About ReconaSense

What is ReconaSense?

Intelligent Security Management and Access Control

What is unique about ReconaSense?

We are the traffic cop of security events for operators. Easy to work with and powerful.

What are your certifications?

Our patented solution meets and exceeds Government regulations for: FICAM, HSPD-12, FIPS 201, ICD705, UL1076, UL294, and FIPS 140-2.

Are you a PSIM?

No, that is a four letter word around our offices.

 

Simplifying and advancing integration capabilities is central to our risk-adaptive framework, but ReconaSense has very little in common with existing PSIM solutions other than we believe we accomplished and exceed what legacy PSIMS intended to provide end users (single pane of glass, complete visibility, open architecture) and channel partners with risk-adaptive access control and integrated security management capabilities. No code platforms, user-definable logic, software-definable templates, only simplicity.

What is FICAM?

The set of security disciplines that allows an organization to enable the right entity to access the right resource at the right time for the right reason. It is the tools, policies, and systems that allow an organization to manage, monitor, and secure access to protected resources. These resources may be electronic files, computer systems, or physical resources such as server rooms and buildings.

Why are SCIFs important?

Physical interactions with sensitive information can take place in many form factors and environments.

How do I save time with ReconaSense?

ReconaSense enables simple classification of access events, video alerts and device states by three simple values – High, Medium and Low. This can reduce investigation up to 40X. Many investigations into the intent behind a security alarm take around 45 minutes, while risk-adaptive systems programmatically classify alerts based on security policy in real-time, enabling operators to prioritize alarms and improve response times.

Customizing Your Product

Is ReconaSense customizable?

Yes, the screen is customizable to the operator and corporate policy with user-definable interfaces and user-definable acknowledgements.

The user interface is unique by each user with configured privileges for the appropriate operator segmentation.

What does risk-adaptive mean?

System programmatically adjusts the access control and security management policies to the most relevant based on user-definable criteria, such as risk environments, operational needs and security levels to ensure better security and business outcomes. Risk-Adaptivity is security triggers and procedures defined by people, places and “Trust Policy”.

How does risk-scoring work?

System programmatically assigns a logical indicator – numerical or categorical – to any singular or combination of device states, monitored events, personnel attributes, access requests, user actions, security level, operational status that represents the security risk that exists during a physical interaction or situation within a continuously monitored facility.

What is provisioning?

Linking and unlinking access permissions for a person or entity to a protected resource

What is a privileged user?

A user that is authorized (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform.

What programs and readers are you compatible with?

We can communicate with any biometric solution compatible with Wiegand or OSDP through the connectivity with Mercury controllers such as Idemia, Milestone, Verint, Aimetis, Zenitel, DMP,  Zero Eyes, Smarter Security Fastlane turnstiles, Dormakaba, Patriot One, Platformatics, Eagl, and NEDAP.

How does your weapons detection integration work?

We transform these signals into intelligent real-time emergency responses across your entire physical security ecosystem (access points, access groups, operator workstations, mobile clients, muster stations, building management systems, light management systems, mass notification, central monitoring clients, etc.)

 

Some examples include: Lockdown turnstiles across multiple entrances at a financial institution in central downtown of major metropolitan area if PatriotOne detected a weapon.

Does your company offer 24/7/365 technical support?

Yes, normal operating hours are Monday – Friday 8:00 am to 5:00 pm CST. Additional support options can be provided based on the systems users’ needs for additional support.

Tech Specs

How many facility codes can your system support at once?

ReconaSense can support 12 credential types simultaneously.

Is your system BLE/NFC Capable?

Our server can read transactions from any reader, regardless of technology. Our mobile apps do not depend on BLE/NFC capabilities, which mobile credential software will specify

Are you architected for the cloud?

Yes, we are server based for local network access and can support global cloud-based implementations.

Are you Mercury board based?

We are compatible with every series of Mercury, with the deepest integrations on the most recent Series 3 controllers.

Do you have an SDK for your software?

Yes, as well as web services and web sockets.

Does your system use single sign-on (SSO)?

Yes, and it can be integrated with end-user solutions.

Training, Licensing, & Partnership

How do I become a Value-Added Reseller (VAR)?

Reach out to schedule a meeting with our team to learn more about each other, and if a good fit, we can schedule either a 1.5 day or 3-day training session – virtually, at your facilities, or at our headquarters in Austin, Texas.

Where is training located?

User-definable. We offer three options: virtually, at your facilities, or at our headquarters in Austin, Texas.

How far in advance do I have to schedule training?

Training needs to be schedule 30 days out if virtual or in Austin and 60 days if travel is required.

How do I license your product for centralized management across multiple facilities?

  • Three main considerations to license ReconaSense software for enterprise-grade implementations:
    • Local Reader Count: How many credential readers per site?
    • Total Reader Count: How many credential readers in total across multiple sites?
    • Security-Level: What level of protection is best fit for current and future security requirements?
  • A few optional considerations include, but are not limited to:
    • Geospatial Monitoring
    • Onboarding Automation
    • FICAM Compliance

How do I license your product for standalone facilities?

  • Two main considerations to license ReconaSense software for a standalone implementation:
    • Local Reader Count: How many credential readers?
    • Security Level: What level of protection is best fit for current and future security requirements?
  • A few optional considerations include:
    • Cyber-hardened Hardware
    • Enclosure, Power Supply
    • FICAM Compliance