About Security Center Synergis™ - Security Center 5.10

Security Center Administrator Guide 5.10

Applies to
Security Center 5.10
Last updated
2023-06-12
Content type
Guides > Administrator guides
Language
English
Product
Security Center
Version
5.10

Security Center Synergis™ is the IP access control system (ACS) that heightens your organization’s physical security and increases your readiness to respond to threats. Synergis™ supports an ever-growing portfolio of third-party door control hardware and electronic locks. Using Synergis™, you can leverage your existing investment in network and security equipment.

Synergis™ was designed with an open and distributed architecture. You can build your system with new IP readers or use what you already have. Integrate your access control system with other third-party systems, like intrusion or building management, and distribute Synergis™ server components on many different network machines to optimize bandwidth and workload.

Synergis™ Enterprise supports an unrestricted number of doors, controllers and client workstations. You can grow your system one door at a time or scale your system across multiple buildings using the Federation™ feature.

How Synergis™ works

Synergis™ architecture is based on the server role known as the Access Manager, which controls the physical door controllers.

The following provides a general description of how Synergis™ architecture works:
  • System configurations are saved by the Directory role.
  • The Directory pushes configurations to the Access Manager.
  • Access Manager communicates directly with the physical door controllers, called access control units, over TCP/IP.
  • Access Manager pushes schedules, cardholder information, and access rules to the door controllers.
  • When a cardholder presents their credential to a reader, the controller refers to the access rule to determine whether the user should be granted or denied access.
  • After controllers have synchronized with the Access Manager, they can operate autonomously, even if they lose the network connection to the Access Manager.

With additional configuration, a cardholder can belong to a cardholder group, a door can be part of an area, and there can be multiple schedules and rules pushed to a unit.

Benefits of Synergis™

Unlike other access control solutions, Synergis™ does not use clearance codes or access levels to grant or deny access. Instead, the basic logic used by Synergis™ to grant or deny access is defined by access rules.

The biggest difference between an access rule approach and an access level approach is that access rules are applied to the access points of the physical locations we want to protect, whereas access levels are applied to people. Access rules specify who can pass through a door and when they can do so. An access level defines where and when a person can gain access.

An access rule contains the three W’s:

Notice that Synergis™ does not grant access to a card or credential. Rather, access is granted or denied based on the cardholders themselves. This subtle, but fundamental shift in the applied logic has a significant benefit in managing lost and stolen cards. The access rules that have been pushed to the door controllers do not have to be modified. If you associate a new credential with a cardholder, the old rule is still valid.