Security Essen 2024
Enter the world of access management
Security Essen 2024
Enter the world of access management
Would you like to find out more?
We would be happy to advise you in an individual appointment and look forward to hearing from you!
We would be happy to advise you in an individual appointment and look forward to hearing from you!
There is so much to discover – Join us on a journey through the .secure world
Who we are – the company
We at gis – a company right in the heart of the innovation hub of Baden-Württemberg – have one goal: to provide our customers with a state-of-the-art, scalable standard IT and process platform and high-performance applications with a small and highly committed team. Our core areas include access control, authorization management, visitor external employee management as well as self-service portals, onboarding processes and much more. With our applications and services, we enable customers to create a complete digital process world. With the flexibly deployable services, apps and modules, we offer our customers the opportunity to realize a real digital transformation in their companies in the shortest possible time and to develop it permanently.
What drives us – what makes us tick
We focus on creativity, performance, responsibility, transparency, passion, respect and a sense of purpose. For some, this may sound antiquated – for us, these are principles. Our compass!
We want to create optimized solutions for customers that make life easier by relentlessly asking WHY and designing automated processes that reflect the reality of our customers with customizable rules.
For us, process-oriented thinking is in the background and a solution – which changes so much because it thinks along with you.
Visit and invitation processes
With .secure.VISIT and the portal solutions for the integration of SelfServies, you not only achieve optimum planning and management of visit processes for your employees, but also leave a “perfect first impression” on visitors. The visitor management application .secure.VISIT and the Outlook add-in provide ideal support for planning events with visitors and external persons and take over the entire control and administration. As it automatically controls processes and workflows (e.g. checking required instructions, approvals for entrances, access to the apron, etc.), it offers all user groups, whether employees planning their visits, reception staff or site managers, the opportunity to carry out their tasks easily and with just a few clicks. The ability to scan the QR codes of visitors, ID cards, etc. optimizes processes. Pre-registration can be carried out directly via the visitor management system or the Outlook add-in. As rules predefine which requirements apply to the different types of visitors (e.g. office visitors, technicians), all other processes are determined and initiated fully automatically in the background when visits are created. By automatically sending an invitation email, the visitor receives all important information and a QR code in advance. In this way, secure.VISIT not only enables optimal planning and management of visitors for your employees, but also leaves a “perfect first impression” on the visitor as part of the visit process.
Manage external companies and external employees
Our solutions provide you with optimum support in managing your external company processes – seamlessly, transparently and completely rule-based. The application for external company management. EXTERNAL enables you to meet the high operational, legal and security-related requirements for managing external persons on the basis of digitalized processes and to control all connected processes. This includes onboarding, including legitimization processes, the implementation of instructions and the ordering of an ID card or the required access rights. By connecting to existing IT systems and their interfaces, relevant information can be transferred from directories, for example, or forwarded to access systems. The web-based application also makes it possible to map the associated order, authorization and administration processes transparently and reliably in the respective operational environment. With the solutions from .secure, it is always possible to transparently track when which external company employee was or is in your company and which areas were or are accessible to him and whether he already has a new assignment for him in the future.
Logistics management and time slot bookings
With gis solutions, it is possible to optimally map and control logistics and yard management processes and manage time windows while integrating them into operational processes. You have the freedom to decide which of the applications, processes and technologies you already use you would like to continue using. In addition to a large selection of software solutions and modules from gis for the design of optimized logistics processes – starting with time slot booking, the optimization of loading and unloading processes, the registration of drivers at manned or unmanned gates, including, if desired, instruction and legitimation systems. Instruction and legitimation processes via self-service, badge coding and issuing or access control via LPR cameras Navigation on the site to the various loading points as well as targeted release of access authorizations, the integration of existing systems and applications is possible via state-of-the-art interface technologies. With .secure, you not only meet all your company’s requirements in the areas of access control, occupational health and safety, management of logistics processes, optimization of loading and unloading processes, scheduling and planning.
On- & Offboarding Processes
With the One Click Self Service Apps, employees are involved in the onboarding and business processes from day one.
From data collection and identification as part of preboarding and onboarding processes for internal or external employees, to carrying out briefings and filling out checklists, to ordering ID cards – the self-service options are simple and easy to adapt to operational requirements and enable tasks to be completed completely digitally and without system interruptions directly via the employee’s end device.
The #LegitimationApp offers quick and easy identification as part of the onboarding process. The legitimation process is started automatically according to your requirements and upon successful completion, the information is transmitted accordingly to responsible persons or further processes (e.g. for the release of authorizations). The #FotoApp allows users to quickly, easily and completely independently provide professional photos for employee badges, badges, IT systems or any occasion. In no time at all, the photos are available for any automated processes, such as ordering a personal employee ID card or company ID card with a picture or the introduction of uniform profile pictures, e.g. for e-mail programs or directoires! Rule-based management of departures means that offboarding is started completely automatically. In this way, you ensure that all authorizations are revoked when employees leave work and that all further processes, such as badge return, are initiated and monitored automatically. Not only you – but also your employees will be thrilled with these smart, digital and innovative processes that not only save time and money, but also leave an impression on your employees.
Instructions
.secure.CERTIFY enables the comprehensive and flexible management of instructions. From the creation of the instruction, to the integration of content in any form, e.g. PDF documents, images, videos, audio, texts or in combination, to the precise definition of rules that determine which group of people at which location has to carry out an instruction and for what reason. The instructions are available to the respective persons as a self-service via the .PORTAL and can, if desired, be carried out in advance at home on a PC or on the move via a mobile device or via self-service on arrival. With our CERTIFY instruction solution, you can map your instruction, training and briefing requirements in an effective, individual, target group-specific, rule-based and automated way.
ID card management
.secure.CARD offers an optimized and powerful lifecycle solution for workflow-based production and management processes for access cards.
The application enables the personalization, encoding and management of RFID media for employees and external parties via a single system.
All upstream and downstream processes, such as ordering the badge, transferring information via interfaces to connected access systems, assigning authorizations and activating the badge, can be designed individually.
The application also offers the option of storing individual layouts so that ID cards can signal the corresponding affiliation.
All typical ID card scenarios (personal/impersonal, temporary/permanent, functional ID card, with/without biometric features, etc.) can be mapped.
By using the #FotoApp, the ID card can be ordered and activated directly by the employee.
But not only that, all processes, such as the production of the ID card, issuing, changing from old to new ID cards or combined ID cards, are fully mapped and documented and can therefore be tracked seamlessly.
Control access and driveways
With .secure.ACCESS and gatekeeper .TABLEAU in combination with other services from gis, it is possible to manage access and entrances using online, offline and mechanical locking systems, LPR cameras and of course any combination. Regardless of the access medium, the type of authorization and the security devices, from doors and locks to turnstiles, barriers and gates – you decide who is allowed to enter certain areas of the company, where, how and why, and above all, who is not! Be it with the access badge, the QR code or an authorized vehicle license plate. The options for managing access and entrances are diverse and can be customized according to your needs and possibilities.
Manage rooms & resources
.secure.ROOMS&RESOURCES enables the management and booking of required rooms, company vehicles, parking spaces, time slots for logistics processes and any other resources. The solution from gis supports you in managing your resources and booking processes – transparently, rule-based and taking into account company-specific requirements. We take a very flexible approach to returns management that goes far beyond the simple booking of rooms and resources. For us, the term “resources” includes things that we use, are available in limited quantities, have specific properties, cannot be “used up”, that we need for a certain period of time, that incur costs and that are usually assigned to a specific location. With .secure.ROOMS&RESOURCES it is possible to search for available rooms and any resources according to individual criteria (e.g. capacity, additional and possible equipment, etc.) and to book them. With this. .secure.ROOMS&RESOURCES can be used optimally, the bookings are also compared and synchronized with other systems or databases so that all information on available resources is always available across all systems.
Management of rental properties and tenants
With #TenantAcces, it is possible to optimize access management for building tenants. Depending on the choice of operator model, management is carried out by the provider (landlord, or commissioned property management company) or by the tenant himself. You decide individually according to your requirements which operator model is suitable for you. Under the provider model, ID cards, access, doors, rooms and access devices are managed exclusively by a provider.
In this case, only the ID cards authorized for the rented areas and the shared access areas (e.g. outer shell) are issued to a tenant. If you opt for the tenant model, access authorizations are managed by the tenant themselves. The provider’s task is to provide access media, create and maintain resources (rooms, floors, access devices, Tennant assignment, and access management of shared resources (entrances, floors, etc.). Regardless of which model you choose, #TenantAccess enables transparent and secure management of rented properties, ensures strict and data protection-compliant separation of data and still enables comprehensive management of shared resources.
Self Services – Apps to Go
Self-services have become an integral part of our everyday lives: whether at the self-service checkout in furniture or DIY stores, online banking via the app or tracking an order.
As a result, we are now used to using self services to carry out tasks independently and flexibly, regardless of time, place and contact person.
At gis, we define self services as all actions and processes that users can carry out independently via our applications.
These considerations and evaluations of our customers’ needs have resulted in our self-service components, which bundle these processes and make sense via WebApps for mobile devices or PCs.
We would also like to offer this service to users.
Be it the ordering of ID cards for internal or external employees or the check-in process for visitors.
User-friendly, intuitively structured and comprehensible self-services can solve the wishes and requirements of these different target groups – individually and process-optimized.
And of course – the heart of .secure
Like good planning for a trip around the world, the management platform is the basis of our .secure world. .secure is a process-oriented, flexible, standardized and modern control and management platform for the areas of physical security, access control and authorisation management. Thanks to its modular structure, the areas of application are very diverse. The modular structure and adaptability through parameterization make it possible to map local and central requirements easily and immediately. The browser-based application is characterized by the fact that it can be flexibly integrated into existing IT and business structures. It offers the freedom to model processes that are individually tailored to operational requirements and to use existing or freely selectable systems or components, to interact with them and to control them.
Would you like to find out more?
We would be happy to advise you in an individual appointment.
We look forward to hearing from you!
We would be happy to advise you in an individual appointment.
We look forward to hearing from you!