{"id":21724,"date":"2022-08-26T07:55:02","date_gmt":"2022-08-26T05:55:02","guid":{"rendered":"https:\/\/gis-consulting.de\/?page_id=21724"},"modified":"2024-09-25T10:19:26","modified_gmt":"2024-09-25T08:19:26","slug":"security-2024-essen","status":"publish","type":"page","link":"https:\/\/gis-consulting.de\/en\/security-2024-essen\/","title":{"rendered":"gis presents at security 2024 in Essen"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[mk_page_section vertical_align=&#8221;center&#8221; bg_color=&#8221;#ffffff&#8221; min_height=&#8221;600&#8243; full_width=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; visibility=&#8221;hidden-sm&#8221; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2024\/09\/gis-security-header_web.png&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1726640559065{border-right-width: 50px !important;padding-right: 50px !important;}&#8221;][mk_padding_divider size=&#8221;10&#8243; visibility=&#8221;hidden-sm&#8221;][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;42&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;36&#8243; size_tablet=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]\n<h1 style=\"padding-left: 10px; text-align: right;\"><span style=\"color: #4a4f55;\"><strong>Security Essen 2024<\/strong><\/span><span style=\"color: #4a4f55;\"><br \/>\n<\/span><\/h1>\n<h3 style=\"padding-left: 10px; text-align: right;\"><span style=\"color: #4a4f55;\"><strong>Enter the world of access management<\/strong><\/span><span style=\"color: #4a4f55;\"><br \/>\n<\/span><\/h3>\n[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section vertical_align=&#8221;top&#8221; bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; min_height=&#8221;200&#8243; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; visibility=&#8221;visible-sm&#8221; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;66&#8243; visibility=&#8221;hidden-sm&#8221;][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;42&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;36&#8243; size_tablet=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]\n<h1 style=\"padding-left: 10px; text-align: right;\"><span style=\"color: #4a4f55;\"><strong>Security Essen 2024<\/strong><\/span><span style=\"color: #4a4f55;\"><br \/>\n<\/span><\/h1>\n<h3 style=\"padding-left: 10px; text-align: right;\"><span style=\"color: #4a4f55;\"><strong>Enter the world of access management<\/strong><\/span><span style=\"color: #4a4f55;\"><br \/>\n<\/span><\/h3>\n[\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#e74c39&#8243; border_color=&#8221;#e74c39&#8243; speed_factor=&#8221;4&#8243; min_height=&#8221;0&#8243; padding_top=&#8221;60&#8243; padding_bottom=&#8221;40&#8243; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;false&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;25&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Would you like to find out more?<br \/>\nWe would be happy to advise you in an individual appointment and look forward to hearing from you![\/mk_fancy_title][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_button dimension=&#8221;outline&#8221; size=&#8221;medium&#8221; icon=&#8221;mk-icon-long-arrow-right&#8221; icon_anim=&#8221;side&#8221; url=&#8221;mailto:in**@************ng.de&#8221; data-original-string=&#8221;VRRJc+4RAahdVyd0UMOpvw==069dF2plag\/9NiG8fEOmwL7afo+pvwU100NAwnLXJLgLPU=&#8221; title=&#8221;This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.&#8221; outline_skin=&#8221;light&#8221;]CONTACT US NOW[\/mk_button][\/vc_column][\/mk_page_section][mk_page_section vertical_align=&#8221;top&#8221; bg_color=&#8221;#46b7ac&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; min_height=&#8221;376&#8243; full_width=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; visibility=&#8221;visible-sm&#8221; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_single_image image=&#8221;21835&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/mk_page_section][vc_row][vc_column][mk_padding_divider size=&#8221;80&#8243; visibility=&#8221;hidden-sm&#8221;][vc_column_text css=&#8221;.vc_custom_1663666426340{margin-bottom: 0px !important;}&#8221;]\n<h2>There is so much to discover &#8211; Join us on a journey through the .secure world<\/h2>\n[\/vc_column_text][mk_padding_divider visibility=&#8221;hidden-sm&#8221;][vc_video link=&#8221;https:\/\/youtu.be\/efXjjSENec0&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider size=&#8221;80&#8243; visibility=&#8221;hidden-sm&#8221;][vc_column_text css=&#8221;.vc_custom_1663245108950{margin-bottom: 0px !important;}&#8221;]\n<h2>Who we are &#8211; the company<\/h2>\n[\/vc_column_text][mk_padding_divider visibility=&#8221;hidden-sm&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1663244702983{margin-bottom: 0px !important;}&#8221;]<strong>We at gis &#8211; a company right in the heart of the innovation hub of Baden-W\u00fcrttemberg &#8211; have one goal: to <\/strong>provide our customers with a state-of-the-art, scalable standard IT and process platform and high-performance applications with a small and highly committed team. Our core areas include access control, authorization management, visitor external employee management as well as self-service portals, onboarding processes and much more. With our applications and services, we enable customers to create a complete digital process world. With the flexibly deployable services, apps and modules, we offer our customers the opportunity to realize a real digital transformation in their companies in the shortest possible time and to develop it permanently.[\/vc_column_text][mk_padding_divider visibility=&#8221;hidden-sm&#8221;][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; column_padding=&#8221;1&#8243; css=&#8221;.vc_custom_1663247313047{padding-right: 20px !important;padding-left: 30px !important;background-color: #e74c39 !important;}&#8221;][vc_column][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663259183572{margin-bottom: 0px !important;}&#8221;]\n<h2 style=\"padding-left: 0px; text-align: left;\"><span style=\"color: #ffffff;\"><strong>What drives us &#8211; what makes us tick<\/strong><\/span><span style=\"color: #ffffff;\"><br \/>\n<\/span><\/h2>\n[\/vc_column_text][mk_padding_divider size=&#8221;36&#8243; visibility=&#8221;hidden-sm&#8221;][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; column_padding=&#8221;1&#8243; css=&#8221;.vc_custom_1663247057337{padding-right: 20px !important;padding-left: 20px !important;background-color: #e74c39 !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1663246135158{margin-bottom: 0px !important;}&#8221;]<span style=\"color: #ffffff;\">We focus on creativity, performance, responsibility, transparency, passion, respect and a sense of purpose. For some, this may sound antiquated &#8211; for us, these are principles. Our compass! <\/span><\/p>\n<p><span style=\"color: #ffffff;\">We want to create optimized solutions for customers that make life easier by relentlessly asking WHY and designing automated processes that reflect the reality of our customers with customizable rules.<br \/>\nFor us, process-oriented thinking is in the background and a solution &#8211; which changes so much because it thinks along with you. <\/span>[\/vc_column_text][mk_padding_divider][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/besucher-und-termine.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663259907698{margin-bottom: 0px !important;}&#8221;]\n<h2>Visit and invitation processes<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1726483339628{margin-bottom: 0px !important;}&#8221;]With .secure.VISIT and the portal solutions for the integration of SelfServies, you not only achieve optimum planning and management of visit processes for your employees, but also leave a &#8220;perfect first impression&#8221; on visitors. The visitor management application .secure.VISIT and the Outlook add-in provide ideal support for planning events with visitors and external persons and take over the entire control and administration. As it automatically controls processes and workflows (e.g. checking required instructions, approvals for entrances, access to the apron, etc.), it offers all user groups, whether employees planning their visits, reception staff or site managers, the opportunity to carry out their tasks easily and with just a few clicks. The ability to scan the QR codes of visitors, ID cards, etc. optimizes processes. Pre-registration can be carried out directly via the visitor management system or the Outlook add-in. As rules predefine which requirements apply to the different types of visitors (e.g. office visitors, technicians), all other processes are determined and initiated fully automatically in the background when visits are created. By automatically sending an invitation email, the visitor receives all important information and a QR code in advance. In this way, secure.VISIT not only enables optimal planning and management of visitors for your employees, but also leaves a &#8220;perfect first impression&#8221; on the visitor as part of the visit process.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/grafik_fremdfirmenverwaltung.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663259686360{margin-bottom: 0px !important;}&#8221;]\n<h2>Manage external companies and external employees<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663259763920{margin-bottom: 0px !important;}&#8221;]Our solutions provide you with optimum support in managing your external company processes &#8211; seamlessly, transparently and completely rule-based. The application for external company management. EXTERNAL enables you to meet the high operational, legal and security-related requirements for managing external persons on the basis of digitalized processes and to control all connected processes. This includes onboarding, including legitimization processes, the implementation of instructions and the ordering of an ID card or the required access rights. By connecting to existing IT systems and their interfaces, relevant information can be transferred from directories, for example, or forwarded to access systems. The web-based application also makes it possible to map the associated order, authorization and administration processes transparently and reliably in the respective operational environment. With the solutions from .secure, it is always possible to transparently track when which external company employee was or is in your company and which areas were or are accessible to him and whether he already has a new assignment for him in the future.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/logistik-und-prozesse.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663260265049{margin-bottom: 0px !important;}&#8221;]\n<h2>Logistics management and time slot bookings<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663260283636{margin-bottom: 0px !important;}&#8221;]With gis solutions, it is possible to optimally map and control logistics and yard management processes and manage time windows while integrating them into operational processes. You have the freedom to decide which of the applications, processes and technologies you already use you would like to continue using. In addition to a large selection of software solutions and modules from gis for the design of optimized logistics processes &#8211; starting with time slot booking, the optimization of loading and unloading processes, the registration of drivers at manned or unmanned gates, including, if desired, instruction and legitimation systems. Instruction and legitimation processes via self-service, badge coding and issuing or access control via LPR cameras Navigation on the site to the various loading points as well as targeted release of access authorizations, the integration of existing systems and applications is possible via state-of-the-art interface technologies. With .secure, you not only meet all your company&#8217;s requirements in the areas of access control, occupational health and safety, management of logistics processes, optimization of loading and unloading processes, scheduling and planning.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2021\/03\/foto.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663262134654{margin-bottom: 0px !important;}&#8221;]\n<h2>On- &amp; Offboarding Processes<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663262116746{margin-bottom: 0px !important;}&#8221;]With the One Click Self Service Apps, employees are involved in the onboarding and business processes from day one.<br \/>\nFrom data collection and identification as part of preboarding and onboarding processes for internal or external employees, to carrying out briefings and filling out checklists, to ordering ID cards &#8211; the self-service options are simple and easy to adapt to operational requirements and enable tasks to be completed completely digitally and without system interruptions directly via the employee&#8217;s end device.<br \/>\nThe #LegitimationApp offers quick and easy identification as part of the onboarding process. The legitimation process is started automatically according to your requirements and upon successful completion, the information is transmitted accordingly to responsible persons or further processes (e.g. for the release of authorizations). The #FotoApp allows users to quickly, easily and completely independently provide professional photos for employee badges, badges, IT systems or any occasion. In no time at all, the photos are available for any automated processes, such as ordering a personal employee ID card or company ID card with a picture or the introduction of uniform profile pictures, e.g. for e-mail programs or directoires! Rule-based management of departures means that offboarding is started completely automatically. In this way, you ensure that all authorizations are revoked when employees leave work and that all further processes, such as badge return, are initiated and monitored automatically. Not only you &#8211; but also your employees will be thrilled with these smart, digital and innovative processes that not only save time and money, but also leave an impression on your employees.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/unterweisungenprozesse.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663262184726{margin-bottom: 0px !important;}&#8221;]\n<h2>Instructions<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663262344410{margin-bottom: 0px !important;}&#8221;].secure.CERTIFY enables the comprehensive and flexible management of instructions. From the creation of the instruction, to the integration of content in any form, e.g. PDF documents, images, videos, audio, texts or in combination, to the precise definition of rules that determine which group of people at which location has to carry out an instruction and for what reason. The instructions are available to the respective persons as a self-service via the .PORTAL and can, if desired, be carried out in advance at home on a PC or on the move via a mobile device or via self-service on arrival. With our CERTIFY instruction solution, you can map your instruction, training and briefing requirements in an effective, individual, target group-specific, rule-based and automated way.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/ausweise_verwalten.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663262444812{margin-bottom: 0px !important;}&#8221;]\n<h2>ID card management<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663262466012{margin-bottom: 0px !important;}&#8221;].secure.CARD offers an optimized and powerful lifecycle solution for workflow-based production and management processes for access cards.<br \/>\nThe application enables the personalization, encoding and management of RFID media for employees and external parties via a single system.<br \/>\nAll upstream and downstream processes, such as ordering the badge, transferring information via interfaces to connected access systems, assigning authorizations and activating the badge, can be designed individually.<br \/>\nThe application also offers the option of storing individual layouts so that ID cards can signal the corresponding affiliation.<br \/>\nAll typical ID card scenarios (personal\/impersonal, temporary\/permanent, functional ID card, with\/without biometric features, etc.) can be mapped.<br \/>\nBy using the #FotoApp, the ID card can be ordered and activated directly by the employee.<br \/>\nBut not only that, all processes, such as the production of the ID card, issuing, changing from old to new ID cards or combined ID cards, are fully mapped and documented and can therefore be tracked seamlessly.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/zutritte-und-zufahrten.jpg&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663274061282{margin-bottom: 0px !important;}&#8221;]\n<h2>Control access and driveways<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663272424625{margin-bottom: 0px !important;}&#8221;]With .secure.ACCESS and gatekeeper .TABLEAU in combination with other services from gis, it is possible to manage access and entrances using online, offline and mechanical locking systems, LPR cameras and of course any combination. Regardless of the access medium, the type of authorization and the security devices, from doors and locks to turnstiles, barriers and gates &#8211; you decide who is allowed to enter certain areas of the company, where, how and why, and above all, who is not! Be it with the access badge, the QR code or an authorized vehicle license plate. The options for managing access and entrances are diverse and can be customized according to your needs and possibilities.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/rooms-and-resources.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663272477246{margin-bottom: 0px !important;}&#8221;]\n<h2>Manage rooms &amp; resources<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663272593301{margin-bottom: 0px !important;}&#8221;].secure.ROOMS&amp;RESOURCES enables the management and booking of required rooms, company vehicles, parking spaces, time slots for logistics processes and any other resources. The solution from gis supports you in managing your resources and booking processes &#8211; transparently, rule-based and taking into account company-specific requirements. We take a very flexible approach to returns management that goes far beyond the simple booking of rooms and resources. For us, the term &#8220;resources&#8221; includes things that we use, are available in limited quantities, have specific properties, cannot be &#8220;used up&#8221;, that we need for a certain period of time, that incur costs and that are usually assigned to a specific location. With .secure.ROOMS&amp;RESOURCES it is possible to search for available rooms and any resources according to individual criteria (e.g. capacity, additional and possible equipment, etc.) and to book them. With this. .secure.ROOMS&amp;RESOURCES can be used optimally, the bookings are also compared and synchronized with other systems or databases so that all information on available resources is always available across all systems.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/mieteraccess.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663273690125{margin-bottom: 0px !important;}&#8221;]\n<h2>Management of rental properties and tenants<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663273716582{margin-bottom: 0px !important;}&#8221;]With #TenantAcces, it is possible to optimize access management for building tenants. Depending on the choice of operator model, management is carried out by the provider (landlord, or commissioned property management company) or by the tenant himself. You decide individually according to your requirements which operator model is suitable for you. Under the provider model, ID cards, access, doors, rooms and access devices are managed exclusively by a provider.<br \/>\nIn this case, only the ID cards authorized for the rented areas and the shared access areas (e.g. outer shell) are issued to a tenant. If you opt for the tenant model, access authorizations are managed by the tenant themselves. The provider&#8217;s task is to provide access media, create and maintain resources (rooms, floors, access devices, Tennant assignment, and access management of shared resources (entrances, floors, etc.). Regardless of which model you choose, #TenantAccess enables transparent and secure management of rented properties, ensures strict and data protection-compliant separation of data and still enables comprehensive management of shared resources.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2021\/06\/employee-network_forweb.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663273765152{margin-bottom: 0px !important;}&#8221;]\n<h2>Self Services &#8211; Apps to Go<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663273793461{margin-bottom: 0px !important;}&#8221;]Self-services have become an integral part of our everyday lives: whether at the self-service checkout in furniture or DIY stores, online banking via the app or tracking an order.<br \/>\nAs a result, we are now used to using self services to carry out tasks independently and flexibly, regardless of time, place and contact person.<br \/>\nAt gis, we define self services as all actions and processes that users can carry out independently via our applications.<br \/>\nThese considerations and evaluations of our customers&#8217; needs have resulted in our self-service components, which bundle these processes and make sense via WebApps for mobile devices or PCs.<br \/>\nWe would also like to offer this service to users.<br \/>\nBe it the ordering of ID cards for internal or external employees or the check-in process for visitors.<br \/>\nUser-friendly, intuitively structured and comprehensible self-services can solve the wishes and requirements of these different target groups &#8211; individually and process-optimized.<br \/>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2022\/09\/secure.png&#8221; image_size=&#8221;full&#8221; align=&#8221;center&#8221;][mk_padding_divider][vc_column_text css=&#8221;.vc_custom_1663273861449{margin-bottom: 0px !important;}&#8221;]\n<h2>And of course &#8211; the heart of .secure<\/h2>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1663273884370{margin-bottom: 0px !important;}&#8221;]Like good planning for a trip around the world, the management platform is the basis of our .secure world. .secure is a process-oriented, flexible, standardized and modern control and management platform for the areas of physical security, access control and authorisation management. Thanks to its modular structure, the areas of application are very diverse. The modular structure and adaptability through parameterization make it possible to map local and central requirements easily and immediately. The browser-based application is characterized by the fact that it can be flexibly integrated into existing IT and business structures. It offers the freedom to model processes that are individually tailored to operational requirements and to use existing or freely selectable systems or components, to interact with them and to control them.<br \/>\n[\/vc_column_text][mk_padding_divider][\/vc_column][\/vc_row][vc_row padding=&#8221;0&#8243;][vc_column][\/vc_column][\/vc_row][mk_page_section bg_color=&#8221;#e74c39&#8243; border_color=&#8221;#e74c39&#8243; speed_factor=&#8221;4&#8243; min_height=&#8221;0&#8243; padding_top=&#8221;60&#8243; padding_bottom=&#8221;40&#8243; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;false&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;25&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Would you like to find out more?<br \/>\nWe would be happy to advise you in an individual appointment.<br \/>\nWe look forward to hearing from you![\/mk_fancy_title][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_button dimension=&#8221;outline&#8221; size=&#8221;medium&#8221; icon=&#8221;mk-icon-long-arrow-right&#8221; icon_anim=&#8221;side&#8221; url=&#8221;mailto:in**@************ng.de&#8221; data-original-string=&#8221;GWRTQ\/CPZvuTTqvxdmGUsQ==069rM0lhi\/ty+nalrkRcsh9j3qUioC9yKvq49hEXwC09ZQ=&#8221; title=&#8221;This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.&#8221; outline_skin=&#8221;light&#8221;]CONTACT US NOW[\/mk_button][\/vc_column][\/mk_page_section][vc_column width=&#8221;1\/2&#8243;][\/vc_column]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[mk_page_section vertical_align=&#8221;center&#8221; bg_color=&#8221;#ffffff&#8221; min_height=&#8221;600&#8243; full_width=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; visibility=&#8221;hidden-sm&#8221; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;2\/3&#8243;][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2024\/09\/gis-security-header_web.png&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1726640559065{border-right-width: 50px !important;padding-right: 50px !important;}&#8221;][mk_padding_divider size=&#8221;10&#8243; visibility=&#8221;hidden-sm&#8221;][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#ffffff&#8221; size=&#8221;42&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;36&#8243; size_tablet=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;] Security Essen 2024 Enter the world of access management [\/mk_fancy_title][\/vc_column][\/mk_page_section][mk_page_section vertical_align=&#8221;top&#8221; bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; min_height=&#8221;200&#8243; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; visibility=&#8221;visible-sm&#8221; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;66&#8243; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-21724","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/21724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=21724"}],"version-history":[{"count":8,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/21724\/revisions"}],"predecessor-version":[{"id":28949,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/21724\/revisions\/28949"}],"wp:attachment":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=21724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}