Access Control Cloud System
![Tailored Security Solutions by TKH Security’s Access Control Cloud System, IPROTECT. IPROTECT Access Control Cloud’s mobile entry method can streamline your security operations.](https://tkhsecurity.com/wp-content/uploads/2023/08/IPROTECT-Access-Control-Cloud_hero.png)
Increasing your security and convenience by design
One technology partner that offers a seamlessly integrated solution for hardware, software, mobile app, and cloud services.
Plug & Play for seamless adaptation.
From medium to enterprise-sized facilities we can provide a tailored fit for your business needs.
What we offer
SaaS + Server maintenance
Keeping you secure, you’re free to focus on your business because we’ll take care of maintenance and system updates on an ongoing basis.
Configuration
Based on your needs, we prepare ready to plug & play systems whilst supporting you with our technical expertise.
A High Standard of Security and Compliance
- Private TKH Security Cloud for better control and heightened security.
- Data center in Amsterdam, NL/EU.
- Your dedicated SOC provided by TKH Security.
Hardware
Giving you full ownership of our hardware such as readers and locks, these come as one-time buy products.
How it works
![](https://tkhsecurity.com/wp-content/uploads/2023/08/How-it-works-768x428.png)
Main Values
![Customized GDPR content, Location-Based Login, Compatibility with All Door Locks Operators can use personalized GDPR content & location-based login with TKH Security’s IPROTECT Access Control.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_Adaptable-1.png)
- Users can have personalized menus that comply with GDPR rules and can also obtain login access rights based on their location.
- Our system fully supports all combinations of electrical door locks, such as high-speed door gates, rolling grilles, turnstiles, and includes registration of the lock status.
- Works independently as one system when using multiple main brands of offline and online door handles, cylinders, and card readers.
![Centralized Location Management, Priority Alarm Handling, Customized Cockpit & Multilingual Communication IPROTECT Access Control allows you to efficiently manage multiple locations centrally whilst prioritizing alarms with interactive floor plans. Customize a cockpit for event-driven insights and seamlessly communicate in multiple languages.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_UX.png)
- Manage and control a large number of locations from one or more central locations (multi-site).
- Based on your needs, you can define priority-based alarm handling including interactive floor plans.
- Customize a cockpit to your business needs with automatic event-driven layouts highlighting relevant information instantly.
- Multi-language capabilities within one system allow you to seamlessly communicate internally, without barriers.
![Comprehensive Security Measures: End-to-End Encryption, Daily Patches, Automated Hardware Updates & a PEN-Tested Environment. Operators can leverage the end-to-end security measures of IPROTECT Access Control from TKH Security.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_A-High-Standard-of-Security.png)
- End-to-end security – Protect your data against any cyberattacks with encrypted communication.
- Possibility to check and install daily updated security patches.
- Manage and update your hardware with the latest software versions automatically.
- We use open standards and community software to provide a consistently secure environment. PEN-tested according to OWASP method.
![Tailored Reporting Solutions Fully Aligned with GDPR: Get Pre-Selection Reports from IPROTECT Access Control Interactive Floorplans and create your own dashboards. Operators can explore tailored reporting options. Generate pre-selection reports from interactive floorplans and create custom dashboards whilst staying GDPR compliant.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_Raporting.png)
- Several possibilities for your reporting and data purposes.
- You can create a pre-selection report which can be executed directly from IPROTECT Cloud, e.g., Interactive floorplan.
- Create your own dashboard.
- Fully aligned with the GDPR.
Videos
![IPROTECT-AC](https://tkhsecurity.com/wp-content/uploads/2024/05/IPROTECT-AC.png)
Main Functionalities
![Control Center Features: Tailored Alarm Procedures, Live Monitoring, Interactive Floorplans from IPROTECT Access Control by TKH Security. Control center functionality offers tailored alarm procedures for efficient incident management along with monitored live events and interactive floorplans for optimized security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Control-Center.png)
![Heightened Security with Offline and Online Access Locks: Flexible Solutions for Facility Security with IPROTECT Access Control by TKH Security. Heightened facility security can be achieved with Offline and Online Access locks within IPROECT Access Control by TKH Security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Offline-Online-Access.png)
![Elevate Security: IPROTECT’s Mobile App Simplifies Access Management and Setup Leverage IPROTECT Access Control's Mobile App for seamless facility entry. Simplify access management, setup, and update with seamless integration.](https://tkhsecurity.com/wp-content/uploads/2024/05/IPROTECT_App.png)
![Streamline Operations: Access Control for Multi-Tenant Offices with IPROTECT Acess Control by TKH Security. Multi-tenant offices can benefit from IPROTECT Access Control multi-tenant feature. Simplify user access and reduce operational complexities with TKH Security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multi-Tenant-Office.png)
![Secure and Flexible Access Management: Multi-Credentials for Multi-Tenant Buildings Users can leverage the security and flexibility of multi-credentials from IPROTECT Access Control from TKH Security. Choose from various access technologies for seamless access management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multi-Credentials.png)
![Centralized Facility Management: Multilocations for Enhanced Efficiency and Security with IPROTECT Access Control. Users can optimize facility management with Multilocations from IPROTECT Access Control from TKH Security. Centralize control, share access keys, and enhance security across multiple sites.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multilocations.png)
![Trails – Authorization of User Group and PC Settings Based on Location with IPROTECT Access Control. Dynamic system adjusting user rights based on workstation and login locations with IPROTECT Access Control from TKH Security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Trails.png)
![Personalized Security Surveillance: Interactive Floorplans for Efficient Facility Oversight with IPROTECT Access Control. IPROTECT Access Control. offers enhanced security surveillance with Interactive Floorplans via customized reports, live monitoring, and interactive controls.](https://tkhsecurity.com/wp-content/uploads/2023/08/Interactive-Floorplans.png)
![TKH Rack Handle: Secure Access Control System for Data Centers and Critical Infrastructure with TKH Security IPROTECT Access Control. TKH Rack handle connects to security critical area – A configurable access control system for data centers, production plants, and critical infrastructure from TKH Security IPROTECT Access Control.](https://tkhsecurity.com/wp-content/uploads/2023/08/TANlock-Rack-Handle.png)
![Deister Key Cabinet: Secure Key Management System for Enhanced Facility Security with TKH Security IPROTECT Access Control. TKH Security IPROTECT Access Control key cabinets and readers allow facility managers to efficiently manage mechanical keys for enhanced facility security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Deister-Key-Cabinet.png)
![IPROTECT Access Control’s Pager Management System by TKH Security: Optimize Pager Usage and Streamline Operations Improve pager management with IPROTECT Access Control Pager Management System. Optimize pager usage and streamline operations.](https://tkhsecurity.com/wp-content/uploads/2023/08/Pager-Management-System.png)
![Efficient Parking Management for Multi-Tenant Facilities Parking Management solution for multi-tenant facilities, tracking vehicle entry and exit, defining space quotas, and streamlining billing systems for enhanced efficiency.](https://tkhsecurity.com/wp-content/uploads/2023/08/Parking-Management.png)
![Threat Management Level: Customize Security Measures for Evolving Threats Operators can customize functionalities for evolving threats with Threat Management Level for enhanced security with TKH Security IPROTECT Access Control](https://tkhsecurity.com/wp-content/uploads/2023/08/Threat-Management-Level.png)
![Push Transaction Extended: Customize Event Integration for Enhanced Event Management Operators can leverage the Push Transaction Extended functionality within IPROTECT Access Control which allows for customized event types and content for seamless integration.](https://tkhsecurity.com/wp-content/uploads/2023/08/Push-Transaction-Extended.png)
![Prevent Unauthorized Access and Streamline Facility Management Facility entrances and doors can benefit from improved security with Anti Passback Functionality. Prevent unauthorized access and streamline facility management with TKH Security IPROTECT Access Control.](https://tkhsecurity.com/wp-content/uploads/2023/08/Anti-Passback-Functionality.png)
![Two Man Rule: Ensuring High-Security Operations with Alarm Verification Operators can leverage the Two Man Rule. An Alarm system for verifying two-person requirement with TKH Security IPROTECT Access Control.](https://tkhsecurity.com/wp-content/uploads/2023/08/Two-Man-Rule.png)
![Interlocking: Secure Access Control for Controlled Atmospheres and Clean Rooms Operators can leverage the secure access control interlocking method for controlled atmospheres and clean rooms.](https://tkhsecurity.com/wp-content/uploads/2023/08/Interlocking.png)
![Guard Tour: Automating Guard Control Rounds for Enhanced Building Security Guards can walk a pre-determined route with Guard Tour from TKH Security IPROTECT Access Control. Automated guard control rounds for efficient monitoring and swift response.](https://tkhsecurity.com/wp-content/uploads/2023/08/Guard-Tour.png)
![Trails – Walk Route: Enhancing Premises Movement Control from TKH Security IPROTECT Access Control. With Trails - Walk Route, operators can define routes, control access areas, and simplify operational management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Walk-Route.png)
Boon Edam
![Case Study: Boon Edam Office Building Modernization Boon Edam's office building in Edam, NL has been modernized by TKH Security to address security and enhance safety measures.](https://tkhsecurity.com/wp-content/uploads/2024/01/Case-Study_Boon-Edam.png)
Boon Edam leads the industry in providing high-quality revolving doors, high-security entrances, and speed gates to customers worldwide. As a third-generation Dutch family business, they take pride in their deep knowledge and unwavering dedication to this specialized market. They are now approaching their 150th birthday, a momentous occasion celebrating a rich history of growth, perseverance, and success.
The Challenge
To modernize the Boon Edam Head office with a secure cloud-based infrastructure, challenges centred around:
- Having a customized overview of all floors with layouts to provide immediate focus on event-related information.
- Transforming the way staff access doors, turnstiles and speed lanes by shifting from traditional access cards to a Mobile App.
- Having one supplier of software, Mobile App, cloud services, and hardware.
![Challenges Faced in Modernizing Boon Edam Head Office TKS Security were able to address the security challenges of the Boon Edam Head office building in Edam, NL.](https://tkhsecurity.com/wp-content/uploads/2024/01/CS_photo_1.png)
A Tailored approach
Working alongside the client and our trusted installer partners at Giant Security B.V., we implemented:
- IPROTECT AC CLOUD – Our integrated solution for software, Mobile App, cloud services, and hardware, which reduces compatibility issues, streamlines operations, and fosters a cohesive technology ecosystem.
- Access / Mobile App – Used in conjunction with IPROTECT Cloud to setup the communication between mobile devices and card readers which turns mobile phones into a virtual access card. Our readers are integrated directly into Boon Edam entrance and security products, providing a smooth solution that works seamlessly with IPROTECT for enhanced access control.
- VDG SENSE Video Management System provides users with eventdriven macros that simplify trigger function setup for predefined events. This feature enhances system adaptability and efficiency, allowing users to easily customize responses to dynamic security situations.
![Tailored Approach for Boon Edam Reception TKH Security solutions were able to get to the heart of Boon Edam’s security needs with a tailored approach that integrates multiple security disciplines.](https://tkhsecurity.com/wp-content/uploads/2024/01/CS_photo_2.png)
Floor Plans
Our Solutions
An intuitive interface within IPROTECT AC Cloud, Boon Edam can leverage:
- Personalized menus.
- Real-time event monitoring through cameras and card readers.
- Alarm system control.
- Customizable Reporting, providing valuable insights and data that align with the unique demands of their office.
![Enhancing Security with IPROTECT Access Control Cloud at Boon Edam Integrated security solutions enhance the daily operations at the Boon Edam office, Edam, NL through a host of solutions through IPROTECT Access Control Cloud from TKH Security.](https://tkhsecurity.com/wp-content/uploads/2024/01/florplans.png)
The Outcome
- This facilitates rapid responses to security incidents, efficient officewide monitoring, and improved safety measures, enabling security personnel to swiftly address threats and safeguard occupants.
- When someone accesses the AC system, video footage is shown automatically. If an alarm triggers, operators can instantly view cameras in the IPROTECT AC interface.
Mobile App
Our Solutions
In line with our “mobile is key” principle, it features:
- Easy registration: Users receive an invitation email with a QR code, inviting them through IPROTECT to download the Mobile App and either start using it or register their organization.
- Flexibility: Per reader, users can customize their phone’s usage settings. This includes options such as requiring the phone to be unlocked prior to use, opening doors within a specified distance, or directly presenting the phone for specific tasks.
- Heightened security of the building because it uses PKI (Public Key Infrastructure).
![Enhancing Security with the Mobile App at Boon Edam At Boon Edam’s ofiice, Edam, NL, speed gates can be opened using the IPROTECT Access ControlCloud Mobile App.](https://tkhsecurity.com/wp-content/uploads/2024/01/Mobile.png)
The Outcome
With TKH Security readers and Boon Edam entrance and security products, Moible App grants exclusive access to 200+ employees, eliminating the need for physical access cards, providing:
- Simplified entry process along with added security to the building.
- Improvement of overall operational efficiency at the office, reducing the risk of lost or stolen cards, and provides detailed access logs for better tracking and security management.
VDG SENSE Video Management
Our Solutions
Implemented as a server-based solution, our VMS ensures comprehensive and efficient video monitoring.
The Outcome
This installation has elevated staff safety and security, offering an impressive array of features that can be utilized by end-users, such as:
- Video Storage: For preserving client footage for evidence and analysis. It ensures that valuable video data is securely retained, enabling investigations and audits to take place effectively.
![Enhancing Staff Safety with Video Management System, VDG SENSE, at Boon Edam Boon Edam, NL, showcases the VDG SENSE Video Management System. The system provides enhanced safety through video monitoring, event-driven macros, and optimized file management, ensuring efficient data retention and supporting safety investigations.](https://tkhsecurity.com/wp-content/uploads/2024/01/security.png)
- Event-Driven Macros: Easy-to-use functions when pre-defined events occur and trigger actions.
- Prioritizing Important Files: Valuable for maintaining a historical record of security incidents. This ensures that essential information is preserved at the office and is easily accessible for compliance, legal, or security purposes.
Security in the Cloud
Our Solutions
Our private TKH Security Cloud enables the client to elevate their security environment, offering enhanced control and heightened measures.
The Outcome
- Availability: Ensuring that office applications and data are consistently accessible is crucial for maintaining productivity. Minimizing downtime risks, with the support of a dedicated Security Operations Center (SOC) in Amsterdam, helps to prevent disruptions and maintain smooth operations at Boon Edam.
![Elevating Security with TKH Security Cloud at Boon Edam A secure cloud infrastructure at Boon Edam is powered by TKH Security Cloud. The system features encryption, threat detection, and scalable resources, delivering advanced security and efficient resource management to protect sensitive information and maintain operational productivity.](https://tkhsecurity.com/wp-content/uploads/2024/01/Cloud.png)
-
Robust Security Features: Encryption, threat detection, and identity management are paramount for safeguarding sensitive information in the office environment. They provide strong defenses against cyber threats, protecting data and maintaining the integrity of operations.
-
Scalable Resources: The ability to scale resources quickly is important for adapting to changing demands within a global organization like Boon Edam. This scalability optimizes cost efficiency, ensuring that resources are allocated effectively to meet workload variations without unnecessary expenses or performance bottlenecks.
“For Boon Edam’s head office building, our vision was to combine premium security with convenience for their staff through a custom approach to office needs. The
result is that they now have the security in place to support daily office operations, with increased administrative efficiency, and a comprehensive security overview that enables them to promptly address issues.”