ACC 7 SOFTWARE • Intelligent Motion, thumbnail and event search
• T wo-factor authentication and emergency
STANDARD FEATURES
privilege override
• Automatic device discovery • Two-person authenticated recorded video viewing
• S upport for third-party ONVIF compliant cameras and • Avigilon Cloud Services web client
• FIPS 140-2 encryption
encoders including dual streaming • Occupancy Counting analytics
• Support for H.265, H2.654, MPEG4, MJPEG • Social Distancing analytics
• Multi-camera export
and JPEG2000 codecs • System & motion event email notifications
• HDSM™ and HDSM SmartCodec™ technology support
• ACC Mobile application
• Video analytics overlays
• L ight and dark user interface themes
• Unusual Motion and Activity Detection timeline
filtering with Skip Play
LEARN MORE
VIDEO MANAGEMENT SOFTWARE 51
AVIGILON CLOUD SERVICES
The Avigilon Cloud Services (ACS) platform connects your ACC sites to the cloud and enables secure access to your system from anywhere
using an internet browser. Operators can review live and recorded video as well as monitor the health of all cloud-connected ACC sites,
including critical components such as cameras and servers.
SPECIFICATIONS
Centralized Anywhere Access Organizations with distributed locations can easily access their ACC sites securely from anywhere on a browser or mobile device.
Access Easy Remote Access Remotely monitor multiple locations and cameras to quickly detect, verify and act on events.
Cloud Connectivity to ACC Sites Connect ACC sites to the cloud to converge media access, system management, and integrations.
Security Tools for everyday operation Access live and recorded video, create and view bookmarks, manage PTZ controls, and export videos to a local drive.
System Health Enhanced Situational Awareness Provides timely and proactive responses to analytic alarms, sent from ACC software as push notifications directly to the ACC Mobile 3 app.
Monitoring Firewall Traversal Firewall traversal enables secure remote access with minimal or no firewall reconfiguration.
Technical Federated Authentication Centralize administration of user identities and use corporate credentials to access ACC, ACM and ACS software.
Specifications Seamless User Provisioning Provisioning users is simple, as existing ACC group privileges are inherited for web client or mobile app viewing.
Real-time Awareness Confirm the operational status of your deployment to prioritize site maintenance activities and optimize uptime across all system components.
Health Dashboard Review a single health dashboard that rolls up the active status of all recorders and connected cameras.
Remote Configuration Access Access configuration details of recorders and cameras across all cloud-connected ACC sites.
Remote Site Upgrades Push software upgrades remotely to one or more ACC sites simultaneously, ensuring all of your sites are always on the latest versions of ACC.
Compatible ACC Platform ACC 7.10 or later is required to connect ACC sites to Avigilon Cloud Services.
Compatible ACC Mobile Platform ACC Mobile 3 App is required to support remote access via a mobile device and to receive analytic alarms from ACC.
KEY FEATURES
The ACS platform enables a modern cloud-connected user
experience, accessible without installation from a web
browser. It lays the foundation for ACC customers to connect
to the cloud and take advantage of capabilities and features
that provide centralized access across distributed systems.
Our platform provides for the delivery of value-add services,
helping to improve your up-time, and enhance productivity,
while also strengthening your security. The ACS platform
simplifies the management of physical security systems for
customers with multi-site facilities and distributed security
systems from anywhere.
LEARN MORE
VIDEO MANAGEMENT SOFTWARE 52
VIDEOMANAGER SOFTWARE
SUPPORTS VT100 & VB400 BODY-WORN CAMERAS
Browser-based system for management of users and devices as well as the managing, storing and sharing of digital evidence.
SPECIFICATIONS
Workflow Control Granular Permissions Users can only access the parts of the VideoManager interface which are relevant to their workflow.
Incidents and videos can be automatically or manually shared between users and groups on VideoManager. Instances can be shared with workers who are
Security Granular Sharing not on VideoManager, using time-sensitive links or exports.
Scalability Administrators can see permissions associated with a user, and how they got those permissions.
Technical Permissions Overview Authorized users can temporarily elevate their priviledges for a limited time, in order to perform certain actions on VideoManager.
Specifications Priviledge Escalation Configure how long footage is kept on VideoManager before it is deleted.
Deletion Policies Ensure your suite of DockControllers always have the latest firmware, eliminating manual upgrades. Configure a specific timeframe for DockController
Automatic DockController firmware upgrades, to minimize workflow disruption.
Firmware Upgrades A comprehensive audit log of every action performed in the system is created. Users can create and download audit logs to view these actions if necessary.
Comprehensive Audit Trail Without a device's access control key, undownloaded footage on a device is inaccessible.
Access Control Keys Footage, report and export filespaces are automatically encrypted for extra security.
File Space Encryption Large numbers of events can be instantaneously deleted or added to incident collections. Large numbers of body-worn cameras can be assigned or
upgraded in parallel.
Bulk Edit Put multiple users in a group for sharing and management purposes. Groups can be supervised by individual users, or other groups.
Download reports detailing various aspects of VideoManager activity e.g. when devices were docked and undocked.
User Groups View real-time statistics with information about how VideoManager is being used.
Reports Creation Windows Server 2016 Essentials, Standard and Datacenter, Windows Server 2012 R2 Essentials, Standard and Datacenter, Windows Server 2012
Live Statistics Essentials, Standard and Datacenter, Windows 10 Pro and Enterprise and Windows 8.1 Pro and Enterprise
Microsoft Internet Explorer 11 (Windows 7/8.1/10), Microsoft Edge 14+ (Windows 10), Firefox 47+ (Windows 10), Chrome 48+ (Windows 7/8.1/10,
Compatible Server Platforms MAC OS X v10.10)
Compatible Client Browsers
CONNECTIVITY FEATURES EVIDENCE PREPARATION FEATURES
• Integrates with ACC video management software (via • Put multiple incidents in an incident collection for sharing
ONStream technology) and management purposes
• C an be enabled as a central VideoManager, to which other • Redact footage and images using effects like bluring,
instances of VideoManager (“sites”) can be connected pixelation and highlighting. Audio, text and zoom
redactions are also available
• Connect VideoManager to CommandCentral Vault,
for footage storage and correlation with other • Non-video media (PDFs, MP4s, JPGs), and videos which
CommandCentral Suite applications1 were not recorded using VT100 or VB400 can be imported
to VideoManager and added to incidents
• Group footage and other important media in an incident for
ease of view 1 Requires CommandCentral Vault subscription.
LEARN MORE
VIDEO MANAGEMENT SOFTWARE 53
ACCESS
CONTROL
The Motorola Solutions Access Control Manager (ACM) system is a physical access control system for enterprise-
class installations, designed to help you focus on securing your people, property and assets, while giving you the
flexibility to respond to alerts wherever you are. It seamlessly integrates with ACC software to provide you with a
powerful and unified security solution that helps you proactively monitor and secure your sites.
CATALOG | COMMERCIAL PRODUCTS PAGE 54
ACM 6 SOFTWARE
Access Control Manager (ACM) is a physical access control system for enterprise-class installations,
designed to protect people, property and assets with advanced alarm and identity management
providing superior control of access to facilities. This 100% browser-based solution offers the flexibility
to respond to alerts from anywhere. ACC unification offers a powerful end-to-end security solution to
monitor and secure sites.
DETAILS
Identity Integrated Badging Ability to design and print badges from within the ACM Browser.
Management Collaborations Collaboration provides the ability to exchange data between the access control appliance application and a large number of other database types
Alarm Identity Correlation Report (e.g., LDAP, SQL Server, Oracle RDBMS, CSV imports, Generic XML, REST API Tools).
Management Event Correlation & Alarm Monitoring Contact tracing tool to help verify identities that may be at risk by having close contact with infected individuals.
Open-Field Integrated Video & Mapping Interface Alarm management workflow, with visual representations of alarms using color-based priority indicators, audible alerts, the ability to view live
Hardware Support Email Notifications and recorded video, append notes, receive instructions, acknowledge and clear alarms.
& Integrations Identity Mustering Automated alarms generated by ACM can be viewed on a map and linked to the associated live or recorded video stream from ACC software.
Controllers & Sub-Panels
Easy to Use Intrusion Detection Receive automatic email notifications of access control events.
& Deploy Wireless Locks This interactive tracker can pinpoint missing personnel quickly with a real-time visual display of where people are at all times based on their
Biometric Readers badging activity.
pivCLASS Protect and future-proof your access control investment by using open-field hardware from leading manufacturers.
Video Security
Turnkey Operation Integration to intrusion detection systems to automate the management and control within the ACM system.
Templates
Customized Reporting Integration with leading third-party wireless lock vendors.
Peer-to-Peer Replication
Integration to biometric fingerprint reader technology.
Scalable Deployment Model
Integration with HID® pivCLASS® technology when implemented in an HSPD-12 environment requiring FIPS 201-2 evaluation program approval.
Mobile App
Unification with ACC software and integration with other third-party video management software to better inform responses with video context.
Easy installation experience with server appliances that are ready to go the moment you plug them in.
Wide selection of easy-to-use templates for doors and wiring for faster configuration.
Pre-defined, ready-made reports that can be customized to display important access control data.
Patented technology that allows for replication of identity data on multiple appliances across many sites. This embedded technology requires no
additional software or hardware and simplifies identity management, promotes consistency of identity data and reduces data entry efforts.
ACM appliances allow you to start with what you need on individual appliances, then expand by adding doors and replicating to additional
appliances as your organization grows.
ACM Expedite provides quick and easy access to pre-configured global actions, allowing operators on-the-go to swiftly perform daily operations
such as unlocking a door, and responding to critical events such as a sitewide lockdown – all from their mobile device.
KEY FEATURES different solutions to uniquely fit customer needs. It also
supports third party integrations through our RESTful API.
The Motorola Solutions Access Control Manager (ACM) The ACM system leverages an open architecture, integrates
system is designed to keep your focus on securing people, identity management and video surveillance such as ACC video
property and assets, and maximize your time by helping management software and achieves a high level of scalability
you respond immediately to alerts wherever you are. The with a low cost of ownership. It delivers a ready-to-deploy
ACM™ system is 100% browser-based, requiring no software solution that provides the performance you expect from an
installation. Deploying hardened linux-based appliances, enterprise-class solution.
we use open-field hardware to leverage a breadth of
standardized products from trusted manufacturers for
LEARN MORE
ACCESS CONTROL 55
ACM 6 SYSTEM
Designed to help you focus on securing your people, property and assets, while giving you the flexibility to respond to alerts wherever you are.
SPECIFICATIONS PROFESSIONAL ENTERPRISE ENTERPRISE PLUS VIRTUAL
EDITION AC-APP- R-PRO-6 AC-APP- R-ENT2-6 AC-APP- R-ENT-PLUS-6 AC-APP- R-VM-6-P
PART NUMBER
Small form factor, desktop 1U rack mount chassis VMware vSphere® ESX(i) 6.5+¹
Appliance Type or Microsoft Hyper-V
Max. Number of Doors 16–32 16–400 16–2048 16–2048
Max. Simultaneous Operators
Max. Identities 10 20 50
Max. Stored Transactions
Storage 75,000 250,000 500,000
Processor
75,000,000 150,000,000
Memory
500 GB (7.2K RPM SATA) 1 TB (7.2K RPM SATA 6 Gbps) 1.3 TB (4 x 480 GB SSD RAID5) 1 TB SSD1
Network Interface 3.7 GHz Intel Pentium® 5400 3.8 GHz Intel Xeon E3-1270 v6
Replication & Hot Standby Auto Failover (4 MB cache, 2C/4T, 65 W) Intel Xeon E-2124 3.3GHz, 3.8 GHz Intel Xeon E3-1270 v6
RAID & Hot-Swap Components 4 GB (1 x 4 GB) (2.6 GHz DDR4 8M cache, 4C/4T, turbo (71W) (8 MB cache, 4C/8T, Turbo, 72 W) (8 MB cache, 4C/8T)
32 GB¹
LICENSE OPTIONS Non-ECC) 8GB 2666MT/s 32 GB (2 x 16 GB)
Max. Number of Doors Supported 1 Gigabit Ethernet Intel DDR4 ECC UDIMM (2400 MT/s DDR4 UDIMMs) 1 Gigabit Ethernet1
per License
1 Gigabit Ethernet Broadcom 5720
No Yes
No Yes Yes1
doors doors doors doors doors doors doors doors
doors doors doors doors
doors doors doors doors doors doors
doors
doors doors
STANDARD FEATURES • PoE compatible Mercury hardware • Graphic maps and muster dashboard
• Quick online license management • Migration from ACM Embedded • Photo import/export
• Email notification Controller
• Event monitoring and schedules • A larm management andacknowledgment
• Identity search, import/export • M ercury and HID hardware
interoperability • Badging
and management
• Panel and door status • S oftware integrations (video, • Multi-language
• Preconfigured and custom reports intrusion, wireless locks and visitor
• Firmware updates management) • S ystem configuration templates for
• OSDP In/Out door support doors, wiring, input and output, to
• Backup and restore • Biometric integrations enable quick Batch Add setup
LEARN MORE • Support for Mercury Security large • M ercury Security panel certificates for
encoded card formats added security
• GSA approved products list
1 System recommendations.
ACCESS CONTROL 56
CONTROLLERS & SUB-PANELS
With hardware options for small to enterprise level systems, deploying and managing your ACM system has never been more intuitive and
flexible as it is today.
DETAILS CONTROLLERS INTERFACE MODULES I/0 MODULES
AC-MER-CONT-LP1501
MODEL NAME AC-MER-CONT-LP1502 AC-MER-CON-MR52 AC-MER-CON-MR16IN
PART NUMBER AC-MER-CONT-LP2500 AC-MER-CON-MR50 AC-MER-CON-MR16OUT
AC-MER-CONT-LP4502 AC-MER-RIM-MR62E
Features Monitor high concentrations of inputs and
Manage 1 to 64 readers per controller Low-cost and high-performance outputs with the ACM system
for all door interface needs
Enhanced data security with embedded Compact footprint and RS-485 connectivity
crypto memory chip Manage multiple door openings with Capable of supporting 16 general-purpose
auxiliary point control and monitoring
Flexible installation for different environments Provide access control and security moni- dry-contact inputs or 16 relay outputs
with PoE, PoE+ or RS-485 connectivity toring using any of the Mercury controllers Supports being clustered or distributed to suit
Expand I/O and readers by simply adding connected to the ACM system the installation environment
input, output and reader interface modules Enhanced data security with embedded
crypto memory chip
LEARN MORE
ACCESS CONTROL 57
READERS & CREDENTIALS
The ACM system offers trusted and secure door readers and multipurpose credential options to keep
security at the forefront of your facility.
DETAILS VIRDI BIOMETRIC AVIGILON SE CARD AVIGILON SE AVIGILON SIGNO AVIGILON SEOS
ACCESS READERS READERS CREDENTIALS CARD READERS CREDENTIALS
MODEL NAME AC-VT-READ-BIO-RFID- AC-HID-READER-SIGNO-
PART NUMBER AC5000SC-BLK-NA AC-HID-READ-ICLASS- AC-HID-CARD-ICLASS- 40TKS-01-00001H-AVG AC-HID-CARD-SEOS-
AC-VT-READ-BIO-RFID- SE-R10-AVG SE-3000-AVG AC-HID-READER-SIGNO- 5006PGCMN-AVG
Features 20TKS-01-00001H-AVG
AC2000SC-NA AC-HID-READ-ICLASS- AC-HID-CARD-ICLASS- AC-HID-READER-SIGNO- AC-HID-CARD-SEOS-
AC-VT-READ-BIO-RFID- SE-RP40-AVG SE-3000-AVG-NL 20KTKS-01-000000-AVG 5006PGGMN-AVG
AC-HID-READER-SIGNO- AC-HID-FOB-SEOS-
AC2000IC-NA Multipurpose card Purposefully designed 40KTKS-01-000000-AVG 5266PNNA-AVG
AC-VT-READ-BIO-RFID- reader to suit different for the ACM system
installation environ- Highly versatile with Leverages advanced
AC5000IC-NA Advanced 56-bit support for the widest Seos credential tech-
ments format provides nology by HID Global,
Detect fingerprints Offers secure commu- multiple levels of range of credential allowing seamless
quickly and accurately nications by utilizing technologies, including migration to a higher
security standard of security
and discern fake the latest authenti- HID Mobile Access
biometric attempts cation through the and functionality
Secure Identity Object Ultra secure storage Advanced 56-bit
for high security (SIO) data model of cryptographic keys format provides
environments on certified secure multiple levels of
Easily set-up and element hardware security
manage biometric Available in logo
identities directly from Includes out-of- card, non logo
the ACM system the-box support for
Open Supervised card or FOB
Get real-time visibility Device Protocol (OSDP)
into current risk for secure bidirectional
position and reduce communication
unauthorized access
LEARN MORE
ACCESS CONTROL 58
READERS & CREDENTIALS
The ACM system offers trusted and secure door readers and multipurpose credential options to keep
security at the forefront of your facility.
DETAILS FARPOINTE DATA FARPOINTE DATA FARPOINTE DATA FARPOINTE DATA FARPOINTE DATA FARPOINTE DATA
CONEKT READERS AND DELTA READERS RANGER READERS GUARDIAN READERS GIBRALTAR READERS PYRAMID READERS
MODEL NAME
CREDENTAILS AC-FP-READ- AC-FP-REC-LONG- AC-FP-READ- AC-FP-READ- AC-FP-READ-P-300-H
PART NUMBER DELTA3-CSN RANGE-WRR-22 GUARDIAN-VR-P- GIBRALTER-BR-P- AC-FP-READ-P-300-H-A
AC-FP-READ-CSR- AC-FP-READ- AC-FP-REC-WRR-44 AC-FP-READ-P-500-H
Features 35L-OSDP DELTA3-SECTOR 403-HA 455-HA AC-FP-READ-P-500-H-A
AC-FP-READ- Exceptionally long AC-FP-READ- AC-FP-READ-
AC-FP-READ-CSR- DELTA5-CSN read range—up to GUARDIAN-VR-P- GIBRALTER-BR-P- AC-FP-READ-PROX-
35L-WG AC-FP-READ- EURO-P-530-HA
DELTA5-SECTOR 200 ft (61 m) 405-HA 453-HA
AC-FP-MOB-CMC-2 AC-FP-READ- Ideal for parking AC-FP-READ- AC-FP-READ-PROX-
AC-FP-FOB-CSC-2 DELTA5.3-CSN facilities, gated GUARDIAN-VR-P- KEYPAD-P-620-HA
AC-FP-READ- AC-FP-READ-P-640-H
AC-FP-CARD- DELTA5.3-SECTOR communities, 410-HA AC-FP-READ-P-640-H-A
CSM-2S AC-FP-READ- marinas and more AC-FP-READ-P-710-H
DELTA6.4-CSN Supports industry Vandal-resis- AC-FP-READ-P-710-H-A
AC-FP-CARD- AC-FP-READ- standard electronic tant with thick AC-FP-READ-P-900-H
CONEKT-CSM-2P DELTA6.4-SECTOR polycarbonate AC-FP-READ-P-900-H-A
access control material, epoxy
AC-FP-CARD- Enhanced interfaces potted electronics Vandal-resistant Outstanding read
CONEKT-CSK-2 smartcard encryp- and tamper proof with stainless steel range and excellent
tion and optional built and reinforced
Enables smart- DESFire EV1 and screws with a bullet-resis- read speed
phones to be the Suited for schools, tant Shot Blocker Mounts to most
access credential EV2 support inner-city environ- insert and tamper surfaces, including
ments, correctional
with a secure Supports industry facilities, or where proof screws metal
smartphone standard interfaces heavy machinery is Suited for schools, Installs indoors or
wallet app
Readers read Based upon operated correctional outdoors
Conekt BLE mobile the world-stan- facilities, housing Supports industry
credentials as dard MIFARE authorities, and standard interfaces
well as traditional technology, ideal
for ISO14443 where heavy
physical equipment is
credentials applications
Supports industry operated
standard and Installs indoors or
custom formats outdoors
For full list of part numbers including credentials, contact your local sales representative.
LEARN MORE
ACCESS CONTROL 59
READERS & CREDENTIALS
The ACM system offers trusted and secure door readers and multipurpose credential cards to keep
security at the forefront of your facility.
DETAILS SCHLAGE MOBILE SCHLAGE MULTI- SCHLAGE SMART SCHLAGE SCHLAGE SCHLAGE
ENABLED MULTI- TECHNOLOGY READERS CARD READERS PROXIMITY WIRELESS ENROLLMENT
MODEL NAME AC-ING-READ-APTIQ- READERS READERS
TECHNOLOGY READERS
READERS MULL-MT11
AC-ALL-READ-APTIQ-
PART NUMBER AC-SCH-READER- OSDP-MULL-MT11-485 AC-ING-READ-APTIQ- AC-ING-READ- AC-ALL-SCH- AC-ING-READ-
(READERS) MTB11 AC-ING-READ-APTIQ- MINI-SM10 XCEEDID-PROX WPR400-MT APTIQ-ENROLL-MT20
AC-ING-READ-
AC-SCH-READER- SNG-MT15 XCEEDID-PROX-C
MTB15 AC-ALL-READ-APTIQ-
OSDP-SNG-MT15-485
AC-SCH-READER- AC-ING-READ-APTIQ-
MTKB15
KEYPD-MTK15
Features Eases the AC-ALL-READ-APTIQ-OSDP- Sleek, Sleek, compact Quickly extend a Simplifies enroll-
transition from compact and and cost-effec- facility’s access ment of smart and
existing proximity KEYPD-MTK15-485 cost-effective tive for applica- control to remote multi-technology
systems to secure AC-ALL-READ-APTIQ- for high-security tions requiring
encrypted card WIEGAND-MTMSK15 applications lower security locations credentials in
technologies or Mini-mullion Mini-mullion Battery-operated “No-Tour” multi-
mobile solutions Recognizes magnetic stripe, design is ideal design is ideal device that can be family applications
Supports Schlage proximity, Schlage smart card for installation in for installation in handheld or placed Program encrypted
Mobile Access and NFC-enabled smart devices tight spaces in a temporary credentials, such
Credentials (BLE) Meets applicable tight spaces location for creden- as a keyfob, over
and Near Field Works with industry standards ISO standards to Recognizes most tial verification
Communication and common access control integrate with industry leading Wi-Fi or USB
system interfaces many access 125 kHz proximity LED indicator connection to PC
(NFC) control systems visually confirms When presented at
Offers support for credentials credential verifica- a lock by the user,
Apple’s Enhanced Mutually Easily integrates tion or rejection
Contactless Polling authenticated in Utilizes the same the pre-pro-
(ECP) for Apple communication into existing credential reader grammed creden-
Wallet and Google between the card legacy proximity modules offered tials automatically
Pay credentials and reader for systems and are update the lock
optimum security compatible with with an
new installations AD Series lock database
For full list of part numbers including credentials, contact your local sales representative.
LEARN MORE
ACCESS CONTROL 60
POWER SUPPLIES
High-efficiency, cost-effective power supplies from LifeSafety Power and Elmdene provide all the power
needed for up to 16-door applications.
DETAILS LIFESAFETY POWER ELMDENE1
AC-LSP-2DR-MER AC-ELM-1DR
MODEL NAME AC-LSP-2DR-MER-LCK AC-ELM-2DR
PART NUMBER AC-LSP-4DR-MER AC-ELM-4DR
Max. Number of Doors Supported AC-LSP-4DR-MER-LCK AC-ELM-4/12DR-EXP
Features AC-LSP-8DR-MER AC-ELM-12DR
AC-LSP-8DR-MER-LCK AC-ELM-4/12DR-EXP-LCK
LEARN MORE AC-LSP-16DR-MER AC-ELM-12DR-LCK
AC-LSP-16DR-MER-LCK AC-ELM-ACCESS-EXP-PLATE
4DR: 4 1DR: 1
8DR: 8 2DR: 2
16DR: 16 4DR: 4
12DR: 12
Designed to house Mercury Security controllers
Designed to house Mercury Security controllers
Separate 24 VDC circuit provides lock power within the same enclosure,
saving the cost of added hardware and installation time 13.8 VDC 4A output supplies continuous full rated current to load
Additional 0.5A to charge standby battery
Modular construction for ease of maintenance and installation
1 Listed products from Elmdene are only available in the European Union and the United Kingdom.
ACCESS CONTROL 61
BUNDLED KITS
The ACM Bundled Kits come with everything needed to connect up to 16 doors of access.
SPECIFICATIONS
MODEL NAME EMBEDDED CONTROLLER KITS1 PROFESSIONAL KITS ENTERPRISE KITS
AC-HID-LSP- AC-HID-LSP- AC-HID-LSP-
PART NUMBER ACMEC-KIT4 ACMEC-KIT8 ACMEC-KIT16 AC-PRO-KIT4 AC-PRO-KIT8 AC-PRO- AC-ENT-KIT8 AC-ENT-KIT16
KIT16
4 8 16
Max. Number of Doors Supported – 4 8 16 8 16
– Enterprise: 1
ACM Appliance Professional: 1
ACM Software ACM Embedded Controller: 1
Licenses – 16
1
Controllers & Controller Mercury Intelligent Controller: 1
Sub-Panels Mercury Interface Modules 248
1 37 3 7
4 8 16 4DR x 1 8DR x 2
Power Supplies LifeSafety Power Enclosure 8DR x 1 8DR x 2 8DR x 1
Card Readers HID VertX V100 Reader –
Credential Cards Interface 100 –
Avigilon SE R10 Card
Readers –
HID® iCLASS® SE RP40
Card Readers 4 8 16 8 16
100 100
1 View notice.
LEARN MORE
ACCESS CONTROL 62
WIRELESS LOCK INTEGRATIONS
The Avigilon ACM system seamlessly integrates with third-party wireless locks for you to combine all of
the components of an access controlled door into a simplified all-in-one system that saves time and costs.
DETAILS SCHLAGE AD SCHLAGE PIM400 & SCHLAGE LE/B & SCHLAGE CONTROL VON DUPRIN RU/RM
SERIES LOCKS PIM300 NDE/B LOCKS MOBILE ENABLED LOCKS CRASHBARS
MODEL NAME AC-SCH-RU-
PART NUMBER AC-SCH-AD400-CUSTOM AC-ALL-SCH-PIM400- AC-SCH-NDE-CUSTOM AC-SCH-CONTROL-
AC-SCH-AD300-CUSTOM 485-RSI AC-SCH-LE-CUSTOM BE467F-CUSTOM VOND-3-47258681
Features AC-SCH-CONTROL- AC-SCH-RU-
(WIRED) AC-ALL-SCH-PIM400- Affordably extend FE410F-CUSTOM
AC-SCH-993-CUSTOM 1501-LC electronic access control VOND-4-47258682
deeper into your facility Designed for multifamily AC-SCH-RM-
(CRASHBAR) AC-ALL-SCH-PIM400-TD2 Packaged with credential residences
AC-ALL-SCH-PIB300-2D reader and access control VOND-3-47258683
Allow residents to gain AC-SCH-RM-
Upgrade to new tech- Standard IP addressable sensors for simplified access using a smart
nologies without taking intelligent controller installation VOND-4-47258684
for up to 16 AD Series credential or their
locks off the door wireless devices LE mortise locks can smartphone Provide greater perimeter
Cylindrical, mortise, Manage up to 240,000 be ordered with LED security for K-12 schools
mortise deadbolt and exit indicator, interior push Eliminate the cost and
trim chassis options cardholders and 50,000 button (IPB) or deadbolt hassle of keys Enable remote
Built-in credential reader transactions in memory for tailored applications undogging and door
and access control PoE compliant to IEEE NDEB cylindrical locks Available as a deadbolt status monitoring
sensors for simplified can be ordered with IPB or interconnect lock
802.3af to extend the lock to Modular kit retrofits
installation include storeroom, office, existing 98/99 and
FIPS 201-2 compliant privacy and apartment 33A/35A series devices
applications
Not all wireless locks products are available in all regions, please contact your local sales representative
to confirm availability.
LEARN MORE
ACCESS CONTROL 63
WIRELESS LOCK INTEGRATIONS
The ACM system seamlessly integrates with third-party wireless locks for you to combine all of the
components of an access controlled door into a simplified all-in-one system that saves time and costs.
DETAILS SALTO VIRTUAL NETWORK (SVN) ASSA ABLOY ASSA ABLOY ASSA ABLOY
DATA-ON-CARD SYSTEM APERIO LOCKS WI-FI LOCKS POWER OVER ETHERNET (POE)
MODEL NAME
PART NUMBER Streamline access management Contact your local sales representative LOCKS
Features for high door density facilities
with access data on the card Deploy in a wide range of Suited for hard-to-wire locations Enable easy and cost-effective
Update cards quickly with RFID applications including offices, Reduce installation time and installations into existing
server cabinets, storage lockers, costs by utilizing existing Wi-Fi infrastructure
technology drawers, glass doors and more
Locks can securely read, receive Easy transition to higher security Set-up real-time communication
and write information to ensure Flawless integration with credentials such as HID Mobile by utilizing IEEE 802.3af PoE-en-
Mercury controllers to provide
access rights are updated and government-issued PIV abled network infrastructure
Issue SALTO JustIn Mobile real-time access and audit with HID Global multiCLASS SE Support multiple credential types
credentials from ACM to manage Support the use of HID Mobile such as HID Mobile, for a secure
access rights over-the-air credentials to access doors using technology
solution with multiCLASS SE
a mobile device technology
Privacy button allow shelter in
place/local lockdown
Available in the United States and Canada only.
LEARN MORE
ACCESS CONTROL 64
FEDERAL GOVERNMENT SOLUTIONS
The ACM system is FIPS 201-2 compliant and is a certified solution on the GSA Approved Product List (APL), meeting the Personal
Identity Verification (PIV) requirements mandated for U.S. federal employees and contractors. Customers can conveniently and
reliably purchase all components of this fully compliant, GSA-approved FICAM solution directly from Motorola Solutions.
DETAILS ACCESS CONTROL HID PIVCLASS CONTROLLERS & HID PIVCLASS HID PIVCLASS
MANAGER SOFTWARE SOFTWARE SUB-PANELS AUTHENTICATION READERS
MODEL NAME
APL Approved Products APL #10122 Validation System APL #10122 MODULE (PAM) Embedded Configuration
PACS software APL# 10123 HID LP4502 Validation pivCLASS RP40 Contactless Reader
pivCLASS Intelligent Two Door System
ACM 6.4.2 System Controller APL# 10123 VAS0300 Rev. B.1 (APL# 10003)
Registration Engine with pivCLASS pivCLASS pivCLASS RK40 Contactless Reader
for ACM Embedded
Authentication Authentication VAS0300 Rev. B.1 (APL# 10004)
pivCLASS Certificate (Software 1.29.1, Module pivCLASS RPK40 Contact/Contactless
Manager, Release Firmware 5.11.38) Reader VAS0300 Rev. B.1 (APL# 10005)
HID LP2500
5.12.0 Intelligent Controller pivCLASS R40 Contactless Reader
pivCLASS Reader (Firmware1.29.1) VAS0300 Rev. B.1 (APL# 10006)
Services, Release HID LP1502 pivCLASS RKCL40 Contact/Contactless
Intelligent Controller Reader VAS0300 Rev. B.1 (APL# 10007)
5.12.0 (Firmware 1.29.1)
pivCLASS HID MR52-S3 Two pivCLASS RPKCL40 Contact/
IDPublisher, Release Reader Interface Contactless Reader with PIN VAS0300
Module (Firmware
5.12.0 Rev. B.1 (APL# 10008)
3.21.0) Authentication Module Configuration
HID MR62e Reader
Interface Module pivCLASS RP40 Contactless Reader
(Firmware 3.21.x) (APL#10003)
pivCLASS RK40 Contactless Reader + PIN
(APL# 10004)
pivCLASS RPK40 Contactless Reader +
PIN (APL# 10005)
pivCLASS R40 Contactless Reader
(APL# 10006)
pivCLASS RKCL40 Contact/Contactless
Reader with PIN (APL# 10007)
pivCLASS RPKCL40 Contact/
Contactless Reader with PIN (APL#
10008)
pivCLASS RPKCLB40 Contact/
Contactless Reader with PIN & BIO (APL#
10026)
pivCLASS RKCLB40 Contact/
Contactless Reader with PIN & BIO
(APL# 10052)
pivCLASS R10 Contactless Reader
(APL# 10085)
LEARN MORE
ACCESS CONTROL 65
BIOMETRIC SOLUTIONS
The integration of ACM with ViRDI’s biometric fingerprint reader technology provides further
safeguards to high security environments with an extra form of identification.
DETAILS VIRDI ENROLLMENT USB VIRDI IP65 FINGERPRINT SMARTCARD VIRDI IP65 FINGERPRINT
FINGERPRINT READER READER WITH KEYPAD SMARTCARD READER
MODEL NAME
PART NUMBER AC-VT-READ-BIO-USB-FOH02-SC AC-VT-READ-BIO-RFID-AC5000SC-BLK-NA AC-VT-READ-BIO-RFID-AC2000SC-NA
Features
Seamless integration between VIRDI’s Seamless integration between VIRDI’s Seamless integration between VIRDI’s
Biometrics Enrollment Manager interface and Biometrics Enrollment Manager interface and Biometrics Enrollment Manager interface and
ACM to add and remove biometric identities ACM to add and remove biometric identities ACM to add and remove biometric identities
Easily set-up and manage biometric identities Secure and convenient access with Bluetooth
IP65 rating for dust and water resistance and VIRDI’s UNIS B plus mobile application
directly from ACM OSDP compatible with ACM
Authenticate individual using one-to-one controllers integration IP65 rating for dust and water resistance
OSSP compatible with ACM
biometric verification Simplify operation with graphic UI and controllers integration
customizable 2.8” Color TFT LCD background
LEARN MORE
ACCESS CONTROL 66
VISITOR MANAGEMENT
ACM integrates with HID Global’s EasyLobby Secure Visitor Management software, which allows
organizations to automate the entire process of registering a visitor, printing a badge and capturing
detailed information in seconds by simply scanning an ID.
DETAILS ACM INTEGRATION WITH HID GLOBAL SNAPSHELL HID GLOBAL SNAPSHELL ASSURETEC ID-150 DYMO 450 TURBO THERMAL
HID GLOBAL EASYLOBBY PASSPORT SCANNER LICENSE CARD SCANNER CARD SCANNER PRINTER
MODEL NAME
PART NUMBER SOFTWARE AC-HID-EL-SS-PASSPORT AC-HID-EL-CSS-R3 AC-HID-EL-AST-ID150 AC-HID-EL-DYMO-450T
Features AC-HID-EL-96000-SVM10
Works together with Leverages Optical Reads and verifies Prints temporary badges
EasyLobby visitor records EasyLobby to improve Character Recognition identity documents for increased security
are automatically the efficiency of identity (OCR) to read driver’s such as driver’s licenses and visibility of visitors
licenses and ID cards and IDs quickly and Eliminates the cost
updated to ACM with registration quickly and accurately accurately, including of ink or toner with
identity information Auto data capture and Easy-to-use with no direct thermal printing
Streamlines enrollment use of camera-based the photo
with pre-registration or technology help provide moving parts and technology
self-registration options compact design takes up
Improves security by quicker onboarding minimal counter space
identifying who is in procedures
a facility quickly and
accurately, especially in
emergency situations
Conduct analysis and
reporting on visitor data,
quickly and easily
LEARN MORE
ACCESS CONTROL 67
INTRUSION PANELS INTEGRATION
Centrally monitor and control Bosch intrusion panels and access events from the ACM system for visual verification
of alerts and faster responses. Operators can arm and disarm panels by area, set-up and assign passcode groups to
identities, configure the system to send access events to the central monitoring service and more.
DETAILS BOSCH INTRUSION INTEGRATION
AC-SW-LIC-BOSCHINTR-1PANEL-6-P
MODEL NAME AC-SW-LIC-BOSCHINTR-10PANEL-6-P
PART NUMBER Mid-range: B3512, B4512, B5512, B6512
Supported Panels Commercial: B8512G, B9512G, D9412GV4 V2, D7412GV4
Features
Colour graphic touch screen display for easy operation
LEARN MORE Built-in presence detector lights the display when user approaches keypad
Built-in proximity reader allows use of a token or card as replacement for a passcode, or for use with dual authentication for high security areas
Four inputs and one output provide cost effective expansion
ACM integration enables quicker verification of intrusion events via live video triggers
No additional access hardware or wiring required — connects to IP networks
ACCESS CONTROL 68
ACM VERIFY VIRTUAL STATIONS
ACM Verify allows any browser-enabled smart device to act as a virtual station. It works by recording and confirming
an individual’s identity using a PIN code, enabling you to extend the capability of your access system to locations
where physical access doors are not feasible.
DETAILS ACM VERIFY
AC-SW-LIC-AVO-VER-5VS-6-P
MODEL NAME AC-SW-LIC-AVO-VER-16VS-6-P
PART NUMBER
Features Device pairing allows you to easily link a device to a virtual station for greater security
Verify profiles by comparing a person’s appearance with a saved database image
LEARN MORE
Send verification events to ACM and view a list of recorded personnel at each virtual station
Activate global actions from events generated by virtual stations
Enable or disable virtual stations from ACM
Suited for sites that do not have access controlled doors or locks such as outdoor mustering stations for fire drills,
a bus for school trips or a work area in an open-plan office
ACCESS CONTROL 69
For more information, visit motorolasolutions.com/en_us/video-security-access-control.html
MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. AVIGILON, the AVIGILON logo, AVIGILON
CONTROL CENTER, ACC, ACCESS CONTROL MANAGER, ACM, LIGHTCATCHER, HDSM SmartCodec, AVIGILON APPEARANCE SEARCH, and AVIGILON PRESENCE DETECTOR are trademarks of Avigilon Corporation. Other
names or logos mentioned herein may be the trademarks of their respective owners. Avigilon Corporation protects its innovations with patents issued in the United States of America and other jurisdictions worldwide (see
avigilon.com/patents). Unless stated explicitly and in writing, no license is granted with respect to any copyright, industrial design, trademark, patent or other intellectual property rights of Avigilon Corporation or its licensors.
© 2022, Motorola Solutions. All rights reserved. 02-2022 [JS01]