Open IP access control hardware.

  • Authentic Mercury open hardware platform
  • Plug and play IP access control
  • Available in kits, panels or single boards
  • 1, 2, 4, 8, 12, 16 portal configurations
  • Door, turnstile and elevator solutions
  • Optional integrated access and lock power
  • POE Controllers for installations at the “edge”
  • Software-only upgrade of any of the 20-plus Mercury-based security systems

Board swap M5 CASI conversions.

  • Escape the proprietary security hardware cage
  • Smooth transition from proprietary CASI hardware to open platform BluBØX hardware
  • Board replacement of CASI hardware without rewiring
  • Substitution of CASI Picture Perfect software with BluSKY software to manage the new system
  • Automatic Picture Perfect to BluSKY database conversion tool
  • Picture Perfect to BluSKY configuration and monitoring tool to support system conversions occurring over a period of time

Web-based control and monitoring of portals and elevators. From anywhere.

  • Real time single point or group status and control from any device, anywhere, anytime
  • Perform lock, unlock, release, timed release, schedule, credential access and simulated swipe functions
  • Provide Photo Verification of any portal
  • View real time events
  • Control a few portals in a single facility or thousands of portals across many facilities
  • Control relay-based elevators
  • Control elevator destination dispatch systems

Flexible system creation tools.

  • Build a system component by component
  • Copy from an existing system
  • Copy from a predefined template
  • Upload from spreadsheet
  • Specify with parameters

Dashboard-style configuration.

  • “At-a-Glance” view of important parameters
  • Single-click access to configuration controls
  • Configure from any device, anywhere, anytime
  • Commission or troubleshoot at the security point with a smartphone or tablet

Predefined schedules and holidays.

  • Flexible schedule definitions
  • Multiple intervals with up to one minute granularity
  • Most commonly-used schedules are predefined
  • Build custom schedules for those that aren’t predefined
  • Most commonly-observed holidays are predefined
  • Holiday dates automatically reloaded each year
  • Select an access schedule for each holiday or globally apply one schedule

Simplified credential management

  • Internal, external and card serial numbers are pre-loaded
  • System provides four flexible methods to enroll a credential
  • Includes integrated photo-ID badging with predefined badge templates and custom badge design tool
  • Easily add and subtract credential attributes
  • System shows all cards in use and all badge upload files for each customer

Role-based security management.

  • Predefined and custom role creation
  • Single-click assignment of permissions, access rights, and badge templates
  • Person based assignment of access rights and badge templates
  • Automated role assignment for imported personnel records

Unified alarm, video, and visitor applications. Everywhere.

  • One database, one user experience, all web-based applications
  • Automatic association of alarm, video, and visitor data with every access event
  • Integrated real-time control, monitoring and response
  • Graphical map and locations user interface

Biometric Person Reader Management.

  • No biometric double data entry
  • Each user can have multiple credentials
  • Enroll at any Person Reader using a mobile device or computer
  • Automatic verification of enrollment or de-enrollment

Multi-tenant and multi-facility administration.

  • The most efficient and secure way to manage multi-tenant and multi-facility physical security
  • Manage all systems in all facilities from a single interface on any device, anywhere, anytime
  • Tenants in a multi-tenant facility can manage their own company’s personnel databases, take pictures, issue credentials and run reports
  • One personnel database can be used to drive both tenant security and base building security
  • Eliminates double data entry and security loopholes

Access control reporting and analytics.

  • 15 standard access control reports
  • Customizable input parameters
  • Predefined and customizable dashlets and dashboards
  • Subscription based report automation
  • PDF and Excel output
  • Many graphs and charts
  • Provides key access analytics

Enterprise features.

  • Advanced groups
  • Global editing
  • Global reporting and analytics
  • Policy based access control
  • Automated audits
  • Credential inactivity
  • Access rights
  • Legacy system migration