Specifications include, but are not limited to: A. The Electronic Access Control and Intrusion System (EACIS) as provided in this Division shall be the Vykon JACE and Web Supervisor based on the Niagara Ax Framework (or “Niagara Ax”), a Java-based framework developed by Tridium. Vykon provides an open automation infrastructure, an open license, and is available from multiple systems integrators. Vykon integrates diverse systems and devices (regardless of manufacturer, communication standard or software) into a unified platform that can be easily managed in real time over a secure network using a standard Web browser. Systems not developed on the Niagara Ax Framework platform are unacceptable. ; B. The EACIS shall be an integrated, web-based access control and alarm monitoring system that shall be accessed through a standard Web browser. The EACIS shall consist of a JACE, Gate or Door Control Modules, Supervised Alarm Input / Output Modules, access and intrusion system peripheral devices and a standard web browser. 1. A JACE Security Controller within each facility shall regulate access, maintain historical records and alarm security personnel. The JACE shall connect to the owner’s local or wide area network. Secure access to the system, either locally in each building, or remotely from a central site or sites, shall be accomplished through standard Web browsers, via the Internet and/or local area network. Each JACE shall communicate to door controllers and other monitoring alarm input/output devices.; 2. A Door Control Module (DCM) shall provide a physical interface for EACIS door peripherals such as card readers, door position switches, request to exit devices and output to control the door locking mechanism. The DCM shall communicate directly to the JACE through a RS485 protocol.; 3. A Supervised Alarm Input / Output Module (IOM) shall provide a physical interface for EACIS alarm inputs such as motion detectors, glass break sensors, etc. and monitor outputs to control VYKON Security. The IOM shall communicate directly to the JACE through a RS485 protocol.; C. The EACIS work provided in this specification shall be performed by two entities. The EACIS Contractor shall have overall responsibility for the Division work. The Enterprise level work will be performed by the Enterprise Developer by a separate owner managed contract.; D. Acceptable EACIS Contractors of the hardware and software components as specified herein are as follows: 1. Premier Commercial Security; 2. Envirocon; 3. Strategic Connections; 4. Owner Approved Equal Alterna