Keep by Feenics V3 fosters increased scalability and provides an upgraded and enhanced user experience through a desktop executable native application
Keep by Feenics™ provides the option of traditional on-site server deployment or fully cloud-based specification

Feenics, Ottawa, Canada, will demonstrate the new Version 3 (V3) of the Keep by Feenics™ cloud-hosted access control and security management platform at ASIS 2016 in Orlando, September 12 -14, booth 2168.

Keep By Feenics™

Keep by Feenics™ is an award-winning platform that provides the option of traditional on-site server deployment or fully cloud-based specification, giving systems integrators and end users uncompromised choices for superior application flexibility. Keep simplifies the management of security, access control and other integrated technologies at the protected premises and is appropriate for vertical markets ranging from SMBs to national and global accounts.

Version 3

Keep by Feenics V3 fosters increased scalability and provides an upgraded and enhanced user experience through a desktop executable native application specifically designed to provide ease of access to the software’s management platform. Along with seamless connectivity, V3 further enriches the user experience with a browser-agnostic configuration that support all web search engines. V3 also allows the user and systems integrator to control and manage multiple sites and locations from a single User Interface (UI). In addition, V3 offers increased capacity for access control readers, making Keep truly unlimited in scalability.

Cloud Hosting

Keep presents a new value proposition in cloud hosting for physical security. It has been engineered to run without servers or appliances on site, lowering the total cost of ownership for the end user and eliminating costly refreshes of servers and hardware. In can also be installed on a local network, with minimal server requirements. In addition, Keep uses the industry’s most widely installed, non-proprietary field hardware by global access control leaders HID and Authentic Mercury Security and interfaces with wireless lock leaders ASSA ABLOY and Allegion.

In any configuration, Keep offers inherent cyber security, including two-factor authentication, TLS encrypted field hardware and a secure SSL connection.

Save

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...