Set of equipment at the guard’s workplace depends on the tasks, peculiarities of the object, installed security equipment. The main task – real-time display of events, status of TCS, video from surveillance cameras.

A guard’s workplace can consist of dozens of digital monitors, displays, communication and notification facilities

A security guard should have site-specific monitoring tools at his or her disposal to help detect security threats, take measures to protect the facility. A basic list of connected equipment:

TSO controllers;
readers, digital panels, monitors, other equipment for receiving and analyzing identifiers;
weighing platforms;
all types of security detectors (optical, infrared, magnetic, acoustic, radiation, etc.)
video surveillance;
sensors, detectors and automatics of fire protection.

Modern software supports multi-window layout, displays video signal in real time, displays video recordings of events from the archive, working with the image (still picture, zoom, rotation, highlighting fragments). At the same time technician displays information from security detectors, sensors. Guardian receives complete information about his site.

The program is a structure with a strict hierarchy: from the chief administrator to the detectors, sensors, and surveillance cameras. Feedback allows you to manage the technology centrally or at the posts, with limited or full functionality for specific jobs.

Physically security software server is created on the basis of computers with Windows, Linux and other operating systems. Additional units, equipment of the passes bureau, digital panels, security guards’ workplaces are connected to the main computer. Life cycle of software usually coincides or exceeds the life cycle of individual devices: when upgrading can use the resources of the current program.

Access levels are built according to a similar scheme: operation is controlled by the central server control, ACS algorithms can be changed at the access bureau or on local blocks, security guard workplaces give access to a particular area.

Redundant servers are used to increase reliability – in the event of a main computer shutdown, the required level of security is maintained by connecting a backup.