Skip to main content
Bosch Security and Safety Systems I South Korea
Access Control Systems

Access Control Software

missing

Access control is an essential component of building security. You need a truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. It offers the highest data security and several features found only in high-end security solutions. On top of this, the software is also open for integration with third party systems, thus making it a very versatile solution for your access control projects.

4 reasons why to choose Bosch access control software

Flexible and scalable

 

Our access control solution can easily grow with the needs of the customer. The software is offered in two pre-configured software bundles for different sized enterprises: Lite and Plus. The bundles offer each a large range of cardholders and doors enabling an easy upgrade when your organization grows. Up to 400.000 cardholders and up to 10.000 doors can be administered in the largest bundle. Since no hardware needs replacing, increasing the system size is very cost-efficient. This outstanding scalability makes the software a truly future-proof investment.

Flexible and scalable
Lite Plus
Lite
Included in bundle (Maximum extension)
Plus
Included in bundle (Maximum extension)
Doors
Lite
16 (80)
Plus
32 (10000)
Cards
Lite
200 (5000)
Plus
2000 (400000)
Divisions
Lite
1 (1)
Plus
2 (200)
Clients
Lite
1 (2)
Plus
2 (200)
Master Access Controller (MAC)
Lite
1 (1)
Plus
1 (40)
Guard tours
Lite
50 (50)
Plus
100 (200)
Intrusion command & control*
Lite
1 (50)
Plus
1 (80)
Intrusion user management*
Lite
1 (50)
Plus
1 (500)
Access Control API
Lite
yes (yes)
Plus
yes (yes)
*Applies to the B and G series intrusion alarm systems: same license for command & control and user management
Lite
Plus

Easy to use

 

The configuration of our access control software is easy: existing floor maps are imported into the system and icons are dragged and dropped to represent controllers, doors and building objects on the map view. Onboarding is straightforward: enrollment and assignment of access rights are all implemented in one dialog manager, even the registration of biometric data, for instance facial recognition. The data of several thousand cardholders held in legacy or HR systems can also be quickly imported with just a few clicks, thanks to the importer / exporter tool. The possibility to create access profiles with a certain scope of access privileges makes the assignment of authorizations simple, as it is not necessary to assign every single authorization to the cardholder but just one pre-defined role profile. To facilitate easy selection of available readers and controllers from the Bosch product catalogue, they are displayed with product photo and CTN number in the device configuration.

Easy to use
Software screen 1: map view
Map view of the building with real floor maps imported into the system. Drag and drop functionality for icons that represent controllers, doors and building objects.
Software screen 2: importer - exporter tool
Screenshot of the importer / exporter tool, which allows fast importing of bulk cardholders’ data.
Software screen 3: controller and reader configuration
Easy controller and reader configuration thanks to display of product photo and CTN number.
Software screen 4: live event display
Events are displayed live on the map view of the building, like the list of last cardholders who attempted to gain access to which doors, who was granted access and who was not.
/

Once installed and set up, using our user-friendly access control system is also easy, with an intuitive icon alarm list and color scheme to ensure fast and efficient operator reactions. At all times, the operator has full situational awareness thanks to the instant updates of events at the access points via the comprehensive overview on the on-screen map. The operator sees a constantly updated list of last cardholders who attempted to gain access to selected doors, who was granted access and who was not. In addition, the map view indicates the respective door on the map to allow the operator to quickly see where exactly the event is happening.

Easy to use

High data security

 

Bosch applies the highest standards with regard to data security and (GDPR compliant) privacy protection. To protect against cybercrime and the loss of personal data, all communication is encrypted at all stages. Our access control software also has trusted digital certificates for mutual authentication between server and client and uses secure design principles such as ‘secure-by-default’ and ‘principle of least privilege’. Your data is definitely safe with the industry-leading Bosch products.

High data security

Data Privacy

Strict access authorizations to personal data

Only relevant data can be collected

Data storage duration to comply with company policy

Data Security

Secure-by-design: encryption, authentication, certificates

Secure-by-default: all security settings on high per default

Principle of least privilege: assign granular privileges for operators

Open for integration

 

Flexibility and openness are very important to us. We designed our system to offer full integration functionality, while remaining as reliable and safe as you are used to with Bosch. The Access Control API is available to allow third party developers to design applications. This way you can offer much faster complete solutions to your customers.

Integration examples

  • Video management
  • Intrusion alarm management
  • Facility management (mobile apps)
  • Identity management (workflow based)
  • Visitor and supplier management
  • Guard tour management
  • Safety and personnel protection
  • Time and attendance management
  • Mobile and biometric reader integration
  • Parking and occupancy management
Open for integration
Integrations

Third party integrations

Our software solution for access control is able to connect to non-Bosch reader devices and non-Bosch software. Our latest enhancements allow integration of an increasing number of third-party applications with our access control system.

Security operator using video management system

Video management integration

You can use our access control software (Access Management System) in combination with video surveillance systems like Bosch Video Management System (BVMS 10.1 or higher) or systems from third parties like Milestone Xprotect. Integration with a video management system offers manual video verification to increase the security level at doors. Here the monitoring operator verifies if the person at the door matches the registered person in the database and if so, allows the person to enter. You can also use it to search for specific events. Moreover, access commands and events can be handled by the video management system, making the operation of the integrated system most efficient.

Woman using pin code to operate intrusion alarm system

Intrusion detection integration

The integration with B and G Series Intrusion Control Panels facilitates the combination of efficient authorization management and a central overview of all access and intrusion authorizations. Operators can add, delete and modify intrusion-related user passcodes and authorizations directly in our access control software (Access Management System), as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion areas directly in the system's user interface and see their arming status on the system map. This provides operators with a central overview of all access and intrusion states, allowing a remote management to handle intrusion alarms efficiently. Please note: the B Series and G Series panels are not available in European countries.

Time & Attendance

Time and attendance integration

Our software offers a default easy export of data that third-party Time and attendance or HR systems need. For systems that cannot work with the default data, our software offers the possibility to customize your export file with time stamps. We have a practical step-by-step instruction available how the customizable exportation is done. Thanks to this export functionality you can choose any solution that best fits your needs and have it work seamlessly with our access control software.

Offline locks

Offline locks integration

Offline locks offer flexibility for projects with remote locations or architectural design limitations. Also for interior doors that require a moderate level of security, such as storage rooms and office areas. Our software offers full functionality for offline locks integration, making it possible to choose any offline locks vendor that supports the OSS-SO standard.

Parking management

Parking management integration

Next to using standard readers, access to parking lots can also be regulated by long-range readers and ID cards, or by video cameras and license plate recognition. There are many specialized parking management suppliers and our access control software can be integrated with almost all of them.

Powerful software

 

High-end security features

Powerful hardware and software combination

An access control system combines logic, control and signaling to physically secure premises. It is therefore crucial that the software on the administrator’s side and the hardware at the door’s side, work together reliably. Bosch, being a manufacturer of both hardware and software, ensures a seamless integration in a consistent and reliable end-to-end solution.

Experience the powerful combination of the Bosch controller and software as the core of your access control system

Technician Controller

Always available

Bosch has a unique two-step method to ensure that we can offer increased resilience and high availability. Our IP-based access control solution uses one or more (redundant) Master Access Controllers (MAC’s) between the server and the Access Modular Controllers (AMC). If the server fails, the MAC’s take over and ensure that the AMC’s still communicate with each other. This way, even functionalities that include various controllers such as anti-passback, guard tour and area control can still be performed.

And even in the very improbable case that both MAC’s would fail, the AMC’s remain active and can still make the right access decision based on the latest status available. During the time of missing connection, up to 2 million events can be stored. This technology provides the end-user with the highest system availability on the market.

Practical information

Here you can find some practical tools to help you understand our access control software offering. It includes an infographic that presents the features and benefits of our access control software with icons and pictures. Next to this an access management software system guide, to help you build your own access control system. Finally you can find the link to our online product catalog where you can download all the files you need for the latest version of Access Management System.

Access Management System infographic
Access Management System infographic

Infographic

Download our Access Management System infographic

AMS System guide

AMS System guide

Download our AMS System guide

Contact us

Contact us

 

If you are interested in the possibilities our access control software can offer you, or you would like to find out where you can buy our access control products, please click the button to contact your local contact person.

Share this on: