User-Oriented Access Control
Reduce costs by moving administration to the end-user’s smartphone.
Users can manage key cards and pin codes instead of centralised management.
Speed up onboarding of new and temporary users through delegated security.
Access & audit logs in the cloud and mobile application. Easy to export for external reporting.
By allowing end-users to manage their own credentials we decrease costs for administration and reduce end-user angst when it comes to key cards, pin codes, and alarms.
Combined with best practices in modern software development and cybersecurity we increase security compared to legacy access control systems.
We believe modernizing the physical security industry is not just opening doors through the users’ smartphone, it is changing the way businesses interact with their users by giving them control over their own credentials.
Use Group Sets to assign permissions based on roles rather than giving users permissions through access profiles.
Send out key cards without the risk for credentials being compromised. Key cards can be blank since users can register themselves upon arrival.
Delegate administration for temporary users to operators for decentralized administration.