Security management center
Telecommunications companies tend to have a distributed infrastructure, often in different time zones. The Sigur architecture allows you to link all facilities into a single system, regardless of their geographic location, and advanced integration capabilities - include data from other security systems to it.
Sigur is integrated with dozens of common CCTV, security and fire alarm systems. The integrated solution allows you to monitor the situation at all branches of the company in more convenient way, as well as to respond more quickly to any incidents, which is especially important for companies with high security and risk resistance requirements.
Time & attendance
Sigur supports schedules of any complexity with various algorithms for calculating working hours, so for each of the groups of employees you can create a schedule that fully meets the specifics of its work. At facilities with a distributed structure, the system will automatically adjust the schedule and keep track of attendance, adjusted for the time zone in which the access point is located.
In addition to organizing access control at the entrance groups, you can always expand the system by equipping additional access points - these can be technical or server rooms, communication towers and even server cabinets.
For company guests or personnel of third-party organizations, you can provide for the issuance of temporary passes: bar-, pin-codes or organize identification by smartphone. All these identifiers can be issued centrally and delivered to the addressee via electronic communication channels.
Mobile terminalLearn more
Blance between identification convenience & security
Sigur supports any identification methods, including their combinations, as well as complex logics of access.
So, for example, at the entrance to offices, you can use face recognition as the most convenient method that does not require any additional actions from a person, and for interior rooms, use proximity cards or identification by smartphone.
In cases when a higher level of security is required, you can use a combination of methods: for example, card + face, card + PIN, and so on. Also, access to specially protected areas can be organized according to a more complex scheme: for example, an engineer can get into the server room only when accompanied by a security officer or only with his authorization.
Thus, it is possible to organize access control flexibly and in accordance with the level of security required by each specific zone or room.
Face recognition system
Facial recognition is already built into Sigur. To use it, you do not need any specific equipment: for most cases, almost any IP camera and an ordinary modern computer will do.Learn more