KeyScan Inc.

 

Keyscan is a leading manufacturer of premium access control solutions with more than 25 years dedicated to the design and manufacture of access control hardware and software. Industry-renowned for product quality and customer support, Keyscan systems are built on a foundation of versatility, flexibility, and scalability.

Keyscan designs, engineers and manufactures all of its hardware and software in North America to the highest level of quality. The organization has adopted a “One Solution” approach - offering one hardware and software platform that accommodates installations regardless of project size, complexity or vertical market. Whether your project is a small regional enterprise or a multi-national corporation with locations around the globe, the Keyscan team of professionals can design an access control system that addresses your real-world security challenges.

 


Introducing Keyscan Aurora Access Control Management Software

Keyscan Inc. is proud to release Keyscan Aurora, the new generation of Access Control Management Software.

describe the image

 Aurora delivers a dynamic new user experience that is customer-centric, intuitive and easy-to-use. These attributes combined with the Keyscan single software approach - allowing one solution to comfortably support small and mid-size installations, while exceeding the demands of much larger deployments - provides dealers-integrators with the ease of design, installation and support; and provides end users with features and capabilities that exceed their expectations in a format they are thrilled to interact with every day.

The Keyscan Aurora user interface creates a new world of possibilities. Leveraging the expanded processing power and capabilities built into the Keyscan line of access control and elevator control units, the software provides users a host of enhanced features including:

  • Support for up to 90 000 credentials
  • 10 assigned groups to a single individual
  • Multiple credentials assignable to a single user
  • Unlimited optional user-definable fields
  • Impressive panel-to-panel global communication
  • New multi-threaded communication structure

People Centric

Manage People

Schedule Management

Create Schedules

Reports

System Reporting

Active maps

Active Mapping

Visitor management

Visitor Management

Lockdown

Facility Lockdown


About Access Control

Access Control systems are about more than monitoring doors; they are an integral part of any security system and give users a convenient platform to manage their facilities. Traditional keys cannot track who and when people have access, and when keys go missing rekeying locks can be extremely expensive.

Keyscan Access Control systems solve all of these problems and many more, including:

  • performing a facility or area lock down from any PC or Keyscan reader
  • bringing motion detectors, glass breaks, door contacts, panic buttons into Keyscan to track and assign alarm conditions from a single interface 
  • calling up live video in the event of an alarm 
  • arming or disarming an intrusion panel via the access control system 
  • creating a map with active icons that show system status, control doors, call up video, show employee photos as they pass through protected doors, and much more 
  • run custom reports to determine what areas are accessed and when

Retrofitting an Existing Access Control System

If you are an existing user of an access control product and are experiencing one or more of the following, Keyscan can help:

  • I have found that my access control system has become antiquated
  • My current system doesn’t offer all of the features I need
  • I am not pleased with the performance of the system
  • I am looking to expand and am experiencing limitations

Retrofitting an existing system is often not as daunting a task as many originally anticipate. Keyscan is a non-proprietary system and in the majority of cases, the very same readers and credentials that are already installed at your facility can be utilized. Furthermore, the existing wiring connecting readers and electronic locking hardware to the system can also be reused.

By re-using the existing infrastructure, the costs associated with updating an access control system can be significantly reduced.