Sigur controllers are designed to operate as part of the Sigur network-based access control system and control various devices connected to them. Sigur controllers use completely independent decision-making and recording algorithms. Even if the server is not available at the moment, the controller will decide on whether to grant access or not independently, based on the autonomous cardholder database and access rules.
All events are also registered autonomously and marked with the date and time from the inbuilt real-time clock.
All cards, time zones and events are stored in the non-volatile memory of the controller. When the connection is restored, all events are synced with the database on the server of the access control system.
The server software consists of the database server and the Sigur system server module. The database server provides access to the shared database to all components of the system. The server module ensures communication with the system controllers via a communication line.
Any Windows 7, Windows 8, Windows 10, Windows Server 2008 R2 SP1 and newer (32-bit and 64-bit) or Linux Debian (32-bit and 64-bit) computer with installed Sigur software can serve as the system server.
A workstation is a software complex that can be launched by the user on any computer connected to the main system server via TCP/IP protocol or directly on the server. The number of workstations in the system is unlimited.
COMPANIES OPERATING IN DIFFERENT TIME ZONES
Sigur supports different time zones, which allow you to create custom access rules and accurately track working time in companies with a wide network of branches.
SYSTEM HEALTH MONITORING
To monitor the health of the connected components and equipment, Sigur collects data from all connected devices in real time, including the connection status of checkpoints, checkpoint operating mode, fire alarm status, etc.
LIMITATION AND ASSIGNMENT OF ADMIN RIGHTS
In Sigur, you will be able to assign individual areas of responsibility to each operator. In their accounts, the operators will have access only to the functionality essential to performing their duties.