About Security Center Synergis™ - Security Center 5.9

Security Center User Guide 5.9

Applies to
Security Center 5.9
Last updated
2021-06-16
Content type
Guides > User guides
Language
English (United States)
Product line
Security Center unified platform > Security Center
Version
5.9

Security Center Synergis™ is the IP access control system (ACS) that heightens your organization’s physical security and increases your readiness to respond to threats. Supporting an ever-growing portfolio of third-party door control hardware and electronic locks, it allows you to leverage your existing investment in network and security equipment.

Synergis™ was designed with an open and distributed architecture. You can build your system with new IP readers or use what you already have. Integrate your access control system with other third-party systems, like intrusion or building management, and distribute Synergis™ server components on many different network machines to optimize bandwidth and workload.

Synergis™ Enterprise supports an unrestricted number of doors, controllers and client workstations. You can grow your system one door at a time or scale your system across multiple buildings using the Federation™ feature.

How Synergis™ works

Synergis™ architecture is based on the server role known as the Access Manager, which controls the physical door controllers.

The following provides a general description of how Synergis™ architecture works:
  • System configurations are saved by the Directory role.
  • The Directory pushes configurations to the Access Manager.
  • Access Manager communicates directly with the physical door controllers, called access control units, over TCP/IP.
  • Access Manager pushes schedules, cardholder information, and access rules to the door controllers.
  • When a cardholder presents their credential to a reader, the controller refers to the access rule to determine whether the user should be granted or denied access.
  • Once controllers have synchronized with the Access Manager, they can operate autonomously, even if they lose the network connection to the Access Manager.

With additional configuration, a cardholder can belong to a cardholder group, a door can be part of an area, and there can be multiple schedules and rules pushed to a unit.