You are on page 1of 20

How to Deploy an

Advanced Building
Access System
Your Guide to Protecting Your Sites
with a Cost-Effective Security Solution

In today’s environment, it’s more important


than ever to deploy a building access system
with state-of-the-art security features.

Centralized management, user-level permis-


sions, detailed logging & advanced notifica-
tions are all tools that will combat theft and
vandalism.

A high-quality building access system will


enhance the security of your sites. This guide
to will show you how to better protect your Version 1.0
revenue-generating equipment. Released June 30, 2007

www.dpstelecom.com • 1-800-622-3314 US $36.95

“We protect your network like your business depends on it”TM


© Copyright 2007 DPS Telecom

All rights reserved, including the right to reproduce this white paper or portions thereof in any form with-
out written permission from DPS Telecom. For Information, please write to DPS Telecom 4955 E. Yale
Ave., Fresno, CA 93727-1523 • Call: 1-800-622-3314 • Email: info@dpstele.com

Printed in the U.S.A


Executive Summary
With crime rates on the rise, it is more important than ever to protect your sites with a comprehen-
sive building access system. In July, 2200 homes in Lexia, Australia were without power when
West Power Company's mission-critical equipment was damaged by vandals. In February, thou-
sands of customers in Virginia were left without phone service or access to 911 due to the theft sev-
eral hundred thousand dollars worth of communications equipment. Later that month, 100,000 cus-
tomers in Wisconsin were without cable when Charter Communications had network equipment
maliciously damaged.

How many of your best customers would be affected negatively if your mission-critical equipment
or facilities were stolen or vandalized? Do you know how much revenue you stand to lose?

With incidences of industrial vandalism and theft on the rise, you need to protect your company's
important assets. While you may have been hesitant to invest in a building access security system
due to the high costs of purchasing new security equipment, you can now seamlessly integrate
building access elements into your existing network alarm monitoring system. This integrated
building access security will protect your sites from security threats.

This white paper is a guide to the essential elements of a building access system. It will give you
the information you need to increase uptime and protect your revenues though site monitoring.

Contents

What is a Building Access System?........................................................................................................4


Why do I need a Building Access System?............................................................................................4
4 Basic Elements of a Well Designed Building Access System............................................................5
12 Key Building Access System Features..............................................................................................6
7 Costly Pitfalls of Physical Locks and Keys........................................................................................8
9 Advantages of Electronic Access Control ..........................................................................................9
The Secret to Agile Disaster Recovery..................................................................................................10
The DPS SiteCAM.................................................................................................................................11
Case Study: All West Communications Eliminates Costly and Dangerous Windshield Time..............12
Case Study: SAIC Protects Mission-Critical IT Services with Alarm Monitoring...............................13
4 Intelligent Propped Door Features......................................................................................................14
Get Peace of Mind with a High-Quality Access Control Solution........................................................15
DPS Building Access System Specifications.........................................................................................16

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
What is a Building Access System?
A building access system protects your profits by keeping revenue-generating equipment secure. It also reduces the
cost of managing geo-diverse remote sites, as you can view and control access remotely from a central terminal.

Why do I need a Building Access System?


Whether or not you’ve already experienced theft or vandalism in your network, your unmanned sites are vulnerable.
While you might expect this type of criminal activity from strangers, an alarming amount of damage is done by
employees, ex-employees, and outside contractors.
With industrial crime on the rise, you need more than basic security features. A simple lock-and-key system is not a
viable security solution, and it will not adequately protect your network uptime. To effectively manage your sites,
you need to restrict access to authorized personnel only. Traditional keys can’t give you user-level access control,
and they also can’t provide you with a log of every entry and exit.

The Optimal Building Access System is Integrated Into Your


Alarm Monitoring System
If you’re planning to deploy a new building access system, there is one very important factor that you must not
ignore. If you accomplish alarm monitoring and access control with a single system, you’re doing yourself and your
company a big favor. Integration with your alarm monitoring system will provide you with many benefits:

• You’ll achieve price economies by purchasing one system instead of two.


• You’ll receive building access alarms on the same screen as all of your other alarms.
• You won’t have to add another terminal to your NOC.
• You’ll leverage your existing monitoring investment and avoid installing expensive new transport.
• You’ll only have to deal with one vendor, giving you a single point of contact.

A good building access system should integrate seamlessly into your current alarm monitoring system. You already
have capable site controllers in your remotes, and you already have a central terminal - your alarm master.
Integration with alarm monitoring makes building access as easy as installing user input devices (keypads or card
readers) at your entry points. The rest of the access system components, and its transport network, is already present
in your deployed alarm monitoring system.

By integrating your building access system into your current alarm monitoring system, you are also establishing
access control that can be managed from a central location, greatly reducing costly windshield time - the time you
spend driving to remote sites because you have inadequate visibility.

"It was easy to see that if we could enhance the DPS building access, that
was the way to go... We were very motivated because we like DPS. It was
already everywhere, and we didn't want another terminal in our NOC."
-Dennis E.
Sr. Systems Engineer

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
4
4 Basic Elements of a Well Designed Building Access System
A building access system is composed of four basic pieces, the Master, the Site Controller, the Entry Control Unit, and
the User Input Device. These four components are crucial to creating or expanding your building access system.

Centralized Management Creates an Optimal Building Access System


Alarm Master
Provides centralized
management for your entire
building access system

Site Controller
Site A Site N Controls local
access at each site

Entry Control Unit


User Input
Processes data from
Device
keypads or keycards
Accepts input
from entrant
(code or key-
card)

1) Master Station:
A master station interfaces with your Site Controllers and provides centralized management for your
entire system.

2) Site Controller:
The Site Controller controls local access at your remote site. The unit maintains a list of personnel
who are authorized to access the facility. The Site Controller knows which personnel can access
which doors during which days and hours. It records all valid entries, attempts, and the time of each
action. It can hold up to 1,300 user profiles. A good Site Controller should maintain a history log
that records a running tally of each indiviual site access. It should also have the capability to operate
autonomously (independent of the alarm master).

3) Entry Control Unit:


This device is mounted on the interior of the site directly behind the the proxy card reader. An access
code that is read by the proxy card reader is accepted by the ECU and sent onto the Site Controller or
the master station for validation. If the access code is valid, the ECU will release the door strike.

4) User Input Device (Keypad or Proxy Reader):


These devices are mounted to a wall or the door itself. The proxy card reader sends codes from key-
pads or keycards to the Entry Control Unit for verification.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
5
12 Key Building Access System Protect Your Return on
Features Investment — Make Sure
Your Vendor Offers
1) Centralized Management Guaranteed Results
Your building access system should be manageable from a central termi-
nal. This will allow you to watch over and control your access points In my experience, clients who think
from a single monitoring platform, which can be accessed remotely. This hard about cost justification have a
increases overall system effectiveness and reduces staffing requirements. much more important concern than
just price. They want to make sure that
2) Proximity Reader Support (Wiegand + Custom) they’re not
Proximity card readers offer a variety of advantages over spending their
traditional keypads. Keycards cannot be shared with others company’s
as codes can be, and keycards are much better for use in money on a sys-
hostile climates. A good access system should support a tem that doesn’t
selection of user input devices, including proximity readers work as adver-
and keypads.
tised.
Bob Berry
3) Detailed Logging That’s smart. Chief Executive Officer
Your access system should log every entry to your sites. Knowing exactly
You have to be DPS Telecom

who accessed your sites, and when they did so, is crucial the event of van- careful when
dalism or theft (or simply to proactively locate your employees). working with equipment vendors,
especially on protocol mediation
4) Compatibility with Site Power projects. Most vendors can’t support
Your building access system should operate on site power, all your legacy equipment, and they
either battery or commercial. By using protected power, don’t have the development capabili-
your system will still work during a commercial power fail- ties to make integration work.
ure. Some vendors will charge you large
NRE (non-refundable engineering)
5) Sufficient Size for Your Network fees up front for custom work, and
If you are going to incorporate an access system into a large network, it give no guarantee that the resulting
should support for at least 1,000 user codes or keycards at each site, with product will meet your performance
support for at least 50,000 total codes or cards throughout the enterprise. requirements.

6) Access Scheduling Personally, I think that’s a lousy way


to do business. I give all my clients a
You should be able to define a weekly schedule for
site access. This ensures that your sites can only be
30-day guarantee: If my product
accessed when they should be. doesn’t completely satisfy you,
return it for a full refund. If I can’t
7) Multiple Transport Options give you a solution, I don’t want your
Your building access system should support multiple paths for upstream
money. If I’m doing custom work for
communication. LAN and serial should be available. you, I don’t expect you to pay for it
until I’ve proven that it works to your
8) Fault-Tolerance- A good BAS has a redundant user database. satisfaction.
Individual sites must be able to operate independently of the master if Very few vendors will make that guar-
communication is lost. The goal is to make the decision of access locally, antee. But you need to demand the
then report to the master. By alleviating the reliance on the master,you best level of service from your vendor
can get fast access, even in the event of a communication failure. to ensure that your implementation is
100% successful.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
6
9) Independent Door Control
Look for an access system that gives you the power to control each door at your facility independently.
You might want to give many users access through the front door, but restrict access to a central area to
just a handful of key staff. To do this, you must be able to control exactly which doors can be entered by
which personnel.

10) Centralized Management


Imagine driving to a mountaintop site every time you want to change a code. From a single termi-
nal with a single operator, you must be able to manage all of your staff access requirements. An
access system that can be administered remotely adds to your bottom line by minimizing costly
windshield time.

11) Video Surveillance


A complete network alarm management system requires more than just environmental and equipment monitoring.
Security and personnel issues are also part of the complete picture. Video surveillance is especially useful when used
in conjunction with a building access system. This will allow you to visually watch over your site.

Video surveilance enables you to:


• Capture images of unauthorized access in the event of theft or vandalism
• Visually confirm who is at the door before giving them access to the facility
• Visually confirm critical environmental conditions
• Assist technicians at remote facilities

12) Web Browser Access


You need to be able to view detailed information about your remote site. Look for a building
access system that has a built-in web-browser interface. With a web-browser interface, multiple
users can view the conditions at a single site.

A Fault-Tolerant System Functions When You Need it Most


If this line is severed, the ECU con-
tains a single emergency code that
allows access.

If this line is severed the Site Controller


can make local access decisions with
1,300 stored access codes.

Fault-tolerant systems store user access codes in multiple locations, allowing the system to continue to function when
critical communication lines are severed.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
7
7 Costly Pitfalls of Physical Locks and Keys

1) Physical Keys are Easy to Copy


As long as you continue to use tra-
The DPS Building Access System Supports
ditional locks and keys to secure Keypads and Proxy Card Readers
your sites, you can never know how
many unauthorized copies have
been made - or who is holding them. How many times have
you copied a “Do Not Duplicate” key at a hardware store?
Keypad
The DPS Keypad is a time-
2) Lost Keys Force You to Change the Locks tested user input device. It is
designed to withstand extreme
If you lose a traditional key, the only way to maintain securi-
heat and cold, and the metal
ty is to change all the locks that it can access. Imagine the
hood provides added security
cost of losing an entire ring of keys, necessitating the replace-
from prying eyes.
ment of multiple locks at your sites. When a key is lost, you
have to assume the worst case scenario.
Because data processing is handled primarily by the
Entry Control Unit (ECU), which is mounted inside of
3) Forgetting a Key is a Major Hassle your building, you’re better off trying to guess codes
Every time a technician forgets to take a key on a truck roll, than to “hotwire” the keypad. The design of the system
your travel time and expense doubles. That tech has to drive makes manipulation via the internal wiring impossible.
back to the office, pick up a key, then drive all the way back However, even attempting to enter false key codes will
out to the site. The same situation can occur if that tech sim- lock the sytem and alert the regional operating center
ply picks up the wrong key, as large organizations will have after only five failed attempts.
at the very least dozens of similar looking keys.

4) Keys Inhibit In-Field Dispatch


If you already have a tech in the field near the site of an
alarm, it’s almost always best to dispatch them from their
current location. If they don’t have the right key on hand, Proxy Card Reader
however, they’ll have to drive all the way back to the NOC to
The proximity card reader has
pick up the key they need.
several advantages over other
input devices. Like traditional
5) Key Usage Can’t Be Logged or Tracked magnetic stripe cards, proximi-
Physical keys make it impossible to log entries to your sites. ty cards cannot be easily
shared by employees - a card
6) Locks and Keys Can’t Efficiently Provide cannot be in two places at
User-Level and Time-of-Day Access Control once.
Keys always work, even when you don’t want them to.
Unlike magnetic-stripe cards, however, you never have
There are probably few legitimate reasons why a site needs to
to struggle with failed swipes. You simply hold your
be accessed on Sundays at 3 a.m., but you can’t restrict
card within a few inches of the environmentally sealed
access times with traditional keys.
reader to gain access to the site. This is especially
handy in colder climates, where you don’t have to
7) Phyisical Locks Don’t Support Remote remove gloves to swipe a card or enter a keycode.
“Buzz In”
If an unexpected event comes up and you want to allow Proximity cards are also much more difficult to dupli-
access to a site immediately, you can’t if you use traditional, cate than magnetic-stripe cards.
physical locks.

8) You Have to Deal With Heavy Keyrings


With traditional keys, you almost always end up carrying large, heavy keyrings to access multiple sites. If
you lose a full ring of keys, the cost to change the locks can qucikly become astronomical.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
8
9 Advantages of Electronic Access Control
1) Electronic Keys are Difficult to Duplicate
While physical keys can be copied very easily, duplicating electronic keys requires a much higher degree of sophistica-
tion. This makes your access system much more secure than it could ever be with physical keys.

2) You NEVER Have to Change the Locks


An electronic user database means that you never have to change locks at your sites. If a keycard is ever lost, it can be
immediately removed from the database and a new one can be issued. If an employee leaves your company, his or her
access rights can be deleted within seconds. This greatly lowers your overall exposure to risk.

3) You Only Have to Remember One Key


With electronic access, your single key or access code grants you access to every door you need to access, so there’s no
chance of forgetting the key for a particular door. If you get to a site where you need access and you are not recognized
by the system, a network operator can add you or your supervisor to the list instantly.

4) Electronic Keys Reduce Windshield and Repair Time


If a tech needs additional access to handle an emergency in the field, his or her rights can be updated immediately. This
way, the tech can travel straight to the emergency without returning to the office, reducing costly windshield time and
accelerating repairs.

5) Complete History Logging


With an electronic access system, every entry to your sites is logged for later review. This can be an invaluable tool
when investigating vandalism or theft, or for tracking response times or techincal activities internally.

6) Electronic Access Control is Completely Customizable for Every User


Electronic access control gives you the ability to set user-level access rights all the way down to individual doors and
times. This minimizes your exposure to risk by granting no more site access than is necessary.

7) Electronic Locks Permit Remote “Buzz In”


If a tech or outside contractor needs access to a locked site, you can open that door remotely from your central terminal.
This gives you an extra degree of flexibility while making sure that you know about entries into your sites.

8) You Won’t Waste Time and Pocket Space with Electronic Access
With electronic access control, you’ll never have carry (or risk losing) a large ring of keys.

9) Electronic Access Systems Can Notify You of Propped Doors


If a tech or anyone else decides it’s a good idea to prop open a door at a secured site, you’ll receive a prompt notification.

Success Story: All West Communications Eliminates Costly &


Dangerous Windshield Time With Advanced Alarm Monitoring

“By watching our technicians, we can help step them through


what is going on. It can also help if we have an intrusion alarm or
a fire alarm. We can instantly see what's going on."
Darcy Kunz
V.P. of IT Operations
All West Communications
Visit www.TheProtocol.com to read the full story

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
9
The Secret To Agile Disaster Recovery:
The Fault-Tolerant Building Access System from DPS Telecom
When Mother Nature threatens your network, you must be able to respond swiftly. If your building access system is
knocked out, your staff’s ability to conduct repairs will be severely limited.

When Disaster Strikes, Fault-Tolerant Systems Are Invaluable


To ensure that you are able to bounce back after a natural disaster, any building access system you select must continue
to function when connectivity between its parts is lost.

The DPS Telecom Building Access System continues operating during connection losses. Each of the three main com-
ponents of the system (Master, Site Controller, and the ECU) can function locally without an upstream connection.

The Master contains the complete set of access codes, but each Site Controller contains up to 1,300 codes for its local
site. If the connection to the master is lost, your access system will continue to function normally.

In the unlikely event that the ECU loses its link to the Site Controller, the ECU contains a single emergency key that
will allow access to the site - and that key will only allow access during a connectivity loss.

Master
Contains the complete
database of user
access codes

Site Controller
Contains up to 1,300 local
access codes

Entry Control Unit (ECU)


Contains a single emergency
key that will function when
the unit loses its connection
to the Site Controller

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
10
SiteCAM

Achieve Visual Remote Site Visibility


With the NetGuardian SiteCAM, you don’t have to wonder what’s happening at your sites. You can see for yourself.

The SiteCAM connects directly to your NetGuardian and delivers high-quality live video of your remote site. This is great for
co-location sites, where chances for interference with your equipment are particularly high. It’s also valuable for walking techni-
cians through repairs from the comfort of your central office.

SiteCAM Benefits:
•Capture images of
unauthorized facility access

•Visually confirm who is at a


door before giving them
access to the facility.

•Visually check critical


environmental conditions

•Assist technicians at remote


facilities

•Check the weather status of


remote sites.

•Connect Up to 4 cameras per


NetGuardian

•45º field of view

•Focus range 1m to infinity

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
11
Case Study: All West Communications Eliminates
Costly & Dangerous Windshield Time With Advanced
Alarm Monitoring and Integrated Video Surveillance
All West Communications, Inc. has been serving Utah cus-
tomers since 1912. The company provides telephone serv-
Remembering a Client-Oriented Vendor
ice, dialup, high-speed internet access, digital cable televi-
sion, and call centers throughout several western US states. Leads to a New Monitoring Partnership
All West also operates a premier web-hosting business and As Kunz searched for a solution to his discontinued equip-
a cellular service. ment problem, DPS Telecom came to mind. Kunz had
already spoken to DPS at a tradeshow and had been receiv-
ing the monthly DPS Ezine The Protocol for several years.
Harsh Winters Make Site Visits Costly &
After his web-based research, Kunz signed up to participate
Perilous in a DPS Live Meeting Room.
In Utah, harsh winters make on-site maintenance a daunt-
ing task. But regardless of weather conditions, it is the
responsibility of the All West IT department to monitor and
protect the operation of fiber optic lines, microwave radio
towers, and switching equipment. That's a pretty big chal-
lenge says Darcy Kunz, All West's V.P. of IT Engineering
and Operations. "Some of our sites are at 10,000 feet,"
said Kunz. "We have to use a snow cat or snowmobile to
get to them in the winter. It can be pretty dangerous."
DPS NetGuardian RTU’s with integrated SiteCAM video
surveillance are a big part of reducing costly & dangerous
site visits at All West Communications.

“It worked wonderfully. It gave us a good idea of what


could happen, what DPS equipment did, and how it would
fit in our operation,” said Kunz. “It was a great way of pre-
senting the information we needed to make a decision. Rick
had the entire staff at his fingertips, so if there was a ques-
tion that came up, he could bring them online and answer
our questions immediately.” After weighing their options,
All West purchased and deployed a T/Mon NOC and a fleet
of NetGuardians.
Darcy Kunz
V.P. of IT Engineering and Operations Comprehensive Training Provides a Fast
All West Communications Track to Better Monitoring
"It makes getting up to the site extremely difficult," added To better interact with their new equipment Kunz and his
All West's Wireless Manager Jimmy Clegg. With every staff flew out to DPS headquarters to participate in a week-
visit to the site being dangerous, an insufficient monitoring long Factory Training Event.
system means a lot of unnecessary risk and expense.
Armed with new knowledge from the DPS training, Kunz
and his staff will return to Utah to begin implementing
Discontinued Monitoring Equipment
monitoring improvements. Kunz will be installing
Jeopardized A Growing Network SiteCAMs at several remote sites. “By watching our techni-
All West recently expanded their network and needed to cians we can help step them through what is going on,”
purchase monitoring equipment for new sites. When they said Kunz. “It can also help if we have an intrusion alarm
contacted their alarm vendor, however, they met a major or a fire alarm. We can instantly see what’s going on....
setback. "Our existing equipment had been discontinued
and was unavailable, but we still needed to upgrade and be
able to monitor our old equipment, plus our new equip-
ment," said Kunz. With the inability to add monitoring to The Protocol Ezine Online
their sites, All West faced a serious threat.
Visit www.TheProtocol.com to read the complete story.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
12
Case Study: SAIC Protects Mission-Critical IT Services
With Advanced Alarm Monitoring
SAIC is a leading systems, solutions, and technical services And after he completes his week of training, Miller will be
company. The company solves its customers' mission-criti- taking a wealth of monitoring knowledge back to SAIC
cal problems with innovative applications of technology and Entergy.
and expertise. SAIC is currently managing outsourced cor-
porate IT services for Entergy, an integrated energy compa- "One of the main things that I'll be doing when we get
ny. back is to start attaching DPS RTUs to various PBXs," he
said, adding "I'm going to try to find a way to get the
Ross Miller is a Voice NetGuardian 832A involved with the Avaya system
Network Engineer for because it's a solid box, and I'm very familiar with it
SAIC. His chief responsi- now… If I can attach the monitoring system to a couple
bility is monitoring key components, that will allow me to view alarms off-site
Entergy's IT operations, pri- and do some alarm management."
marily an Avaya call center

Ross Miller
that has eight sites span-
ning four states. Miller's
work protects mission-criti-
cal business communica-
“ It was exciting to see the kind of quality
that DPS is rolling out.

Voice Network Engineer tions for Entergy staff.
SAIC "Any maintenance, A Commitment to Client Service Backs
upgrades, troubleshooting Reliable Monitoring Equipment
for the call center system… I support them," he said. For Even though Miller found the broad DPS product line to be
Miller, alarm monitoring is a vital part of doing exciting, he noted that the level of client service was most
his job well. impressive. "The service DPS offers is impeccable, to say
the least," he said.
Legacy Monitoring Equipment Wasn't
Getting the Job Done During his week of training, Miller was pleased to interact
Robust monitoring was a critical component of Miller's job, with key members of the DPS technical staff. "It's very
but the legacy monitoring equipment he was working with encouraging knowing that… if DPS would pay that kind of
just wasn't effective. "The reliability was one issue. We attention to us while we are here, there is no doubt that
were using [another RTU], and that box has a lot of prob- DPS will continue that relationship when we're six states
lems with it." And when Miller encountered trouble with away," he said. "The service at DPS is really what shines
his existing monitoring equipment, the technical support he compared to our previous monitoring vendor… It really
needed just wasn't there. did impress us."

Essential Support Responsibilities


Demand Comprehensive Training
Since he needed a solid base of alarm monitoring knowl-
edge to do his job well, Miller recently attend a week-long
DPS Telecom Factory Training Event. "We have a lot of
legacy RTUs that interface back to our T/Mon NOC," he
said. "We were looking for a replacement RTU that would
interface with our current infrastructure… which is why
I'm here at Factory Training."

Factory Training Provides In-Depth


Understanding and Real-World Results
Miller found DPS Factory Training to be a highly valuable SAIC attended a DPS Factory Training Event to get maximum
experience. He received comprehensive training from the value from their dual-redundant T/Mon NOC’s
same engineers and support techs who design and install
DPS monitoring equipment. "Training was great this
week," Miller said. "It was exciting to see the kind of
quality that DPS is rolling out."

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
13
Essential TL1 • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com

4 Intelligent Propped Door Features 8 T/Mon NOC Features that Other


Masters Can’t Match
It almost goes without saying that doors propped open at your 1. Integrated Building Access System. T/Mon can
remote sites are a big problem. handle all of your alarm, plus your access control.
This eliminates the need to add another terminal in
Propped doors: your central office and hire another operator.
•Present a huge security risk 2. Detailed alarm notifications in plain English that
•Increase climate control costs your staff will immediately understand and take
•Allow the outside environment to threaten site equipment action on. Every notification includes full information
about the alarm, including its severity, location,
There are some cases, however, when you may want to allow a door date/time stamp, and a user-defined description.
to remain unlocked or open. The following 4 intelligent propped 3. Immediate notification of changes of state (COSs),
door features allow you to accomodate special access needs at your including new alarms and alarms that have cleared.
site: You don’t have to hunt to find out what’s changed in
your network — T/Mon lists it for you.
1.) Enable Propped Door 4. A continuously updated list of all current standing
This command will allow a door to be propped open for a set alarms. Even if the system operator acknowledges the
amount of time without triggering an alarm. This is handy during alarm, it remains in the Standing Alarms screen until it
major equipment installations. is cleared.
5. Text message windows displaying specific instruc-
2.) Enable Extended Propped Door tions for the appropriate action for an alarm.
This command will extend the previous command’s time limit by an System operators, even without extra training, will
amount set by the user. know precisely what to do and who to call in case of
an alarm.
3.) Enable Stay Open Mode 6. Pager and e-mail notifications. Send alarm notifica-
This command acts much like the propped door commands, except tions directly to maintenance personnel, even if
that it will leave the site door unlocked for an infinite amount of they’re away from the NOC.
time. This is a great for business offices, where the receptionist can
7. Derived alarms and controls that combine and corre-
unlock the front door at the start of the day and lock it in the
late data from multiple alarm inputs and automatically
evening. Now you have free access during the day and keycard
control remote site equipment to correct complex
access after hours.
threats.
4.) Disable Stay Open Mode 8. Mediation of alarms from over 25 protocols to
This command acts to close the previous command and place the SNMP traps forwarded to MOM
door back in a monitored alarm mode that will sound if it is not
closed by a set period of time.

The T/Mon NOC Remote Alarm Monitoring System provides


total visibility of your network status and automatically noti-
fies the right people to keep your network running.

Sign up for a Web demo of T/Mon NOC


at www.dpstelecom.com/webdemo

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
14
Get Peace of Mind with a High-Quality Access Control Solution
Would you know if someone accessed your site at 3:00 AM on a Sunday morning?

If you distribute physical keys to your sites, you can never be


sure of when they are used. This puts your mission-critical infra- A Free Building Access
structure at an unacceptable risk. An advanced building access
system gives you the power to monitor every entry at your sites - Consultation Will Let You
and the peace of mind provided by after-hours notifications sent
to your mobile phone or pager.
Sleep Better
Logging and Tracking Lets You Know Who’s Determining your site security needs can be
Accessing Your Sites After Hours tough. If you’ve got a busy job with a lot of
The powerful logging and tracking capabilities of a high-quality responsibilities, you don’t have a lot time to eval-
building access system will provide you all of the information uate building access systems and survey your
you need to protect your remote sites. You’ll be able to stop remote sites.
many threats before they affect your operations. If you do have
an incident, your response time will be greatly improved. You’ll So why not get help
also have invaluable entry logs for your investigation. from experts you can
trust? DPS Telecom will
Monitor Your Outside Contractors as They Work help you survey your
Even during regular hours, you need to know that your site will
remote sites step-by-
remain secure. As you know, this can be especially important
when your company is working with outside contractors for
step, making sure you
repairs and equipment installations at your site. Because outside don’t miss any opportu-
contractors are never completely under your control, you must be nities to tighten your
able to monitor their activity at your sites. security — and give Rick Dodd
yourself added peace of Director of Sales
Limit Access for Outside Personnel with Access mind. DPS Telecom
Rights that Expire Automatically
Good building access systems will allow you to create keycode or A DPS expert consultant can help your figure out
keycards for outside contractors in the same way that you would what building access system will most effectively
for your own employees. Contractor codes, however, can be pro- integrate with your existing alarm monitoring sys-
grammed to “sunrise” and “sunset”, or commence and expire at tem without overloading your budget. Our goal is
designated times. If an outside vendor will be working on your to help you maximize your return on investment
equipment for three days, they can be given site access during while minimizing your expenditure by finding you
those three days - and only during regular business hours. If the the right security strategy for your network.
contractor needs additional access, you can grant it at any time.
Plus, because DPS Telecom is a leader in alarm
monitoring as well as access control, you’ll learn
how integration into a single system can cut your
costs and more effectively protect your revenue.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
15
DPS Building Access System Specifications
The DPS Building Access System contains all the advanced features that are critical to properly controling access to your
site.The T/Mon NOC is a powerful master system that can provide global centralized management for your system. The
NetGuardian is a dominant site manger that can maintain a strong local network. Finally the Proxy Card Reader is the most
effective user access device on the market. Integrate your BAS into a DPS monitoring platform and benefit from the ability
to create a security safety net with our fault-tolerant system.

T/Mon NOC (Master Station):


NetGuardian 832 A G4 (Site Controller):

Access Code Capacity: 1,300


Doors Supported per NetGuardian: 8 (16 with RS-485 option)

Access Code Capacity: More than 10,000 Protocols: SNMP and DCPx
Fuse: Two 5-Amp GMT fuses Discrete Inputs: 32 (expandable to 176)

Modem: 56K baud internal modem (for dial-up console Alarm Detection Speed: User-defined (3 to 999 msec)
access)
Analog Inputs: 8
LAN Interface: 10/100 BaseT
Analog Input Range: (-94 to 94 VDC or 4 to 20 mA)
Polling Ports: 24 user-selectable ports
Control Outputs: 8 Form C relay contacts
Polling Interfaces: RS-232, RS422/485, 202 modem,
Maximum Voltage: 60 VDC/120 VAC
33.6K modem, FSK modem, PSK modem
Maximum Current:1 Amp, AC/DC
T/Access COM Port: 1
IP Address Ping Targets: 32
Processor: 2.4 GHz Intel Pentium 4
Interfaces: 7 DB9 RS-232 ports, 1DB9 RS.485 port,
Hard Drive: 80GB (7200 RPM)
• 1 RJ45 10BaseT Ethernet port 1 RJ11 POTS jack,
Slots: 6 PCI, 1 AGP
• 2 50-pin amphenol connectors) discretes, controls,and analogs)
Fans: 2 internal • 1 DB9 connector (analogs)

Removable Storage: 1.44 floppy disk drive, CD drive


Visual Display: Front-panel LCD, SVGA monitor con-
nection available
Proxy Card Reader:
Unit Controls: 4 LCD menu control buttons
Hardware Warranty: 2 years Dimensions: 3” x 5” x x 2.5”

Mounting: Wall Mount


Entry Control Unit:
Environmentally Sealed: Yes
Dimensions: 6.5” x 6” x 1.5”

Mounting: Wall Mount Motion Sensor:

Fuse: GMT 1/4 Amp Provides automatic exit tracking


and intrusion notifications.
Temperature Range: 32 to 140 F
Detection Range: 3-6 meters
Humidity Range: 0% to 95% non-condensing

Interfaces: RS422

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
16
Live Meeting Rooms

Live Meeting Rooms combine Web-based video, teleconferencing, and


instant messaging to create a virtual conference room.

A Web demonstration is a convenient, low-pressure way for the you to learn about key
monitoring concepts. The benefits of using a Live Meeting room are:

• You have a direct connection to the DPS Sales team


• A comprehensive slideshow displays clear, informative data and application drawings.
• The DPS Engineering Team is on-hand to answer any of your questions

"It was a great way of presenting the information we needed to make a decision. Rick had
the entire staff at his fingertips, so if there was a question that came up, he could bring
them online and answer our questions immediately."
-Darcy Kunz
V.P. of IT Operations
All West Communications

In a Live Meeting Room, You’ll Get Answers to All Your Questions


In a Live Meeting Room, you’ll see the full range of DPS solutions for network reliability management,
including T/MonXM, the NetGuardian 832A, the Remote Alarm Block 176N, the Advanced Telemetry
System, and more. Your Applications Engineer will help you find the solution with the right capacity, proto-
col, and data transport for you. You can view presentations & application overviews from Applications
Engineers and ask questions for more details on the topics you're most interested in.

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
17
The Alarm Monitoring Information
You Need is only a Click Away
www.DpsTelecom.com
Want to learn more about advanced monitoring
solutions that cut your costs and boost your
revenue? The DPS Telecom website provides
informational articles about specific monitoring
problems their solutions. Visit today to take
your monitoring to the next level.

Register at MyDPS and get exclusive


access to:
•Firmware and software downloads and
upgrades
•Product Manuals
•Product datasheets
•Exclusive user forms

www.TheProtocol.com
The Protocol is a free alarm monitoring ezine emailed directly to your inbox every month. Every
issue is filled with information critical to your everyday operations:

•“Tech Tips" from expert engineers make it easy


to use the advanced features of DPS equipment.
•White Papers deliver fast, informal tutorials on
SNMP, TL1, and other alarm monitoring technolo-
gies.
•New Products and upgrade announcements will
keep you up-to-date about cutting-edge monitoring
technology.
•Client Success Stories share how DPS product
perform in the real world.

To get your free subscription to The


Protocol, register online at
www.TheProtocol.com/Register

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
18
Get the Facts Before You Purchase Your Next Network Monitoring System
If you found the information in this white paper useful, you’ll also be interested in the other white papers in the DPS Telecom
Network Monitoring Guide series. Each paper is a complete guide to an essential aspect of network monitoring. These are the
facts you need to know to make an informed purchase of your next network monitoring system.

Perfect-Fit Alarm Monitoring


Do you have a specialized monitoring need that no off-the-shelf product can solve? Does it seem like you
need to buy several products just to get the job done? At DPS, we design and build custom products to
suit our clients' unique needs. In this white paper, we'll walk you through our time-tested development
process that can give you exactly what you need. To receive this report, visit:
http://www.dpstelecom.com/white-papers

Practical Guide to SNMP Troubleshooting


Your Are you encountering problems with your SNMP implementation? Are you planning to expand your
SNMP deployment? This white paper is a guide to troubleshooting SNMP. Get valuable tips for identify-
ing and solving problems with MIBs, firewalls, traps, IP routing, and more. To receive this report, visit:
http://www.dpstelecom.com/white-papers

Monitoring Alarms Over T1


Monitoring sites outside of your existing LAN used to be difficult, expensive, and time-consuming. Now,
new technology allows you to effectively monitor sites when T1 is the only available connection. This
new white paper will show you how to monitor your outside plant sites, cost-effectively provide Ethernet
to site equipment, and maximize your ROI. To receive this report, visit:
http://www.dpstelecom.com/white-papers

Give Us Your Feedback


Send your comments to feedback@dpstelecom.com

This all sounds great, but where can I get product details?
If you would like to know more about the products and services mentioned in this white paper, visit www.dpstelecom.com
and click “Applications.” or “Products.”

Building Access System • DPS Telecom • 4955 East Yale Avenue, Fresno, California 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
19
"It was easy to see that we could enhance the DPS building access, that was the way to
go....."I really stuck my neck out, and I did it because of my prior five years of experi-
ence with DPS. I've supported the platform here internally since Day One."

—Dennis E.
Senior Systems Engineer

“As a telecom provider, uptime is becoming more critical every day. A


99.9% uptime is considered bad. In order to achieve 100% we turned
to DPS. The whole experience was very impressive."
—Rich Abalos
Calaveras Telephone

About the Authors


Robert Berry is founder and CEO of DPS Telecom, an industry-leading devel-
oper of network alarm management solutions. Two decades' experience
designing remote telemetry systems have taught Berry that technology is most
powerful when it meets real-world business needs. DPS Telecom clients have
grown to appreciate Berry's dedication to developing technology solutions that
lower costs and raise revenue.

Andrew Erickson is Lead Writer for The Protocol, the monthly alarm monitoring
ezine from DPS Telecom (www.TheProtocol.com). Experience writing website
content and product documentation have prepared him to capture the expertise
of the DPS Engineering team in a clear and concise white paper.

www.dpstelecom.com
1-800-622-3314

US $36.95

“We protect your network like your business depends on it”TM

You might also like