Leverage COVID-19 response technologies to reopen your workplace safely and comply with local health and safety guidelines. Learn more.

Access Control Manager System

Access Control Manager System

Scalable Enterprise Solution

The ACM system is a physical access control system for enterprise-class installations, designed to help you focus on securing your people, property and assets, while giving you the flexibility to respond to alerts wherever you are. It seamlessly integrates with ACC software to provide you with a powerful and unified security solution that helps you proactively monitor and secure your sites.

Secure Operating System

An open-source Linux® platform provides protection against network vulnerabilities.

Retain Existing Investments

Capitalize on company investment in existing hardware by moving from proprietary or unsupported hardware to the ACM system.

Easy Synchronization & Role Management

Enforce policy restrictions, meet regulations and reduce the risk of duplicate data entry by integrating with external IT and HR identity management solutions. Map physical access to enterprise roles such as departments, locations and titles.

System Redundancy

Optional hot standby-auto failover solution automatically saves policies, settings and identities from any one primary appliance to a standby appliance.

Global Access

Avigilon ACM solutions are available 24/7/365 from any internet accessible location, using any device with a browser, and can be managed by multiple operators simultaneously. Whether using ACM Enterprise or ACM Virtual system, all changes are automatically synchronized across the entire access system, displaying only the most up-to-date information.

User-Friendly Interface

The ACM system interface keeps most system operations at your fingertips, allowing you to effectively manage, act on and create custom reports for critical security events.

Alarm Management and Video Interface
Visual context for alarm events

Personnel Locator and Occupancy Tracker
Enhance the safety of key personnel

Area Identity Report
Snapshot of on-site identities and their locations
based on doors accessed

Intrusion Event Monitoring and Control
Correlate alarms with system actions