Catalog

New: The Kentix Catalog 2018

Browse now!

Live Demo

Get a live demonstration of the features and functions of our monitoring solutions directly from your desk from a Kentix employee.

Make an appointment now!

Contact

Call us:
+49 6781 - 56 25 10 (SALES)
+49 6781 - 56 25 11 (SUPPORT)

Or write us:
Contact form

Support

You need technical Support?
Open contact form.

For assistance through our technical support, click here to
download Teamviewer.

App Finder

You need help with the planning?

Use the Kentix Application Finder for the right planning to secure your rooms:

Open Application Finder

Follow us on Twitter:

LinkedIn

Follow us on LinkedIn:

/Kentix Application Finder
Kentix Application Finder2018-08-01T15:06:43+00:00

Kentix Application Finder: The Planning Aid for the Protection of your Rooms

Please select your IT environment

Planungshilfe (PDF)

Protection of building entrances and possibly other rooms in the building against unauthorized access with an online-compatible solution for the administration of authorizations, time-level-profiles and access logs.

Doors are to be opened using RFID mediums in order to guarantee a user-related documentation each time. Authorizations can individually be granted or denied. If necessary, the solution ought to be expandable to other rooms or areas and be combinable with video surveillance.

Access control for chambers - office - doctor's practice

Office

Planning aid (PDF)

Protection of entrances and possibly other rooms in the building against unauthorized access with an online-compatible solution for the administration of authorizations, time-user-profiles and access logging.

Doors are to be opened using RFID mediums so that user profiles will also be logged every time. Authorizations can be granted or denied individually. If required, the solution ought to be expandable to other rooms or areas and be combinable with video surveillance. Additionally, critical areas (entrance, rooms with limited access) ought to be monitored for burglary. In doing so, the access system takes over the entire control.

Office monitoring with access control

Office

Planning aid (PDF)

Protection of non-public doors in or outside the building against non-authorized access across multiple branches.

The administration of users and authorizations for single branches ought to be done centrally and integrate all sites into one system in order to keep the administration effort small. All access is documented in a central logbook. Additionally, critical areas are to be video controlled for an even higher level of security.

Access control for office branches (wireless)

Office

Planning aid (PDF)

Access control for offices across branches
 as a hard-wired IP solution.

Protection of non-public doors in or outside the building against non- authorized access across multiple branches.

The administration of users and authorizations for single branches ought to be done centrally and integrate all sites into one system in order to keep the administration effort small. All access is documented in a central logbook. Additionally, critical areas are to be video controlled for an even higher level of security.

The complete installation is fully IP-based, without wireless or battery- powered components.

Access control for office branches
 (IP-based)

Office

Planning aid (PDF)

Several branch locations with remote IT or engineering rooms. The rooms are connected to a central location via WAN and ought to be monitored completely.

The monitoring ought to be done from a central location and integrate the single rooms on the sites into one system. If required, the monitoring solution ought to be expandable in order to add video surveillance or to integrate rooms not related to IT for example.

Alarm monitoring across branches

Office

Planning aid (PDF)

Protection of entrances and possibly other rooms in the building against unauthorized access with an online-compatible solution for the administration of authorizations, time-user-profiles and access logging.

Doors are to be opened using RFID mediums so that user profiles will also be logged every time. Authorizations can be granted or denied individually. If required, the solution ought to be expandable to other rooms or areas and be combinable with video surveillance. Additionally, critical areas (entrance, rooms with limited access) ought to be monitored for burglary. In doing so, the access system takes over the entire control.

Office monitoring with access control and connection to a PBX

Office

Contact form

Couldn’t find your application?

Own application - Individual requirements

Office

Planning aid (PDF)

Absicherung von nicht-öffentlichen Türen am oder im Gebäude gegen unberechtigten Zutritt über mehrere Filialen hinweg.

Die Verwaltung der Benutzer und Berechtigungen für die einzelnen Filialen soll dabei zentral erfolgen und alle Standorte zu einem System zusammenfassen, um den Administrationsaufwand klein zu halten. Alle Zutritte werden in einem zentralen Logbuch gespeichert. In kritischen Bereichen soll zusätzlich eine Videoanbindung erfolgen um diese besser zu überwachen.

Filialübergreifende Zutrittskontrolle für Geschäftsstellen (funkgebunden)

Office

Planning aid (PDF)

Absicherung von nicht-öffentlichen Türen am oder im Gebäude gegen unberechtigten Zutritt über mehrere Filialen hinweg.

Die Verwaltung der Benutzer und Berechtigungen für die einzelnen Filialen soll dabei zentral erfolgen und alle Standorte zu einem System zusammenfassen, um den Administrationsaufwand klein zu halten. Alle Zutritte werden in einem zentralen Logbuch gespeichert. In kritischen Bereichen soll zusätzlich eine Videoanbindung erfolgen um diese besser zu überwachen.

Filialübergreifende Zutrittskontrolle für Geschäftsstellen (funkgebunden)

Office

Planning aid

Monitoring in accordance with IT compliance of a standard server room with multiple IT cabinets, USV and climate system.

The room ought to be monitored for all major physical threats such as over temperature, high humidity and more. The monitoring system ought to be as simple as possible with manageable installing and investment efforts.

Server room up to 20qm

Server room

Planning aid (PDF)

Monitoring in accordance with IT compliance of a standard server room with multiple IT cabinets, USV and climate system. Additionally, there is another room with back-up systems, USV systems or other remote technology.

The room s ought to be monitored for all major physical threats such as over temperature, high humidity and more. The monitoring system ought to be preferable simple, with manageable installing and investment efforts.

Server room up to 20qm and backup room up to 20qm

Server room

Planning aid (PDF)

IT rooms are distributed across multiple sites. Each site contains one or multiple rooms with IT cabinets, infrastructure and other technology all of which are to be fully monitored.

The monitoring ought to be done from a central position and integrate all single areas into one system. If required, the monitoring solution ought to be expandable in order to integrate video surveillance or external sites for example.

Distributed infrastructure - Multiple IT rooms distributed across several sites

Server room

Planning aid (PDF)

Data center with a larger number of IT cabinets that are to be monitored for physical threats such as over temperature, high humidity, carbon monoxide (early fire detection) and more

The monitoring is carried out be multiple sensors that are integrated into one central system. Adjoining engineering rooms also are to be monitored. The USV and climate control systems can be integrated via existing signal contacts. Additionally, the solution ought to offer interfaces for superordinate monitoring systems.

Data center with 300qm and engineering side rooms

Server room

Planning aid (PDF)

Protection of one or more IT cabinets (server racks) against unauthorized access with an online-compatible solution for the administration of authorizations, time-level-profiles and access logs.

Doors can be opened using RFID mediums so that a user-related log is created each time. Authorizations can individually be granted or denied. If required, the solution ought to be expandable to other rooms or areas and be combinable with video surveillance.

Access control system for IT cabinets

Server room

Planning aid (PDF)

You are the carrier or user of container or outdoor data centers in which systems with high availability requirements are operated?

Physical security – meaning the protection of all affiliated devices against threats such as over temperature, high humidity, fire or burglary – is playing an important role for the permanent operation of servers and their surroundings. Potential threats must be detected as early as possible and at one glance in order to initiate countermeasures in time. The monitoring solution ought to be scalable. Additionally, interfaces for a superordinate network monitoring are to be available.

Container data center

Server room

Planning aid (PDF)

Access to IT- and technical rooms
 with hard-wired wall-mounted IP readers.

Your company has one or several IT- or technical rooms that are to be protected against unauthorized access. The administration of the accesses shall be realized with a fully IP-based solution. An opening of doors can take place using RFID-media, the input of a PIN- code or as a combination of both. All accesses are logged and are subject to the configured access profiles. The installation shall be designed as a fixed wiring without wireless or battery-powered components.

Access control for IT- and technical rooms

Server room

Contact form

Just contact us! We will be happy to discuss your requirements and make an individual offer..

Couldn’t find your application?

Server room

Planungshilfe (PDF)

Sie sind Betreiber bzw. Nutzer von Container- oder Outdoor-Rechenzentren in welchen Systeme mit Hochverfügbarkeits-Anforderungen betrieben werden.

Physikalische Sicherheit – also die Absicherung aller verbauten Geräte gegen Gefahren wie Übertemperatur, hohe Luftfeuchtigkeit, Brand und Einbruch spielt hierbei eine wichtige Rolle für den dauerhaften Betrieb der Umgebung. Potentielle Gefahren sollen möglichst früh auf einen Blick identifizierbar sein, um Gegenmassnahmen einzuleiten. Die Überwachungslösung soll dabei möglichst skalierbar sein. Zusätzlich sollen Schnittstellen für ein übergeordnetes Network-Monitoring zur Verfügung stehen.

Container-Rechenzentrum

Server room

Planning aid (PDF)

Within the production facility, there are several engineering and supply rooms that are to be monitored.

Physical security – meaning the protection of all affiliated devices against threats such as over temperature, high humidity, fire and burglary – plays an important role in the permanent operation of servers and their environment. Potential threats ought to be detected as soon as possible in order to initiate countermeasures in time. The monitoring itself ought to be done from a central position in order to be able to determine any critical conditions at a glance.

Monitoring of engineering and supply rooms

Industry

Planning aid (PDF)

Within the production facility there are IT cabinets which connect computer-controlled production lines to the server infrastructure for example.

The cabinets ought to be monitored permanently for all critical threats such as over temperature or fire in order to secure the constant availability of the systems and thus guarantee an uninterrupted production. Potential risks ought to be detected as early as possible in order to initiate counter measures in time. The monitoring ought to be done from a central position so that critical conditions can directly be identified. Moreover, the solution ought to be scalable in order to be able to expand it if necessary.

Monitoring of distributed IT cabinets on production sites

Industry

Planning aid (PDF)

Protection of rooms inside the buildings as well as entrance doors against unauthorized access with an online-compatible solution for the administration of authorizations, time-level-profiles and access logs.

Doors are to be opened using RFID mediums so that user-related access logs are created. Authorizations can individually be granted or denied. If required, the solution ought to be expandable to other rooms/areas and be combinable with video surveillance.

Access control for industrial sites - storage - logistics (wireless)

Industry

Planning aid (PDF)

Access control for industry, storage and logistics
 as a hard-wired IP solution.

Protection of rooms and access areas (gates, barriers) against unauthorized access with a completely IP-based solution for the administration of authorizations, time-level profiles and access logging. The door opening is done easily using RFID media and/or a PIN input to have a user specific logging. Permissions can be granted or withdrawn individually. If necessary the solution can be extended to other rooms/areas or be combined with video surveillance.

Access control for industrial sites - storage - logistics
 (IP-based)

Industry

Planning aid (PDF)

Access control for distributed storage areas and material cabinets.

There are several rooms or cabinets on site in which papers or materials for production or consumption materials are stored. An access control system ought to be installed in order to better control access and removal of material. The administration of user data and profiles ought to be done from a central position. All access is to be logged in a logbook. The affiliated components should be easy to maintain.

Access control for distributed storage areas and material cabinets

Industry

Contact form

Just contact us! We will be happy to discuss your requirements and make an individual offer.

Couldn’t find your application?

Industry

Planungshilfe (PDF)

Absicherung von Lagerbereichen oder Materialschränken.

Am Standort gibt es mehrere Räume oder Schränke, in denen Materialien für die Produktion, Unterlagen oder Verbrauchsmaterialien gelagert werden. Dort soll eine Zutrittskontrolle installiert werden, um Zugang und Entnahme von Materialien besser zu kontrollieren. Die Verwaltung von Benutzerdaten und Profilen soll von zentraler Stelle erfolgen. Alle Zutritte sind in einem zentralen Logbuch erfasst. Die verbauten Komponenten müssen möglichst einfach zu warten sein.

Zugriffskontrolle für verteilte Lagerbereiche und Materialschränke

Industry

Planungshilfe (PDF)

Absicherung von Lagerbereichen oder Materialschränken.

Am Standort gibt es mehrere Räume oder Schränke, in denen Materialien für die Produktion, Unterlagen oder Verbrauchsmaterialien gelagert werden. Dort soll eine Zutrittskontrolle installiert werden, um Zugang und Entnahme von Materialien besser zu kontrollieren. Die Verwaltung von Benutzerdaten und Profilen soll von zentraler Stelle erfolgen. Alle Zutritte sind in einem zentralen Logbuch erfasst. Die verbauten Komponenten müssen möglichst einfach zu warten sein.

Zugriffskontrolle für verteilte Lagerbereiche und Materialschränke

Industry

Planungshilfe (PDF)

Absicherung von Lagerbereichen oder Materialschränken.

Am Standort gibt es mehrere Räume oder Schränke, in denen Materialien für die Produktion, Unterlagen oder Verbrauchsmaterialien gelagert werden. Dort soll eine Zutrittskontrolle installiert werden, um Zugang und Entnahme von Materialien besser zu kontrollieren. Die Verwaltung von Benutzerdaten und Profilen soll von zentraler Stelle erfolgen. Alle Zutritte sind in einem zentralen Logbuch erfasst. Die verbauten Komponenten müssen möglichst einfach zu warten sein.

Zugriffskontrolle für verteilte Lagerbereiche und Materialschränke

Industry

Request live demo

Just ask us!

We have sparked your interest, but you still need more information? Fill out the following form and make an appointment today. We will show you the solution in an online webinar and answer all your questions!
Request live demo
Open server room

Visit the Kentix server room!

In our interactive server room you can see how ingeniously simple monitoring with Kentix is and how the individual products connect with each other.
Open server room