top of page
Building Automation.png

SMART BUILDING MANAGEMENT

Based on integrated device management platform, the unified platform provides integration from facility management system, network management and building devices to time attendance system. Implementation can be deployed in stages as per business requirements.

SITUATIONAL AWARENESS.png

SITUATIONAL AWARENESS

Single real-time platform with holistic, integrated, map centric view of entire security infrastructure. A system that enables management of all situations all the way through to resolution and auditing.

MULTI ACCESS POLICY.png

MULTI ACCESS POLICIES

Comprehensive security by layer for individuals, groups, departments and organization. Permission Access Control with ownership access to specific person based on event, Role-Based Access Control (RBAC) for groups and Restrictive Access Control based on area (Money Room with Dual Authorization).

FACILITY MAP.png

FACILITY MAPS

Create multi-level facility map for all buildings in your organization using the integrated GUI builder. Monitor alarm states, perform actions, search devices and view live video footage from a single facility map.

Realtime Monitoring.png

REAL-TIME MONITORING

Real-Time monitoring lets officers respond to inputs from the real-world. These inputs vary ranging from simple contact closure to complex events such as video communication loss or temperature and flow sensors. 

Alert Escalation.png

ALERT ESCALATION

The system allows setting customizable alerts of notifications (email, sms alerts, alarm sound). All event alarms can be configured to escalate to a higher priority until they are processed by an Office. With pre-defined operation procedure pop-up, guards can acknowledge events and record actions.

Task Scheduling.png

TASK SCHEDULING (MACROS)

Set schedules (one time or recurrent for a period) for specific actions for any system devices in advance (eg : set door to free access for period of time for event management) 

Personal Data Fields.png

CUSTOM DATA FIELDS

Provides the flexibility to expand and customize system-defined personnel data fields (PDF) to include additional credentials relevant to your business (ie. Competency, Certifications, Licences).

CYBER SECURITY.png

CYBERSECURITY STANDARDS

Warrants and compliant to International High Security Standards (FIPS 201, CPNI, Class 5). Employs high grade authentication and encrypted communication between Device-Controller, Controller-Server, Server-Client, FIDO® certified mobile authentication and revolving key encrypted database.

UNLIMITED SCALABILITY

Built on a powerful management platform providing centralized control to thousands of access points, unlimited access credentials and millions of event transactions. 

Hierarchy Management.png

HIERARCHY MANAGEMENT

Support comprehensive management of identity (what you have or what you own) across multiple organizations, anywhere. System division designed for higher security management across organizations, buildings and even business units.

MULTI ENTRANCE.png

MULTI-ENTRANCE ACCESS

A building or controlled area with multi-access points can be configured with anti-passback and zone count enhanced security protocol to prevent consecutive entries to these areas using a single cardholder credential.

HARDWARE INTEROPERABILITY.png

HARDWARE

INTEROPERABILITY

The system supports integration to third party hardware (readers, locks, other high security products) and connectivity to a range of reader protocols : Wiegand, OSDP, Aperio.

EVENT LOG.png

EVENT MANAGEMENT

All Event Logs are recorded with date-time stamp, filtered by different priority level and color-coding for easier browsing and course of action. Beyond text, event activation can also be programmed to generate sound and pop-up video. 

CORRECTIVE ACTIONS.png

CORRECTIVE ACTIONS

Alert-to-action bindings prompts officers to proactively address any forthcoming alerts raised with corrective actions. Corrective actions can be officer driven or executed in a non-interactive mode through a set of built-in programmable logic controllers (ie. text messages to cell phones)

Picture1.png

DIVISIONING

Grouping or divisioning is created for different access system objects : access edge devices, users, access policies and schedules. Grouping allows for efficient operation and seamless user control and management.

FEXIBLE TIME ZONE.png

FLEXIBLE TIME ZONES

Designed for enterprise scalability supporting multi-server environment and remote operations, any dates and times configured within a report, (e.g. activity report), will be assumed to be within the selected time zone (rather than the time zone on the configuring operator's workstation). This can be changed to another time zone if required.

GLOBAL ACCESS_1.png

GLOBAL ACCESS CONTROL

Distributed open architecture with centralized access management across global offices. All communications are securely connected via encrypted IP networks, with centralized access and remote authorization capabilities.

FLEXIBLE TIME FRAME.png

FLEXIBLE TIME-FRAME

Set up and manage various time and access schedules to maintain your facility and help meet the business and security needs of the groups residing within. Have pre-defined events configured with actions to provide better security control and automation.

Policy Compliance.png

POLICY COMPLIANCE

ENFORCEMENT

Manage employee certifications and policies timely for business compliance and risk management. Ensure compliance with a range of regulations and standards, optimize personnel flow and safety on-site with policy reminders, so that you can get on with business as usual.

High Availability.png

HIGH AVAILABILITY

Protection of people, property and information is a fundamental requirement for all businesses which can be only fulfilled through uninterrupted operations. Our built-in high availability solution provides extensive protection mechanisms for the system and its data at all times. 

CONTACTLESS APPROACH

Use Bluetooth® Low Energy technology of your smartphone or wearable electronic device as your credentials to gain access to secure areas on your site, interact with your building systems, and receive important site notifications.

ENCHANCED REPORTING.png

ENCHANCED REPORTING

Use the built-in GUI Report Editor for advanced reporting every-time. Report layouts are highly modular with reporting fields configurable. Reports can also be generated on a schedule or event (ie fire alarm) and emailed automatically to specific user in various formats (.doc, .xls, .pdf or .csv).

Centralized DEployment.png

CENTRALIZED DEPLOYMENT

Built in utility tool, supports one-to-many replication where all configurations settings and data can be migrated seamlessly and concurrently from a centralized server to the various peripheral devices of different firmware version, making deployment faster and more efficient. 

Import Export.png

EXPORT AND IMPORT

The system provides rich functionality and flexibility to support transfer of data (alarms, events, records, status, schedules) between system and external sources.

Restful API.png

RESTFUL API INTEGRATION

Improve functionality using readily available powerful RESTful API to offer flexibility and inter-operability for integration to ERP System, Video Management, Elevator Destination, Building Automation, IP Intercom, to name a few.

Image by Volodymyr Hryshchenko

Building Blocks for Device-To-Device Communications

POWERFUL & PREVALENT TECHNOLOGY

Our unified security platform allows you to spend less time managing your building security systems across locations so you have more time to run your business.

bottom of page