

About the VISO SMS solution

The VISO SMS (Security Management System) is a solution that integrates building systems within a single software platform. Its primary task is to centrally monitor subordinate systems. In addition, this solution enables operators to obtain a clear view of the situation in the monitored area, allowing for efficient and quick decision-making and reacting to events such as fire, burglary, failure, etc.

VISO SMS features

Automated detection of alarm situations within a single platform Supporting the operator in taking the right action in the alarm situation according to the established security policy, including verification of false alarms Supporting the implementation and supervision of maintenance and service work Recording of operator actions including system configuration and operation viso sms artykul EN viso-sms

Systems integrated with the VISO SMS

VISO SMS can function as a master platform integrating various security systems, or as a module of the RACS 5 access control system. The solution supports the work of people responsible for facility security, enabling them to monitor, visualize and manage the following systems:

Intruder Alarm Systems

SATEL (INTEGRA) Honeywell (Galaxy Dimension) Perimeter Protection System CIAS (IB-SYSTEM IP)

Access Control System

Roger (RACS 5)

Fire Alarm Systems

Bosch (FPA, AVENAR) Siemens (Cerberus PRO) Schrack Seconet (Integral EvoxX) POLON-ALFA (POLON 4000 and POLON 6000) ESSER by Honeywell (FlexES Control, IQ8 Control C/M)

CCTV

DVRs/NVRs and cameras: Hikvision, Dahua, Hanwha Vision, BCS LINE, BCS POINT, Provision-ISR, IPOX, EVOS and Tiandy VMS systems: Milestone XProtect, VMS Bosch, Avigilon Control Center Cameras: PTZ Hikvision, Dahua, BCS LINE, BCS POINT, Provision-ISR and IPOX Cameras in ONVIF and RTSP standards

Locating alarms on maps

One of the most important aspects of building safety management is not only the ability to immediately receive notifications about alarms and failures but also to visualise them appropriately on maps for easy problem location and then their verification and solving. VISO SMS includes a notification monitor that registers and presents various alarms on an ongoing basis. It also has a map module that allows to locate given alarm and verify it remotely using a CCTV system. Both tools are highly configurable in terms of operation and appearance.

Security scenarios

An important aspect of the work of a security system supervisor is the correct detection of alarms and the efficient implementation of actions planned in response to these situations. For this purpose, procedures are being developed for system operators to follow in order to effectively respond to emergency situations at the facility. The VISO SMS module allows you to develop in advance and then display the procedure for the operator when a given alarm or failure occurs. Such a procedure, called a security scenario, not only contains a list of actions to be performed but also allows the operator to interactively trigger actions such as calling a supervisor, sending a mobile text (SMS) or an e-mail, generating an attendance report, etc.

Maintenance of security systems

VISO SMS also offers additional functionalities in the field of registration and organization of service and maintenance works, including the ability to add notes to such elements on the map as, e.g. detectors, doors, or cameras, and also registers test alarms from fire detectors.

Facilities using the VISO SMS

The VISO SMS security management system is used in various market sectors. The solution was implemented, among others, at the Wrocław University of Economics, the Kupiec production plant, the Gdańsk Science and Technology Park or the Lixa C office building. VISO SMS – monitoring and visualizing security systems
13 Nov 2022
Cyber Security logo

Cyber Security

Cyber Security

Data of public and private enterprises and individuals should be protected against risks on virtual environment. Secure access to these data should be provided a with a sustainable structure. STC provides extensive solutions
in a wide range in the area of cyber security, such as access control, identity control, attack detection, threat analysis, log management and correlation, detection of security threats and cyber intelligence.

Cyber Security Solutions

firewall
NETWORK AND INFRASTRUCTURE SECURITY
smartphone
APPLICATION SECURITY
server
DATA SECURITY
web-security
WEB SECURITY
route
END POINT SECURITY
message
SECURE MESSAGING and COMMUNICATION
verified
IDENTITY AND ACCESS MANAGEMENT
security
MOBILE SECURITY
cloud-computing
CLOUD SECURITY
 Cyber Security risk
INFORMATION SECURITY and RISK MANAGEMENT
data-processing
FRAUD AND PROCESS SECURITY
internet-of-things
IoT IoT means that the objects are connected to the Internet or a network and thanks to this connection, they stop being a simple object and share information about their own state, receive commands and direct their behavior and thus become smarter; thus, it aims to provide a world where devices become more autonomous.
blockchain Cyber Security
BLOCKCHAIN
hacker
CYBER ATTACK INTELLIGENCE SYSTEM

Services

  • THE FLEXIBILITY OF OPEN SOURCE AND THE POWER OF COMMERCIAL SOFTWARE
  • CYBER-SECURITY SERVICES
  • CYBER-SECURITY OPERATION CENTER (CSOC)
  • CYBER INTELLIGENCE SERVICE
  • MAINTENANCE AND SUPPORT SYSTEM
  • RED TEAM SERVICE AND CONSULTING PACKAGE
  • PenTest
  • TEST SERVICES
    • Vulnerability scanning services
    • Penetration testing services
    • External network penetration test
    • Internal network penetration test
    • Wireless network test
    • Website security audit
    • DDOS Test
    • Application Load and Stress Test
    • Inspection of Specially Written Applications
    • Social Engineering
    • GDPR Compliance
    • Awareness Trainings

CONSULTANCY

  • CYBER-SECURITY FRAMEWORK CONSULTANCY
  • SECURITY INSPECTIONS AND LEAKAGE TESTS
  • SECURE CODE DEVELOPMENT CONSULTANCY
  • INFORMATION SECURITY MANAGEMENT SYSTEM CONSULTANCY
  • SAFE PROCESS MANAGEMENT CONSULTANCY
  • COMPLIANCE CONSULTANCY WITH THE LAW ON PROTECTION OF PERSONAL DATA
  • EKS / SCADA SECURITY CONSULTANCY

Training

  • ARTIFICIAL INTELLIGENCE USAGE IN CYBER SECURITY
  • IDENTITY MANAGEMENT and ACCESS CONTROL SYSTEMS TRAINING
  • EDGE SECURITY TRAINING
  • CYBER-SECURITY PROGRAM
  • FORENSIC ANALYSIS
  • PENETRATION TEST
  • CYBER THREAT INTELLIGENCE ANALYSIS
  • IT AWARENESS TRAINING
  • LINUX OPERATING SYSTEMS SECURITY TRAININGS
  • BASIC CYBER DEFENSE TRAINING
  • WEB APPLICATION SECURITY TRAINING
  • SECURE SOFTWARE DEVELOPMENT
19 Oct 2021
logo_remourban

the smart URBAN transformation

Star Technology represent the smart URBAN transformation

About

A sustainable urban regeneration model leveraging the convergence of energy, mobility and ICT to transform European cities into Smart Cities
REMOURBAN main concept REMOURBAN

the smart URBAN transformation

Energy, transport and information and communication technologies (ICT) are key to achieve economical and societal benefits and improve citizens’ quality of life. They also represent most of the interrelations between people and technology. A big challenge to offer new interdisciplinary opportunities to make cities smarter is already open in the common area where energy production, distribution and use, mobility and transport, ICT work together and are intimately linked. REMOURBAN will implement large scale interventions and intense dissemination initiatives to demonstrate the potential of the urban regeneration model in the energy, mobility and ICT sectors. rbanRegenerationModel The project is fully aligned with the Smart Cities European strategy and involves three lighthouse cities and two follower cities.

LIGHTHOUSE CITIES

The first phase will consist in a large scale demonstration of the potential that offers the proposed model for urban regeneration to deploy integral actions in the areas where energy, mobility and ICT sectors are intimately linked.
In particular, the retrofitting of an existing district for reducing energy demand to very low values, improving the generation facilities and the supply of energy for a better use of the local resources (use of renewable) and higher efficiency (use of district scale system), in order to achieve low energy districts (renewable district heating and cooling, PV,CHP,… ), substitute a high number of conventional vehicles by clean vehicles, improving in parallel the associated infrastructures and the management (for instance electrical vehicles and charging infrastructure) and finally improving through ICT solutions the management of some of the city infrastructures, as the smart grids or the traffic management systems. A financial and feasibility plan has been developed in order to guarantee the investment and the return of them. The cities that are committing an intervention are Valladolid, Nottingham and Tepebasi/Eskisehir. These lighthouse cities also commit the deployment of a powerful monitoring system, in order to gather the necessary variables for the evaluation procedure that will be designed in a previous stage. Further that the technical actions, these interventions will include a relevant citizen engagement activity for maximizing the impact and achieve a wider validation. The large scale demonstrations are a part of very ambitious urban plans.
11 Oct 2021
Multimodal Biometrics

اجهزة حضور وانصراف

اجهزة حضور وانصراف

اجهزة بصمة وجه

 

مع هذة الاجهزه اصبحت عملية اداراة وتنظيم اوقات العمل سهلة للغاية بل يمكن ايضا حساب الاجور والمرتبات عن طريقها بكل دقة 

و تعد اجهزة البصمة من اهم ادوات المدير الناجح و اصحاب المشاريع للتحكم الكامل فى عملية الحضور و الانصراف الخاصة بالموظفين وتتوافر فى اجهزة الحضور و الانصراف امكانية عمل كلمة سر لمسؤل جهاز الحضور و الانصراف حتى لا يتم الدخول الى الجهاز من خلال اى شخص غير مفوض و التعديل فى عمليات الحضور و الانصراف للموظفين و امكانية اضافة اكثر من بصمة للموظف الواحد فى اى حال او اى ظرف طارق مثل اصابة الموظف وامكانية اضافة اكثر من 10000  موظف على نفس الجهاز حتى تناسب الشركات والهيئات الكبرى وايضا مساحة شاسعة لتسجيل عدد هائل من العمليات وتتميز بوجود شاشة الوان لاظهار بيانات الموظفين ومواعيد الدخول والخروج وحتى انها ايضا تنطق باللغة العربية والانجليزية لتوضيح عملية الدخول والخروج ويمكن من خلالها اضافة مواعيد استثنائية لعدد معين من الموظفين  وتحديد ايضا اوقات الماموريات وتنظيم الشيفتات وتحديد الاجر الاضافى  ولا داعى للقلق فهى تعمل اثناء انقطاع التيار الكهربائى لانها تحتوى على انظمة بطاريات مما يسمح لها بالعمل لمدة 6 ساعات فى حالة انقطاع التيار الكهربائى ويمكن من خلالها ربط اكثر من فرع فى نفس الوقت ويمكن ربطها بالشبكة الدخلية واستخراج التقارير وعمليات الدخول والخروج من خلال مخرج الشبكة او مخرج  usb , وتتميز بانها يمكنها اصدار اكثر من 10 انواع من التقارير وللمثال وليس الحصر ( تقرير مفصل لكل موظف – تقرير اجمالى لكل الموظفين – تقرير بالاجر الاضافى ) 

 ويتوافر لدينا احدث اجهزه للحضور والانصراف بالبصمه و بالعين و بالكارت ويوجد اجهزة بصمه العين والتي تعد من افضل اجهزه البصمه للتاكد من الهويه الشخصيه كما يتم التدريب على هذة الاجهزة وتركيبها من خلال مهندسين متخصصين

ويمكن التحكم فى االبصمة من خلال:-

ubio-x faceVisionPass

ويمكن دمج كل الطرق او بعضها فى الجهاز الواحد

يتوافر لدينا احدث اجهزة الحضور والانصراف بالبصمة والعين والكارت بأرخص سعر فى مصر

المميزات :                                                   

1_تستطيع ضبط مواعيد الموظفين

2_ تسهيل اجراءت تسجيل الحضور دون تلاعب او تاخير اواى تعطل

3_ايضا برامج الحضور الانصراف عربى وانجليزى بواجهة سهلة الاستخدام

4_تقليل الوقت فى العملية تمكين عشرة اشخاص واكثر بتسجيل بصمتهم فى دقيقة

5_تقسيم الشركة الى اقسام او ادارات واضافة الورديات ومواعيدها وحساب التاخيرات والانصراف المبكر

6_التوريد والتركيب على استخدام جهاز البصمة

7- تقديم الخدمة ما بعد البيع والدعم الفنى طوال فترة الضمان

8- توفير في جهاز حضور وانصراف امكانيه عمل كلمه سرلكل موظف

9-يمكن من خلالها ربط اكثر من فرع فى نفس الوقت ويمكن ربطها بالشبكه الداخليه واستخراج التقارير وعمليات الدخول والخروج

تقرير الدخول و الخروج اليومي 

لإظهار الدخول و الخروج والتأخير والغياب اليومى.

التقرير الشهري الإجمالى

لإظهار اجمالي ايام الشهر وايام الحضور و التأخير و الغياب والأجازات.

تقرير تفصيلي للموظف

لإظهار معلومات عن حاله الموظف من الدخول و الخروج و ساعات العمل و التأخير والغياب و الأجازات ويتم تصميم هذا التقرير حسب الطلب في شاشه تصميم التقارير.

تقرير الخلاصة اليومية لإظهار معلومات عن حاله الموظفين  و اظهار اجمالي عدد ( الموظفين و الدخول و الخروج و الغياب و المتأخرين و المجازين .. الخ ) مع نسبه الدخول على مستوي كل قسم ،ويتم تصميمه في شاشه تصميم التقارير.

وضع لوائح الدوام الخاصه بالعميل من خلال تحديد فترات وايام الأجازات الرسمية

يدعم النظام إمكانية إدخال عدد لا محدود من الفترات المقررة على الموظفين

مع طريقه تحديد الدخول و الخروج للموظف.

تهيئه النماذج المعتمدة لدى العميل

من خلال شاشة تصميم التقارير يمكن ترحيل الأجمالي الشهري لساعات

( الغياب – التأخير – الإضافي ) إلي نظام المرتبات  و الأجور

يمكن للمستخدم تحديد بدايه زمن بداية ونهاية زمن الدخول و الخروج خلال 24 ساعه

“يسعدنا اهتمامكم بمنتجات الشركة الاساسية ولكى نتمكن من التواصل معكم بشكل اسرع نرجو الاتصال على ارقام قسم المبيعات 01148009052 – 01149044332 – 01142954520 – 01150007381

ليه تجيب موظف يسجل الحضور والآنصراف وستار تكنولوجى تقدر توفرلك جهاز البصمه تخليك واثق ان التقارير بتطلع بدون اى غلط او لخبطه والدعم الفنى مجاانا ده غير مميزات تانيه كتير اتصل وانت اكيد الكسبان. 

ومن خدمتنا ايضا:-

 كاميرات مراقبة – اجهزة انذار الحريق  – انتركم – شبكات – بوابات امنية

وتقدر تتابعنا على الفيسبوك او تويتر او انستجرام وتابع كل ما هوجديد من فيديوهات من خلال قنوات التواصل الاجتماعى اللى موجودة على شمال الصفحة ومنها هتعرف كل العروض الجديدة 

مع ستار تكنولوجى خطوة بخطوة نحو التميز

07 Apr 2021
Open Supervised Device Protocol (OSDP)

Open Supervised Device Protocol (OSDP)

What is Open Supervised Device Protocol (OSDP)?

Open Supervised Device Protocol (OSDP) is a standard that has been developed by the Security Industry Association (SIA) in order to offer more secure access control communications. This protocol works across various types of readers, controllers (RBH), and software, and has been developed as a way to improve on issues of security that are often faced with other legacy systems.

In other words, the development of this protocol aimed to help implement, monitor and maintain a more stable and secure system of access control devices, which includes the use of advanced smart card technology applications and biometrics.

In addition to improved security, it improves interoperability between access control and security devices, through bi-directional communication. To retain its focus on security, it is constantly refined, with OSDP v2.1.7 currently gaining recognition as a standard by the American National Standards Institute (ANSI).

Manufacturers, like HID Global, Mercury and Cypress, are already using OSDP and it is recommended for use in government and other high-security settings, since the protocol meets all federal access control requirements, such as Public Key Infrastructure (PKI) for Federal Identity, Credential and Access Management (FICAM).

OSDP security standard to replace Wiegand for access control communication  - SecureIDNews

What is the wiring diagram for OSDP?

If you’re interested in having a more in-depth look at how it works, take a look at this OSDP protocol example diagram, which gives an insight into how to use it with existing Wiegand devices.

This includes how to connect both a Peripheral Device (PD) or Access Control Unit (ACU), or both. This OSDP wiring diagram pdf download also provides more information on Pin Designations, DIP Switch Settings, OSDP Default Parameters, Status LED Behavior, and Bench Testing.

Implementing OSDP

What is the OSDP Protocol?

The Open Supervised Device Protocol (OSDP) is a way of linking together access control devices and smart cards in a way that guarantees optimum security. Other legacy systems, while popular and easier to use, unfortunately, do not always offer the same level of security, and are vulnerable to tampering.

Using AES-128 encryption, and by constantly monitoring wiring, this protocol keeps an eye on all points within the system, to make sure that it protects against all threats. Other advanced functionality features include advanced user interfaces, with welcome messages and text prompts, and the use of 2 wires instead of 12+. The use of two wires, in this case, allows for multi-drop installation, supervised connections and scalability.

Implementing this is, therefore, crucial in ensuring that your access control system is up to date with all of the latest security system requirements.

What is the OSDP Protocol?

How Does OSDP Protocol Work?

The OSDP Protocol works through an audio-visual system, which integrates a user feedback mechanism to ensure an access control environment that is built for, and benefits, the user. Since encryption and authentication processes are already predefined, there is no need for guesswork, which takes a lot of stress and labor costs out of the equation. This also means that this protocol costs less to implement on devices already embedded in the system.

The main benefit of it is that it works across a range of devices and security solutions, regardless of the equipment manufacturer. This includes peripheral devices (PD’s), which include card readers, as well as other devices like secured access doors/gates and control panels (CP’s).

Internet Protocol (IP) environments can also use OSDP and it is recommended when Transmission Control Protocol/Internet Protocol TCP/IP, USB or other protocols are not available. OSDP over IP is currently in development and will be launched soon. This will ensure that the interoperability of this protocol extends even further.

Advantages over Wiegand

It has a number of advantages over Wiegand, such as:

  • It supports two-way communication between a reader and a controller. This means that a controller, a computer or an interface unit can connect with a reader and identify a malfunctioning device, manage LED indication or check a PIN-code that was entered.
  • Its connection is encrypted (OSDP supports high-end AES-128 encryption) and makes it much more secure than Wiegand and other common protocols.
  • OSDP is cheaper to install because it requires less cable. Also, this interface enables a reader to function even if it’s located 1200m away from the controller. In case with Wiegand, the distance between a reader and a controller rarely exceeds 152m.
  • It has a user-friendly interface and is easy to implement.
Open Supervised Device Protocol and Added Security - SPG Controls