Industry Perspective

A conversation with Jack Graves

ACCESS control should be a cutting edge technology, and the opportunity to visit with Jack Graves of DSX Inc. came in the form of lunch near the company's headquarters in Dallas. DSX offers a system with 32-bit Windows® applications coupled with the latest in scalable hardware. Now, the company has the ability to integrate with different DVRs. This allows stored and live video from the DVR to be accessed within the DSX software as an integrated solution. All video is transmitted across a LAN connection.

DSX offers a system with 32-bit Windows® applications coupled with the latest in scalable hardware. Now, the company has the ability to integrate with different DVRs.

Q. Access control is an important ingredient to employee security and safety. How critical is the maintenance and upgrade of the software you offer?

A. The software a WinDSX customer would buy today will be able to meet their security needs for many years to come. Of course, there are obvious performance and feature advantages to doing regular updates or upgrades to existing software.

However, the end user has to set their own rules and priorities for determining the software update policy. Will it be based on considerations such as the following?

  • System performance improvements.

  • Improved software operation in administration tasks.

  • New requirements triggered by operating system upgrades or changeovers.

  • Enhanced feature options that provide truly valuable improvements.

  • Or any combination of all of the above.

The first reason a customer buys a particular access control system is because they believe it provides a total solution for their access control needs. Contained within the customer's expectations is the trust that the basic functions will be stable and strongly engineered to meet long-term security and performance needs. An abundance of software "bells and whistle" features are a strong attraction, but it always comes back to the long-term integrity and performance of the product. Will it maintain backwards compatibility while simultaneously providing a migration path for upgrades and enhancements with minimal cost?

Q. Talk about DSX software and DSX hardware. How do they interface with each other, and what are a few distinct features of each product?

A. WinDSX software and hardware can communicate via a combination of methods through direct serial port connection and dial-up phone modems locally or over LAN/WAN networks.

The WinDSX system is a PC-based building/facility management and monitoring system used to control and monitor personnel and alarm activity. By making extensive use of distributed processing, the DSX system integrates access control, alarm monitoring, elevator and HVAC control, guard tour, time and attendance, and video imaging into a single, Windows&reg-based system using an ordinary PC.

WinDSX software is ideal for multi-location central station use, as well as single-location proprietary use. The multi-user, multi-location capacity allows customers to manage their own building or buildings nationwide from a central location. It also provides opportunities for DSX authorized dealers to manage multiple locations from their central station.

The DSX system control panels offer various combinations of card reader and keypad inputs, relay outputs and alarm inputs. All DSX panels use a fully distributed architecture with all real-time processing performed at each DSX panel. By distributing all information, the DSX system provides significant advantages:

  • Instant response to card read or keypad entry, regardless of system size.

  • No degradation of system performance in the event of a communication loss. All time zones, access levels and holiday schedules remain operational.

  • No loss of transactions for system history files. All panels automatically switch to buffer mode, storing up to 25,000 events per panel.

Instead of all processing power being centralized in one computer, it is distributed throughout the system to make for a much more efficient and secure system.

Q. DSX Access Control recently introduced the 1022-PKG system bundle. What are some of the highlights and upgrades of this product?

A. The new DSX 1022-PKG is a product-value package being offered to first-time and small-system customers. This bundle is priced to compete. A big plus is that it contains more capabilities than others, including the full, feature-rich version of WinDSX software, a DSX-1022 two-door controller (eight inputs, four relay outputs, two reader ports), DSX-MCI communications device and transformer, two Prox readers and 50 Prox cards.

With this economical package the customer can grow their system as one's needs grow. The software is the complete operating program, not a limited or scaled-down version. The hardware design can be expanded to meet any future system need by using additional DSX-1022 controllers or by adding DSX-1042/1048 scaleable controllers.

All systems are flexible and expandable as the owner's needs and demands change. DSX maintains interface compatibility with all previous versions of their control panels. Control panel I/O is scalable and, based on the individual requirements of the customer, it too can be expanded as the need arises. DSX provides a two-year manufacturer's warranty on all control panels.

Q. What course or direction do you see the access control market turning to in terms of IT convergence?

A. IT convergence is a pretty broad term. Ask 10 people and you will get 10 different answers on what IT convergence is. Access control systems operate over the LAN more these days than in years past. There will be a changes to the systems to make them better citizens on the LAN. Access control will have to conform to the same standards as other LAN systems in order to be accepted by the IT departments.

Basically the industry is transitioning from running on private networks where everyone can make their own rules, to running on shared networks where everyone needs to follow the same rules. The problem is that the rules are not exactly set in stone just yet, and different IT departments have different rules.

DSX's software and hardware engineers are constantly developing and testing new product concepts.

This article originally appeared in the September 2006 issue of Security Products, pg. 58.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.