iprotect access & security...large transportation companies like gvt, smt, scherpenhuijzen have...

2
Many useful functionalities A fully-fledged Security Management System with many useful options that can be adapted to every situation. Access Control No hassles with old-fashioned key management. Being able to grant or deny access is automated using the Access Control system. Access rights can be set per region or area and there are useful features such as Guard Tour and Two Man Rule. Automatic notifications can also be set to detect when unauthorized persons try to access areas to which they have no rights. Video Surveillance Video Surveillance makes it possible to assess situations and respond immediately from remote locations. By integrating IP cameras, co- decs and video analysis techniques with the latest streaming methods, Video Surveillance offers the best picture quality. The equipment is adjustable and based on open standards, enabling very easy integration and installation. Intercom The Commend Intercom systems supplied by TKH Security are among the best in the world. Recognition of employees based on their voice and facial features. Where necessary, combining calls with Video images. The system offers excellent audio quality. By using ana- logue techniques in combination with digital signal processing (DSP), this system is very future-oriented. Intrusion Detection The Intrusion Detection system is based on the latest technology, and multiple sites can be managed from a single central control point. Effective as well as cost-reducing. As soon as an intrusion is detected, the alarm system immediately sends a notification to the emer- gency control room or to company security teams. iProtect Access & Security All aspects of security in one neat platform Creating an optimum environment is a challenge. How do you monitor security in an efficient way and still remain welcoming? Our Security Management Solution offers the best solution for efficient management of one or several buildings and grounds. TKH Security's solution is unique, because it integrates several security disciplines into a single neat platform. Integrated customization can combine Access Control, Video Management, Intrusion Detection and Intercom. Not only does the solution offer all these functionalities, they also operate seamlessly together. TKH Security's solution is suitable for all types of locations. From semi-public buildings to high security locations that require exceedingly comprehensive top security. The solution is also highly suitable for multi-tenanted buildings, or businesses with premises and grounds at multiple locations. The solution has been proven to be successful in: Business premises For businesses with one or more buildings and which are multi-tenanted Healthcare Applied in more than 50% of the hospitals in the Netherlands Public buildings Our solutions were applied in trend-setting projects such as B30, the ICC, Eurojust, and NACH Logistics & Transport Large transportation companies like GVT, SMT, Scherpenhuijzen have chosen us

Upload: others

Post on 25-Feb-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: iProtect Access & Security...Large transportation companies like GVT, SMT, Scherpenhuijzen have chosen us. Controller range 4.0 The driving force behind the Security Management Solution

Many useful functionalities

A fully-fledged Security Management System with many useful options that can be adapted to every situation.

Access ControlNo hassles with old-fashioned key management. Being able to grant or deny access is automated using the Access Control system. Access rights can be set per region or area and there are useful features such as Guard Tour and Two Man Rule. Automatic notifications can also be set to detect when unauthorized persons try to access areas to which they have no rights.

Video SurveillanceVideo Surveillance makes it possible to assess situations and respond immediately from remote locations. By integrating IP cameras, co-decs and video analysis techniques with the latest streaming methods, Video Surveillance offers the best picture quality. The equipment is adjustable and based on open standards, enabling very easy integration and installation.

IntercomThe Commend Intercom systems supplied by TKH Security are among the best in the world. Recognition of employees based on their voice and facial features. Where necessary, combining calls with Video images. The system offers excellent audio quality. By using ana-logue techniques in combination with digital signal processing (DSP), this system is very future-oriented.

Intrusion DetectionThe Intrusion Detection system is based on the latest technology, and multiple sites can be managed from a single central control point. Effective as well as cost-reducing. As soon as an intrusion is detected, the alarm system immediately sends a notification to the emer-gency control room or to company security teams.

iProtect Access & Security

All aspects of security in one neat platform

Creating an optimum environment is a challenge. How do you monitor security in an efficient way and still remain welcoming? Our Security Management Solution offers the best solution for efficient management of one or several buildings and grounds.

TKH Security's solution is unique, because it integrates several security disciplines into a single neat platform. Integrated customization can combine Access Control, Video Management, Intrusion Detection and Intercom. Not only does the solution offer all these functionalities, they also operate seamlessly together.

TKH Security's solution is suitable for all types of locations. From semi-public buildings to high security locations that require exceedingly comprehensive top security. The solution is also highly suitable for multi-tenanted buildings, or businesses with premises and grounds at multiple locations.

The solution has been proven to be successful in:• Business premises For businesses with one or more buildings and which are multi-tenanted• Healthcare Applied in more than 50% of the hospitals in the Netherlands • Public buildings Our solutions were applied in trend-setting projects such as B30, the ICC, Eurojust, and NACH• Logistics & Transport Large transportation companies like GVT, SMT, Scherpenhuijzen have chosen us

Page 2: iProtect Access & Security...Large transportation companies like GVT, SMT, Scherpenhuijzen have chosen us. Controller range 4.0 The driving force behind the Security Management Solution

Controller range 4.0

The driving force behind the Security Management Solution is the unique combination of hardware and software which has been developed in-house by TKH Security.

Pluto is a recently introduced, intelligent network controller. Smaller and more compact, but at the same time a lot more powerful than any of its predecessors and competitors. Together with the Orion door controller and Solar power management unit, Pluto is the fourth-generation controller range. A future-proof system, to be installed 'plug & play' and can be used in virtually all situa-tions.

The hardware is compatible with a wide range of card reader technologies and different types of card readers, including the Sirius range which has been developed in-house by TKH Security.

Controller range 4.0 Sirius Card Reader

iProtect Access & Security Software iProtect is our Security Management software which has been developed in-house. iProtect Access is the basic variant with only access control features. It is possible to start with only one card reader, which also makes iProtect very attractive for new users. The system is flexible and scalable and can therefore grow with the user.

As the customer's security needs grow, the system can easily be extended to iProtect Security. This will enable components for Video, Intrusion Detection and Intercom to be integrated.

The whole is efficient, centralized and manageable from any location via the iProtect web-based software. One or more locations can be easily monitored using an interactive floor plan: KeyMaps. If an incident occurs or a deviation is detected in the building, the administrator is notified and camera images can be consulted immediately or contact takes place via intercom.

Some of the iProtect features:• A single to hundreds of card readers (online and offline)• Visitor registration• Guard tour• Email support• Authorization of persons in specific areas• Horizontal database separation

A number of additional portals have also been developed especially for iProtect, which resolve a specific user demand. iWork: the process that makes authentication and authorization easier. iVisit: for an efficient management of visitor flows and access rights for contractors. And inControl: a notification programme that shares important updates about events by email or SMS, which can be tailored for the user.

TKH Security BV.

Paasheuvelweg 20, 1105 BJ Amsterdam

The Netherlands

T. +31 (0)20 462 07 00

E. [email protected]

I. https://tkhsecurity.com

TKH Security

Our goal is to provide an important contribution to a safe and secure place for

everyone. This is done through development of the most innovative and flexible

security systems and the most user-friendly, open and flexible integration platform

in the world.

Our organization is flexible with an open culture, in which we feel committed

with our partners and clients, and in which reliability and service take priority. Our

employees’ attitude and their ongoing search for new possibilities guarantees

continuous innovation.