Home Trusted by 500,000+ buyers

Identity Management Software - Cornerstone

Supplier: Argus Solutions playlist_addCompare

Cornerstone is the baseline Argus product providing enrolment, recognition, reporting and application security “out of the box”.

Price Guide (Inc GST): POA

Additional modules including Time and Attendance, Entry Access Control, Asset Management, ID Card printing, Secure document scanning and KeyWatcher integration can be licensed to expand upon this core functionality.

Cornerstone is a complete identity management solution and one of the most sophisticated security solutions available in the world today.

Comprehensive functionality:

Entry Access Control & Visitor (2 additional modules)

The Access Control functionality allows you to manage and implement rules that determine when, where and how a particular user or group can gain access.

  • Provides Access Control functionality
  • Scalable solution when making use of True Identity Controllers (TICs)

More information >>

Asset Management (1 additional module)

The Asset Management feature allows you to track Assets against recognised Users either by manually selecting them or automatically if Assets are marked with RFID tags.

Asset Groups are used to group together particular types of Assets and also to define permissions on Assets.

  • Issue of Assets via recognition
  • Manual issue or RFID
  • Supports Operator as well as User recognition for issue of high security assets.

More information >>

ID Card Printing (EPI) (1 additional module)

The EPI Integration module is primarily designed to facilitate security credentials in the form of high quality ID cards produced with a re-transfer printer.

However, the module has been integrated in such a way that it provides many enhancements to the way Cornerstone functions. This includes:

  • High quality image capture
  • Printing of durable cards
  • Ability to enhance and crop images
  • Select templates for different card designs
  • Search for users then batch print cards

Furthermore, most of these features can be accessed during the creation of users and operators allowing you to capture, enhance & crop a high quality image, select a template then print the card all as part of the enrolment process

More information >>

Time & Attendance (1 additional module)

Time and Attendance logs the Time and Date a user was recognised but can also track Job Codes, Location and Clock On codes defined with the log entry.

Each Clock On eventually links to a matching Clock Off entry and as such can be used for Time Tracking.

Job Codes are used to define specific work, tasks, projects etc.

Using Cornerstones reporting functionality, Time and Attendance can easily track and monitor who is working on what.

  • Recognition and logging of users passing defined check-points
  • Clock On/Clock Off
  • Support for timesheets including breaks

More information >>

Enrolment and Recognition (standard functionality)

Enrolment and recognition functionality is a standard part of the Cornerstone identity management solution.

The enrolment process itself has been wrapped up into an easy to use step-by-step wizard - user can be quickly added to the system using this approach.

More information >>

Secure Document Scanning (1 additional module)

The optional ID Card Scanning module enhances the functionality of Cornerstone by allowing you to scan ID cards and secure documents then store their images along with the user’s details.

OCR functionality can be utilised with certain secure documents such as driving licences thus reducing the enrolment time.

More information >>

KeyWatcher Integration (1 additional module)

Cornerstone can integrate with Morse Watchmans' KeyWatcher key management systems.

Keys that are removed and replaced from the secure key storage cabinet are automatically tracked using Cornerstone's asset management and tracking features.

With this additional module installed you can keep track of KeyWatcher keys, including automatic checking in and out, using Cornerstone's Asset Management functionality.

More information >>

This "fitted for but not with" approach ensures you only get that functionality that you are looking for and do not pay for unused features.

The architecture supports plug-in components enabling customization to whatever requirements you may have and utilizing the features and security already provided “out of the box”.