2N® ACCESS COMMANDER By 2N TELEKOMUNIKACE
Access management software
Prevent the entry of unauthorized persons to your building with the 2N IP Access Control system. The nerve centre of the whole system is 2N® Access Commander with its simple and intuitive user interface. Use it not only for managing access to the building, but also for monitoring the status of access units in real time.
ACCESS CONTROL CONFIGURATION
Simply set up the access rights in your organization, i. e. specify who can enter which doors during the specific time period.
BULK MANAGEMENT OF 2N DEVICES
Larger installations managed effectively- copy settings between 2N devices, backup their configuration or add them to a common zone.
BUILT-IN TIME & ATTENDANCE
Time & Attendance system is a native part of 2N® Access Commander software. It records an attendance of employees that can be viewed via the web interface or exported to XLS or CSV file.
MULTIPLE SITE CONTROL
An ideal solution for a company that has branch offices in different cities. An admin oversees the access control system installed in all buildings and manages the devices from a single location.
DEVICE MONITORING AND NOTIFICATIONS
An admin finds out with one glance if all devices are up and running smoothly. In case of any alarm or disconnection, they are immediately informed by email or via notification icon.
SUPPORTS INTEGRATION VIA API
2N® Access Commander is ready to be integrated into third-party systems such as time & attendance or CRM systems using the REST API web interface.
OPERATION VIA WEB INTERFACE
Everything is set up via an intuitive, user-friendly web interface, which is customized according to the user’s needs, available in 7 different languages and accessible from anywhere.
VISITOR CARD MANAGEMENT
Being set up directly in 2N® Access Commander, visitors have only time-limited access into specific locations and their movement can be monitored.
MONITORING MISUSE OF ACCESS RIGHTS
The Anti-passback function allows you to record or completely ban repeat entry if no departure from a restricted area was registered beforehand. This significantly increases oversight of compliance with access rules.
SYNCHRONISATION WITH DATABASE SYSTEMS
Connection to Microsoft Active Directory with the aid of a LDAP protocol or regular synchronisation with other systems via CSV ensures that users are created automatically in 2N® Access Commander and also regularly synchronised.