Access Control Cloud System
![Image of IPROTECT AC Cloud’s mobile entry method being leveraged.](https://tkhsecurity.com/wp-content/uploads/2023/08/IPROTECT-Access-Control-Cloud_hero.png)
Increasing your security and convenience by design
One technology partner that offers a seamlessly integrated solution for hardware, software, mobile app, and cloud services.
Plug & Play for seamless adaptation.
From medium to enterprise-sized facilities we can provide a tailored fit for your business needs.
What we offer
SaaS + Server maintenance
Keeping you secure, you’re free to focus on your business because we’ll take care of maintenance and system updates on an ongoing basis.
Configuration
Based on your needs, we prepare ready to plug & play systems whilst supporting you with our technical expertise.
A High Standard of Security and Compliance
- Private TKH Security Cloud for better control and heightened security.
- Data center in Amsterdam, NL/EU.
- Your dedicated SOC provided by TKH Security.
Hardware
Giving you full ownership of our hardware such as readers and locks, these come as one-time buy products.
How it works
![](https://tkhsecurity.com/wp-content/uploads/2023/08/How-it-works-768x428.png)
Main Values
![Image showing how operators can use personalized GDPR menus & location-based login.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_Adaptable-1.png)
- Users can have personalized menus that comply with GDPR rules and can also obtain login access rights based on their location.
- Our system fully supports all combinations of electrical door locks, such as high-speed door gates, rolling grilles, turnstiles, and includes registration of the lock status.
- Works independently as one system when using multiple main brands of offline and online door handles, cylinders, and card readers.
![Efficiently manage multiple locations centrally. Prioritize alarms with interactive floor plans. Customize cockpit for event-driven insights. Seamlessly communicate in multiple languages.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_UX.png)
- Manage and control a large number of locations from one or more central locations (multi-site).
- Based on your needs, you can define priority-based alarm handling including interactive floor plans.
- Customize a cockpit to your business needs with automatic event-driven layouts highlighting relevant information instantly.
- Multi-language capabilities within one system allow you to seamlessly communicate internally, without barriers.
![Image showing operator utilizing the end-to-end security measures of IPROTECT Access Control System.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_A-High-Standard-of-Security.png)
- End-to-end security – Protect your data against any cyberattacks with encrypted communication.
- Possibility to check and install daily updated security patches.
- Manage and update your hardware with the latest software versions automatically.
- We use open standards and community software to provide a consistently secure environment. PEN-tested according to OWASP method.
![Image showing how users can operate IPROTECT Access Control System for Adaptable, User-Focused, Secure Solutions by TKH Security.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_Raporting.png)
- Several possibilities for your reporting and data purposes.
- You can create a pre-selection report which can be executed directly from IPROTECT Cloud, e.g., Interactive floorplan.
- Create your own dashboard.
- Fully aligned with the GDPR.
Videos
![](https://tkhsecurity.com/wp-content/uploads/2024/05/IPROTECT-AC.png)
Main Functionalities
![Image showing control center functionality which offers tailored alarm procedures for efficient incident management along with monitored live events and interactive floorplans for optimized security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Control-Center.png)
![Image representing heightened facility security with Offline and Online Access locks.](https://tkhsecurity.com/wp-content/uploads/2023/08/Offline-Online-Access.png)
![Image showing user leveraging IPROTECT's Mobile App for seamless facility entry. Simplify access management, setup, and update with seamless integration.](https://tkhsecurity.com/wp-content/uploads/2024/05/IPROTECT_App.png)
![Image showing different office locations that can benefit from multi-tenant feature with Access Control. Simplify user access and reduce operational complexities.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multi-Tenant-Office.png)
![Image showing the user leveraging the security and flexibility of Multi-Credentials. Choose from various access technologies for seamless access management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multi-Credentials.png)
![Image showing user optimizing facility management with Multilocations. Centralize control, share access keys, and enhance security across multiple sites.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multilocations.png)
![](https://tkhsecurity.com/wp-content/uploads/2023/08/Trails.png)
![Image representing the enhanced security surveillance that is on offer with Interactive Floorplans via customized reports, live monitoring, and interactive controls.](https://tkhsecurity.com/wp-content/uploads/2023/08/Interactive-Floorplans.png)
![Image showing TKH Rack handle connected to security critical area – A configurable access control system for data centers, production plants, and critical infrastructure.](https://tkhsecurity.com/wp-content/uploads/2023/08/TANlock-Rack-Handle.png)
![Image of key cabinets and readers that allow facility managers to efficiently manage mechanical keys for enhanced facility security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Deister-Key-Cabinet.png)
![Improve pager management with IPROTECT Pager Management System. Optimize pager usage and streamline operations.](https://tkhsecurity.com/wp-content/uploads/2023/08/Pager-Management-System.png)
![](https://tkhsecurity.com/wp-content/uploads/2023/08/Parking-Management.png)
![Image illustrating operators customizing functionalities for evolving threats with Threat Management Level for enhanced security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Threat-Management-Level.png)
![Image of operator leveraging Push Transaction Extended functionality which allows for customized event types and content for seamless integration.](https://tkhsecurity.com/wp-content/uploads/2023/08/Push-Transaction-Extended.png)
![Image of entrances and doors that can benefit from improved security with Anti Passback Functionality. Prevent unauthorized access and streamline facility management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Anti-Passback-Functionality.png)
![Image of operator monitoring security leveraging the Two Man Rule. Alarm system for verifying two-person requirement.](https://tkhsecurity.com/wp-content/uploads/2023/08/Two-Man-Rule.png)
![Image of user accessing an area of facility that employes Interlocking. Operators can leverage this secure access control method for controlled atmospheres and clean rooms.](https://tkhsecurity.com/wp-content/uploads/2023/08/Interlocking.png)
![Image of guard walking a pre-determined route with Guard Tour. Automate guard control rounds for efficient monitoring and swift response.](https://tkhsecurity.com/wp-content/uploads/2023/08/Guard-Tour.png)
![Image of premises movement. With Trails - Walk Route, operators can define routes, control access areas, and simplify operational management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Walk-Route.png)
Boon Edam
![Image depicting the case study of Boon Edam's office building modernization by TKH Security.](https://tkhsecurity.com/wp-content/uploads/2024/01/Case-Study_Boon-Edam.png)
Boon Edam leads the industry in providing high-quality revolving doors, high-security entrances, and speed gates to customers worldwide. As a third-generation Dutch family business, they take pride in their deep knowledge and unwavering dedication to this specialized market. They are now approaching their 150th birthday, a momentous occasion celebrating a rich history of growth, perseverance, and success.
The Challenge
To modernize the Boon Edam Head office with a secure cloud-based infrastructure, challenges centred around:
- Having a customized overview of all floors with layouts to provide immediate focus on event-related information.
- Transforming the way staff access doors, turnstiles and speed lanes by shifting from traditional access cards to a Mobile App.
- Having one supplier of software, Mobile App, cloud services, and hardware.
![Image showing the Boon Edam Head office building.](https://tkhsecurity.com/wp-content/uploads/2024/01/CS_photo_1.png)
A Tailored approach
Working alongside the client and our trusted installer partners at Giant Security B.V., we implemented:
- IPROTECT AC CLOUD – Our integrated solution for software, Mobile App, cloud services, and hardware, which reduces compatibility issues, streamlines operations, and fosters a cohesive technology ecosystem.
- Access / Mobile App – Used in conjunction with IPROTECT Cloud to setup the communication between mobile devices and card readers which turns mobile phones into a virtual access card. Our readers are integrated directly into Boon Edam entrance and security products, providing a smooth solution that works seamlessly with IPROTECT for enhanced access control.
- VDG SENSE Video Management System provides users with eventdriven macros that simplify trigger function setup for predefined events. This feature enhances system adaptability and efficiency, allowing users to easily customize responses to dynamic security situations.
![Image showing a reception area of Boon Edam.](https://tkhsecurity.com/wp-content/uploads/2024/01/CS_photo_2.png)
Floor Plans
Our Solutions
An intuitive interface within IPROTECT AC Cloud, Boon Edam can leverage:
- Personalized menus.
- Real-time event monitoring through cameras and card readers.
- Alarm system control.
- Customizable Reporting, providing valuable insights and data that align with the unique demands of their office.
![Image showing people passing through a door with integrated security solutions.](https://tkhsecurity.com/wp-content/uploads/2024/01/florplans.png)
The Outcome
- This facilitates rapid responses to security incidents, efficient officewide monitoring, and improved safety measures, enabling security personnel to swiftly address threats and safeguard occupants.
- When someone accesses the AC system, video footage is shown automatically. If an alarm triggers, operators can instantly view cameras in the IPROTECT AC interface.
Mobile App
Our Solutions
In line with our “mobile is key” principle, it features:
- Easy registration: Users receive an invitation email with a QR code, inviting them through IPROTECT to download the Mobile App and either start using it or register their organization.
- Flexibility: Per reader, users can customize their phone’s usage settings. This includes options such as requiring the phone to be unlocked prior to use, opening doors within a specified distance, or directly presenting the phone for specific tasks.
- Heightened security of the building because it uses PKI (Public Key Infrastructure).
![Image of speed gates that can be opened using IPROTECT Cloud Mobile App.](https://tkhsecurity.com/wp-content/uploads/2024/01/Mobile.png)
The Outcome
With TKH Security readers and Boon Edam entrance and security products, Moible App grants exclusive access to 200+ employees, eliminating the need for physical access cards, providing:
- Simplified entry process along with added security to the building.
- Improvement of overall operational efficiency at the office, reducing the risk of lost or stolen cards, and provides detailed access logs for better tracking and security management.
VDG SENSE Video Management
Our Solutions
Implemented as a server-based solution, our VMS ensures comprehensive and efficient video monitoring.
The Outcome
This installation has elevated staff safety and security, offering an impressive array of features that can be utilized by end-users, such as:
- Video Storage: For preserving client footage for evidence and analysis. It ensures that valuable video data is securely retained, enabling investigations and audits to take place effectively.
![Image showing individual walking through a speed gate with integrated security solutions.](https://tkhsecurity.com/wp-content/uploads/2024/01/security.png)
- Event-Driven Macros: Easy-to-use functions when pre-defined events occur and trigger actions.
- Prioritizing Important Files: Valuable for maintaining a historical record of security incidents. This ensures that essential information is preserved at the office and is easily accessible for compliance, legal, or security purposes.
Security in the Cloud
Our Solutions
Our private TKH Security Cloud enables the client to elevate their security environment, offering enhanced control and heightened measures.
The Outcome
- Availability: Ensuring that office applications and data are consistently accessible is crucial for maintaining productivity. Minimizing downtime risks, with the support of a dedicated Security Operations Center (SOC) in Amsterdam, helps to prevent disruptions and maintain smooth operations at Boon Edam.
![Image showing revolving doors with integrated security solutions.](https://tkhsecurity.com/wp-content/uploads/2024/01/Cloud.png)
-
Robust Security Features: Encryption, threat detection, and identity management are paramount for safeguarding sensitive information in the office environment. They provide strong defenses against cyber threats, protecting data and maintaining the integrity of operations.
-
Scalable Resources: The ability to scale resources quickly is important for adapting to changing demands within a global organization like Boon Edam. This scalability optimizes cost efficiency, ensuring that resources are allocated effectively to meet workload variations without unnecessary expenses or performance bottlenecks.
“For Boon Edam’s head office building, our vision was to combine premium security with convenience for their staff through a custom approach to office needs. The
result is that they now have the security in place to support daily office operations, with increased administrative efficiency, and a comprehensive security overview that enables them to promptly address issues.”