Management platform .secure
Integrative, flexible and process-oriented control and management platform as the strategic basis of our modules!
.secure is a process-oriented control and management platform in the areas of physical security, access control and authorization management.
Due to the modular structure, the areas of application are very diverse: from visitor and contractor management to access management and time management to instruction management. Since .secure can be parameterized, the application can be flexibly adapted to company-specific requirements. .secure is not an isolated application – it is a platform and contains technologies and components to interact, cooperate and control a wide variety of systems.
Based on operational rules and specifications, .secure coordinates data & information flows from various IT systems, data sources and process definitions and controls a multitude of company-wide or cross-company business processes and IT systems almost fully automatically. The applications controlled by .secure are permanently and automatically supplied with the latest data and rule sets – making it a reliable clock generator for all associated subsystems.
Thus, .secure is today able to control a multitude of processes and systems inside and outside the management platform in a rule-based and automated way.
The areas of application of the management platform .secure briefly and simply explained
The heart of gis GmbH offers you complete flexibility, freedom and independence through rule-based control and automation.
Strategic alignment
The architecture of .secure is designed for complete flexibility, independence and freedom for the connection of subsystems or technologies and process design. Business processes are mapped independently of the existing environment. Using the example of authorization control in the area of physical access, it is possible to connect a wide variety of manufacturer systems (e.g. RFID technologies or biometric components, etc.) simultaneously in mixed operation. The focus of the rule-based control is the mapping of the authorization of people to enter a room or not. This is done completely transparently and comprehensibly via a clear set of rules and has the same effect on all systems and components used, regardless of manufacturer or technology.
The same applies to almost all other business processes: no matter which visitor management system is in place, how external company management is mapped, which instruction system is used at location A or in region B – .secure is able to connect, control or receive data from these different systems. Thus, even massively heterogeneous environments (hardware as well as software systems) can be placed under centralized and automated control. If a strategic realignment or consolidation of the system environments is desired, this can be done at any time.
Digital transformation
The technical elements that are now understood under the term “digital transformation” have been a basic principle of the .secure platform from the very beginning: to consistently connect systems and processes in such a way that an extremely flexible and highly communicative process and network landscape is created. From this, data and information can be composed and connected to further systems and processes in a reliable manner.
The core elements here are the automated interconnection of data streams and the overcoming of system boundaries. The goal is to maximize the reduction of manual repetitive tasks and to greatly increase performance, productivity, quality and reliability.
Our features – your benefit
Core components
Organizational Management (OM)
Hierarchical and non-hierarchical structures, organizations, organizational units (OU), cost centers and organizational groups with variable focus or deployment are mapped in this area. For example, entry processes and job changes of employees are displayed and the management of persons takes place transparently.
Facility Management (FM)
All objects, components, floors, rooms and area structures are mapped in any depth. The representation takes place hierarchically as well as non-hierarchically. Another benefit is that all door specifications – right down to the door and locking technology, are fully documented and assigned. For example, it can be traced at any time which doors (incl. their properties such as escape, rescue, intervention) and locking systems a building has. Likewise, the respective buildings are assigned to the corresponding locations.