STRONGER & SIMPLER ACCESS CONTROL

Streamlined process
Rationalised permission administration for Security / Facilities / HR personnel.

Secure credentials
Supports secure up-to-date RFID card technologies, as well as legacy standards.

Multi-site management
Control physical access across any number of locations without the complexity.

Real-time responsiveness
Live visitor tracking and permissions updates that take instant effect at all doors.
DELIVERING MORE WITH LESS

Streamlined infrastructure
Uses existing Microsoft Active Directory based identity and access management systems.

No separate databases
Seamless Active Directory integration. No sync-servers or databases to support & protect.

Scalability as standard
Unlimited numbers of sites, doors and door-users – as standard, straight out of the box.

Leverage the network
Connect up wired and/or wirelessly controlled doors through standard IP data networks.
SECURING DATA & SUPPORTING COMPLIANCE

Streamlined data management
No duplication of staff personal data between physical and IT access control systems.

Location-aware control
Add location-based restrictions to IT- access for sensitive data and critical applications.

Role-based security
Security permissions groups can combine physical and IT access privileges for teams.
Audit-trail reporting
Comprehensive reporting for each and every controlled door, for any and all door-users.
COST EFFICIENT IDENTITY & ACCESS MANAGEMENT

Streamlined costs
Simple scalable licencing, from one door to whatever you need – no matter the location.

Freedom from lock-in
Our standards-based approach allows choice and avoids proprietary technologies.

Maximised ROI
Flexibility to share identity and access management costs across many applications.

Open integration
No barriers to interfacing with other systems to provide joined-up enterprise solutions.
CHOICE OF DOOR CONTROL HARDWARE BRANDS

Wired door hardware
Manufacturers of compatible wired door control equipment include: Axis Communications & HID Global.

Wireless door hardware
Manufacturers of compatible wireless door controls include: Assa Abloy Aperio, HES, Sargent & Securitron.

WHY DO IT ANY OTHER WAY?
