Log in
RU  KZ 

Solution for telecom companies

Solution for my project
Any distribution support
Any distribution support
Link all branches, regardless of their geographic location, into a single system and to manage its elements or monitor events.
Multipurpose security system
Multipurpose security system
Any identification methods and access rules, ready-made integrations with dozens of video surveillance systems, fire alarm systems, alcohol testing devices and other systems
Access control to server cabinets
Access control to server cabinets
Differentiation of time and access rights to telecommunications equipment, complex access logics, event logging and reporting
Integration with IT-infrastructure
Integration with IT-infrastructure
Out-of-the-box tools for interacting with corporate systems: synchronization of employee data, delegation of access decisions or blocking of accounts in Active Directory when an employee is not at work
Registration of passes anywhere
Registration of passes anywhere
With the help of a mobile terminal, you can mark employees where there is no ordinary access point at all - for example, at remote towers and other telecommunications infrastructure facilities
Remote issuance of identifiers
Remote issuance of identifiers
Use barcodes, PIN codes or smartphone identification to remotely issue temporary passes to guests of any of the company's branches.

Security management center

Telecommunications companies tend to have a distributed infrastructure, often in different time zones. The Sigur architecture allows you to link all facilities into a single system, regardless of their geographic location, and advanced integration capabilities - include data from other security systems to it.

As a result, this makes it possible to make the ACS a security control center for all facilities of the company and reduce the costs associated with monitoring security and administering systems, as well as manage the system from one center - for example, the company's head office.

Multipurpose solution

Sigur is integrated with dozens of common CCTV, security and fire alarm systems. The integrated solution allows you to monitor the situation at all branches of the company in more convenient way, as well as to respond more quickly to any incidents, which is especially important for companies with high security and risk resistance requirements.

Also you can configure various automatic reactions of one of the systems to events in the other: for example, Sigur automatically unlocks doors and turnstiles for evacuation in the case of a fire alarm.

Time & attendance

Sigur supports schedules of any complexity with various algorithms for calculating working hours, so for each of the groups of employees you can create a schedule that fully meets the specifics of its work. At facilities with a distributed structure, the system will automatically adjust the schedule and keep track of attendance, adjusted for the time zone in which the access point is located.

In addition to organizing access control at the entrance groups, you can always expand the system by equipping additional access points - these can be technical or server rooms, communication towers and even server cabinets.

For company guests or personnel of third-party organizations, you can provide for the issuance of temporary passes: bar-, pin-codes or organize identification by smartphone. All these identifiers can be issued centrally and delivered to the addressee via electronic communication channels.

Mobile terminal

For those cases where it is impossible to organize a classical access point, you can use the Sigur mobile terminal. This is an application for a smartphone or tablet running Android, which will allow you to mark the arrival and departure of an employee even at the most remote infrastructure facilities, or keep track of the expiration dates of the card and training.

Learn more

Blance between identification convenience & security

Sigur supports any identification methods, including their combinations, as well as complex logics of access.

So, for example, at the entrance to offices, you can use face recognition as the most convenient method that does not require any additional actions from a person, and for interior rooms, use proximity cards or identification by smartphone.

In cases when a higher level of security is required, you can use a combination of methods: for example, card + face, card + PIN, and so on. Also, access to specially protected areas can be organized according to a more complex scheme: for example, an engineer can get into the server room only when accompanied by a security officer or only with his authorization.

Thus, it is possible to organize access control flexibly and in accordance with the level of security required by each specific zone or room.

Face recognition system

Facial recognition is already built into Sigur. To use it, you do not need any specific equipment: for most cases, almost any IP camera and an ordinary modern computer will do.

Learn more