{"id":1261,"date":"2021-03-25T17:25:25","date_gmt":"2021-03-25T17:25:25","guid":{"rendered":"https:\/\/rbh-access.com\/?page_id=1261"},"modified":"2023-06-27T10:22:59","modified_gmt":"2023-06-27T15:22:59","slug":"axiomv","status":"publish","type":"page","link":"https:\/\/rbh-access.com\/pt\/software\/axiomv\/","title":{"rendered":"AxiomV"},"content":{"rendered":"
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n

Empreendimento
Gerenciamento de seguran\u00e7a <\/h3><\/div>\n <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n

<\/h2>

AxiomV<\/strong>\u00a0Sistema de gerenciamento de seguran\u00e7a empresarial para grandes aplica\u00e7\u00f5es multi-local \/ multilocat\u00e1rio, integra perfeitamente o controle de acesso, monitoramento de alarme e vigil\u00e2ncia por v\u00eddeo em um sistema de gerenciamento e seguran\u00e7a de edif\u00edcio elegante e vers\u00e1til<\/p><\/div><\/div>\n <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\tSOLICITAR DEMO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\tVER CAT\u00c1LOGO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n
\n
\n \n \n\n \n \"constru\u00e7\u00e3o \n <\/div>\n <\/div>\n\n<\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Reunir diferentes aspectos do gerenciamento de seguran\u00e7a pode ser um desafio. O AxiomV enfrenta o desafio combinando controle de acesso e monitoramento de alarme com v\u00eddeo, automa\u00e7\u00e3o de gerenciamento de edif\u00edcios, rastreamento de ativos, tour de guarda e gerenciamento de visitantes e muitas outras fun\u00e7\u00f5es de seguran\u00e7a importantes em uma solu\u00e7\u00e3o de gerenciamento de seguran\u00e7a elegante e vers\u00e1til.

Aproveitando o poder do Microsoft SQL Server \u2122 e da poderosa estrutura MS .NET \u2122, a AxiomV est\u00e1 posicionada na vanguarda da tecnologia de seguran\u00e7a moderna. Adicionar novos aplicativos e solu\u00e7\u00f5es \u00e9 f\u00e1cil devido \u00e0 flexibilidade da plataforma de software e hardware subjacente.

Uma arquitetura s\u00f3lida e uma interface de usu\u00e1rio flex\u00edvel e altamente personaliz\u00e1vel fornecem ferramentas poderosas para o gerenciamento de Seguran\u00e7a Corporativa. Hardware robusto e altamente sofisticado implementa uma variedade de solu\u00e7\u00f5es flex\u00edveis em um n\u00edvel de firmware. Projetado e fabricado \u201cinternamente\u201d, o AxiomV oferece longevidade incompar\u00e1vel e garantir\u00e1 uma longa vida \u00fatil para um investimento em seguran\u00e7a. A AxiomV oferece uma solu\u00e7\u00e3o sofisticada, por\u00e9m acess\u00edvel, para sistemas de todos os tamanhos.<\/p>

AxiomV \u2122 Enterprise Edition<\/strong>\u00a0\u00e9 constru\u00eddo em uma arquitetura de v\u00e1rios servidores, onde servidores discretos s\u00e3o implementados em toda a rede corporativa com recursos de \u201cespera ativa\u201d e \u201cfailover\u201d autom\u00e1tico. No caso de um dos servidores de comunica\u00e7\u00e3o e \/ ou dados ficar offline, existe um servidor standby totalmente sincronizado e atualizado, pronto para assumir.

Cada Communications Server<\/strong>\u00a0lida com v\u00e1rias redes de UNC-500s \/ UNC-100s por meio de uma ampla variedade de tecnologias de comunica\u00e7\u00e3o. Cada uma dessas redes NC pode ter v\u00e1rias conex\u00f5es com um Comm. Servidor. Nossa arquitetura exclusiva permite que esses canais de backup se conectem a UNCs \/ NCs \u201cMaster\u201d e \u201cSlave\u201d constituindo uma rede. Desta forma, n\u00e3o s\u00f3 a perda de um canal de comunica\u00e7\u00e3o \u00e9 sustent\u00e1vel, mas tamb\u00e9m a falha de um ou mais Controladores da Rede. O controlador \u201cSlave\u201d assumir\u00e1 a fun\u00e7\u00e3o de \u201cMaster\u201d quando o canal de comunica\u00e7\u00e3o de backup for ativado.

D-NET<\/strong>\u00a0conecta dispositivos, como controladores de leitor RC-2 IOC-16, controladores de entrada \/ sa\u00edda ao UNC-500 \/ UNC-100. 38,4 Kbps, o circuito RS-485 opera em um loop de comunica\u00e7\u00e3o bidirecional \u201cClasse A\u201d de par tran\u00e7ado de cobre blindado. UNC-500 \/ UNC-100, 4-8 dos RC-2s e 16 controladores IOC-16 atuam como amplificadores e repetidores, combinando as dist\u00e2ncias de 3.000 p\u00e9s entre dispositivos individuais em um loop de 15.000 p\u00e9s. Devido \u00e0 sua natureza bidirecional, o D-NET pode suportar sabotagem de cabo e falha de um dispositivo.

C-NET<\/strong>\u00a0conecta at\u00e9 15 UNC-500 \/ UNC-100s entre si, criando uma rede de NCs. 2,5 Mbps, baseado em pacote ARCNET, supervisionado e auto-ajust\u00e1vel C-NET funciona em um loop de comunica\u00e7\u00e3o bidirecional \u201cClasse A\u201d de par tran\u00e7ado de cobre blindado. Cada UNC-100 atua como um impulsionador e um repetidor, combinando dist\u00e2ncias de 2.000 'entre NCs individuais em um loop de 12.000'. Devido \u00e0 sua natureza bidirecional, o C-NET pode suportar uma sabotagem de cabo C-NET e uma falha de um UNC-500 \/ UNC-100.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Gest\u00e3o de V\u00eddeo<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

O sistema Axiom fornece acesso direto aos recursos do DVR a partir da tela de status do sistema, tela de registro de eventos, mapas interativos e m\u00f3dulo de relat\u00f3rio de hist\u00f3rico<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"axion-monitor\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

\u2022 Visualiza\u00e7\u00e3o de eventos hist\u00f3ricos
\u2022 V\u00eddeo ao vivo na tela
\u2022 Conex\u00f5es TCP \/ IP
\u2022 Integra\u00e7\u00e3o de relat\u00f3rios
\u2022 Visualiza\u00e7\u00e3o pr\u00e9, p\u00f3s-evento
\u2022 Suporta v\u00e1rias marcas
\u2022 Controle PTZ na tela
\u2022 Atribui\u00e7\u00e3o de chamada \/ tiro<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Mapeamento Din\u00e2mico<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Completo com exibi\u00e7\u00e3o manual ou autom\u00e1tica em caso de alarme, o mapeamento \u00e9 aprimorado pelo acesso direto e total a todas as fun\u00e7\u00f5es de controle e configura\u00e7\u00e3o, integra\u00e7\u00e3o com v\u00eddeo ao vivo e de eventos para cada dispositivo. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"axioma-din\u00e2mico\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

\u2022 Exibi\u00e7\u00e3o manual ou autom\u00e1tica em alarme
\u2022 Acesso direto para controlar e configurar
\u2022 Integra\u00e7\u00e3o com evento ao vivo e v\u00eddeo<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Tour interativo do guarda<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Para verificar o funcionamento de uma porta, a presen\u00e7a de pessoas na \u00e1rea ou v\u00e1rios outros problemas que podem estar fora de ordem, um oficial de seguran\u00e7a patrulhamento \u00e9 necess\u00e1rio para garantir que essas inspe\u00e7\u00f5es sejam realizadas a tempo e na ordem adequada<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"guarda\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

\u2022 Opera\u00e7\u00e3o em tempo real
\u2022 Exibi\u00e7\u00e3o de progresso ao vivo
\u2022 Usa leitores existentes em pontos de acesso
\u2022 Inicie passeios manualmente ou por programa\u00e7\u00f5es<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

FUN\u00c7\u00d5ES Integradas\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"AXIOM-INTEGRATED\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Alarmes de Seguran\u00e7a<\/strong><\/p>

Um n\u00famero extremamente grande de pontos de alarme exclusivos pode ser monitorado por um sistema Axiom. Cada ponto pode ser totalmente configurado para tipo de anuncia\u00e7\u00e3o, prioridade, mensagens de a\u00e7\u00e3o personaliz\u00e1veis, sa\u00edda ASCII, gatilho CCTV e links execut\u00e1veis. Mapas gr\u00e1ficos ao vivo e instru\u00e7\u00f5es de manuseio de alarmes codificados por cores orientam os operadores uma resposta eficiente a cada alarme<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"AXIOM-LOCK\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Suporte de bloqueio sem fio <\/strong><\/p>

Como um destaque para uma solu\u00e7\u00e3o com fio ou uma implanta\u00e7\u00e3o total da tecnologia de bloqueio sem fio Axiom faz interface com v\u00e1rias marcas de bloqueios sem fio simultaneamente. Essa flexibilidade permite que a trava sem fio certa seja usada para a aplica\u00e7\u00e3o certa! A Axiom fornece monitoramento completo dos bloqueios sem fio e de todas as condi\u00e7\u00f5es de problema. V\u00e1rios modos de opera\u00e7\u00e3o s\u00e3o oferecidos dependendo da capacidade dos bloqueios sem fio, como as fun\u00e7\u00f5es dormit\u00f3rio e privacidade.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

M\u00daLTIPLAS FUN\u00c7\u00d5ES\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"AXIOM-MOBILE\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Suporte para navegador e celular<\/strong><\/p>

A configura\u00e7\u00e3o do servidor da Web no sistema Axiom permitir\u00e1 que os operadores controlem e administrem o sistema de seguran\u00e7a por meio de um navegador da Web a partir de qualquer sistema operacional.<\/p>

\u2022 Editar cart\u00f5es, hor\u00e1rios, n\u00edveis de acesso
\u2022 Monitorar e controlar portas, pontos de alarme e sa\u00eddas de rel\u00e9
\u2022 Executar banco de dados e relat\u00f3rios de atividades
\u2022 Use qualquer navegador<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"axioma\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Controle de elevador<\/strong><\/p>

O Axiom pode se comunicar com o controlador do elevador via ASCII program\u00e1vel ou interface de entrada \/ sa\u00edda.<\/p>

A arquitetura empregada facilita a adi\u00e7\u00e3o de funcionalidade de acesso de visitante aos sistemas existentes. As permiss\u00f5es s\u00e3o facilmente configuradas na tela \u201cN\u00edvel de acesso\u201d.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Gest\u00e3o de Visitantes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Os requisitos de seguran\u00e7a de grandes organiza\u00e7\u00f5es e instala\u00e7\u00f5es s\u00e3o sempre desafiadores, os visitantes devem ser selecionados, registrados e assinados rapidamente em alguns casos com acesso restrito, o que \u00e9 poss\u00edvel usando o Sistema de Gest\u00e3o de Visitantes da RBH.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"visitantes\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Caracter\u00edsticas<\/strong><\/p>

\u2022 Passagem mais r\u00e1pida de visitantes na recep\u00e7\u00e3o
\u2022 Tablet para seguran\u00e7a e recep\u00e7\u00e3o
\u2022 Relat\u00f3rios de visitantes online
\u2022 Para empresas \/ residenciais \/ escolas
\u2022 Para v\u00e1rios locais \/ unidades
\u2022 Gerenciar e rastrear visitantes em todas as instala\u00e7\u00f5es<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Tempo e Presen\u00e7a<\/strong><\/p>

O sistema RBH de Ponto e Presen\u00e7a proporciona maior efici\u00eancia, precis\u00e3o e produtividade ao gerenciamento de recursos e ao processo de folha de pagamento. Este sistema possui um m\u00f3dulo de gerenciamento de escala embutido que se integra com o tempo
e atendimento e sistemas de hardware de controle de acesso para ajudar a fornecer atendimento, horas extras, folha de pagamento e muito mais.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Caracter\u00edsticas<\/strong><\/p>

Capaz de se integrar com qualquer sistema de controle de acesso
\u2022 Compat\u00edvel com tablets e smartphones
\u2022 Notifica\u00e7\u00e3o de e-mail e integra\u00e7\u00e3o de diret\u00f3rio ativo
\u2022 Registro tardio, registro de sa\u00edda antecipado e outras listas de exce\u00e7\u00f5es
\u2022 Gerenciamento de fun\u00e7\u00f5es de funcion\u00e1rios e usu\u00e1rios<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n

Descubra o poder da Axiom<\/h3><\/div>\n <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\tSOLICITAR DEMO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t<\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\tVER CAT\u00c1LOGO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n
\n
\n \n \n \n\n
\n <\/span>\n <\/span>\n <\/div>\n \n
\n \"axiomv_diagram_fs\" <\/div>\n \n <\/a>\n <\/div>\n <\/div>\n\n<\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"

O AxiomV Enterprise Security Management System para grandes aplica\u00e7\u00f5es multi-site \/ multilocat\u00e1rio, integra perfeitamente o controle de acesso, monitoramento de alarme e vigil\u00e2ncia por v\u00eddeo em um sistema de gerenciamento e seguran\u00e7a de edif\u00edcio elegante e vers\u00e1til.<\/p>","protected":false},"author":1,"featured_media":647,"parent":664,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-1261","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"\nAxiomV - RBH Access Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rbh-access.com\/pt\/software\/axiomv\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AxiomV - RBH Access Technologies\" \/>\n<meta property=\"og:description\" content=\"AxiomV Enterprise Security Management System for large multi-site\/multi-tenant applications, seamlessly integrates Access Control, Alarm Monitoring, and Video Surveillance into an elegant and versatile building management and security system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rbh-access.com\/pt\/software\/axiomv\/\" \/>\n<meta property=\"og:site_name\" content=\"RBH Access Technologies\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-27T15:22:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png\" \/>\n\t<meta property=\"og:image:width\" content=\"614\" \/>\n\t<meta property=\"og:image:height\" content=\"745\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rbh-access.com\/software\/axiomv\/\",\"url\":\"https:\/\/rbh-access.com\/software\/axiomv\/\",\"name\":\"AxiomV - RBH Access Technologies\",\"isPartOf\":{\"@id\":\"https:\/\/rbh-access.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rbh-access.com\/software\/axiomv\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rbh-access.com\/software\/axiomv\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png\",\"datePublished\":\"2021-03-25T17:25:25+00:00\",\"dateModified\":\"2023-06-27T15:22:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rbh-access.com\/software\/axiomv\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rbh-access.com\/software\/axiomv\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/rbh-access.com\/software\/axiomv\/#primaryimage\",\"url\":\"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png\",\"contentUrl\":\"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png\",\"width\":614,\"height\":745},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rbh-access.com\/software\/axiomv\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rbh-access.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software\",\"item\":\"https:\/\/rbh-access.com\/es\/software\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AxiomV\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rbh-access.com\/#website\",\"url\":\"https:\/\/rbh-access.com\/\",\"name\":\"RBH Access Technologies\",\"description\":\"We Are Access Control\",\"publisher\":{\"@id\":\"https:\/\/rbh-access.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rbh-access.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/rbh-access.com\/#organization\",\"name\":\"RBH Access Technologies\",\"url\":\"https:\/\/rbh-access.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/rbh-access.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/log2.png\",\"contentUrl\":\"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/log2.png\",\"width\":192,\"height\":82,\"caption\":\"RBH Access Technologies\"},\"image\":{\"@id\":\"https:\/\/rbh-access.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AxiomV - RBH Access Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rbh-access.com\/pt\/software\/axiomv\/","og_locale":"pt_BR","og_type":"article","og_title":"AxiomV - RBH Access Technologies","og_description":"AxiomV Enterprise Security Management System for large multi-site\/multi-tenant applications, seamlessly integrates Access Control, Alarm Monitoring, and Video Surveillance into an elegant and versatile building management and security system.","og_url":"https:\/\/rbh-access.com\/pt\/software\/axiomv\/","og_site_name":"RBH Access Technologies","article_modified_time":"2023-06-27T15:22:59+00:00","og_image":[{"width":614,"height":745,"url":"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rbh-access.com\/software\/axiomv\/","url":"https:\/\/rbh-access.com\/software\/axiomv\/","name":"AxiomV - RBH Access Technologies","isPartOf":{"@id":"https:\/\/rbh-access.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rbh-access.com\/software\/axiomv\/#primaryimage"},"image":{"@id":"https:\/\/rbh-access.com\/software\/axiomv\/#primaryimage"},"thumbnailUrl":"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png","datePublished":"2021-03-25T17:25:25+00:00","dateModified":"2023-06-27T15:22:59+00:00","breadcrumb":{"@id":"https:\/\/rbh-access.com\/software\/axiomv\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rbh-access.com\/software\/axiomv\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/rbh-access.com\/software\/axiomv\/#primaryimage","url":"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png","contentUrl":"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/axiomv.png","width":614,"height":745},{"@type":"BreadcrumbList","@id":"https:\/\/rbh-access.com\/software\/axiomv\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rbh-access.com\/"},{"@type":"ListItem","position":2,"name":"Software","item":"https:\/\/rbh-access.com\/es\/software\/"},{"@type":"ListItem","position":3,"name":"AxiomV"}]},{"@type":"WebSite","@id":"https:\/\/rbh-access.com\/#website","url":"https:\/\/rbh-access.com\/","name":"RBH Access Technologies","description":"We Are Access Control","publisher":{"@id":"https:\/\/rbh-access.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rbh-access.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/rbh-access.com\/#organization","name":"RBH Access Technologies","url":"https:\/\/rbh-access.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/rbh-access.com\/#\/schema\/logo\/image\/","url":"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/log2.png","contentUrl":"https:\/\/rbh-access.com\/wp-content\/uploads\/2021\/03\/log2.png","width":192,"height":82,"caption":"RBH Access Technologies"},"image":{"@id":"https:\/\/rbh-access.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/pages\/1261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/comments?post=1261"}],"version-history":[{"count":3,"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/pages\/1261\/revisions"}],"predecessor-version":[{"id":7536,"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/pages\/1261\/revisions\/7536"}],"up":[{"embeddable":true,"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/pages\/664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/media\/647"}],"wp:attachment":[{"href":"https:\/\/rbh-access.com\/pt\/wp-json\/wp\/v2\/media?parent=1261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}