Slider

MTZ® Access

Access Control with MTZ® Access

From access control to the securing of a maximum security wing - MTZ® Access adapts flexibly to your requirements.

Access technology such as biometrics, Pin code, duress code, double access refusal, area change control or dual control are easy to use and can be combined freely. Individually parameterisable weekly programs and time zones ensure that access authorisations for each employee are precisely configured. Authorised persons are not hindered in their freedom of movement, whereas unauthorised persons are successfully denied access.

With the internal system monitoring, irregularities are recognised immediately and accordingly dealt with or suggestions made. All procedures are, as far as possible, automated. However, manual intervention is always possible. The access control can be extended with a hazard detection system or building security management.


Visitor Management with MTZ® Visitor

So that your visitors may move freely within a limited area, they are granted access to certain rooms through their own individual card – however, only for the length of their visit. Employees, who are expecting visitors, can register their guest beforehand and state important details such as names and the duration of the visit. That way, the reception staff has all the important information before the person concerned arrives. With the software MTZ® Time, it is possible to check if the contact person is present. After the visiting time has elapsed, the access authorisation expires automatically.

With MTZ® Visitor, the reception department has a tool for visitor management, registration and access evaluation, without having to take care of the system configuration and access management. These are set up in MTZ® Access by security administrators. Optionally, visitor cards and visitor passes can simply be issued.

Car Park Management with MTZ® Car Park

With MTZ® Car Park, you can extend the access control with an uncomplicated and convenient car park management for your employees. Parking fees can easily be recorded and through a simple interface be passed on to accounting systems.

Access readers verify if the employee is authorised to drive into the car park. When the car park is full, the access control will allow no further entrance. With the access control software, it is also possible to view the car park occupancy at any time. .

The parking time of the employees is recorded by entrance and exit readers and can be invoiced by means of a cost plan. Billing can be made either on a monthly basis or according to the exact parking time.

MTZ® Hazard Detection

The hazard detection system is supplementary to access control, with the main emphasis on perimeter protection, using direct current (DC) technology.

The DC technology has up to 24 internal DC bus systems for DC standard technology and additionally, up to 4 external BC controllers with 24 DC systems can also be integrated. The detectors are monitored by the software. The LSN-technology (Local Security Network) enables a free combination of intrusion detectors and fault indication sensors as well as the integration of common DC standard detectors per LSN-coupler. The detectors are identified, initialized and monitored by the software.

In MTZ® Access the appropriate actions for the individual alarms are parameterized. This can be from a simple monitor notification up to the automatic notification of the responsible security company. If the security guard is on site, at a terminal he can call up exactly where the disturbance is. For instance: “Break in; development department; window 3”. This shortens the reaction time and enables fast and efficient action. The arming/unarming of the complete system or individual zones takes place at terminals or access readers with a pin code keypad.

Interfaces to management systems are integrated and adaptable. Software and hardware can easily be extended with additional modules such as Video Monitoring or Visitor Management.

Import Interface Pro

With the import interface Pro, master data from third-party systems can be imported into the MTZ® BS, either nonrecurring or periodically. The format and transfer type is individually adjustable: The import of files in text format (ASCII-file); import type CSV or fixed length, line by line import; interactive assignment of sentence types and master data fields.

LDAP Import Interface

With of the LDAP interface, data can be imported from directory services into the personnel master data of the MTZ® BS. The textboxes which are to be compared can be interactively linked. Source data can be limited by filters. This way, e.g. only employees of a certain department/company may be imported. Target data base can be protected, so that personnel can be managed independently from LDAP. The data can be synchronised automatically with time control* or manually.

Common directory services that can be addressed by the LDAP interface are for instance:
Microsoft Active Directory (MAD),
Novell Directory Services (NDS) and
Apache Directory Server (ADS).

An automatic card authorisation after the import can be arranged. The data exchange takes place through standardised TCP/IP.

Note: We recommend the additional assignment of the "Import Interface Pro".

OPC UA Interface

The OPC interface (Unified Architecture) enables access to the MIDITEC hardware by means of the standardised OPC protocol. On the one hand the MTZ® OPC UA server provides the information on the status of all devices and on the other hand offers the control of the devices per OPC.

The MTZ® OPC server supports the modern mechanism of the OPC Unified Architecture with a maximum of security, robustness and performance.

OPC UA Converter Bosch/BIS
The OPC BIS interface provides a connection to Bosch´s Building Management “BIS”. For this, specially adapted additional software to the OPC server is used.

OPC UA Converter D/A
With the OPC Classic interface, a connection to already existing Classic OPC software can be achieved. With additional software, the MTZ® OPC server acts as the Classic OPC server. With this interface, a conversion of existing Classic OPC systems to OPC UA can be avoided.

Locking system for Locker Groups

Security not only plays a central role for buildings and rooms, but also for cabinets and lockers. The new feature “Locking systems for locker groups” enables an individual authorisation assignment for cabinet or locker doors. The authorisation for a cabinet/locker is made within the personnel master data. If more than one cabinet/locker is registered to a person, all of these will open when a booking takes place at a reader. There is no restriction to this amount. The connection is made through a controller, to which up to 5 doors can be connected. In turn, the controller is connected to a serial control unit to which a maximum of 16 controllers can be connected. This makes it possible to secure up to 80 cabinets or lockers with one control unit. Through booking at a reader that is connected to the first controller, the appropriate cabinet or locker doors are opened. By means of a feedback contact, a door that may not have locked is registered; likewise a break-in (opening without card reading) is registered and processed into a warning message. The locking system for cabinets/lockers is only available as a module for access and has to be licenced separately. To complete the all-round solution each cabinet requires a locking unit, these can be purchased e.g. from the Company eff eff.

MTZ® PegaSys Locking System

Whether readers, fittings or lock cylinders: With the PegaSys Locking system software, you can connect PegaSys offline components quite simply to the access module of MTZ® Business Solution, so that the administration of all access authorisations, whether online or offline, can take place through a single superordinate system.

The management of offline authorisations can be done with so called day tickets. For this, every employee must renew his individual authorisations through a daily access booking at an online-connected Read-Write-Reader in the entrance area. Apart from the prolongation, any changes in authorisations are also made on the card. This way, if a card is blocked by the online system, this automatically applies to all relevant offline components.


Back to software overview