Access Control Systems
Access control is an essential component of building security. You need a truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. It offers the highest data security and several features found only in high-end security solutions. On top of this, the software is also open for integration with third party systems, thus making it a very versatile solution for your access control projects.
4 reasons why to choose Bosch access control software
Flexible and scalable
Flexible and scalable
Our access control solution can easily grow with the needs of the customer. Three software bundles enable up to 400.000 cardholders and up to 10.000 doors.
Easy to use
Easy to use
Our user-friendly access control software offers efficient and user-friendly tools to configure the system and an intuitive, modern GUI for easy and convenient operation.
High data security
High data security
Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages.
Open for integration
Open for integration
Our software solution for access control is able to connect to non-Bosch software and devices. Our latest enhancements allow easy integration of third-party applications.
Flexible and scalable
Our access control solution can easily grow with the needs of the customer. The software is offered in three pre-configured software bundles for different sized enterprises: Lite, Plus and Professional. The bundles offer each a large range of cardholders and doors enabling an easy upgrade when your organization grows. Up to 400.000 cardholders and up to 10.000 doors can be administered in the largest bundle. Since no hardware needs replacing, increasing the system size is very cost-efficient. This outstanding scalability makes the software a truly future-proof investment.
Lite | Plus | Professional | |
---|---|---|---|
Lite Included in bundle (Maximum extension) | Plus Included in bundle (Maximum extension) | Professional Included in bundle (Maximum extension) | |
Doors | Lite 16 (80) | Plus 32 (288) | Professional 128 (10000) |
Cards | Lite 200 (5000) | Plus 2000 (10000) | Professional 5000 (400000) |
Divisions | Lite 1 (1) | Plus 2 (5) | Professional 5 (200) |
Clients | Lite 1 (2) | Plus 2 (5) | Professional 5 (200) |
Master Access Controller (MAC) | Lite 1 (1) | Plus 1 (5) | Professional 1 (40) |
Guard tours | Lite 50 (50) | Plus 100 (100) | Professional 200 (200) |
Web-based Visitor Management | Lite no (yes) | Plus no (yes) | Professional yes (yes) |
Intrusion command & control* | Lite 1 (50) | Plus 1 (80) | Professional 1 (80) |
Intrusion user management* | Lite 1 (50) | Plus 1 (200) | Professional 1 (500) |
REST API | Lite no (no) | Plus yes (yes) | Professional yes (yes) |
*Applies to the B and G series intrusion alarm systems: same license for command & control and user management | Lite | Plus | Professional |
The configuration of our access control software is easy: existing floor maps are imported into the system and icons are dragged and dropped to represent controllers, doors and building objects on the map view. Onboarding is straightforward: enrollment and assignment of access rights are all implemented in one dialog manager, even the registration of biometric data, for instance facial recognition. The data of several thousand cardholders held in legacy or HR systems can also be quickly imported with just a few clicks, thanks to the importer / exporter tool. The possibility to create access profiles with a certain scope of access privileges makes the assignment of authorizations simple, as it is not necessary to assign every single authorization to the cardholder but just one pre-defined role profile. To facilitate easy selection of available readers and controllers from the Bosch product catalogue, they are displayed with product photo and CTN number in the device configuration.
/
Once installed and set up, using our user-friendly access control system is also easy, with an intuitive icon alarm list and color scheme to ensure fast and efficient operator reactions. At all times, the operator has full situational awareness thanks to the instant updates of events at the access points via the comprehensive overview on the on-screen map. The operator sees a constantly updated list of last cardholders who attempted to gain access to selected doors, who was granted access and who was not. In addition, the map view indicates the respective door on the map to allow the operator to quickly see where exactly the event is happening.
High data security
Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages. Our access control software also has trusted digital certificates for mutual authentication between server and client and uses secure design principles such as ‘secure-by-default’ and ‘principle of least privilege’. Your data is definitely safe with the industry-leading Bosch products.
Data Privacy
Strict access authorizations to personal data
Only relevant data can be collected
Data storage duration to comply with company policy
Data Security
Secure-by-design: encryption, authentication, certificates
Secure-by-default: all security settings on high per default
Principle of least privilege: assign granular privileges for operators
Open for integration
Flexibility and openness are very important to us. We designed our system to offer full integration functionality, while remaining as reliable and safe as you are used to with Bosch. A REST based API (REST API) is available to allow third party developers to design applications. This way you can offer much faster complete solutions to your customers.
Integration examples
- Video management
- Intrusion alarm management
- Facility management (mobile apps)
- Identity management (workflow based)
- Visitor and supplier management
- Guard tour management
- Safety and personnel protection
- Time and attendance management
- Mobile and biometric reader integration
- Parking and occupancy management
Third party integrations
Our software solution for access control is able to connect to non-Bosch reader devices and non-Bosch software. Our latest enhancements allow integration of an increasing number of third-party applications with our access control system.
Check out our third party integrations
Video management integration
You can use our access control software (Access Management System) in combination with video surveillance systems like Bosch Video Management System (BVMS 10.1 or higher) or systems from third parties like Milestone Xprotect. Integration with a video management system offers manual video verification to increase the security level at doors. Here the monitoring operator verifies if the person at the door matches the registered person in the database and if so, allows the person to enter. You can also use it to search for specific events. Moreover, access commands and events can be handled by the video management system, making the operation of the integrated system most efficient.
Intrusion detection integration
The integration with B and G Series Intrusion Control Panels facilitates the combination of efficient authorization management and a central overview of all access and intrusion authorizations. Operators can add, delete and modify intrusion-related user passcodes and authorizations directly in our access control software (Access Management System), as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion areas directly in the system's user interface and see their arming status on the system map. This provides operators with a central overview of all access and intrusion states, allowing a remote management to handle intrusion alarms efficiently. Please note: the B Series and G Series panels are not available in European countries.
Time and attendance integration
Our software offers a default easy export of data that third-party Time and attendance or HR systems need. For systems that cannot work with the default data, our software offers the possibility to customize your export file with time stamps. We have a practical step-by-step instruction available how the customizable exportation is done. Thanks to this export functionality you can choose any solution that best fits your needs and have it work seamlessly with our access control software.
Offline locks integration
Offline locks offer flexibility for projects with remote locations or architectural design limitations. Also for interior doors that require a moderate level of security, such as storage rooms and office areas. Our software offers full functionality for offline locks integration, making it possible to choose any offline locks vendor that supports the OSS-SO standard.
Parking management integration
Next to using standard readers, access to parking lots can also be regulated by long-range readers and ID cards, or by video cameras and license plate recognition. There are many specialized parking management suppliers and our access control software can be integrated with almost all of them.
Powerful software
High-end security features
Multi-factor authentication
Multi-factor authentication
To be able to prove a person’s right to enter, you need to have some form of authentication. There are various identification modes possible such as an access card, a key fob, pin code or biometric data. After authentication, the reader sends information to the controller and the latter verifies with the server if the user is authorized to enter. When only one identification mode is applied, this is called single-factor authentication. Two-factor or multi-factor authentication requires one or more additional identification modes, and access is only granted if all features match. Our systems support the combined use of cards, pin codes, fingerprints, facial recognition, etc. This way you can make sure the protection of the premises meets a high level of security requirements.
Global anti-passback
Global anti-passback
Anti-passback is a security measure that prevents a second entry with the same access card. The Global anti-passback function ensures that this security measure is applied at all locations within the facility. If any one reader in the area receives an anti-passback violation, it will prevent that access card holder from entering through other doors in the same area.
Threat level management
Threat level management
Threat level management facilitates guaranteeing a high level of safety. Up to 15 configurable threat levels ensure that safety measures or restrictions can be initiated quickly in critical situations such as a fire or terrorist attack. The different threat levels can – in minimum time – make all doors open, all doors locked, or a mix of some open and some blocked. A unique option that Bosch offers to use in threat situations is the possibility to reconfigure certain doors in a second so that only first responders with the highest authorization get permission to enter the area, while all other cardholders are blocked. Besides in high threat situations, threat level management is also useful in case of low threat level situations like sports events, open days, or parents’ evenings at schools.
Parking management
Parking management
If you would like to control the usage of your parking area, using the parking management feature is very helpful. Each parking lot can be divided into logical areas, with a maximum number of cars defined for them. When the parking area has reached its maximum capacity, you can prevent access for arriving cars. Load-balancing of the parking lots is also possible, with current capacity information displayed on the operator’s screen.
Guard tour management
Guard tour management
If you want your building to be guarded by a security guard, the feature ‘Guard Tour’ in our access control software is a very useful one: you can indicate a route around the premises, punctuated by card readers, where the guard must present a special guard card to prove that he has physically visited the reader. The guard tour consists of a series of readers with the calculated walking time in seconds. The maximum tolerable delay between readers, and the tolerable deviation (+/-) from the start time, are also attributes of the guard tour. Deviations outside of these defined tolerances can potentially trigger alarms or show real-time video to protect the guard.
Division management
Division management
For larger premises it is possible to set up different divisions for the access control system. With our access control software, you can create up to 400 divisions, depending on the license type. For instance, in the case of a multi-company building, companies can share one access control system in the building. When they log in to the system, only information from their own company and possibly shared areas are shown. Also very suitable for building owners, who can buy only one access control system and use individual settings for each of their renters. Divisions can be adjusted and enhanced at any time.
Visitor management
Visitor management
You can combine our access control software (Access Management System) with our web-based visitor management software, offering you all the benefits for enhancing the visiting process. Effective visitor management must go beyond meeting and greeting visitors who enter the reception area of any business or public building. It must enhance building security, protect facilities and employees, and improve users' and visitors' overall experience. Bosch's easy-to-use, browser-based visitor management software integrates seamlessly with Access Management System.
Read more about Visitor management
Powerful hardware and software combination
An access control system combines logic, control and signaling to physically secure premises. It is therefore crucial that the software on the administrator’s side and the hardware at the door’s side, work together reliably. Bosch, being a manufacturer of both hardware and software, ensures a seamless integration in a consistent and reliable end-to-end solution.
Experience the powerful combination of the Bosch controller and software as the core of your access control system
Always available
Bosch has a unique two-step method to ensure that we can offer increased resilience and high availability. Our IP-based access control solution uses one or more (redundant) Master Access Controllers (MAC’s) between the server and the Access Modular Controllers (AMC). If the server fails, the MAC’s take over and ensure that the AMC’s still communicate with each other. This way, even functionalities that include various controllers such as anti-passback, guard tour and area control can still be performed.
And even in the very improbable case that both MAC’s would fail, the AMC’s remain active and can still make the right access decision based on the latest status available. During the time of missing connection, up to 2 million events can be stored. This technology provides the end-user with the highest system availability on the market.
Practical information
Here you can find some practical tools to help you understand our access control software offering. It includes an infographic that presents the features and benefits of our access control software with icons and pictures. Next to this an access management software system guide, to help you build your own access control system. Finally you can find the link to our online product catalog where you can download all the files you need for the latest version of Access Management System; V5.0
Infographic
Download our Access Management System infographic
Download
AMS System guide
Download our AMS System guide
Download
Contact us
If you are interested in the possibilities our access control software can offer you, or you would like to find out where you can buy our access control products, please click the button to contact your local contact person.
Contact your specialist
Explore more
- Access Control Systems overviewLearn more
- Visitor ManagementLearn more
- Mobile AccessLearn more
- Biometric Access ControlLearn more
- Let them in and keep them out- we help you to keep your premises secureVisit page
Access Control SystemsOffice and Apartment BuildingsSecurity