Enjoy freedom. Creating connections. Automated and rule-based. Meet requirements.

Enjoy freedom. Creating connections. Automated and rule-based. Meet requirements.


Management platform .secure

Integrative, flexible and process-oriented control and management platform as the strategic basis of our modules!

.secure is a process-oriented control and management platform in the areas of physical security, access control and authorization management.

Due to the modular structure, the areas of application are very diverse: from visitor and contractor management to access management and time management to instruction management. Since .secure can be parameterized, the application can be flexibly adapted to company-specific requirements. .secure is not an isolated application – it is a platform and contains technologies and components to interact, cooperate and control a wide variety of systems.

Based on operational rules and specifications, .secure coordinates data & information flows from various IT systems, data sources and process definitions and controls a multitude of company-wide or cross-company business processes and IT systems almost fully automatically. The applications controlled by .secure are permanently and automatically supplied with the latest data and rule sets – making it a reliable clock generator for all associated subsystems.

Thus, .secure is today able to control a multitude of processes and systems inside and outside the management platform in a rule-based and automated way.

The areas of application of the management platform .secure briefly and simply explained

The heart of gis GmbH offers you complete flexibility, freedom and independence through rule-based control and automation.

Strategic alignment


The architecture of .secure is designed for complete flexibility, independence and freedom for the connection of subsystems or technologies and process design. Business processes are mapped independently of the existing environment. Using the example of authorization control in the area of physical access, it is possible to connect a wide variety of manufacturer systems (e.g. RFID technologies or biometric components, etc.) simultaneously in mixed operation. The focus of the rule-based control is the mapping of the authorization of people to enter a room or not. This is done completely transparently and comprehensibly via a clear set of rules and has the same effect on all systems and components used, regardless of manufacturer or technology.

The same applies to almost all other business processes: no matter which visitor management system is in place, how external company management is mapped, which instruction system is used at location A or in region B – .secure is able to connect, control or receive data from these different systems. Thus, even massively heterogeneous environments (hardware as well as software systems) can be placed under centralized and automated control. If a strategic realignment or consolidation of the system environments is desired, this can be done at any time.

Digital transformation

The technical elements that are now understood under the term “digital transformation” have been a basic principle of the .secure platform from the very beginning: to consistently connect systems and processes in such a way that an extremely flexible and highly communicative process and network landscape is created. From this, data and information can be composed and connected to further systems and processes in a reliable manner.

The core elements here are the automated interconnection of data streams and the overcoming of system boundaries. The goal is to maximize the reduction of manual repetitive tasks and to greatly increase performance, productivity, quality and reliability.


Our features – your benefit

Data protection and data security calculated actively and rule-based

Browser-based software applications have never been so secure! The .secure architecture as well as the technologies used are designed, developed and operated by trained developers who are sensitive to data protection in the sense of EU-DSGVO conformity – all with the involvement and control of external, independent data protection experts. In order to maintain an overview at all times, all changes are consistently logged. This makes .secure easily auditable, secure and completely up-to-date.

Life cycle management of data sets based on validity

The complete lifecycle of data records, e.g. of a person, a secure object or an access medium, is mapped and controlled by .secure and is transparently traceable for the company. In the case of new employees, all steps are mapped, from the preparation of the assignment, to entry, to exit and, if necessary, re-entry, and the authorizations are only available if the person is currently employed by the company.

Simplest operation of the app or web application

The user-optimized interface and the comprehensible structure make it possible for everyone involved – whether a “normal” employee, an administrator or a visitor – to operate the applications independently and perform the desired actions. Due to the optimized user guidance, user acceptance is increased enormously.

Role-oriented and rule-based authorization management

The basis of the well thought-out authorization concept is transparent user management. Here, among other things, information from the Active Directory used is used and the authorizations are assigned automatically according to the predefined roles and rules. It is important to us that the authorizations are meaningful, unambiguous and traceable and that you are always informed about who has access to which information or functions and when, and why.

Standard software with customizing options

The possibility of parameterizing the different modules of .secure means that they can be used individually and according to the requirements in your company. Together with you, we set up company-wide sets of rules and secure authorization mechanisms that are tailored to your company’s requirements.

Services management

Whether employees, visitors or external parties, various services can be prepared independently and adapted to diverse needs. Regardless of whether it is a matter of ordering catering, booking parking spaces, renting technical equipment, using WLAN or other services – of course always depending on the required authorization of the person.

Core components

Organisationsmanagement & Facilitymanagement

Organizational Management (OM)

Hierarchical and non-hierarchical structures, organizations, organizational units (OU), cost centers and organizational groups with variable focus or deployment are mapped in this area. For example, entry processes and job changes of employees are displayed and the management of persons takes place transparently.

Facility Management (FM)

All objects, components, floors, rooms and area structures are mapped in any depth. The representation takes place hierarchically as well as non-hierarchically. Another benefit is that all door specifications – right down to the door and locking technology, are fully documented and assigned. For example, it can be traced at any time which doors (incl. their properties such as escape, rescue, intervention) and locking systems a building has. Likewise, the respective buildings are assigned to the corresponding locations.

We are pleased to cooperate

Start typing and press Enter to search