Intelligent Security Management and Access Control
We are the traffic cop of security events for operators. Easy to work with and powerful.
Our patented solution meets and exceeds Government regulations for: FICAM, HSPD-12, FIPS 201, ICD705, UL1076, UL294, and FIPS 140-2.
No, that is a four letter word around our offices.
Simplifying and advancing integration capabilities is central to our risk-adaptive framework, but ReconaSense has very little in common with existing PSIM solutions other than we believe we accomplished and exceed what legacy PSIMS intended to provide end users (single pane of glass, complete visibility, open architecture) and channel partners with risk-adaptive access control and integrated security management capabilities. No code platforms, user-definable logic, software-definable templates, only simplicity.
The set of security disciplines that allows an organization to enable the right entity to access the right resource at the right time for the right reason. It is the tools, policies, and systems that allow an organization to manage, monitor, and secure access to protected resources. These resources may be electronic files, computer systems, or physical resources such as server rooms and buildings.
Physical interactions with sensitive information can take place in many form factors and environments.
ReconaSense enables simple classification of access events, video alerts and device states by three simple values – High, Medium and Low. This can reduce investigation up to 40X. Many investigations into the intent behind a security alarm take around 45 minutes, while risk-adaptive systems programmatically classify alerts based on security policy in real-time, enabling operators to prioritize alarms and improve response times.
Customizing Your Product
Yes, the screen is customizable to the operator and corporate policy with user-definable interfaces and user-definable acknowledgements.
The user interface is unique by each user with configured privileges for the appropriate operator segmentation.
System programmatically adjusts the access control and security management policies to the most relevant based on user-definable criteria, such as risk environments, operational needs and security levels to ensure better security and business outcomes. Risk-Adaptivity is security triggers and procedures defined by people, places and “Trust Policy”.
System programmatically assigns a logical indicator – numerical or categorical – to any singular or combination of device states, monitored events, personnel attributes, access requests, user actions, security level, operational status that represents the security risk that exists during a physical interaction or situation within a continuously monitored facility.
Linking and unlinking access permissions for a person or entity to a protected resource
A user that is authorized (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform.
We can communicate with any biometric solution compatible with Wiegand or OSDP through the connectivity with Mercury controllers such as Idemia, Milestone, Verint, Aimetis, Zenitel, DMP, Zero Eyes, Smarter Security Fastlane turnstiles, Dormakaba, Patriot One, Platformatics, Eagl, and NEDAP.
We transform these signals into intelligent real-time emergency responses across your entire physical security ecosystem (access points, access groups, operator workstations, mobile clients, muster stations, building management systems, light management systems, mass notification, central monitoring clients, etc.)
Some examples include: Lockdown turnstiles across multiple entrances at a financial institution in central downtown of major metropolitan area if PatriotOne detected a weapon.
Yes, normal operating hours are Monday – Friday 8:00 am to 5:00 pm CST. Additional support options can be provided based on the systems users’ needs for additional support.
ReconaSense can support 12 credential types simultaneously.
Our server can read transactions from any reader, regardless of technology. Our mobile apps do not depend on BLE/NFC capabilities, which mobile credential software will specify
Yes, we are server based for local network access and can support global cloud-based implementations.
We are compatible with every series of Mercury, with the deepest integrations on the most recent Series 3 controllers.
Yes, as well as web services and web sockets.
Yes, and it can be integrated with end-user solutions.
We use an SQL server.
Training, Licensing, & Partnership
Reach out to schedule a meeting with our team to learn more about each other, and if a good fit, we can schedule either a 1.5 day or 3-day training session – virtually, at your facilities, or at our headquarters in Austin, Texas.
User-definable. We offer three options: virtually, at your facilities, or at our headquarters in Austin, Texas.
Training needs to be schedule 30 days out if virtual or in Austin and 60 days if travel is required.
Every 3 years.
- Three main considerations to license ReconaSense software for enterprise-grade implementations:
- Local Reader Count: How many credential readers per site?
- Total Reader Count: How many credential readers in total across multiple sites?
- Security-Level: What level of protection is best fit for current and future security requirements?
- A few optional considerations include, but are not limited to:
- Geospatial Monitoring
- Onboarding Automation
- FICAM Compliance
- Two main considerations to license ReconaSense software for a standalone implementation:
- Local Reader Count: How many credential readers?
- Security Level: What level of protection is best fit for current and future security requirements?
- A few optional considerations include:
- Cyber-hardened Hardware
- Enclosure, Power Supply
- FICAM Compliance