Access Control System
![Image showing seamless access solutions from IPROTECT Access Control System](https://tkhsecurity.com/wp-content/uploads/2023/08/IPROTECT_Access_Control_Hero.png)
With over 25 years of experience, TKH Security is one of the leading companies in the access control field. The Access Control System is suitable for on-site implementation but also for multi-site and multi-tenant solutions. From simple access control to specific security solutions, TKH Security can provide a tailored fit for your business needs.
Main Values
![Image showing how operators can use personalized GDPR menus & location-based login.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_Adaptable-1.png)
- Users can have personalized menus that comply with GDPR rules and can also obtain login access rights based on their location.
- Our system fully supports all combinations of electrical door locks, such as high-speed door gates, rolling grilles, turnstiles, and includes registration of the lock status.
- Works independently as one system when using multiple main brands of offline and online door handles, cylinders, and card readers.
![Efficiently manage multiple locations centrally. Prioritize alarms with interactive floor plans. Customize cockpit for event-driven insights. Seamlessly communicate in multiple languages.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_UX.png)
- Manage and control a large number of locations from one or more central locations (multi-site).
- Based on your needs, you can define priority-based alarm handling including interactive floor plans.
- Customize a cockpit to your business needs with automatic event-driven layouts highlighting relevant information instantly.
- Multi-language capabilities within one system allow you to seamlessly communicate internally, without barriers.
![Image showing operator utilizing the end-to-end security measures of IPROTECT Access Control System.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_A-High-Standard-of-Security.png)
- End-to-end security – Protect your data against any cyberattacks with encrypted communication.
- Possibility to check and install daily updated security patches.
- Manage and update your hardware with the latest software versions automatically.
- We use open standards and community software to provide a consistently secure environment. PEN-tested according to OWASP method.
![Image showing how users can operate IPROTECT Access Control System for Adaptable, User-Focused, Secure Solutions by TKH Security.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_IPROTECT_Access_Contreol_Raporting.png)
- Several possibilities for your reporting and data purposes.
- You can create a pre-selection report which can be executed directly from IPROTECT Cloud, e.g., Interactive floorplan.
- Create your own dashboard.
- Fully aligned with the GDPR.
Videos
![](https://tkhsecurity.com/wp-content/uploads/2024/05/IPROTECT-AC.png)
Main Functionalities
![Image showing control center functionality which offers tailored alarm procedures for efficient incident management along with monitored live events and interactive floorplans for optimized security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Control-Center.png)
![Image representing heightened facility security with Offline and Online Access locks.](https://tkhsecurity.com/wp-content/uploads/2023/08/Offline-Online-Access.png)
![Image showing user leveraging IPROTECT's Mobile App for seamless facility entry. Simplify access management, setup, and update with seamless integration.](https://tkhsecurity.com/wp-content/uploads/2024/05/IPROTECT_App.png)
![Image showing different office locations that can benefit from multi-tenant feature with Access Control. Simplify user access and reduce operational complexities.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multi-Tenant-Office.png)
![Image showing the user leveraging the security and flexibility of Multi-Credentials. Choose from various access technologies for seamless access management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multi-Credentials.png)
![Image showing user optimizing facility management with Multilocations. Centralize control, share access keys, and enhance security across multiple sites.](https://tkhsecurity.com/wp-content/uploads/2023/08/Multilocations.png)
![](https://tkhsecurity.com/wp-content/uploads/2023/08/Trails.png)
![Image representing the enhanced security surveillance that is on offer with Interactive Floorplans via customized reports, live monitoring, and interactive controls.](https://tkhsecurity.com/wp-content/uploads/2023/08/Interactive-Floorplans.png)
![Image showing TKH Rack handle connected to security critical area – A configurable access control system for data centers, production plants, and critical infrastructure.](https://tkhsecurity.com/wp-content/uploads/2023/08/TANlock-Rack-Handle.png)
![Image of key cabinets and readers that allow facility managers to efficiently manage mechanical keys for enhanced facility security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Deister-Key-Cabinet.png)
![Improve pager management with IPROTECT Pager Management System. Optimize pager usage and streamline operations.](https://tkhsecurity.com/wp-content/uploads/2023/08/Pager-Management-System.png)
![](https://tkhsecurity.com/wp-content/uploads/2023/08/Parking-Management.png)
![Image illustrating operators customizing functionalities for evolving threats with Threat Management Level for enhanced security.](https://tkhsecurity.com/wp-content/uploads/2023/08/Threat-Management-Level.png)
![Image of operator leveraging Push Transaction Extended functionality which allows for customized event types and content for seamless integration.](https://tkhsecurity.com/wp-content/uploads/2023/08/Push-Transaction-Extended.png)
![Image of entrances and doors that can benefit from improved security with Anti Passback Functionality. Prevent unauthorized access and streamline facility management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Anti-Passback-Functionality.png)
![Image of operator monitoring security leveraging the Two Man Rule. Alarm system for verifying two-person requirement.](https://tkhsecurity.com/wp-content/uploads/2023/08/Two-Man-Rule.png)
![Image of user accessing an area of facility that employes Interlocking. Operators can leverage this secure access control method for controlled atmospheres and clean rooms.](https://tkhsecurity.com/wp-content/uploads/2023/08/Interlocking.png)
![Image of guard walking a pre-determined route with Guard Tour. Automate guard control rounds for efficient monitoring and swift response.](https://tkhsecurity.com/wp-content/uploads/2023/08/Guard-Tour.png)
![Image of premises movement. With Trails - Walk Route, operators can define routes, control access areas, and simplify operational management.](https://tkhsecurity.com/wp-content/uploads/2023/08/Walk-Route.png)
VodafoneZiggo
![Image of facility employee.](https://tkhsecurity.com/wp-content/uploads/2023/08/CS_hero_VodafoneZiggo.png)
VodafoneZiggo is a leading Dutch company that supplies landline, mobile and integrated communications and entertainment services to consumers and businesses.
The Challenge
- To manage the access control for 650+ facilities with automatic arming/disarming functionalities.
- Implementation of an integrated intrusion system using camera surveillance (Access Control).
- Providing controlled process access requests via a service ticket app to optimally protect unmanned locations.
![Learn about the challenges of managing access control for 650+ facilities and implementing integrated intrusion systems.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_VodafoneZiggo_The-Challenge.png)
The Outcome
- Implementation of our Access Control Management System in 500+ locations and growing.
- Heightened security measures in place for intrusion detection based on real-time information.
- Increasing entry security with Automatic HUB Access across sites giving dedicated access to allocated engineers.
![Discover the outcomes of implementing an Access Control Management System in 500+ locations and enhancing entry security.](https://tkhsecurity.com/wp-content/uploads/2023/08/2_VodafoneZiggo_The-Outcome.png)
The Solution
Working closely with VodafoneZiggo, TKH Security were able to deliver seamless security management functionalities.
Dedicated access
To a defined location per each engineer using our Anti Passback functionality which is now in place and tackles facility issues that arise when leaving and returning to a secure area that needs to be accessed by engineers.
Multi-system & location management
Via our Multilocation functionality, which works as one system with one control center for 500+ locations. With online access control, a TKH Security system operator can manage multiple systems through the user interface of one central coordinating server.
With alarms, events, and maps receivable on the operator console of the central system, end-users will have a comprehensive overview of all occurring situations. Combining multi-site functionality with server synchronization, VodafoneZiggo can now spread risks and save time whilst stepping up the security at their facilities.
Integrated workflow with a ticket system
Critical tech rooms can now only be accessed once a web application ticket has been accepted, giving access to a specific location via IPROTECT, a functionality that was customized to a special security procedure by VodafoneZiggo. If an engineer has no ticket to a technical room, the Vodafone engineer can send a request to an operator who can then decide whether to grant access.
“TKH Security’s knowledge of our situation with unmanned locations stood out in this implementation, and it allowed them to put in place a range of tailored functionalities that we needed for over 650 locations.
With our main challenges concerning access management and the need for an integrated intrusion system, TKH Security managed to cover the areas needed to heighten our security procedures and convenience.”