IS2000 Security Management Software


IS2000 is a world-class security management software application and a member of the ‘IMRON Software’ suite. IS2000 has the unique ability to integrate to the industry’s most trusted brands of hardware systems for access control, intrusion, HVAC, and video. Customers benefit from this by being able to manage all of their systems from one powerful and easy to use interface.

Only IS2000 offers this unique ability, and has the most extensive integrated platform solution in the industry today. Sites with legacy or proprietary hardware can now expand with newer ‘open standards’ hardware using IS2000. This allows the customer to future-proof their site while retaining their previous hardware investment. IS2000 is scalable and can manage any size system, making it the perfect security management solution for educational facilities, retail centers, health care facilities, commercial buildings, financial institutions, stadiums, logistics, manufacturing plants, and airports.


Scalable

Due to its modular design, IS2000 can be scaled and deployed in the cloud or on-premise for small to large enterprise environments. Support for multiple regional servers can be configured to use a single redundant database that is replicated globally across the enterprise. IS2000 clients have the option of using a thick feature rich Windows application, or a browser agnostic web app.

Databases from an HR System or other applications can be imported using our Data Import Utility. Supported data formats include Active Directory, text files, spreadsheets, and ODBC data sources.

IS2000 also has an available SDK that gives software developers the ability to integrate all functionality using an XML based protocol.

IS2000’s unique ability to simultaneously manage traditional hardware platforms and newer web based IP controllers from a seamless environment, make it the only choice for your security management needs.


On-Premise vs. Cloud

Features IS2000 On-Premise IS2000 Cloud
Manage Access Control (Personnel, Access Levels, Time Schedules, Door Control) YES YES
Manage and View Real-Time Events and Alarms YES YES
Configure and Manage Hardware YES YES
Work from a PC, Mac, smartphone, or tablet at anytime NO YES
Maintenance Annual fee Included
License Model Perpetual Subscription
Access to latest product and features updates Requires Active Maintenance Included

Supported Systems

Manufacturer System Hardware
Avigilon Access Control Manager HIDMercury
AXIS Communications Entry Manager A1001
Bosch G Series / B Series Alarm Controllers
Casi Rusco Facility Commander Proprietary Micro 5 Enclosure
DSX WinDSX SDK Integration
DVTEL Longitude HIDMercury
Genetec Synergis Mercury
Honeywell ProWatch Mercury
Johnson Controls P2000 Proprietary / Mercury
Lenel OnGuard Mercury
Matrix / Frontier Frontier Universe Mercury
Maxxess eFusion Mercury
Open Options dnaFusion Mercury
Quintron AccessNSite HID / Mercury
RS2 Access It! Mercury
S2 S2 Enterprise / Global Proprietary / Mercury
Video Insight MonitorCast HIDMercury
ZK Access ZK Software inBio and ACP
Manufacturer Reader
Safran MorphoTrak 4G V-Flex, MorphoWave, Morpho 3D Face, MorphoAccess 5 Series, MorphoAccess VP Series, MorphoAccess SIGMA
Suprema Facestation, BioStation, BioStation 2, BioStation T2, BioEntry W, BioEntry Plus, BioLite Net, BioLite Solo, Xpass, BioMini
ZK Access BioCam300, FR1200, FR1300, F18, F21, MultiBio700, MultiBio 800-H
Manufacturer System
ELK M1 Gold Series
Inovonics EN4000 and EN1723
Edwards EST3
Manufacturer System
Assa Abloy Aperio Wireless Lock
Assa Abloy IN120
Schlage/Allegion AD Series
Manufacturer System
Bosch Bosch G / B Series
DMP DMP XR100
ELK ELK M1
Manufacturer System
AXIS Communication AXIS Camera Station
Milestone XProtect

Applicable Markets


System Overview



 

Feature List

Access and Security Solution
Scalable Enterprise Security Management Software Multi-User Support
Easy to use interface can run in either Application or Desktop Mode Occupancy Control
Integration to some of the leading Intrusion Detection systems in the industry Muster Reporting
Video Integration to cutting edge IP / NVR systems Easy to use Report Manager
Integrated Badge Designer Integrated Guard Tour
Time and Attendance Graphic Maps (Interactive)
Thin Client Email on Alarm
System Partitioning to the device level

Triggerable Actions (Hardware Specific)
Door: Momentary Unlock Anti-Passback
Door: Card/PIN, Card Only, PIN only mode change Activate Device / Group Areas
Control Point: Activate, Deactivate, Pulse (Configurable timer) Delay Commands
Alarm Panel: Arm, disarm, force arm Macro Commands
Integrated Badge Designer Run an executable
First man in / Snow day Set Trigger Variables
Global I/O Linking Execute a command file
Interlocking

Real-Time Monitoring
Events (Interactive Control) Jump to Graphic on Alarm
Status Alarm Manager
Video

Graphic Maps
Control and view devices on a map Plotted devices can reside on different layers

Reporting
Standard and advanced custom filtering Printing Options: Any network or local printer with a Windows printer driver can be utilized.
Export Options: Open Document Text, XLS, XML, HTML, PDF, and more Email

Administration
Software updates available from the cloud Auto event archiving
Auto backups locally

Support/Management
Cloud software updates available Online ticketing system
Remote access support Local and Cloud technical documentation

Custom Commands
All Device Commands All PC related commands
Ability to group global device commands Camera Call-up
Facility Lockdown capability Pre-canned text or email message

Web Interface
IS2000 Web Service (does not use IIS or Apache) Basic Administration of credentials
Browser Agnostic Real-time Event/Alarm monitoring
No software to load on client workstations Real-time device status and control


Resources

        IS2000 Brochure
        IS2000 Overview Video
        Security Management Video
        IS2000 Help Site
        IS2000 Part List Generator
        IS2000 Certification
        Importing a Lenel Database
        AXIS Camera Station Integration


Integrations

        Axis A1001
        HID VertX/Edge EVO
        Mercury (All Controllers)
        ZK Access (ACP/inBIO)
        Biometrics

  •  Axis Camera Station
  •  Milestone

        Bosch
        DMP
        ELK

        Inovonics
        Edwards Fire Panel
        Serial/Network Interface

  •  Fargo

  •  Magicard

  •  Any Windows Compliant Printer

        Kone
        Mercury
        ZK Access

        Aperio
        Assa Abloy
        Schlage (Allegion)

  •  Active Directory

  •  ODBC

  •  Spreadsheets

  •  Text Files

  •  Facebook

  •  Twitter

  •  Messenger Services

  •  Newsfeeds

  •  XML Web Services

  •  Allows for 3rd Party Integration

  •  Supports All Commands


What's Supported

  •  Server 2016

  •  Server 2012

  •  Server 2008

  •  Windows 10

  •  Windows 8

  •  Windows 7

  • Note: End of Life (EOL) notice for Windows 2000 Support effective as of June 18, 2009.

  •  English

  •  Spanish

  •  German

  •  Finnish

  •  French

  •  Italian

  •  Portuguese

  •  Swedish

  •  Microsoft Access

  •  Microsoft SQL Server

  • Note: Microsoft Access has a database size limitation of 2 GB and should be used in smaller installations in which a large amount of events do not occur. SQL Server Express has a database size limitation of 4 GB.

  •  Google Chrome

  •  Mozilla Firefox

  •  Internet Explorer

  • Note: Browser support is only available when using the IS2000 Thin Client.


Best Practices

It is imperative that the proper database maintenance be configured for the SQL Server, IMRON Corporation is not responsible for the configuration / management of the SQL database as this is outside of the scope of support provided by IMRON Corporation. Any database maintenance plans and configuration of the SQL logging should be configured and managed by the site’s IT department as well as the installing dealer.

Archives through IS2000 should be performed regularly to ensure the size of the Events table / Audit table are not allowed to grow to unmanageable sizes. How frequently the archive process should be scheduled will depend on the amount of events the customer receives daily. It is strongly recommended that customers that receive 5,000 or more events daily should perform archives monthly.

Database backups should be completed on a regular basis. All database backup files should be stored on a network or external drive to avoid data loss in the event of a catastrophic machine failure. Both the Data folder as well as the database files should be backed up on a regular basis. The database backups should be tested periodically to ensure the backup process has been completed successfully.

For sites with a large amount of events, IMRON Corporation strongly suggests evaluating the database for events that are excessive and disabling these events. For example, REX (Request to Exit), Door is Open and Door is Closed messages. This will prevent the Events database from reaching capacity.

IS2000 is a server / client environment. All licensing for the client machines is obtained from their respective server. The client machines do not store any data and will push any changes made on the client to the server’s database. It is imperative for the IS2000 application to be running on the server machine in order for the client machines to connect to IS2000 properly. If there is a loss of communication between the IS2000 server and the client machine, the client machines will experience problems connecting and writing data to the database.

It is unnecessary to perform downloads frequently on the system and when completing downloads the operator should take great care in doing so to avoid an interruption of access to readers and events. When performing a download, only one (1) download should be started at a time. Performing multiple downloads will cause the system to download multiple times, the first download started will not be interrupted, the system will wait for the first download to complete before starting the next download. Depending on the databases selected to be downloaded, the amount of cardholder records and the amount of controller’s onsite, the download process can take up to five (5) minutes to complete per controller.

When a download of personnel records takes place, the controller’s memory is cleared and the personnel records are sent to the controller. During this period of time the card holder may receive an “Access Denied” event. If the card is presented multiple times the controller will learn the card information and grant access if the card has the proper access levels.

IMRON Corporation requires that all support provided be provided to IMRON Certified dealers only. A self guided curriculum/certification is available via the Help section of the IS2000 software at no charge.