Feature Focus

rss

Feature Focus

Spotlight on key features of the Cogito system and the value they provide to customers.


Harmin Riarh
Harmin Riarh
Harmin Riarh's Blog

Simplify processes and save time with Command Macros

A command macro is a predefined set of commands that execute as if they were a single command. They can be activated via Cogito’s quick tasks menu or scheduled to run at a predetermined date and time.

A command macro has a number of uses, including when you need to override normal access control operations for a specific situation.

For example, if a special event was being organized in the office outside normal business hours it would be important to ensure all invited attendees had access to the event, but not to other parts of the building.

In Cogito a command macro can be created to unlock certain doors, but lock others, or perhaps grant access to persons with access cards who would not normally be able to enter that area of the building. Any combination of commands can be included in a macro so, for example, it can include allowing elevator access to that specific floor and disabling door held open alarms among many other options.

These commands are set up in advance by following a series of simple steps to create the macro. The macro can then be executed from Cogito’s quick task menu. Alternatively, an added benefit is that a macro can be assigned a schedule, meaning it will run at a certain date and time.  So in our example above, all the commands to prepare for the special event could be set up and tested well in advance. The security staff can then “set it and forget it” knowing the command macro will run automatically in advance of the event. Of course another macro can be set to run later to restore access to normal conditions.

Command macros can also be used for more mundane tasks. The commands can be run on access points, controllers, as well as in the Cogito application itself to automate tasks.

If you have a time consuming process that you would like your access control system to automate, please contact us for a demo and how this feature can work for your situation.

Managing employee vacations and absences

A cardholder’s access is tied to the Access Group of which they are a member. The access group defines where they can and cannot enter and the times of day – and days of week – that access is authorized.

However, when a cardholder is on vacation of some other form of leave, they should not be accessing the customer site at all.

Cogito’s Absence management feature enables this temporary lockout easily within the application.

A typical user’s profile includes an “Absences” tab. This can be used to add the start and end date of any scheduled absences and during this period the user would be denied access when presenting their card or other credentials. Several absences periods can be set up and these can be subsequently edited or removed.

Obviously managing an entire company’s vacation schedule within the security management system is not efficient. But using Cogito’s robust and comprehensive software development kit (SDK) it is straightforward to construct a customized and secure connection between Cogito and the company’s human resources management system (HRMS) that can automatically export vacation schedules directly to Cogito based on Active Directory or an identifier such as employee number.

Customizing User Profiles

Cogito comes with a comprehensive set of identification criteria for each user’s access control profile.

These include the standard name and title, address, employee number, title, department and so on. However, several customers have needed to add additional data to a cardholder’s profile. One major corporate client recently added 40 “custom fields” to their company's user database such as:

  • Driver’s License number
  • Whether they had any special accessibility needs
  • Mother’s maiden name (to prove identity)
  • Vehicle license plate, make, model and color
  • Date of hiring
  • Serial numbers of equipment issued (laptop and phone)
  • Additional details of their office location

All these were easily added through the Cogito’s Custom Field Editor. The Custom Field Editor enables fields to be created, edited and moved around the interface. Fields can be created in a number of formats:

  • Text
  • Time & Date
  • Check Box
  • Combo Box (drop down menu)
  • Number

Further features enable the content of a field to be made non-editable once it has been entered.

A typical user profile appears on a number of tabs including:

  • General (name and other identifying info)
  • Credentials (information regarding cards, PIN access etc.)
  • Pictures of user and their signature
  • Absences schedule

Fields can be added to an existing tab, or a new tab can be created. There is no limit to the number of tabs or the number of fields.

Additionally, through our software development kit (SDK) we were able to link the Cogito integrated security system with other corporate systems such as the human resources management system which contained much of the identifying information for the users; and asset tracking for details on laptops and phones.

Please contact us for more information on how we can create fully customized user profiles for your customer.

Mailing list

    Newsletter

    Keep up on our always evolving product features and technology. Enter your e-mail and subscribe to our newsletter.

    About Our Company

    Our vision is to lead the development of the next generation intelligent security systems that enable security stakeholders of organizations around the world make world a safer place.

    Get in touch

    • Address: 7045 Tranmere Drive, Unit 8, Mississagua, Ontario, Canada

    • Phone: (416) 792-9110

    • Email: info@averics.com


    Become a Dealer

    Contact us today to become an Averics certified dealer.