Protection against electronic eavesdropping

Integrated security systems

Advisory and expert assesment of security systems

btn left
btn right

Access by two-factor authentication

Detection of access permissions violation

Deploying network-distributed architecture with a single management and monitoring center

Generating reports about events based on records from databases

+
-
services_img
+
-
services_img
+
-
services_img
+
-
services_img

Access control systems (ACS)

Arrangement of access to the guarded area by two-factor authentication

Access through the checkpoint is granted in case of matching the recognized employee's face with the face in the database and tapping a valid card to the reader (two-factor authentication). If a person taps someone else's card (possibly stolen), the turnstile will not open and the security will be informed. The working hours of employees are recorded and can be viewed in the form of a report. 
If the person comes to work not in his/her shift, the access may be forbidden.   

 

Detection of access permissions violation

Access to the premises of office workers and security guards (doors with magnetic locks) is organised by the same policy as for the checkpoint (matching two factors - a face and a card).

Office employees are not allowed to enter service premises of security units (e. g. server room). In case of violation (for example, a person who has no access permission to this area entered through an opened door and a surveillance camera located in the room captured the face of a person), the door is blocked, the head of the local security is notified, and additionally, if necessary, the head of Holding security is notified too.

 

Deploying network-distributed architecture with a single management and monitoring center

Employees of different companies that are part of the holding can visit different holding facilities located in different cities, with certain access permissions to certain areas of the facilities. The main security department of the holding sets access permission levels to a certain facility area for every person.

In case of policies violation, or if the situation gets out of control at a certain facility, the main security department of the holding may interfere in the process of organizing security at the facility: locking/unlocking doors, watching video from surveillance cameras, adjusting access permissions, searching the archive, etc.

 

Generating reports about events based on records from databases

For each element of the facility that is part of the holding, chronology of events is recorded (without the possibility of deletion):

  • date and duration of stay of persons or vehicles in certain areas of the facility
  • list of alarm events
  • list of operators actions (arming/disarming, opening/closing doors ...)
  • recording of working hours
  • other (the additional options list is determined by the needs of the customer)

 

Feedback form

form background image