Access Control Software (2024)

Access Control Systems

Access Control Software (2)

Access control is an essential component of building security. You need a truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. It offers the highest data security and several features found only in high-end security solutions. On top of this, the software is also open for integration with third party systems, thus making it a very versatile solution for your access control projects.

4 reasons why to choose Bosch access control software

Access Control Software (4)

Flexible and scalable

Our access control solution can easily grow with the needs of the customer. Three software bundles enable up to 400.000 cardholders and up to 10.000 doors.

Access Control Software (5)
Access Control Software (7)

Easy to use

Our user-friendly access control software offers efficient and user-friendly tools to configure the system and an intuitive, modern GUI for easy and convenient operation.

Access Control Software (8)
Access Control Software (10)

High data security

Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages.

Access Control Software (11)
Access Control Software (13)

Open for integration

Our software solution for access control is able to connect to non-Bosch software and devices. Our latest enhancements allow easy integration of third-party applications.

Access Control Software (14)

Flexible and scalable

Our access control solution can easily grow with the needs of the customer. The software is offered in three pre-configured software bundles for different sized enterprises: Lite, Plus and Professional. The bundles offer each a large range of cardholders and doors enabling an easy upgrade when your organization grows. Up to 400.000 cardholders and up to 10.000 doors can be administered in the largest bundle. Since no hardware needs replacing, increasing the system size is very cost-efficient. This outstanding scalability makes the software a truly future-proof investment.

Access Control Software (15)
LitePlusProfessional
Lite

Included in bundle (Maximum extension)

Plus

Included in bundle (Maximum extension)

Professional

Included in bundle (Maximum extension)

Doors

Lite

16 (80)

Plus

32 (288)

Professional

128 (10000)

Cards

Lite

200 (5000)

Plus

2000 (10000)

Professional

5000 (400000)

Divisions

Lite

1 (1)

Plus

2 (5)

Professional

5 (200)

Clients

Lite

1 (2)

Plus

2 (5)

Professional

5 (200)

Master Access Controller (MAC)

Lite

1 (1)

Plus

1 (5)

Professional

1 (40)

Guard tours

Lite

50 (50)

Plus

100 (100)

Professional

200 (200)

Web-based Visitor Management

Lite

no (yes)

Plus

no (yes)

Professional

yes (yes)

Intrusion command & control*

Lite

1 (50)

Plus

1 (80)

Professional

1 (80)

Intrusion user management*

Lite

1 (50)

Plus

1 (200)

Professional

1 (500)

REST API

Lite

no (no)

Plus

yes (yes)

Professional

yes (yes)

*Applies to the B and G series intrusion alarm systems: same license for command & control and user management

LitePlusProfessional

The configuration of our access control software is easy: existing floor maps are imported into the system and icons are dragged and dropped to represent controllers, doors and building objects on the map view. Onboarding is straightforward: enrollment and assignment of access rights are all implemented in one dialog manager, even the registration of biometric data, for instance facial recognition. The data of several thousand cardholders held in legacy or HR systems can also be quickly imported with just a few clicks, thanks to the importer / exporter tool. The possibility to create access profiles with a certain scope of access privileges makes the assignment of authorizations simple, as it is not necessary to assign every single authorization to the cardholder but just one pre-defined role profile. To facilitate easy selection of available readers and controllers from the Bosch product catalogue, they are displayed with product photo and CTN number in the device configuration.

Access Control Software (16)
Access Control Software (17)
Access Control Software (18)
Access Control Software (19)
Access Control Software (20)

/

Once installed and set up, using our user-friendly access control system is also easy, with an intuitive icon alarm list and color scheme to ensure fast and efficient operator reactions. At all times, the operator has full situational awareness thanks to the instant updates of events at the access points via the comprehensive overview on the on-screen map. The operator sees a constantly updated list of last cardholders who attempted to gain access to selected doors, who was granted access and who was not. In addition, the map view indicates the respective door on the map to allow the operator to quickly see where exactly the event is happening.

Access Control Software (21)

High data security

Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages. Our access control software also has trusted digital certificates for mutual authentication between server and client and uses secure design principles such as ‘secure-by-default’ and ‘principle of least privilege’. Your data is definitely safe with the industry-leading Bosch products.

Access Control Software (22)

Data Privacy

Strict access authorizations to personal data

Only relevant data can be collected

Data storage duration to comply with company policy

Data Security

Secure-by-design: encryption, authentication, certificates

Secure-by-default: all security settings on high per default

Principle of least privilege: assign granular privileges for operators

Open for integration

Flexibility and openness are very important to us. We designed our system to offer full integration functionality, while remaining as reliable and safe as you are used to with Bosch. A REST based API (REST API) is available to allow third party developers to design applications. This way you can offer much faster complete solutions to your customers.

Integration examples

  • Video management
  • Intrusion alarm management
  • Facility management (mobile apps)
  • Identity management (workflow based)
  • Visitor and supplier management
  • Guard tour management
  • Safety and personnel protection
  • Time and attendance management
  • Mobile and biometric reader integration
  • Parking and occupancy management
Access Control Software (23)
Access Control Software (24)

Third party integrations

Our software solution for access control is able to connect to non-Bosch reader devices and non-Bosch software. Our latest enhancements allow integration of an increasing number of third-party applications with our access control system.

Check out our third party integrations

Access Control Software (25)

Video management integration

You can use our access control software (Access Management System) in combination with video surveillance systems like Bosch Video Management System (BVMS 10.1 or higher) or systems from third parties like Milestone Xprotect. Integration with a video management system offers manual video verification to increase the security level at doors. Here the monitoring operator verifies if the person at the door matches the registered person in the database and if so, allows the person to enter. You can also use it to search for specific events. Moreover, access commands and events can be handled by the video management system, making the operation of the integrated system most efficient.

Access Control Software (26)

Intrusion detection integration

The integration with B and G Series Intrusion Control Panels facilitates the combination of efficient authorization management and a central overview of all access and intrusion authorizations. Operators can add, delete and modify intrusion-related user passcodes and authorizations directly in our access control software (Access Management System), as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion areas directly in the system's user interface and see their arming status on the system map. This provides operators with a central overview of all access and intrusion states, allowing a remote management to handle intrusion alarms efficiently. Please note: the B Series and G Series panels are not available in European countries.

Access Control Software (27)

Time and attendance integration

Our software offers a default easy export of data that third-party Time and attendance or HR systems need. For systems that cannot work with the default data, our software offers the possibility to customize your export file with time stamps. We have a practical step-by-step instruction available how the customizable exportation is done. Thanks to this export functionality you can choose any solution that best fits your needs and have it work seamlessly with our access control software.

Access Control Software (28)

Offline locks integration

Offline locks offer flexibility for projects with remote locations or architectural design limitations. Also for interior doors that require a moderate level of security, such as storage rooms and office areas. Our software offers full functionality for offline locks integration, making it possible to choose any offline locks vendor that supports the OSS-SO standard.

Parking management integration

Next to using standard readers, access to parking lots can also be regulated by long-range readers and ID cards, or by video cameras and license plate recognition. There are many specialized parking management suppliers and our access control software can be integrated with almost all of them.

Powerful software

High-end security features

Access Control Software (31)

Multi-factor authentication

To be able to prove a person’s right to enter, you need to have some form of authentication. There are various identification modes possible such as an access card, a key fob, pin code or biometric data. After authentication, the reader sends information to the controller and the latter verifies with the server if the user is authorized to enter. When only one identification mode is applied, this is called single-factor authentication. Two-factor or multi-factor authentication requires one or more additional identification modes, and access is only granted if all features match. Our systems support the combined use of cards, pin codes, fingerprints, facial recognition, etc. This way you can make sure the protection of the premises meets a high level of security requirements.

Access Control Software (32)
Access Control Software (34)

Global anti-passback

Anti-passback is a security measure that prevents a second entry with the same access card. The Global anti-passback function ensures that this security measure is applied at all locations within the facility. If any one reader in the area receives an anti-passback violation, it will prevent that access card holder from entering through other doors in the same area.

Access Control Software (35)
Access Control Software (37)

Threat level management

Threat level management facilitates guaranteeing a high level of safety. Up to 15 configurable threat levels ensure that safety measures or restrictions can be initiated quickly in critical situations such as a fire or terrorist attack. The different threat levels can – in minimum time – make all doors open, all doors locked, or a mix of some open and some blocked. A unique option that Bosch offers to use in threat situations is the possibility to reconfigure certain doors in a second so that only first responders with the highest authorization get permission to enter the area, while all other cardholders are blocked. Besides in high threat situations, threat level management is also useful in case of low threat level situations like sports events, open days, or parents’ evenings at schools.

Access Control Software (38)
Access Control Software (40)

Parking management

If you would like to control the usage of your parking area, using the parking management feature is very helpful. Each parking lot can be divided into logical areas, with a maximum number of cars defined for them. When the parking area has reached its maximum capacity, you can prevent access for arriving cars. Load-balancing of the parking lots is also possible, with current capacity information displayed on the operator’s screen.

Access Control Software (41)
Access Control Software (43)

Guard tour management

If you want your building to be guarded by a security guard, the feature ‘Guard Tour’ in our access control software is a very useful one: you can indicate a route around the premises, punctuated by card readers, where the guard must present a special guard card to prove that he has physically visited the reader. The guard tour consists of a series of readers with the calculated walking time in seconds. The maximum tolerable delay between readers, and the tolerable deviation (+/-) from the start time, are also attributes of the guard tour. Deviations outside of these defined tolerances can potentially trigger alarms or show real-time video to protect the guard.

Access Control Software (44)
Access Control Software (46)

Division management

For larger premises it is possible to set up different divisions for the access control system. With our access control software, you can create up to 400 divisions, depending on the license type. For instance, in the case of a multi-company building, companies can share one access control system in the building. When they log in to the system, only information from their own company and possibly shared areas are shown. Also very suitable for building owners, who can buy only one access control system and use individual settings for each of their renters. Divisions can be adjusted and enhanced at any time.

Access Control Software (47)
Access Control Software (49)

Visitor management

You can combine our access control software (Access Management System) with our web-based visitor management software, offering you all the benefits for enhancing the visiting process. Effective visitor management must go beyond meeting and greeting visitors who enter the reception area of any business or public building. It must enhance building security, protect facilities and employees, and improve users' and visitors' overall experience. Bosch's easy-to-use, browser-based visitor management software integrates seamlessly with Access Management System.

Read more about Visitor management

Access Control Software (50)

Powerful hardware and software combination

An access control system combines logic, control and signaling to physically secure premises. It is therefore crucial that the software on the administrator’s side and the hardware at the door’s side, work together reliably. Bosch, being a manufacturer of both hardware and software, ensures a seamless integration in a consistent and reliable end-to-end solution.

Experience the powerful combination of the Bosch controller and software as the core of your access control system

Access Control Software (51)

Always available

Bosch has a unique two-step method to ensure that we can offer increased resilience and high availability. Our IP-based access control solution uses one or more (redundant) Master Access Controllers (MAC’s) between the server and the Access Modular Controllers (AMC). If the server fails, the MAC’s take over and ensure that the AMC’s still communicate with each other. This way, even functionalities that include various controllers such as anti-passback, guard tour and area control can still be performed.

And even in the very improbable case that both MAC’s would fail, the AMC’s remain active and can still make the right access decision based on the latest status available. During the time of missing connection, up to 2 million events can be stored. This technology provides the end-user with the highest system availability on the market.

Practical information

Here you can find some practical tools to help you understand our access control software offering. It includes an infographic that presents the features and benefits of our access control software with icons and pictures. Next to this an access management software system guide, to help you build your own access control system. Finally you can find the link to our online product catalog where you can download all the files you need for the latest version of Access Management System; V5.0

Access Control Software (52)
Access Control Software (53)

Infographic

Download our Access Management System infographic

Download

Access Control Software (54)

AMS System guide

Download our AMS System guide

Download

Latest access control software: Access Management System 5.0Go to product catalog

Contact us

Access Control Software (55)

If you are interested in the possibilities our access control software can offer you, or you would like to find out where you can buy our access control products, please click the button to contact your local contact person.

Contact your specialist

Explore more

  • Access Control Systems overviewLearn more
  • Visitor ManagementLearn more
  • Mobile AccessLearn more
  • Biometric Access ControlLearn more
  • Let them in and keep them out- we help you to keep your premises secureVisit page

Access Control SystemsOffice and Apartment BuildingsSecurity

Access Control Software (2024)

References

Top Articles
Latest Posts
Article information

Author: Dr. Pierre Goyette

Last Updated:

Views: 6364

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Dr. Pierre Goyette

Birthday: 1998-01-29

Address: Apt. 611 3357 Yong Plain, West Audra, IL 70053

Phone: +5819954278378

Job: Construction Director

Hobby: Embroidery, Creative writing, Shopping, Driving, Stand-up comedy, Coffee roasting, Scrapbooking

Introduction: My name is Dr. Pierre Goyette, I am a enchanting, powerful, jolly, rich, graceful, colorful, zany person who loves writing and wants to share my knowledge and understanding with you.