SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Checkmarx acquires Tromzo: Leap in autonomous AppSec
    • HackerOne executive appointments: Accelerate CTEM growth
    • Wachter's Proto LUMA boosts retail innovation
    • G2E Asia Philippines: Top gaming trends & insights
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

Ava Security teams up with Feenics to offer security professionals and integrators an integrated security solution

23 Jun 2021

Ava Security teams up with Feenics to offer security professionals and integrators an integrated security solution
Contact company
Contact Ava Security
icon Add as a preferred source Download PDF version
Related Links
  • Physical access control: Critical steps to ensure a smarter future

Ava Security, a unified service provider of cybersecurity and video security, has teamed up with Feenics, a provider of forward-thinking Access Control-as-a-Service (ACaaS) solutions, to offer security professionals and integrators a modern, integrated security solution.

The Ava Aware Cloud™, intelligent video management system (VMS) is now available as part of the Keep by Feenics™ cloud-based access control platform, providing the simplicity, security, and power needed for proactive physical security. More security professionals are moving to cloud security for a better experience, with better outcomes.

Access control events

By enabling the 24/7 visual capture of access control events as they happen, Ava Security’s powerful AI analytics gives security professionals what they need to act: usable, precise data, delivered in real-time, whether from a video security stream, reader, or door sensor. This just isn’t possible with either video security or access control alone.

After an incident, fast forensic searches allow video security teams to find things faster

For instance, if a door is propped open or credential authorisation fails, the Aware Map view pops up, showing the name of the badge holder, the image on the credential, and the exact location in real-time. This is entirely different from simple alert. Plus, after an incident, fast forensic searches allow video security teams to find things faster and reduce the burden of manually reviewing massive amounts of footage.

Video security hardware

Feenics and Ava hold a shared vision that security technology should be open, secure, simple to deploy and scale, and remotely accessible.

  • Open - Organisations can keep the access control or video security hardware they’ve already invested in. Even existing cameras are accessible through the cloud to provide ubiquitous video coverage–what is needed for real-time proactive security. Plus, security professionals own the choice to mix and match the best technologies to suit their security and risk profile.
  • Secure - Both companies have placed the utmost priority on security given the risks of operating in a connected world. Whether at rest or in transit, Ava’s video surveillance solution is cyber-hardened with always-on end-to-end encryption and factory-installed certificates. It also provides audit trails of both operator and administrator action, which are automatically recorded to address the full spectrum of compliance requirements. Ava is ISO-certified. Keep by Feenics' data is also encrypted in transit and at rest, and the company is both ISO 9001-2015 certified and is an AWS certified-cloud practice.
  • Simple-to-scale - The solution is simple to deploy, manage and scale in the cloud, whether for a single door or multi-site enterprise.
  • Mobile - Security operators can get real-time alerts on any device, on any browser, from anywhere. Additionally, the Keep byFeenics access control system easily integrates with mobile credentials to provide a touchless entry experience.

Physical security scenarios

Brian Matthews, Director of Sales at Feenics, comments: “Modern, cloud-based security has arrived. Ava Security is the perfect partner for us to help organisations extend the value and power of their access control systems. Together, we’ve made it simpler to proactively secure buildings, doors, assets, and protect people.”

George Martinez, Director of Sales Engineering at Ava Security, comments: “Our partnership with Feenics alters the experience for security professionals and equips them to get far more from their security operations. With video security as the ‘eyes’ of the Feenics’ access control system, organisations can easily connect the dots between a security event and the ‘who’ and ‘where’. The result is the ability to respond quickly–even to physical security scenarios that were previously un-addressable with access control or video security alone.”

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Physical security
  • Industrial security
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security access systems
  • Asset tracking
  • Electronic access control
  • Network cameras
  • Door security
  • Covert Surveillance
  • Integration software
  • Event security
  • Cyber security
  • Video Management System
  • Data Security
  • Network Video Recorders
  • Digital Video Recorders
  • Cloud security
  • Mobile access
  • Video surveillance
  • Touchless Security
  • Related links
  • HID Access control software
  • Biometric Access control software
  • ANPR Software CCTV software
  • Infrared CCTV cameras
  • Access Control Software Access control software
  • Control Software CCTV software
  • Card Access control software
  • PCB CCTV cameras
  • Broadcast Messenger Access control software
  • Detection Software CCTV software
  • Thermal CCTV cameras
  • Wireless CCTV cameras
  • Proximity Access control software
  • Carpool Anti-passback Access control software
  • IP Surveillance Software CCTV software
  • Central Monitoring Option Access control software
  • Management Software CCTV software
  • Smart Card Access control software
  • Centrally managed access solution Access control software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • High Level Interface Access control software
  • Keypad Commands/Intrusion Zones Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • NetVue Interface to Nice Systems Access control software
  • NStar software upgrade Access control software
  • Remote software for telecode door entry phone system Access control software
  • Reporting Option Access control software
  • Server software for MSDE Access control software
  • Version Upgrade Access control software
  • Visitor Management tool Access control software
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control software
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec