{"id":5,"date":"2021-04-20T05:42:29","date_gmt":"2021-04-20T05:42:29","guid":{"rendered":"https:\/\/www.asis-technologies.com\/?page_id=5"},"modified":"2024-11-12T08:46:50","modified_gmt":"2024-11-12T08:46:50","slug":"home","status":"publish","type":"page","link":"https:\/\/www.asis-technologies.com\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\n\t\t
\n\t\t\t

<\/p>\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nGoENTRA MOBILE ACCESS \n\t\t\t\t\t\t\t<\/rs-layer>

    \n
  • <\/i> Mobile ID <\/li>\n
  • <\/i> Event View <\/li>\n
  • <\/i> Facility Booking <\/li>\n
  • <\/i> Credential Management <\/li>\n
  • <\/i> Incident Reporting & Notification <\/li>\n
  • <\/i> Visitor Management System<\/li>\n<\/ul> \n\t\t\t\t\t\t\t<\/rs-layer>TAKE ME THERE \n\t\t\t\t\t\t\t<\/a>Comprehensive Mobile Access Control Solution for the Enterprise \n\t\t\t\t\t\t\t<\/rs-layer>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nENTERPRISE SECURITY MANAGEMENT \n\t\t\t\t\t\t\t<\/rs-layer>Key features of Enterprise Security Management \n\t\t\t\t\t\t\t<\/rs-layer>
      \n
    • <\/i> IP Video Surveillance <\/li>\n
    • <\/i> Building Automation <\/li>\n
    • <\/i> Elevator Control <\/li>\n
    • <\/i> Carpark Management <\/li>\n
    • <\/i> Visitor Management <\/li>\n<\/ul> \n\t\t\t\t\t\t\t<\/rs-layer>LEARN MORE \n\t\t\t\t\t\t\t<\/a>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nUNLIMITED INTEGRATION POSSIBILITIES \n\t\t\t\t\t\t\t<\/rs-layer>Flexible integration with many 3rd party systems through open communications industry standard WEB Services API \n\t\t\t\t\t\t\t<\/rs-layer>
        \n
      • <\/i> IP Video Surveillance <\/li>\n
      • <\/i> Building Automation <\/li>\n
      • <\/i> Elevator Control <\/li>\n
      • <\/i> Carpark Management <\/li>\n
      • <\/i> Visitor Management <\/li>\n<\/ul> \n\t\t\t\t\t\t\t<\/rs-layer>LEARN MORE \n\t\t\t\t\t\t\t<\/a>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nWEB ENABLED GIGABIT
        \nIP ACCESS CONTROLLERS \n\t\t\t\t\t\t\t<\/rs-layer>\"P900 \n\t\t\t\t\t\t\t<\/rs-layer>
          \n
        • <\/i> 150,000 cards and 1,000,000 events <\/li>\n
        • <\/i> Python Scripting <\/li>\n \n
        • <\/i> OSDP, ADNET, Wiegand, and CLEX <\/li>\n
        • <\/i> MIFARE Classic & DESFire, Biometric & Wireless Keylocks
          <\/li>\n<\/ul> \n\t\t\t\t\t\t\t<\/rs-layer>LEARN MORE \n\t\t\t\t\t\t\t<\/a>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>\"P908 \n\t\t\t\t\t\t\t<\/rs-layer>\"C302\" \n\t\t\t\t\t\t\t<\/rs-layer>Modular architecture for versatile expandability and effortless setup with built-in web browser ui \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nPrevention of rfid fraud (cloning & hacking) with skeyma (secret key management) end-to-end secure encryption system based on aes128 & 3des \n\t\t\t\t\t\t\t<\/rs-layer>LEARN MORE \n\t\t\t\t\t\t\t<\/a>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>ANTI-CLONING ACCESS CARDS WITH END-TO-END ENCRYPTION \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nSEAMLESS BIOMETRIC RECOGNITION \n\t\t\t\t\t\t\t<\/rs-layer>
            \n
          • <\/i> Anti-Spoofing Face Recognition & Iris Recognition <\/li>\n
          • <\/i> Integrated Fever & Mask detection Face Recognition <\/li>\n
          • <\/i> Cost Efficient Fingerprint Recognition <\/li>\n \n \n<\/ul> \n\t\t\t\t\t\t\t<\/rs-layer>LEARN MORE \n\t\t\t\t\t\t\t<\/a>\"\" \n\t\t\t\t\t\t\t<\/rs-layer>MULTI BIOMETRIC ENROLMENT FOR NON-CONTACT USER AUTHENTICATION IDEAL FOR SOCIAL DISTANCING DURING COVID-19 \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t