S2 Security

Unified Security Management

A Leading Developer of Enterprise Physical Security Solutions

Enterprise-class, feature-rich S2 access control systems integrate credential-based access control, intrusion detection and video applications for a unified management and administration experience.

One platform. Endless possibilities

Being prepared for anything is your job, making it easier is S2 Access Controls. Their web-based system seamlessly unifies the management and administration of access control, intrusion detection, video applications and even legacy systems.

Fully Distributed, Highly Scalable

S2 has physical security management systems featuring a fully distributed, highly scalable IP network architecture as well as unified management and administration. Customizable to your needs, their systems easily scale up or down to fit businesses of any size and geographic distribution. Large global enterprises can build an entire ecosystem of S2 access control and video management systems under one centrally controlled network.

S2 Distributed Architecture Benefits

  • Unified Management and Administration
  • Modular and Expandable Systems
  • Scalable Ecosystem
  • Centralized Management and Reporting
  • Secure Communication
  • Storage Backup
  • Auto Discovery
  • Flexible Network Setup

IP Access Control: S2 NetBox

The S2 NetBox access control and event monitoring system is the server for local S2 Nodes and includes embedded software with a web server, an ODBC-compliant database management system and an application software suite. To support the widest range of business applications, S2 NetBox systems communicate with S2 video management systems, third-party video management systems and other integrations through the IP network.

Distributed Processing: S2 Nodes

Highly flexible components of any S2 NetBox system, S2 Nodes handle distributed processing and are the connection points for card readers, monitoring points, supervised inputs, relay outputs and temperature points. Access control and events from connected devices are aggregated to the user interface for centralized system management. In the event of power or communication loss, S2 Nodes continue to operate.

Video Management: S2 NetVR

Scalable and expandable, S2 video management systems support a range of applications from small offices to large enterprises. Multiple S2 NetVR servers can connect to a single S2 NetBox controller or be managed with a single user interface, allowing the systems to easily scale with organizational growth.

Centralized Security Management: S2 Global

With S2 Global, you can easily centralize management of your distributed S2 access control and video management systems. The flexible system allows it’s easy to expand as the security needs and physical footprint of an organization change, enabling distributed organizations to build large physical security networks without requiring any additional investment in communication infrastructure.


How do you design and protect an S2 Security system from attackers?

S2 Security systems are made within a secure environment. All code is reviewed to minimize any possible areas that could make us vulnerable to attackers. We use cloud to network to server to panels using the TLS 1.2 protocol. Our design process ensures that attackers cannot access our facility. There is a series of firewalls and antivirus redundancies that make access to these systems highly restricted.

After deployment of a security system, how is maintenance handled?

Integrators receive frequent updates with everything they need to keep systems secure. Daily scans are done to monitor for generalized cybersecurity threats. Any issues are immediately reported to our customers. We determine the best course of action when vulnerabilities are discovered. This can be a timely patch within 24 hours or a notification to raise awareness.

How does Progress Security Systems collaborate with S2/Lenel (read the highlighted section and phrase it as if PSS is answering the question)?

The Progress Security Systems must collaborate with S2/Lenel because once systems are installed or used, there is a risk of them being compromised. To minimize these risks, our installation experts use top cybersecurity practices.

This includes following product requirements and guidelines from forced default credential changes to networking recommendations. Once an installation is complete, it's recommended that the system integrator performs a survey to make sure safe computing practices are being followed.

What manufacturing protocols are in place?

Manufacturing is always done behind a series of firewalls and almost entirely offline. If manufacturing is ever done online it is on a closed network. None of our products spends more than about five minutes connected to any type of intranet. When they are, it is only to conduct testing and licensing to ensure everything is working properly.

ready to learn more?

Our Team of Experts is Here for You

If you have an access control project or simply want to learn more, we are happy to provide you with more information

Scroll to Top