Smart Solutions @ Work

Borer FUSION Tru-ID Access Control and Management Software

FUSION Tru-ID application software is flexible, easy to use and has a range of features to enhance security and improve productivity and contain costs.

Borer Fusion Access Control Management

FUSION offers live monitoring and control of the access control system in real time. It shows the status of all site controllers, door controllers, alarms, input and output ports. User entry and exits are recorded as they occur with the user’s photo and credentials. The administrator can control door alarms, lock or unlock doors, add or delete users and assign access privileges.

Borer FUSION Tru-ID card and fingerprint readers and controllers are intelligent. When the network connection to the central database is broken, readers make access decisions at the point of entry. Power over Ethernet (PoE) and TCP/IP significantly reduces the quantity of equipment deployed and eliminates local power supplies, batteries, mains power outlets, control panels and wall boxes.

A large access control system often has complex sets of access privileges demanding significant administrative effort to manage.

Borer FUSION Access Control Software reduces the complexity and make the systems more manageable by providing four ways of allocating and managing cardholder access privileges:

  • access groups for users with the same access privileges;
  • access profiles to manage access permissions across many sites;
  • temporary access groups ensuring access privileges for visitors and contractors are automatically cancelled at the end of the visit;
  • access roles to allocate access privileges according to the user’s job function or role (e.g. only electricians have access to electrical switch rooms).

The video shows the FUSION Tru-ID Management Software recording all movement through the turnstile in real time.


  • Card reader controllers with dual local database

    The current live database and the last known good database downloaded are held at the reader which will revert to the last known good database should the current database get corrupted because of a network failure while a database download is in progress.

  • Managed Distribution of Power

    Controls the energy delivered to every door limiting the power demands of electric releases making the most efficient use of the available energy. The least number of components to install at the door no main power outlet, no power supply, no battery, no control panel and no housing

  • Dual Path Network Communications is standard

    Each bridge can support two IP addresses so that in the event of a network fault, data to the server can be automatically re-routed via a different network path.

  • Supports Multiple Biometric Templates

    Enables each user to register a combination of up to ten finger print, facial or iris templates.

  • Native TCP/IP Communication

    FUSION does not use of third party converters to achieve TCP/IP connectivity for ease of installation and commissioning.

  • Event Driven Communications

    Unlike most systems which use polled communications FUSION field devices are event driven; data is only transmitting in response to a real life event thereby keeping network traffic to a minimum.


  • Retain Control over every facet of ID Card Production

    Includes card printing, the issue of encryption keys and card encoding without reference to the manufacturer or installer.

  • Full Integration

    Integrated with visitor management, attendance recording, photo-ID card production all running on the same database and sharing the same network infrastructure.

  • Security of Data from Card to Database

    Data is read directly from the smart card into the reader controller for transmittal via the network without sending data across insecure interfaces such as Wiegand, clock and data, RS485, etc.

  • Managed Distribution of Power

    Controls the energy delivered to every door limiting the power demands of electric releases making the most efficient use of the available energy.

  • Faster Install Time

    With only 17 cable ends to terminate, an access door can be installed and commissioned in 2 hours.

  • ‘Plug and Play’ ensures Rapid Commissioning

    All field devices are ‘plug and play’, automatically logging on to the network and signing on to the server database as soon as they are connected allowing a reader to be commissioned in less than 5 minutes.

  • Better Diagnostics

    Remote diagnostic enables the administrator to remotely reprogram and reset equipment over the LAN reducing the number of site maintenance visits.

  • Supports Multiple Door Locks

    Including Magnetic Locks/Maglocks and Electric Strikes.

Access Profiles

Access Profiles can be set within FUSION allowing access only to predefined areas for which specific access policies are required. The user’s Access Profile controls where (access zone) and when (time) that individual is authorised to be at any time, and what credentials (fingerprint or smart card) are required for access.

Home Zone

This is a pre-defined area assigned to a worker as the regular work place during specified work and break hours. Users may be limited to the Home Zone, restricting access to other areas outside of the Home Zone area.

Visit Zone

Additional access privileges can be assigned to a user for a specific area which needs to be visited on a regular basis, without increasing that user's overall access privileges.

Route Based Access

A user must reach locations in a particular sequence which is defined on his smart card, and cannot access devices which are not part of his route or which are out of sequence. This prevents users from wandering intentionally or unknowingly. This is especially useful for sensitive areas where contract workers need to reach their place of work along a defined route, for example ports, laboratories, data centres.

Privileged Access

Privileged Access gives a user the highest level of access (such as Directors and senior people in the organisation), allowing access to any controlled area without checking access rights. 

Keyholder Access

Designated individuals are assigned Keyholder Access and are then the First-In User permitted to enter the premises before other users are allowed in.


A user's exit must be registered on the system before FUSION will allow that same user re-entry into the specified area.