Force 5's Gatekeeper Makes Utility Enterprise - Audit-ready
FREMONT, CA: Force 5 delivers enterprise solutions built from the ground up with compliance, security, messaging, and usability in mind. Powerful architecture pairs with robust security protocols to deliver the ideal solution for our clients. Force 5’s central compliance solution is Gatekeeper.
Gatekeeper is the next generation in monitoring and logging physical access to critical areas. Ideally suited for organizations seeking to self-monitor and manage access to a facility, Gatekeeper seamlessly integrates access/activity monitoring, credential /photo verification, and visitor management. This powerful solution helps businesses achieve and maintain compliance and reduce operational risk. Gatekeeper produces compliance based evidence and forensics needed for real-time risk analysis and audit-ready reporting.
Self-Service Unified Platform with Limited Back Office Requirements
Gatekeeper self-service kiosks provide around the clock logging for access to physical security perimeters. These kiosks create a constant, secure, real-time picture of your organization’s visitors facilitating situational awareness and risk assessment. Gatekeeper Kiosks are always there, no additional staff needed.
Logging for Physical Security Perimeters
Critical Infrastructure Protection is designed to efficiently identify security threats, develop policies and procedures to address these threats. Gatekeeper surpasses NERC CIP requirements with escort-centric electronic logging. Visits are recorded, stored, and utilized for reporting. Gatekeeper makes your utility enterprise audit-ready.
Point of Entry Compliance
Gatekeeper Perimeter enForce provides enterprise level contractor access logging to your facilities. Perimeter enForce is offered as individual sets or in modular units’ temporary containers brought in with kiosks and turnstiles to provide a pass through point for workers. Identities are captured with fingerprint and worker certifications are tracked using Gatekeeper Certification Tracking.
Gatekeeper Certification Tracking provides powerful management tools for granting and monitoring worker certifications. Visitors with missing required certifications are notified of their needed certifications or denied access. Completed orientations cane be granted via Gatekeeper Kiosks. Reports, logs, and dashboards reflect visitor activity in accordance with needed certifications.
Gatekeeper Front Desk is a streamlined visitor management application ideal for security guards, receptionists, and lobby desks. Users can view visitor activity, see scheduled visits, control access devices (such as turnstiles), log visitors in, assign badges, and enroll first time visitors all from an easy to use interface.
Gatekeeper Contractor Management provides powerful and seamless organization and logging of contractors. Identifiers, such as badges and fingerprints, streamline visit logging. Scheduling features allow express visits with pre-configured options. With Gatekeeper, you know where your contractors are and what they're doing.
Key & Object Management
Gatekeeper Key Management tracks the authorized usage of secure keys and objects in specific areas. Keys are checked-in and checked-out from secure lock boxes by individuals with confirmed identities. Escorted keys are shown on dashboards, logged for historical reporting, and are accurately identified using proximity communication.
Contractor Access Control
Gatekeeper kiosks can be utilized for Turnstile or other device control. Kiosks allow access through confirmed identity selection and visit logging. Physical identifiers such and fingerprints and corporate badges can be utilized for fast identification. All logging is recorded and displayed in the centralized Gatekeeper system for security personnel and compliance officer review.
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...