Force 5's Gatekeeper Makes Utility Enterprise - Audit-ready
FREMONT, CA: Force 5 delivers enterprise solutions built from the ground up with compliance, security, messaging, and usability in mind. Powerful architecture pairs with robust security protocols to deliver the ideal solution for our clients. Force 5’s central compliance solution is Gatekeeper.
Gatekeeper is the next generation in monitoring and logging physical access to critical areas. Ideally suited for organizations seeking to self-monitor and manage access to a facility, Gatekeeper seamlessly integrates access/activity monitoring, credential /photo verification, and visitor management. This powerful solution helps businesses achieve and maintain compliance and reduce operational risk. Gatekeeper produces compliance based evidence and forensics needed for real-time risk analysis and audit-ready reporting.
Self-Service Unified Platform with Limited Back Office Requirements
Gatekeeper self-service kiosks provide around the clock logging for access to physical security perimeters. These kiosks create a constant, secure, real-time picture of your organization’s visitors facilitating situational awareness and risk assessment. Gatekeeper Kiosks are always there, no additional staff needed.
Logging for Physical Security Perimeters
Critical Infrastructure Protection is designed to efficiently identify security threats, develop policies and procedures to address these threats. Gatekeeper surpasses NERC CIP requirements with escort-centric electronic logging. Visits are recorded, stored, and utilized for reporting. Gatekeeper makes your utility enterprise audit-ready.
Point of Entry Compliance
Gatekeeper Perimeter enForce provides enterprise level contractor access logging to your facilities. Perimeter enForce is offered as individual sets or in modular units’ temporary containers brought in with kiosks and turnstiles to provide a pass through point for workers. Identities are captured with fingerprint and worker certifications are tracked using Gatekeeper Certification Tracking.
Gatekeeper Certification Tracking provides powerful management tools for granting and monitoring worker certifications. Visitors with missing required certifications are notified of their needed certifications or denied access. Completed orientations cane be granted via Gatekeeper Kiosks. Reports, logs, and dashboards reflect visitor activity in accordance with needed certifications.
Gatekeeper Front Desk is a streamlined visitor management application ideal for security guards, receptionists, and lobby desks. Users can view visitor activity, see scheduled visits, control access devices (such as turnstiles), log visitors in, assign badges, and enroll first time visitors all from an easy to use interface.
Gatekeeper Contractor Management provides powerful and seamless organization and logging of contractors. Identifiers, such as badges and fingerprints, streamline visit logging. Scheduling features allow express visits with pre-configured options. With Gatekeeper, you know where your contractors are and what they're doing.
Key & Object Management
Gatekeeper Key Management tracks the authorized usage of secure keys and objects in specific areas. Keys are checked-in and checked-out from secure lock boxes by individuals with confirmed identities. Escorted keys are shown on dashboards, logged for historical reporting, and are accurately identified using proximity communication.
Contractor Access Control
Gatekeeper kiosks can be utilized for Turnstile or other device control. Kiosks allow access through confirmed identity selection and visit logging. Physical identifiers such and fingerprints and corporate badges can be utilized for fast identification. All logging is recorded and displayed in the centralized Gatekeeper system for security personnel and compliance officer review.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment