Start your day with confidence

The Security Center Synergis™ IP access control system (ACS) heightens the security of your organization and increases your readiness to respond to incidents and threats, while leveraging any existing network and security equipment investments. With advanced security measures and support for an ever-growing number of 3rd party access control devices, the Synergis system gives you the confidence to protect your people and assets.

Synergis customers

Think differently

Building entrance with glass doors

Security beyond the door

Historically, access control systems were concerned with securing access through a door or to a facility and managing access rights. From vendors to installers and end users, the conversation on security ended there. The security landscape has evolved and new threats, specifically cybersecurity threats, have emerged. Your access control system should not only secure your doors, but it should itself be protected from cyber-attacks. 

Operator-Centric Security

Operator-centric security

The operator experience should always be top of mind. After all, if a system is too complex, it will lead to human error and confusion. Unfortunately, traditional ACS vendors are primarily focused on developing door control hardware, while the user experience is of secondary importance. Modern ACS solutions must commit to focusing on the operator’s perspective, empowering them through a unified and a dynamic approach to security and access rights management.

City Streets Aerial View

Outside the box thinking

For too long, security systems have served to strictly meet primary physical security needs like securing doors. Going beyond this conventional mindset, users should be able to do more with an ACS solution. Examples include securing server racks, medicine cabinets, and retail display cases. Taking it one step further, an ACS can complement time and attendance systems as a means of ensuring human resources compliance, as well as monitoring traffic-dense areas to enhance efficiency.


Choose your hardware

Choose your preferred access control hardware

By supporting an ever-growing array of widely-deployed, non-proprietary, access control modules and electronic locks, the Synergis system closely safeguards the long-term viability of your access control investments. Organizations are able to choose the hardware that best suits their evolving needs, including controllers from HID Global, Mercury Security, and Axis and electronic locks from Allegion, ASSA ABLOY, SALTO and SimonsVoss.  As the Genetec™ ecosystem continues to expand, rest assured that you will have access to the latest ACS technology. 

Neutralize threats

Neutralize threats at a moment’s notice

The Synergis system empowers your organization to respond to physical security and cyber-threats with confidence. With embedded threat management capabilities, you can quickly change the behavior of your security system at a moment's notice in response to potential physical threats. Protect your security system from cyber threats with end-to-end encrypted communications for software and hardware, secure claims-based authentication, and digital certificates. Also, be assured on the health of your system with system health monitoring.

Strengthen security

Strengthen security with a complete picture

Empower security operators with a forward-looking approach that unifies access control with video, communications management, intrusion, and more. The Synergis system provides efficient workflows and greater automation through its unified platform, ensuring that more time can be spent monitoring critical tasks rather than administrating software. And, for multi-site organizations, the Synergis system allows you to monitor remote independent sites as if they were part of a single virtual system, improving your overall operations.


Adapted to your security demands

Whether you need to secure a large, multi-site facility, or a smaller location with a few doors, the Synergis system has the flexibility needed to adapt to your security environment. And as a key pillar of the Genetec unified platform, Security Center, you can now merge your access control needs with other security applications such as video surveillance.

With centralized credential and cardholder management, you can streamline your access control operations by managing cardholder from a single location, issuing a single credential for access to all your sites, and synchronizing cardholder access rights to all your locations.

If you are looking for a more affordable way to deploy and maintain your access control system, Software as a Service (SaaS) edition is available. Take advantage of the benefits Access Control as a Service (ACaaS) has to offer, including regular system updates and maintenance automatically delivered by Genetec without incurring any interruptions to the security operations.

See Synergis editions

Read more about Synergis on our resource hub.

Access all resources


Synergis™ Cloud Link Appliance

Bring access control intelligence to the door

Synergis Cloud Link is a powerful and intelligent PoE-enabled appliance engineered to natively support a mix of widely-deployed and non-proprietary door control modules and electronic locks. Bringing intelligence to the door, the Synergis Cloud Link appliance is deployed over an IP network to enable real-time door connectivity and control, and event reporting.

Learn more

Third party controllers for access control

Leverage widely-deployed third party controllers

The Synergis system brings an open approach to the world of access control, allowing you to move away from proprietary solutions. Genetec partners with the security industry's leading manufacturers of access control equipment, enabling you to deploy a mix of non-proprietary controllers, like the PoE-enabled HID EDGE EVO, HID VertX controllers, Mercury LP and EP controllers, and the AXIS A1601 controller.

Learn more

IP access control electronic locks

Extend your reach with electronic locks

Deploy a variety of the wireless, WiFi, and PoE electronic locks to extend your reach without running expensive cabling to each door. Connect your locks to your wireless or wired network and easily enroll them within your ACS system. All cardholder, access rights, and scheduling are managed through the Synergis system, providing unified management of IP locks with the rest of your access control infrastructure.

Learn more


Choose an edition that fits your needs

Synergis access control software is available in a variety of packages to fit the size and particular needs of your security application. You can always modify your package with a simple license update as your needs evolve.

Maximum number of readers 64 256 Unrestricted Unrestricted
Maximum number of monitoring clients (5 included) 5 10 Unrestricted Unrestricted
Number of access managers 1 2 Unrestricted Unrestricted
Badge designer and custom fields
Alarm management
Dynamic graphical maps
Custom reports and email notifications
Virtualization support
Built-in Access Manager failover
Visitor management
Threat level management  
Microsoft Active Directory - cardholders and users    
Global cardholder management and Federation*    
 Included or supported       Optional     * Main site must be Enterprise. Remote site software can be any package.

Synergis customers

Charlotte Knights Stadium Invests in Unified Video Surveillance and Access Control

BB&T Ballpark

BB&T Ballpark ensures the finest guest experience while protecting its newly-built 55-million-dollar facility from threats with unified video surveillance and access control.

Read more

Cargo Marine Terminal texas ip access control customers

Manchester Terminal

Cargo marine terminal in Texas fortifies its security perimeter with Genetec Security Center unified platform.

Read more

10 doors are using Synergis™ access control system at the Twickenham Stadium

Twickenham Stadium

Twickenham Stadium implements phased growth plan to upgrade and unify security, simplifying tasks for operators and ensuring a positive experience for visitors.

Read more

Migrating to an IP-based access control system?

Request our white paper to learn about the considerations, best practices, and step-by-step guide to migrating from a legacy to an IP-based access control system.