Choose language
IPROTECT

Access Control Cloud System

Image of IPROTECT AC Cloud’s mobile entry method being leveraged.

Increasing your security and convenience by design

One technology partner that offers a seamlessly integrated solution for hardware, software, mobile app, and cloud services.

Plug & Play for seamless adaptation.

From medium to enterprise-sized facilities we can provide a tailored fit for your business needs.

What we offer

SaaS + Server maintenance

Keeping you secure, you’re free to focus on your business because we’ll take care of maintenance and system updates on an ongoing basis.

Configuration

Based on your needs, we prepare ready to plug & play systems whilst supporting you with our technical expertise.

A High Standard of Security and Compliance

  • Private TKH Security Cloud for better control and heightened security.
  • Data center in Amsterdam, NL/EU.
  • Your dedicated SOC provided by TKH Security.

Hardware

Giving you full ownership of our hardware such as readers and locks, these come as one-time buy products.

How it works

Main Values

Image showing how operators can use personalized GDPR menus & location-based login.
  • Users can have personalized menus that comply with GDPR rules and can also obtain login access rights based on their location.
  • Our system fully supports all combinations of electrical door locks, such as high-speed door gates, rolling grilles, turnstiles, and includes registration of the lock status.
  • Works independently as one system when using multiple main brands of offline and online door handles, cylinders, and card readers.
Efficiently manage multiple locations centrally. Prioritize alarms with interactive floor plans. Customize cockpit for event-driven insights. Seamlessly communicate in multiple languages.
  • Manage and control a large number of locations from one or more central locations (multi-site).
  • Based on your needs, you can define priority-based alarm handling including interactive floor plans.
  • Customize a cockpit to your business needs with automatic event-driven layouts highlighting relevant information instantly.
  • Multi-language capabilities within one system allow you to seamlessly communicate internally, without barriers.
Image showing operator utilizing the end-to-end security measures of IPROTECT Access Control System.
  • End-to-end security – Protect your data against any cyberattacks with encrypted communication.
  • Possibility to check and install daily updated security patches.
  • Manage and update your hardware with the latest software versions automatically.
  • We use open standards and community software to provide a consistently secure environment. PEN-tested according to OWASP method.
Image showing how users can operate IPROTECT Access Control System for Adaptable, User-Focused, Secure Solutions by TKH Security.
  • Several possibilities for your reporting and data purposes.
  • You can create a pre-selection report which can be executed directly from IPROTECT Cloud, e.g., Interactive floorplan.
  • Create your own dashboard.
  • Fully aligned with the GDPR.

Videos

Main Functionalities

Control Center

With events that can occur as a one-off, or simultaneously, it’s crucial to have an overview of what is happening and where.

The Solution

Alarm procedures are tailored to your individual needs, allowing you to assign a priority characteristic and follow-up action through a pop-up screen on the administrator’s workstation. Supported by an interactive floorplan and camera images, you can see ‘live’ what is going on and where whilst saving and reviewing these images afterward.

How can a Control Center functionality benefit my facility?

  • Alarm distribution: Option of different types of alarm procedures: security alarm, technical alarm, general alarm.
  • Alarm actions: You can set which actions you want to combine, for example:
    • Emergency response card authorization.
    • Burglar alarm camera preferences & automatic door locking.
    • Description prompt when alarm activated for situation overview.
    • The guard knows exactly which action(s) must be performed before the alarm can be reset.
Icon arrow down
Image showing control center functionality which offers tailored alarm procedures for efficient incident management along with monitored live events and interactive floorplans for optimized security.

Offline, Online Access

Facilities require high-speed access to multiple passages, while also requiring locking mechanisms for less frequently used areas with different access needs.

The Solution

Offline and Online Access locks cater to both scenarios in a facility, providing online access card readers for frequent use and offline electronic door locks with integrated readers and batteries for infrequent use, eliminating the need for cabling.

Why use Offline, Online Access?

  • Provides heightened security in both online and offline areas through authorized and updatable access cards.
  • Users do not have to differentiate between presenting their access card on an online or offline card reader.
  • Combining online and offline card readers creates a secure and flexible closing plan.
  • Access cards provide information on the status of offline electronic locks.
Icon arrow down
Image representing heightened facility security with Offline and Online Access locks.

Mobile App

IPROTECT Cloud follows the core principle of “mobile is key” by supporting mobile devices. This applies to both using and creating/assigning rights to locks and individuals.

Access management

Access management to a building:

  • One Mobile App for our online readers and DOM locks for Android and iOS.
  • Simplification of card handling process for access control systems which unburdens system administrators and end-users in both an operational and logistical way.
  • No physical card management needed for mobile devices.
  • Data on mobile – Access rights and events are sent directly to or from the mobile device.
  • Heightened security of the building with your mobile as a key.

 

Setup and update management

Setup and update management of hardware such as locks and readers:

  • Use Mobile App to update locks.
  • Possibility to seamlessly switch from offline to online locks in order to update them.

 

How it works

Mobile devices are part of our everyday lives, delivering convenient solutions to fit in with our movements and actions.

The Solution

Our app links with IPROTECT Cloud, turning your phone into a key using:

  • Scan&Go – allows users to open doors by holding their device within range of the reader.
  • Select&Go – The system shows nearby readers and pressing the selected reader’s button opens the door.
  • Background Mode – allows access without unlocking the device or opening the app.

 

How can Mobile App benefit my facility?

  • Easy registration – End-users are invited through IPROTECT to the system where they will receive an invitation email with a QR code to download the Mobile App and register their organization.
  • Flexibility – Per reader, users can customize their phone’s usage settings. This includes options such as requiring the phone to be unlocked prior to use, opening doors within a specified distance, or directly presenting the phone for specific tasks.
  • Our app is multilanguage supported on Android and iOS.
  • Storing multiple organizations – Supports multiple organizations, allowing for easier access to facilities for tenants or visitors traveling between different organizations.
Icon arrow down
Image showing user leveraging IPROTECT's Mobile App for seamless facility entry. Simplify access management, setup, and update with seamless integration.

Multi-Tenant Office

Managing access to individual office spaces or floors in a multi-tenant building can be challenging, particularly when multiple users are involved.

The Solution

Access Control helps property owners manage access for their tenants in a flexible and friendly way. Through distributed rights each tenant has the possibility to manage their visitors through this GDPR compliant system.

Why use Multi-Tenant solutions in my facility?

It allows you to:

  • Streamline the process of access for users that run their own offices within the facility.
  • Cut back on the complexity of trying to run a facility that caters to multiple different daily needs.
Icon arrow down
Image showing different office locations that can benefit from multi-tenant feature with Access Control. Simplify user access and reduce operational complexities.

Multi-Credentials

Multi-tenant buildings need to accommodate varying access credential preferences for tenants and visitors without the need to switch to a new type of ID or credential.

The Solution

Multi-Credentials enables secure and flexible access for visitors and employees of different companies using various technologies such as QR codes, biometrics, mobile cards, MIFARE DESfire cards, and Bluetooth. The process for creating or deleting access in IPROTECT Cloud is the same, regardless of the credential used.

How can my facility benefit from Multi-Credentials?

  • Provides tenants with flexibility and ease of choosing preferred access credentials.
  • Enhances security and strengthens the entrance process.
  • Enables granting, changing, or restricting access through Multi-Credentials when necessary.
Icon arrow down
Image showing the user leveraging the security and flexibility of Multi-Credentials. Choose from various access technologies for seamless access management.

Multilocations

Efficiently managing large facilities involves combining information from multiple systems, allowing you to optimize cost savings by overseeing various locations from a single control center.

The Solution

A single central coordinating server allows a system operator to manage multiple systems through a unified user interface, providing a comprehensive overview of ongoing situations through alarms, events, and interactive floorplans.

Why Multilocations?

Along with a better overview of security operations, you can:

  • Share access keys between multiple servers for efficient access control.
  • Combine multi-site functionality with server synchronization.
  • Save time whilst stepping up the security of your facilities.
  • Save money and spread risks.
Icon arrow down
Image showing user optimizing facility management with Multilocations. Centralize control, share access keys, and enhance security across multiple sites.

Trails – Authorization of User Group and PC Settings

Developing a system to dynamically assign user rights based on the workstation’s location is a common pain point.

The Solution

Our system adjusts user rights based on workstation and login locations, enabling control, accommodating employees in multiple locations or departments, and enhancing security measures.

Why do I need location restrictions?

  • Tailor menu rights by assigning them based on the location and type of workstation.
  • Login restriction (option) with person present in area to login.
Icon arrow down

Interactive Floorplans

How do you monitor security in an efficient way when it comes to one, or multiple facilities?

The Solution

Floorplans is an interactive platform that seamlessly integrates crucial daily use activities that can be tailored for each type of user with a number of possible options such as:

  • Opening a predefined report.
  • Live control and management of objects such as cameras and card readers.
  • Area counters that help manage parking lot numbers.
  • Opening a menu item.
  • Viewing historical events of an object.
  • Showing objects with a definable deviation.

 

Why Floorplans for my facility?

  • Personalized menu and reporting.
  • Monitor latest events.
  • Interactive object (icons) with status.
  • Arm/disarm your facilities alarm system.
  • Adjust card reader status for example: Open/Closed/Automatic.
Icon arrow down
Image representing the enhanced security surveillance that is on offer with Interactive Floorplans via customized reports, live monitoring, and interactive controls.

TKH Rack Handle

TKH Rack Handle offers an advanced electromechanical locking system specifically tailored for all areas which need to be secured such as data centers,  or in your critical infrastructure.

The Solution

Managed by IPROTECT’s integration, it offers protection to sensitive equipment through enhanced security features – with all the benefits of a wired card reader.

Features

  • Full integrated provisioning of rack handle settings, firmware, and keystore.
  • Secure connection.
  • Log events from the rack handle in IPROTECT including images of those accessing racks thanks to our Video Management System Integration – VDG SENSE.
  • Local stored cards for calamity openings by lost network connection.
  • Support of handle locked and door position input.
  • Intrusion detection protecting the doors of the racks.
  • Remote opening.
  • Manage different access rights within one server room for different companies and server cabinets.
  • Additional authentication with PIN code support.
  • Support of FQDN (Full Qualified Domain Name).
Icon arrow down
Image showing TKH Rack handle connected to security critical area – A configurable access control system for data centers, production plants, and critical infrastructure.

Key Cabinet

In a multitude of environments and sectors, efficient key management for facility managers is essential, from universities and prisons, to corporations, hospitals, and more – where traditional methods often lack accountability.

The Solution

A key cabinet is a lockable cabinet containing individual RFID keyTags that can be provided with one or more physical keys, with access managed by presenting an access card to a connected reader – managed and controlled by our IPROTECT AC system.

Features

  • Alarm Notification: The system sends a notification when a keyTag is not returned in time, preventing unauthorized access and reinforcing security protocols.
  • Track Whereabouts: Provides an overview of the removal and reinsertion of keyTags, including person information and time stamps.
  • Access Control Integration: Prevent people from leaving a certain area if they still possess keyTags – all linked to the corresponding card number.
  • Keymap Functionality: IPROTECT’s intuitive keymap feature offers an overview of the cabinet, providing instant status updates on keyTag availability.

 

User Management: IPROTECT simplifies user categorization into Administration or Daily User roles, facilitating control over access rights and time zone settings for keyTag usage.

Icon arrow down
Image of key cabinets and readers that allow facility managers to efficiently manage mechanical keys for enhanced facility security.

Pager Management System

Effectiveness is important to prevent many ‘expensive’ pagers from remaining unused in the charging station.

The Solution

By presenting an access card, an available pager is loaded with the user’s profile.

Why do I need IPROTECT to manage my Pager Management System?

  • The number of pagers in use is optimized as much as possible.
  • Pager number and profile managed by IPROTECT.
  • Pager requests logged in IPROTECT.
Icon arrow down
Improve pager management with IPROTECT Pager Management System. Optimize pager usage and streamline operations.

Parking Management

Tracking resident and visitor entrants in shared parking areas enhances the efficiency of multi-tenant premises.

The Solution

This functionality allows operators to define the number of spaces for vehicles, carefully allocated for each business within your premises.

Why use Parking Management for my facility?

  • Define quota or ‘blocks’ of spaces to registered visitors using passes.
  • Count the number of vehicles currently parked using entry and exit tracking.
  • Reject tenant parking when max allocation has been reached.
  • Switch parking lots between tenants and implement a streamlined end-of-month billing system for convenience and flexibility.
Icon arrow down

Threat Management Level

Situations change daily and the threat management level of your facility needs to be appropriately set for different times.

The Solution

With Threat Management Level, functionalities can be adjusted when the situation is appropriate.
For example:

  • Whether or not to use a pin code.
  • Changing normal access to remote access through the intervention of a control room (video verification).
  • Being able to block certain groups of people, for example, visitors.

 

Why do I need to consider the Threat Management Level of my facility?

Facilities can have a systematic and controlled approach to stay on top of potential threats in many different forms, requiring constant monitoring.

Icon arrow down
Image illustrating operators customizing functionalities for evolving threats with Threat Management Level for enhanced security.

Push Transaction Extended

Send events to another system, with options to customize the event type and content.

The Solution

With the JSON push transaction webservice it is possible to send IPROTECT transactions in JSON format to an external system like an “Elastic Stack”. It is possible to specify precisely which transactions are sent and what data is added.

What is the benefit of Push transaction?

  • By defining the event types and their relevant data to be sent, only necessary information is stored.
  • End user is independent in choosing database type for storage events.
  • End user is independent when making a choice of type of tooling for making overviews/reports.
Icon arrow down
Image of operator leveraging Push Transaction Extended functionality which allows for customized event types and content for seamless integration.

Anti Passback Functionality

Leaving or returning to an area can pose security issues, such as visitors sharing passes, users attempting re-entry, and exceeding time limits.

The Solution

IPROTECT Cloud streamlines facility management by offering different security features for access control.

How does it work?

  • APB: Refuses access when a person tries to enter an area (door) when the registered person is already inside.
  • TAPB: Access is denied when a person tries to enter an area again within a certain time.
  • TAPB Reversed: Access is denied when a person exceeds a time limit in a location making leaving the area not possible.
Icon arrow down
Image of entrances and doors that can benefit from improved security with Anti Passback Functionality. Prevent unauthorized access and streamline facility management.

Two Man Rule

The two-man rule is a solution designed to achieve a high level of security for operations and actions that require two or more authorized persons at all times.

The Solution

An alarm will sound if the two-person requirement is not met, either due to unaccompanied visitors or insufficient personnel in the area.

Why consider a Two Man Rule?

  • Within a facility, different areas can have different authorization levels.
  • In some areas, two authorized persons must always be present.
  • Certain visitors must be accompanied by authorized persons when they want to enter the area.
Icon arrow down
Image of operator monitoring security leveraging the Two Man Rule. Alarm system for verifying two-person requirement.

Interlocking

A secure, productive, and efficient method for opening and closing doors is critical for your facility’s controlled atmosphere, clean rooms, or heightened security solution.

The Solution

Interlocking is a highly effective security measure that ensures only one of multiple doors is open at a time. It provides secure access control and sends a ‘wait’ signal, allowing the door to be opened only when the other one is closed.

Why Interlocking for my facility?

  • Secure and controlled access to areas.
  • Controlled conditions when operating with atmospheric challenges.
  • Detection and identification in secure areas.
  • Preventing tailgating of unauthorized visitors.
Icon arrow down
Image of user accessing an area of facility that employes Interlocking. Operators can leverage this secure access control method for controlled atmospheres and clean rooms.

Guard Tour

The importance of guard control rounds cannot be understated for building security, especially in security-sensitive areas where proper planning of rounds and routes is crucial.

The Solution

Guard Tour allows guards to walk pre-determined control rounds within a certain time during their shift with multiple predefined routes that can be set to your facility preferences.

What benefit will Guard Tour bring to my business?

  • Register reporting point times via card readers, with minimum and maximum times.
  • Receive automatic alarms for deviations, prompting swift action.
  • Efficiently monitor predetermined areas with heightened awareness.
Icon arrow down
Image of guard walking a pre-determined route with Guard Tour. Automate guard control rounds for efficient monitoring and swift response.

Trails – Walk Route

In monitored premises, tracking and controlling every movement is impossible. Yet, knowing the movements and routes of visitors and employees is essential.

The Solution

Walk Route allows a person to walk from A to B while the system checks if they follow the specified walking route within a certain time. The system will sound an alarm if there are any deviations.

Why do I need Walk Route?

  • Define a route for visitors/employees.
  • Strict control over access areas.
  • With one button, you can pause all walking routes, simplifying operational management.
Icon arrow down
Image of premises movement. With Trails - Walk Route, operators can define routes, control access areas, and simplify operational management.
Case Study

Boon Edam

Image depicting the case study of Boon Edam's office building modernization by TKH Security.

Boon Edam leads the industry in providing high-quality revolving doors, high-security entrances, and speed gates to customers worldwide. As a third-generation Dutch family business, they take pride in their deep knowledge and unwavering dedication to this specialized market. They are now approaching their 150th birthday, a momentous occasion celebrating a rich history of growth, perseverance, and success.

The Challenge

To modernize the Boon Edam Head office with a secure cloud-based infrastructure, challenges centred around:

  • Having a customized overview of all floors with layouts to provide immediate focus on event-related information.
  • Transforming the way staff access doors, turnstiles and speed lanes by shifting from traditional access cards to a Mobile App.
  • Having one supplier of software, Mobile App, cloud services, and hardware.
Image showing the Boon Edam Head office building.

A Tailored approach

Working alongside the client and our trusted installer partners at Giant Security B.V., we implemented:

  • IPROTECT AC CLOUD – Our integrated solution for software, Mobile App, cloud services, and hardware, which reduces compatibility issues, streamlines operations, and fosters a cohesive technology ecosystem.
  • Access / Mobile App – Used in conjunction with IPROTECT Cloud to setup the communication between mobile devices and card readers which turns mobile phones into a virtual access card. Our readers are integrated directly into Boon Edam entrance and security products, providing a smooth solution that works seamlessly with IPROTECT for enhanced access control.
  • VDG SENSE Video Management System provides users with eventdriven macros that simplify trigger function setup for predefined events. This feature enhances system adaptability and efficiency, allowing users to easily customize responses to dynamic security situations.
Image showing a reception area of Boon Edam.

Floor Plans

Our Solutions

An intuitive interface within IPROTECT AC Cloud, Boon Edam can leverage:

  • Personalized menus.
  • Real-time event monitoring through cameras and card readers.
  • Alarm system control.
  • Customizable Reporting, providing valuable insights and data that align with the unique demands of their office.
Image showing people passing through a door with integrated security solutions.

The Outcome

  • This facilitates rapid responses to security incidents, efficient officewide monitoring, and improved safety measures, enabling security personnel to swiftly address threats and safeguard occupants.
  • When someone accesses the AC system, video footage is shown automatically. If an alarm triggers, operators can instantly view cameras in the IPROTECT AC interface.

Mobile App

Our Solutions

In line with our “mobile is key” principle, it features:

  • Easy registration: Users receive an invitation email with a QR code, inviting them through IPROTECT to download the Mobile App and either start using it or register their organization.
  • Flexibility: Per reader, users can customize their phone’s usage settings. This includes options such as requiring the phone to be unlocked prior to use, opening doors within a specified distance, or directly presenting the phone for specific tasks.
  • Heightened security of the building because it uses PKI (Public Key Infrastructure).
Image of speed gates that can be opened using IPROTECT Cloud Mobile App.

The Outcome

With TKH Security readers and Boon Edam entrance and security products, Moible App grants exclusive access to 200+ employees, eliminating the need for physical access cards, providing:

  • Simplified entry process along with added security to the building.
  • Improvement of overall operational efficiency at the office, reducing the risk of lost or stolen cards, and provides detailed access logs for better tracking and security management.

VDG SENSE Video Management

Our Solutions

Implemented as a server-based solution, our VMS ensures comprehensive and efficient video monitoring.

 

The Outcome

This installation has elevated staff safety and security, offering an impressive array of features that can be utilized by end-users, such as:

  • Video Storage: For preserving client footage for evidence and analysis. It ensures that valuable video data is securely retained, enabling investigations and audits to take place effectively.
Image showing individual walking through a speed gate with integrated security solutions.
  • Event-Driven Macros: Easy-to-use functions when pre-defined events occur and trigger actions.
  • Prioritizing Important Files: Valuable for maintaining a historical record of security incidents. This ensures that essential information is preserved at the office and is easily accessible for compliance, legal, or security purposes.

Security in the Cloud

Our Solutions

Our private TKH Security Cloud enables the client to elevate their security environment, offering enhanced control and heightened measures.

 

The Outcome

  • Availability: Ensuring that office applications and data are consistently accessible is crucial for maintaining productivity. Minimizing downtime risks, with the support of a dedicated Security Operations Center (SOC) in Amsterdam, helps to prevent disruptions and maintain smooth operations at Boon Edam.
Image showing revolving doors with integrated security solutions.
  • Robust Security Features: Encryption, threat detection, and identity management are paramount for safeguarding sensitive information in the office environment. They provide strong defenses against cyber threats, protecting data and maintaining the integrity of operations.

  • Scalable Resources: The ability to scale resources quickly is important for adapting to changing demands within a global organization like Boon Edam. This scalability optimizes cost efficiency, ensuring that resources are allocated effectively to meet workload variations without unnecessary expenses or performance bottlenecks.

Icon quote

Sander Zonneveld

Regional Account Manager, TKH Security

“For Boon Edam’s head office building, our vision was to combine premium security with convenience for their staff through a custom approach to office needs. The
result is that they now have the security in place to support daily office operations, with increased administrative efficiency, and a comprehensive security overview that enables them to promptly address issues.”

Do you want to know more about our

Access Control Cloud System