Showing ways. Be a guide. Let us find ways. Get to your destination quickly.

Showing ways. Be a guide. Let us find ways. Get to your destination quickly.

Graphical security management .MAPS

maps

.MAPS provides you with a graphically prepared overview of all security-related information of your company.

There is hardly any security planning software solution that brings results to light faster than .MAPS. All data managed in .secure can now be displayed and managed graphically. It is also quite respectable in terms of usefulness, possibilities, clarity and function.

The physical security management software was born from our indispensable will to put an end to the permanent waste of time in the context of security planning and control.


.MAPS:
See, know and work together instead of guessing, puzzling and wasting time.

Why .MAPS?

Plan security

Physical security planning is a (permanent) structured process that considers the entire life cycle of buildings, organizations, regulations, engineering & technologies. Often, the difficulty lies in quickly having up-to-date and resilient information available for precisely these planning and information processes.

Different system worlds

Very often, specific tasks (for example, room and occupancy planning, security, rescue and escape route organization, as well as authorization and access control) require different systems that communicate with each other only with very high technical effort. A mutual alignment and a systemically resilient implementation of change processes remains the goal, but this is often not achievable.

Different areas of responsibility

Process participants and areas of responsibility are usually divided into different organizational units and set up organizationally in different internal or external companies. This often makes it difficult to quickly and seamlessly share necessary up-to-date information.

Special systems without access for employees

The data and information are managed in special systems. Making it available to other interested departments or employees is hardly ever planned and rarely possible. External service providers often cannot access the data or send it back modified. The result is: “scattered” primary data in different systems and formats. If at all, reconciliation is only possible with a great deal of manual effort and considerable potential for error.

You are probably familiar with one or another of the following situations:

So where are the actual building plans?

Are there current plans that everyone involved can access?

Which rooms can they open with their badges or keys?

Where does Mr. Huber have access?

Where locks its keys and how can I see where these rooms are?

Where are the escape routes?

Can I display this data immediately to each employee via their intranet access?

How far can externals actually move?

Shouldn’t the technical rooms for the IT infrastructure actually be in section C1?

So how exactly are the safety zones designed?

How do I know which rooms are affected?

Is there no way to access this information graphically on my smartphone?

Can I get the information without searching through any Excel lists, Pdf printouts, reports and evaluations in different programs?

There is a solution that makes all this possible:

.MAPS

So how do you arrive at these results?

It’s just a few steps to get there – that’s all!

Phase 1 – Providing the data once

Provide plan as image file

.MAPS only requires image files (JPG, png or PDF) to use object data in the form of building, room or site plans, quickly and operationally.

Specific CAD file formats are not required.

The individual image files are simply loaded into the .secure.MAPS system via “File Upload”.

Perform automated object detection

The analysis of the individual image files and the generation of the spatial or object information is performed by various image recognition algorithms. Rooms and doors are therefore always detected automatically.

The automatic recognition rate depends on the quality of the image file or plan. Manual corrections are possible at any time.

A comprehensive toolset supports users in processing the graphically captured data.

The result: Polygonized room contours or door elements that can be addressed and attributed.

Phase 2 – Verify and attribute

Verify and confirm detection result

In an optional processing run, the recognition results can be verified. This is made possible easily and quickly by powerful tools.


The result:
Resilient and correct object plans and door lists.

Connect with existing databases

The verified object plans and door lists can be easily linked to existing data sets. The information can be displayed in different layers – including appropriate access rights.

The result:

Graphical display of any information such as.

– Safety Zones & Types

– Occupancy information

– Location of employees, technical equipment, etc.

– escape, rescue, evacuation routes

– Authorizations of keys, employees, departments, functions, etc.

– Rooms and room types

– Location of any components such as access readers, cameras, etc.

...and it only takes a few moments!

In addition to this administrative component, the brand new .MAPS.Viewer is available as of Q1 2016. This enables us not only to dynamically show your employees the way to the next vanishing point – we can also show your visitors the way to the meeting room.

You would like to learn more? Then take a look at the multimedia report on .MAPS, which not only provides information about the product, but also gives an insight into how the .secure team works, or contact us directly.

Information material

gis_broschuere_secure_maps

Product brochure .secure

Download now!

We are pleased to cooperate

Start typing and press Enter to search