OUR SOLUTIONS

We give you a smart way to monitor and control your access and our system has innovative and valuable modules too.

Image

@Access

Cloud-based Access Control

eAccess is a cloud-based access control that proved its reliability and stability. This system is extremely flexible, which includes an eAccess control panel and provides ACaaS (Access Control as a Service) based service. It means that the service is using the secure and reliable GPRS data communication between each eAccess control panel and the server. All information transmitted in a secure, encrypted way in the desired time intervals, such as card usage, system events, authorization rights for the users, etc.
The server is located in a safe and secure area and can be accessed only by the eAccess control panels and the users of the system. The controller equipped with a variety of inputs, outputs and interfaces in order to meet the challenge of the installation site and not only able to control and monitor the standard wired locks, fire rated locks but also the world's first wireless locks. Using REST API, the system can be integrated with other applications such as building management, time and attendance, payroll, asset management, and key management systems.

Image

@Timesheet

Time and Attendance System

The eTimesheet system is also integrated into the eAccess interface, where a specially developed, movable or fixed 5 or 12 push-button readers send data, but in Accessium, normal readers can also have working hours authority. The functions of the buttons can be flexibly chosen by the customer (working hour, absence, holiday, sick leave etc.), which are the data for the integrable payroll systems. Integration of the CCTV system is also supported, so the integrated and captured camera images can ensure that real-time information is the basis for payroll accounting.

Image

@Escape

Emergency Evacuation Management System

This is a new and outstanding security solution that works with eAccess. The solution supports the ambulance, firefighters or police job with the last known location of the users. As the system independent of local infrastructure, it works perfectly in case of fire and even in the damage of the local network. As it gives no spatial constraints, the information can be checked in real-time from anywhere, thus supporting the firefighter’s jobs and save lives.

Image

@Visitor

Visitor Access Solution

Visitor management is integrated into eAccess in such a way that everyone is able to learn how to manage the cards easily in everyday use. The most important aspect was the user-friendly surface. The module supports preset permissions and door groups, which simplifies and speeds up the operator’s work.

Image

@Reader

Mobile Card and Bar Code Reader

Our developed barcode reader not only works as a card reader, but also reads the most commonly used 1D barcode and the 2D codes such as the QR code. In case of REST API integration with third party the read information can be used at once in the customer’s system. This reader is suitable for internal or external applications.

Image

@Credit

Credit/Ticket Management

Would you use the card for payment in the facility area as well? It can be used with or without thirdparty integration. The software is prepared and can be customized to the customer's requirements.

Image

@Monitor

Data Collection/Monitoring/Processing

The most exciting module is the eMonitor when we need to work closely with the managers on how to approach, manage and evaluate the needed information. The collected data not only used in real time throughout a predefined process but also useful in longer-term and data might be used retrospectively. This can be a great tool for facilities to be more effective, successful and profitable.

Image

@Horn

Work Shift Signal

This system is designed for those facilities which deal with large areas or noisy work environments. This new innovation not only capable of sounding sirens on a pre-programmed schedule, but it is also possible to upload multiple audio files that trigger different inputs according to dynamically changing programs/work schedules, e.g. heat alert work schedule. Our system supports different programs/work schedules in operation and is capable of managing the system by area/work order.

CONVENIENT

An almost unlimited number of IDs can be assigned, and you can add, modify, or delete permissions all the time, not only during installation.

COST-EFFECTIVE

The use of the access control system can replace the traditional registration, thus reducing the need for security service working hours.

SAFE

High security IDs cannot be copied and lost IDs can be banned remotely, so you don’t have to fear illegal intrusion. It works all the time so the protection becomes more effective.

INDEPENDENT

As the system independent of local infrastructure, it works perfectly in case of fire and even in the damage of the local network.

CUSTOMIZABLE

We offer highly flexible solutions: Individual or Mix and Match system structure. Our services are tailored to our client's needs.

CLOUD-BASED

The latest generation of access control systems is the cloud-based access control solution, which opens up new perspectives in terms of convenience, security, flexibility, integration, controllability.

Chrome
 

Subscribe for more Updates.