{"id":48,"date":"2022-03-03T20:43:18","date_gmt":"2022-03-03T20:43:18","guid":{"rendered":"https:\/\/digitronicsinc.com\/dti\/?page_id=48"},"modified":"2022-03-10T18:47:11","modified_gmt":"2022-03-10T18:47:11","slug":"government","status":"publish","type":"page","link":"https:\/\/digitronicsinc.com\/dti\/government\/","title":{"rendered":"Government"},"content":{"rendered":"<h3><span style=\"color: #993366;\">Access Control Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-228 alignright\" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png\" alt=\"\" width=\"359\" height=\"206\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-768x441.png 768w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control.png 808w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/><\/p>\n<ul>\n<li>Redundant Host Processors<\/li>\n<li>Web-hosted Access Control<\/li>\n<li>Biometrics Systems<\/li>\n<li>Photo IS Management<\/li>\n<li>Visitor Management Systems<\/li>\n<li>PIV Card Compliant<\/li>\n<li>Readers and Credentials<\/li>\n<\/ul>\n<h3><span style=\"color: #993366;\">Intrusion Detection Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">An intrusion detection system (IDS) monitors a network or systems for malicious activity or policy violations.\u00a0 Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.\u00a0 Examples include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-204 alignright\" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Image-intrusion-detection-300x183.png\" alt=\"\" width=\"354\" height=\"216\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Image-intrusion-detection-300x183.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Image-intrusion-detection.png 450w\" sizes=\"auto, (max-width: 354px) 100vw, 354px\" \/><\/p>\n<ul>\n<li>UL Listed Defense Industrial Security System<\/li>\n<li>Interface Monitoring of Your System<\/li>\n<li>Burglar Alarm Systems<\/li>\n<li>Panic Alarms<\/li>\n<li>Web Application-Based Integration<\/li>\n<li>Monitoring<\/li>\n<\/ul>\n<h3><span style=\"color: #993366;\">Closed Circuit TV and Intercom<\/span><\/h3>\n<p style=\"text-align: justify;\">Closed Circuit TV (CCTV) refers to surveillance cameras connected to security systems, and can include infrared technology, cloud-based storage with on-demand access to video footage.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-201 alignright\" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/CCTV-image-300x203.png\" alt=\"\" width=\"324\" height=\"219\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/CCTV-image-300x203.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/CCTV-image-1024x694.png 1024w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/CCTV-image-768x520.png 768w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/CCTV-image.png 1132w\" sizes=\"auto, (max-width: 324px) 100vw, 324px\" \/><\/p>\n<p style=\"text-align: justify;\">Intercom systems are another layer of security for your home or business.\u00a0 They allow dual-way communication\u00a0 When someone press the call button on outdoor unit, the indoor bell will ring immediately to alert you. You can press the response button to talk with the people outside.\u00a0 Most well-built intercom systems include a built-in high sensitivity microphone and speaker, ensuring clear audio input and output.<\/p>\n<h3><span style=\"color: #993366;\">Security Management Systems<\/span><\/h3>\n<p style=\"text-align: justify;\">Security Management Systems integrate all your security technologies into a connected universal platform with a common user interface.\u00a0 These may include access control, video surveillance, intrusion alarms, fire detection, visitor management, electronic locking, communications and other security technologies.\u00a0 The platform enables the various functional subsystems to communicate with one another, acting as one operating unit, and thus providing a greater level of protection and ease of use. (Imagine how inefficient it would be to operate each of these systems separately.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-205 \" src=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM.png\" alt=\"\" width=\"637\" height=\"389\" srcset=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM.png 979w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM-300x183.png 300w, https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/ISMM-768x469.png 768w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include: Redundant Host Processors Web-hosted Access Control Biometrics Systems Photo IS Management Visitor Management Systems PIV Card Compliant Readers and Credentials Intrusion Detection Systems An intrusion detection system (IDS) monitors a network or systems for malicious activity or policy violations.\u00a0&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-48","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Government - Digitronics, Inc.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitronicsinc.com\/dti\/government\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Government - Digitronics, Inc.\" \/>\n<meta property=\"og:description\" content=\"Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include: Redundant Host Processors Web-hosted Access Control Biometrics Systems Photo IS Management Visitor Management Systems PIV Card Compliant Readers and Credentials Intrusion Detection Systems An intrusion detection system (IDS) monitors a network or systems for malicious activity or policy violations.\u00a0&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitronicsinc.com\/dti\/government\/\" \/>\n<meta property=\"og:site_name\" content=\"Digitronics, Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-10T18:47:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/\",\"name\":\"Government - Digitronics, Inc.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Access-Control-300x172.png\",\"datePublished\":\"2022-03-03T20:43:18+00:00\",\"dateModified\":\"2022-03-10T18:47:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Access-Control.png\",\"contentUrl\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Access-Control.png\",\"width\":808,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/government\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/#website\",\"url\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/\",\"name\":\"Digitronics, Inc.\",\"description\":\"Security Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitronicsinc.com\\\/dti\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Government - Digitronics, Inc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitronicsinc.com\/dti\/government\/","og_locale":"en_US","og_type":"article","og_title":"Government - Digitronics, Inc.","og_description":"Access Control Systems Access control refers to the practice of restricting entrance to a property, a building, or a room to only authorized persons.\u00a0 Physical access control is best achieved through access control systems.\u00a0 Examples include: Redundant Host Processors Web-hosted Access Control Biometrics Systems Photo IS Management Visitor Management Systems PIV Card Compliant Readers and Credentials Intrusion Detection Systems An intrusion detection system (IDS) monitors a network or systems for malicious activity or policy violations.\u00a0&hellip;","og_url":"https:\/\/digitronicsinc.com\/dti\/government\/","og_site_name":"Digitronics, Inc.","article_modified_time":"2022-03-10T18:47:11+00:00","og_image":[{"url":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/digitronicsinc.com\/dti\/government\/","url":"https:\/\/digitronicsinc.com\/dti\/government\/","name":"Government - Digitronics, Inc.","isPartOf":{"@id":"https:\/\/digitronicsinc.com\/dti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitronicsinc.com\/dti\/government\/#primaryimage"},"image":{"@id":"https:\/\/digitronicsinc.com\/dti\/government\/#primaryimage"},"thumbnailUrl":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control-300x172.png","datePublished":"2022-03-03T20:43:18+00:00","dateModified":"2022-03-10T18:47:11+00:00","breadcrumb":{"@id":"https:\/\/digitronicsinc.com\/dti\/government\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitronicsinc.com\/dti\/government\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitronicsinc.com\/dti\/government\/#primaryimage","url":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control.png","contentUrl":"https:\/\/digitronicsinc.com\/dti\/wp-content\/uploads\/2022\/03\/Access-Control.png","width":808,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/digitronicsinc.com\/dti\/government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitronicsinc.com\/dti\/"},{"@type":"ListItem","position":2,"name":"Government"}]},{"@type":"WebSite","@id":"https:\/\/digitronicsinc.com\/dti\/#website","url":"https:\/\/digitronicsinc.com\/dti\/","name":"Digitronics, Inc.","description":"Security Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitronicsinc.com\/dti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":4,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages\/48\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/pages\/48\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/digitronicsinc.com\/dti\/wp-json\/wp\/v2\/media?parent=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}