|Keep by Feenics™ provides the option of traditional on-site server deployment or fully cloud-based specification|
Feenics, Ottawa, Canada, will demonstrate the new Version 3 (V3) of the Keep by Feenics™ cloud-hosted access control and security management platform at ASIS 2016 in Orlando, September 12 -14, booth 2168.
Keep by Feenics™
Keep by Feenics™ is an award-winning platform that provides the option of traditional on-site server deployment or fully cloud-based specification, giving systems integrators and end users uncompromised choices for superior application flexibility. Keep simplifies the management of security, access control and other integrated technologies at the protected premises and is appropriate for vertical markets ranging from SMBs to national and global accounts.
Keep by Feenics V3 fosters increased scalability and provides an upgraded and enhanced user experience through a desktop executable native application specifically designed to provide ease of access to the software’s management platform. Along with seamless connectivity, V3 further enriches the user experience with a browser-agnostic configuration that support all web search engines. V3 also allows the user and systems integrator to control and manage multiple sites and locations from a single User Interface (UI). In addition, V3 offers increased capacity for access control readers, making Keep truly unlimited in scalability.
Keep presents a new value proposition in cloud hosting for physical security. It has been engineered to run without servers or appliances on site, lowering the total cost of ownership for the end user and eliminating costly refreshes of servers and hardware. In can also be installed on a local network, with minimal server requirements. In addition, Keep uses the industry’s most widely installed, non-proprietary field hardware by global access control leaders HID and Authentic Mercury Security and interfaces with wireless lock leaders ASSA ABLOY and Allegion.
In any configuration, Keep offers inherent cyber security, including two-factor authentication, TLS encrypted field hardware and a secure SSL connection.