►Event Control Log - provides information about who, when and where have had access.
►Scheduled access – restriction of access to a specific period of time, including the weekly schedule.
►Flexible access control – with the use of a variety of devices that provide you the possibility of monitoring and control:
►Web - based administration from your PC
►Wall programming device (Wall PD)
►Mobile programming device (Mobile PD)
►Safe sharing of data – with the use of reliable technology: Microsoft SQL Server Database together with SSL certificates.
►Revalidation to reduce risks - activation for the need of a specific user to restore the access rights of the key (revalidation) with a certain time interval, provides organizing the access with time-limitation and improving the system’s security. At the same time, when the revalidation of the key is implemented, the system receives from it the data from audit log events in the previous period.
►High Security Standard protection – the production from leaders in manufacturing of High Security locking system, companies Mul-T-Lock (Israel) and ABLOY (Finland) meet the most tough international standards.