12.07.2015 Views

Keystone® 600N5 - Best Access Systems

Keystone® 600N5 - Best Access Systems

Keystone® 600N5 - Best Access Systems

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NEW KEYSTONE ®<strong>600N5</strong> FEATURES• Stanley factory service that allows Importing and Appending data• Mass deletes Employees, Keys, Doors• Performance improvements in searches and finders• Activity log that tracks user transactions• Upgrades available for Keystone 600 (v3.53) and Keystone 600Ncustomers – Automatically converts data to new formatSample ScreenKEYSTONE ®<strong>600N5</strong> SOFTWAREThe Stanley Security Solutions Keystone ® <strong>600N5</strong> key and core management software offers all of the same security, convenience,and functionality found in the original Keystone ® 600 programs, but with the added ability to operate in a network configuration.Keystone ® <strong>600N5</strong> will assist you with the tedious task of managing your key and core records in today’s environment, inwhich multiple people in different locations may need to access the data simultaneously. The Keystone ® <strong>600N5</strong> software isdesigned to operate over modern network environments, such as Windows ® NT, XP, 2000 or 2003 servers. The Keystone ®<strong>600N5</strong> includes special help screens that can be accessed whenever you need assistance. Complex commands and detailedmenu trees are eliminated by the function key index at the bottom of each screen. Select the information tab desired and theappropriate screen is called up. Instructions and help screens are immediately available.ADDITIONAL FEATURESBuildings• Support multiple facilities• Displays people, keys and departments with access to a building• Lists departmental access, designating the people, keys andkeyrings that have access to that department• Displays buildings with doors, cores and locks in the buildingCores• Lists all cores and their location (Buildings and doors)• Cross-references employees, keys and departmentsDoors• Shows the doors with cores, locks and other items that are installedon the door• Displays doors and people, keys and departments that can accessthose doorsKeys• List all keys and items currently due back (or due back by anyday designated)• Lists keys that have been issued by keyholders• On-screen Displays of BEST masterkey code records• Records issuance of keys, keyrings, cores and locks to people• Maintains historical records on all keys, keyrings, cores and locks• Shows all keyrings, keyring holders, and what buildings, coresand doors the keyring accesses• Maintains key cabinet records displaying the keys, keyringsand locks located on a hook• Tracks out-of-service keys, keyrings and other items that arelost, stolen or destroyed• Displays cores, departments, doors and buildings that keys canaccessLocks• Displays locks, lock location and the people, keys and departmentswith access to that lock• Lists manufacturer product records with items connected specificallyto that manufacturer’s productPeople• Displays people, keys, keyrings, cores, locks on one record• Maintains list of deleted employees (and doors) with the ability todisplay and reactivate them• Searches for and identifies people by name, ID, department, title andtype• Cross-references people to cores, doors and buildings they accessSecurity• Password restricted logins enable administration to restrictusers’ access for designated screensSoftware – general• Automated and manual pin segment calculator• Comprehensive list of reports available as an on-screen menu• Built-in easy-to-use backup program to any mapped drive• Program always displays date of last backup• Lists users who made backup with dates• Dynamic searching capability for all records• Large note field available on all card records• On-screen indicator shows when historical info. is present for a record• On-screen indicator appears when notes are present on a record• Able to operate in an NTFS network environment with TCPIP protocol• Multiple users can access the program at the same timeStanley Security Solutions, Inc.6161 East 75th St. Indianapolis, IN 46250Ph: 800•964•5625 Ext #6 Fax: 317•806•3528www.stanleysecuritysolutions.com B-276 8/06

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!