SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique perspectives

Cortech Developments’ Datalog 5 software integrated with Access Control Technology’s ACTpro Enterprise software

Published on 20 Mar, 2017

ACT and Cortech are achieving interoperability that provides cause and effect across an unusually wide range of building systems through data merging
The partnership between Cortech and ACT will provide end users with an added value solution

Cortech Developments’ main software product, Datalog 5, now offers full integration with ACTpro Enterprise software designed by access control provider ACT.

Mitigating risk

The partnership between Cortech and ACT will provide end users with an added value solution that optimises security across large estates incorporating multiple sites and buildings.

Commenting on the integration, Jason Blundell, Head of Sales at Cortech Developments, said: “The ACT collaboration demonstrates how interoperable systems mitigate risk, provide sustainable cost reduction, improve efficiency and deliver greater situational awareness.”

ACT and Cortech are achieving interoperability that provides cause and effect across an unusually wide range of building systems through data merging.

Facility management

James Mc Alister of ACT said: “The alliance with Cortech is another example of constituent parts of facility management coming together. We’re committed to wide-ranging data solutions so working with a leading SMS provider was a logical step. ACT now offers a broader suite that can be used on complex and multiple sites.”

Both Cortech Developments and ACT operate across sectors including education, healthcare, retail, utilities, transportation and government with a particular focus on high-security environments and CNI. Cortech solutions are deployed in 27 countries and ACT exports to over 40 countries.

Download PDF Version

Follow us for latest editorial and commercial opportunities
People mentioned in this article

James Mc Alister
James Mc Alister
Jason Blundell
Jason Blundell


Please rate this article


Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition