{"id":265,"date":"2020-02-09T18:11:21","date_gmt":"2020-02-09T18:11:21","guid":{"rendered":"http:\/\/digitronicsinc.com\/newsite\/?page_id=265"},"modified":"2020-03-04T20:36:48","modified_gmt":"2020-03-04T20:36:48","slug":"government","status":"publish","type":"page","link":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/","title":{"rendered":"Government"},"content":{"rendered":"<h3><span style=\"color: #993366;\">Access Control Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-252 alignright\" src=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1-300x172.png\" alt=\"\" width=\"410\" height=\"235\" srcset=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1-300x172.png 300w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1-768x441.png 768w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1.png 808w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\" \/><\/p>\n<ul>\n<li>Redundant Host Processors<\/li>\n<li>Web-hosted Access Control<\/li>\n<li>Biometrics Systems<\/li>\n<li>Photo IS Management<\/li>\n<li>Visitor Management Systems<\/li>\n<li>PIV Card Compliant<\/li>\n<li>Readers and Credentials<\/li>\n<\/ul>\n<h3><span style=\"color: #993366;\">Intrusion Detection Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">An intrusion detection system (IDS) monitors a network or systems for malicious activity or policy violations.\u00a0 Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.\u00a0 Examples include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-19 alignright\" src=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Image-intrusion-detection-300x183.png\" alt=\"\" width=\"405\" height=\"247\" srcset=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Image-intrusion-detection-300x183.png 300w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Image-intrusion-detection.png 450w\" sizes=\"auto, (max-width: 405px) 100vw, 405px\" \/><\/p>\n<ul>\n<li>UL Listed Defense Industrial Security System<\/li>\n<li>Interface Monitoring of Your System<\/li>\n<li>Burglar Alarm Systems<\/li>\n<li>Panic Alarms<\/li>\n<li>Web Application-Based Integration<\/li>\n<li>Monitoring<\/li>\n<\/ul>\n<h3><span style=\"color: #993366;\">Closed Circuit TV and Intercom<\/span><\/h3>\n<p style=\"text-align: justify;\">Closed Circuit TV (CCTV) refers to surveillance cameras connected to security systems, and can include infrared technology, cloud-based storage with on-demand access to video footage.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-777 alignright\" src=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/CCTV-image-300x203.png\" alt=\"\" width=\"400\" height=\"271\" srcset=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/CCTV-image-300x203.png 300w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/CCTV-image-1024x694.png 1024w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/CCTV-image-768x520.png 768w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/CCTV-image-398x270.png 398w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/CCTV-image.png 1132w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n<p style=\"text-align: justify;\">Intercom systems are another layer of security for your home or business.\u00a0 They allow dual-way communication\u00a0 When someone press the call button on outdoor unit, the indoor bell will ring immediately to alert you. You can press the response button to talk with the people outside.\u00a0 Most well-built intercom systems include a built-in high sensitivity microphone and speaker, ensuring clear audio input and output.<\/p>\n<h3><span style=\"color: #993366;\">Security Management Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">Security Management Systems integrate all your security technologies into a connected universal platform with a common user interface.\u00a0 These may include access control, video surveillance, intrusion alarms, fire detection, visitor management, electronic locking, communications and other security technologies.\u00a0 The platform enables the various functional subsystems to communicate with one another, acting as one operating unit, and thus providing a greater level of protection and ease of use. (Imagine how inefficient it would be to operate each of these systems separately.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-261 \" src=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/ISMM.png\" alt=\"\" width=\"622\" height=\"380\" srcset=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/ISMM.png 979w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/ISMM-300x183.png 300w, http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/ISMM-768x469.png 768w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/p>\n<h3><span style=\"color: #993366;\">Visitor Management Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">The increasing importance of a Visitor Management System (VMS) is vital to creating a workplace environment where your employees feel safe.\u00a0 A key aspect of a Visitor Management system keeps your facilities safe and secure while maintaining maximum control over the guests accessing your facilities.<\/p>\n<p style=\"text-align: justify;\">A Visitor Management System will track usage of a public building or site.\u00a0 A Visitor Management System can gather increasing amounts of information and record usage of the facilities by specific visitors and provide documentation of visitor\u2019s whereabouts.<\/p>\n<p style=\"text-align: justify;\">An example of a Visitor Management System is Transportation Security Administration (TSA.)\u00a0 TSA operates VMS to manage visitors to TSA facilities. It is used to register the visitor, allow security personnel to verify the visit and the TSA sponsor, create a temporary badge authorizing access to the facility, and to generate statistical reports concerning visitors to the facility. TSA collects name, employer, TSA sponsor information, and a photograph of the visitor to perform its visitor management functions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include: Redundant Host Processors Web-hosted Access Control Biometrics Systems Photo IS Management Visitor Management Systems PIV Card Compliant Readers and &hellip; <\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":54,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-265","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Government - Digitronics, Inc.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Government - Digitronics, Inc.\" \/>\n<meta property=\"og:description\" content=\"Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include: Redundant Host Processors Web-hosted Access Control Biometrics Systems Photo IS Management Visitor Management Systems PIV Card Compliant Readers and &hellip; Read More Read More\" \/>\n<meta property=\"og:url\" content=\"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/\" \/>\n<meta property=\"og:site_name\" content=\"Digitronics, Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-04T20:36:48+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1-300x172.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/\",\"url\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/\",\"name\":\"Government - Digitronics, Inc.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/newsite\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Access-Control-1-300x172.png\",\"datePublished\":\"2020-02-09T18:11:21+00:00\",\"dateModified\":\"2020-03-04T20:36:48+00:00\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/#primaryimage\",\"url\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Access-Control-1.png\",\"contentUrl\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Access-Control-1.png\",\"width\":808,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/government\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitronicsinc.com\\\/newsite\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Systems\",\"item\":\"http:\\\/\\\/digitronicsinc.com\\\/newsite\\\/systems\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Government\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/newsite\\\/#website\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/newsite\\\/\",\"name\":\"Digitronics, Inc.\",\"description\":\"Integrated Solutions for a better tomorrow\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitronicsinc.com\\\/newsite\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Government - Digitronics, Inc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/","og_locale":"en_US","og_type":"article","og_title":"Government - Digitronics, Inc.","og_description":"Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include: Redundant Host Processors Web-hosted Access Control Biometrics Systems Photo IS Management Visitor Management Systems PIV Card Compliant Readers and &hellip; Read More Read More","og_url":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/","og_site_name":"Digitronics, Inc.","article_modified_time":"2020-03-04T20:36:48+00:00","og_image":[{"url":"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1-300x172.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/","url":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/","name":"Government - Digitronics, Inc.","isPartOf":{"@id":"https:\/\/digitronicsinc.com\/newsite\/#website"},"primaryImageOfPage":{"@id":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/#primaryimage"},"image":{"@id":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/#primaryimage"},"thumbnailUrl":"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1-300x172.png","datePublished":"2020-02-09T18:11:21+00:00","dateModified":"2020-03-04T20:36:48+00:00","breadcrumb":{"@id":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/digitronicsinc.com\/newsite\/systems\/government\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/#primaryimage","url":"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1.png","contentUrl":"http:\/\/digitronicsinc.com\/newsite\/wp-content\/uploads\/2020\/02\/Access-Control-1.png","width":808,"height":464},{"@type":"BreadcrumbList","@id":"http:\/\/digitronicsinc.com\/newsite\/systems\/government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitronicsinc.com\/newsite\/"},{"@type":"ListItem","position":2,"name":"Systems","item":"http:\/\/digitronicsinc.com\/newsite\/systems\/"},{"@type":"ListItem","position":3,"name":"Government"}]},{"@type":"WebSite","@id":"https:\/\/digitronicsinc.com\/newsite\/#website","url":"https:\/\/digitronicsinc.com\/newsite\/","name":"Digitronics, Inc.","description":"Integrated Solutions for a better tomorrow","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitronicsinc.com\/newsite\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/pages\/265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/comments?post=265"}],"version-history":[{"count":13,"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/pages\/265\/revisions"}],"predecessor-version":[{"id":818,"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/pages\/265\/revisions\/818"}],"up":[{"embeddable":true,"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/pages\/54"}],"wp:attachment":[{"href":"http:\/\/digitronicsinc.com\/newsite\/wp-json\/wp\/v2\/media?parent=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}