{"id":46,"date":"2022-03-03T20:42:02","date_gmt":"2022-03-03T20:42:02","guid":{"rendered":"https:\/\/digitronicsinc.com\/dti\/?page_id=46"},"modified":"2022-03-10T18:46:50","modified_gmt":"2022-03-10T18:46:50","slug":"corporate","status":"publish","type":"page","link":"https:\/\/digitronicsinc.com\/dti\/corporate\/","title":{"rendered":"Corporate"},"content":{"rendered":"<p style=\"text-align: justify;\">Corporations can benefit from physical access security. \u00a0Protecting the employees, assets and facilities of an organization is of the utmost importance.\u00a0 Physical security protects the most valuable asset &#8212; the employees.\u00a0 Employee safety should always be the priority as well as securing the facility.<\/p>\n<h3><span style=\"color: #993366;\">Access Control Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-228 alignright\" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png\" alt=\"\" width=\"363\" height=\"208\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-768x441.png 768w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control.png 808w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\" \/><\/p>\n<ul>\n<li>Redundant Host Processors<\/li>\n<li>Web-hosted Access Control<\/li>\n<li>Biometrics Systems<\/li>\n<li>Photo IS Management<\/li>\n<li>Visitor Management Systems<\/li>\n<li>PIV Card Compliant<\/li>\n<li>Readers and Credentials<\/li>\n<\/ul>\n<h3><span style=\"color: #993366;\">Intrusion Detection Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">An intrusion detection system (IDS) monitors a network or systems for malicious activity or policy violations.\u00a0 Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.\u00a0 Examples include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-204 alignright\" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Image-intrusion-detection-300x183.png\" alt=\"\" width=\"346\" height=\"211\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Image-intrusion-detection-300x183.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Image-intrusion-detection.png 450w\" sizes=\"auto, (max-width: 346px) 100vw, 346px\" \/><\/p>\n<ul>\n<li>UL Listed Defense Industrial Security System<\/li>\n<li>Interface Monitoring of Your System<\/li>\n<li>Burglar Alarm Systems<\/li>\n<li>Panic Alarms<\/li>\n<li>Web Application-Based Integration<\/li>\n<li>Monitoring<\/li>\n<\/ul>\n<h3><span style=\"color: #993366;\">Closed Circuit TV and Intercom<\/span><\/h3>\n<p style=\"text-align: justify;\">Closed Circuit TV (CCTV) refers to surveillance cameras connected to security systems, and can include infrared technology, cloud-based storage with on-demand access to video footage.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-232 alignright\" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/SIngle-Camera-300x169.png\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/SIngle-Camera-300x169.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/SIngle-Camera.png 501w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"text-align: justify;\">Intercom systems are another layer of security for your home or business.\u00a0 They allow dual-way communication\u00a0 When someone press the call button on outdoor unit, the indoor bell will ring immediately to alert you. You can press the response button to talk with the people outside.\u00a0 Most well-built intercom systems include a built-in high sensitivity microphone and speaker, ensuring clear audio input and output.<\/p>\n<h3><span style=\"color: #993366;\">Security Management Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">Security Management Systems integrate all your security technologies into a connected universal platform with a common user interface.\u00a0 These may include access control, video surveillance, intrusion alarms, fire detection, visitor management, electronic locking, communications and other security technologies.\u00a0 The platform enables the various functional subsystems to communicate with one another, acting as one operating unit, and thus providing a greater level of protection and ease of use. (Imagine how inefficient it would be to operate each of these systems separately.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-205 \" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM.png\" alt=\"\" width=\"620\" height=\"379\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM.png 979w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM-300x183.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM-768x469.png 768w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Corporations can benefit from physical access security. \u00a0Protecting the employees, assets and facilities of an organization is of the utmost importance.\u00a0 Physical security protects the most valuable asset &#8212; the employees.\u00a0 Employee safety should always be the priority as well as securing the facility. Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-46","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Corporate - Digitronics, Inc.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitronicsinc.com\/dti\/corporate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corporate - Digitronics, Inc.\" \/>\n<meta property=\"og:description\" content=\"Corporations can benefit from physical access security. \u00a0Protecting the employees, assets and facilities of an organization is of the utmost importance.\u00a0 Physical security protects the most valuable asset &#8212; the employees.\u00a0 Employee safety should always be the priority as well as securing the facility. Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitronicsinc.com\/dti\/corporate\/\" \/>\n<meta property=\"og:site_name\" content=\"Digitronics, Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-10T18:46:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/\",\"name\":\"Corporate - Digitronics, Inc.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Access-Control-300x172.png\",\"datePublished\":\"2022-03-03T20:42:02+00:00\",\"dateModified\":\"2022-03-10T18:46:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Access-Control.png\",\"contentUrl\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Access-Control.png\",\"width\":808,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/corporate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Corporate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/#website\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/\",\"name\":\"Digitronics, Inc.\",\"description\":\"Security Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Corporate - Digitronics, Inc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitronicsinc.com\/dti\/corporate\/","og_locale":"en_US","og_type":"article","og_title":"Corporate - Digitronics, Inc.","og_description":"Corporations can benefit from physical access security. \u00a0Protecting the employees, assets and facilities of an organization is of the utmost importance.\u00a0 Physical security protects the most valuable asset &#8212; the employees.\u00a0 Employee safety should always be the priority as well as securing the facility. Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through&hellip;","og_url":"https:\/\/digitronicsinc.com\/dti\/corporate\/","og_site_name":"Digitronics, Inc.","article_modified_time":"2022-03-10T18:46:50+00:00","og_image":[{"url":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/digitronicsinc.com\/dti\/corporate\/","url":"https:\/\/digitronicsinc.com\/dti\/corporate\/","name":"Corporate - Digitronics, Inc.","isPartOf":{"@id":"https:\/\/digitronicsinc.com\/dti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitronicsinc.com\/dti\/corporate\/#primaryimage"},"image":{"@id":"https:\/\/digitronicsinc.com\/dti\/corporate\/#primaryimage"},"thumbnailUrl":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png","datePublished":"2022-03-03T20:42:02+00:00","dateModified":"2022-03-10T18:46:50+00:00","breadcrumb":{"@id":"https:\/\/digitronicsinc.com\/dti\/corporate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitronicsinc.com\/dti\/corporate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitronicsinc.com\/dti\/corporate\/#primaryimage","url":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control.png","contentUrl":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control.png","width":808,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/digitronicsinc.com\/dti\/corporate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitronicsinc.com\/dti\/"},{"@type":"ListItem","position":2,"name":"Corporate"}]},{"@type":"WebSite","@id":"https:\/\/digitronicsinc.com\/dti\/#website","url":"https:\/\/digitronicsinc.com\/dti\/","name":"Digitronics, Inc.","description":"Security Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitronicsinc.com\/dti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":4,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages\/46\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages\/46\/revisions\/234"}],"wp:attachment":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/media?parent=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}