Check out our special report on Artificial Intelligence
G4Tec Releases its New Version 5.0 Access Control and Security Management Software
Product Profile
The new version 5.0 software improves on Group 4 Technology’s already easy-to-use interface with new graphical calendars, system-wide time code visualizations, and real-time, on-screen alarm statistics.
Version 5 offers a new optional upgrade module, Threat Level ManagerTM. This module enables one-touch total system reconfiguration. Five fully customizable security configurations range from green (low) to red (high). Threat Level Manager prevents inconvenience during low threat times, and keeps staff on alert during high threat periods. Threat Level Manager is perfect for holidays when users want to make many configuration changes.
Version 5 revised and improved the Visitor Management System. Users can pre-enroll visitors to save time and populate up to 50 fields of visitor data. The visitor management system can operate as a standard client or as a web client using existing Intranet/Internet Communications. Define visitor’s access level, capture photos and print visitor badges. Assign visitors to authorized employees if you choose the option to make visitor assignments mandatory.
More new features include:
- Predefined commands allow specific commands to be created and added to maps for use by security guards and others with limited system access rights.
- Transaction processing system replaced with Microsoft Message Queue to improve performance of 5000 plus card reader systems.
- Real time alarm filter and on-screen alarm statistics provide immediate data to make instant decisions.
- Link cardholder record to the alarms and current activity screens.
Technical Specification
| Make | G4Tec |
|---|---|
| Manufacturer | G4Tec |
| Category | Access Control>Access control software |
| Model code | multiMAX |
| Additional info | The Security Management software provides standard features like alarm management, controlling access, database management, badge designing, visitor management, system security, antipassback management, biometric recognition and hardware integration. Additional features are provided in the form of management modules, which are available separately. |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download