IS2000 Security Management Software
IS2000 is a world-class security management software application and a member of the ‘IMRON Software’ suite. IS2000 has the unique ability to integrate to the industry’s most trusted brands of hardware systems for access control, intrusion, HVAC, and video. Customers benefit from this by being able to manage all of their systems from one powerful and easy to use interface.
Only IS2000 offers this unique ability, and has the most extensive integrated platform solution in the industry today. Sites with legacy or proprietary hardware can now expand with newer ‘open standards’ hardware using IS2000. This allows the customer to future-proof their site while retaining their previous hardware investment. IS2000 is scalable and can manage any size system, making it the perfect security management solution for educational facilities, retail centers, health care facilities, commercial buildings, financial institutions, stadiums, logistics, manufacturing plants, and airports.
Scalable (On-Premise or Cloud)
Due to its modular design, IS2000 can be scaled and deployed in the cloud or on-premise for small to large enterprise environments. Support for multiple regional servers can be configured to use a single redundant database that is replicated globally across the enterprise. IS2000 clients have the option of using a thick feature rich Windows application, or a browser agnostic web app.
Databases from an HR System or other applications can be imported using our Data Import Utility. Supported data formats include Active Directory, text files, spreadsheets, and ODBC data sources.
IS2000 also has an available SDK that gives software developers the ability to integrate all functionality using an XML based protocol.
IS2000’s unique ability to simultaneously manage traditional hardware platforms and newer web based IP controllers from a seamless environment, make it the only choice for your security management needs.
|Avigilon||Access Control Manager||HID / Mercury|
|AXIS Communications||Entry Manager||A1001|
|Bosch||G Series / B Series||Alarm Controllers|
|Casi Rusco||Facility Commander||Proprietary Micro 5 Enclosure|
|DVTEL||Longitude||HID / Mercury|
|Johnson Controls||P2000||Proprietary / Mercury|
|Matrix / Frontier||Frontier Universe||Mercury|
|Quintron||AccessNSite||HID / Mercury|
|S2||S2 Enterprise / Global||Proprietary / Mercury|
|Video Insight||MonitorCast||HID / Mercury|
|ZK Access||ZK Software||inBio and ACP|
|Safran MorphoTrak||4G V-Flex, MorphoWave, Morpho 3D Face, MorphoAccess 5 Series, MorphoAccess VP Series, MorphoAccess SIGMA|
|Suprema||Facestation, BioStation, BioStation 2, BioStation T2, BioEntry W, BioEntry Plus, BioLite Net, BioLite Solo, Xpass, BioMini|
|ZK Access||BioCam300, FR1200, FR1300, F18, F21, MultiBio700, MultiBio 800-H|
|AXIS Communication||AXIS Camera Station|
|Access and Security Solution|
|Scalable Enterprise Security Management Software||Multi-User Support|
|Easy to use interface can run in either Application or Desktop Mode||Occupancy Control|
|Integration to some of the leading Intrusion Detection systems in the industry||Muster Reporting|
|Video Integration to cutting edge IP / NVR systems||Easy to use Report Manager|
|Integrated Badge Designer||Integrated Guard Tour|
|Time and Attendance||Graphic Maps (Interactive)|
|Thin Client||Email on Alarm|
|System Partitioning to the device level|
|Triggerable Actions (Hardware Specific)|
|Door: Momentary Unlock||Anti-Passback|
|Door: Card/PIN, Card Only, PIN only mode change||Activate Device / Group Areas|
|Control Point: Activate, Deactivate, Pulse (Configurable timer)||Delay Commands|
|Alarm Panel: Arm, disarm, force arm||Macro Commands|
|Integrated Badge Designer||Run an executable|
|First man in / Snow day||Set Trigger Variables|
|Global I/O Linking||Execute a command file|
|Events (Interactive Control)||Jump to Graphic on Alarm|
|Control and view devices on a map||Plotted devices can reside on different layers|
|Standard and advanced custom filtering||Printing Options: Any network or local printer with a Windows printer driver can be utilized.|
|Export Options: Open Document Text, XLS, XML, HTML, PDF, and more|
|Software updates available from the cloud||Auto event archiving|
|Auto backups locally|
|Cloud software updates available||Online ticketing system|
|Remote access support||Local and Cloud technical documentation|
|All Device Commands||All PC related commands|
|Ability to group global device commands||Camera Call-up|
|Facility Lockdown capability||Pre-canned text or email message|
|IS2000 Web Service (does not use IIS or Apache)||Basic Administration of credentials|
|Browser Agnostic||Real-time Event/Alarm monitoring|
|No software to load on client workstations||Real-time device status and control|
- Axis Camera Station
Edwards Fire Panel
Any Windows Compliant Printer
XML Web Services
Allows for 3rd Party Integration
Supports All Commands
Note: End of Life (EOL) notice for Windows 2000 Support effective as of June 18, 2009.
Microsoft SQL Server
Note: Microsoft Access has a database size limitation of 2 GB and should be used in smaller installations in which a large amount of events do not occur. SQL Server Express has a database size limitation of 4 GB.
Note: Browser support is only available when using the IS2000 Thin Client.
It is imperative that the proper database maintenance be configured for the SQL Server, IMRON Corporation is not responsible for the configuration / management of the SQL database as this is outside of the scope of support provided by IMRON Corporation. Any database maintenance plans and configuration of the SQL logging should be configured and managed by the site’s IT department as well as the installing dealer.
Archives through IS2000 should be performed regularly to ensure the size of the Events table / Audit table are not allowed to grow to unmanageable sizes. How frequently the archive process should be scheduled will depend on the amount of events the customer receives daily. It is strongly recommended that customers that receive 5,000 or more events daily should perform archives monthly.
Database backups should be completed on a regular basis. All database backup files should be stored on a network or external drive to avoid data loss in the event of a catastrophic machine failure. Both the Data folder as well as the database files should be backed up on a regular basis. The database backups should be tested periodically to ensure the backup process has been completed successfully.
For sites with a large amount of events, IMRON Corporation strongly suggests evaluating the database for events that are excessive and disabling these events. For example, REX (Request to Exit), Door is Open and Door is Closed messages. This will prevent the Events database from reaching capacity.
IS2000 is a server / client environment. All licensing for the client machines is obtained from their respective server. The client machines do not store any data and will push any changes made on the client to the server’s database. It is imperative for the IS2000 application to be running on the server machine in order for the client machines to connect to IS2000 properly. If there is a loss of communication between the IS2000 server and the client machine, the client machines will experience problems connecting and writing data to the database.
It is unnecessary to perform downloads frequently on the system and when completing downloads the operator should take great care in doing so to avoid an interruption of access to readers and events. When performing a download, only one (1) download should be started at a time. Performing multiple downloads will cause the system to download multiple times, the first download started will not be interrupted, the system will wait for the first download to complete before starting the next download. Depending on the databases selected to be downloaded, the amount of cardholder records and the amount of controller’s onsite, the download process can take up to five (5) minutes to complete per controller.
When a download of personnel records takes place, the controller’s memory is cleared and the personnel records are sent to the controller. During this period of time the card holder may receive an “Access Denied” event. If the card is presented multiple times the controller will learn the card information and grant access if the card has the proper access levels.
IMRON Corporation requires that all support provided be provided to IMRON Certified dealers only. A self guided curriculum/certification is available via the Help section of the IS2000 software at no charge.