Check out our special report on casino security
DSX Who is In software application
Technical Specification
- Make: DSX
- Model code: Who is In
- Reader Types: Card
The Who is In is a Life Safety report that provides a list of Cardholders that are shown to be In a selected area or premise. The inclusion of the cardholder in the report is based on their Zone 1 APB status as being IN for the Location of their last card read. The report can be sorted by Company or by Device location. The report is conveniently initiated from the Who Is In Report Button in the toolbar located at the top of the DataBase program or can be run from the Who is In Report in the reports list. The Who Is In report only displays people whose last card read was within 48 hours of when the report is run. This will exclude people who never read out.
Read more| Make | DSX |
|---|---|
| Manufacturer | DSX - Europe Ltd. |
| Category | Access Control>Access control software |
| Model code | Who is In |
| Reader Types | Card |
| Additional info |
The Who is In is a Life Safety report that provides a list of Cardholders that are shown to be In a selected area or premise. The inclusion of the cardholder in the report is based on their Zone 1 APB status as being IN for the Location of their last card read. The report can be sorted by Company or by Device location. The report is conveniently initiated from the Who Is In Report Button in the toolbar located at the top of the DataBase program or can be run from the Who is In Report in the reports list. The Who Is In report only displays people whose last card read was within 48 hours of when the report is run. This will exclude people who never read out. |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

