Integrated Software Solutions is capable of sharing information across applications, based upon rules. We offer a solution capable of meeting the needs of each customer with custom field names and configurations. Integrated software minimizes data entry, ensuring accuracy while expediting process management.
You can run one (1), two (2) or any number of modules, grow your system as budget allows and needs arise. When you run disparate systems you are at a sever disadvantage, increased costs, with manual checks and balance.
Let your systems work for you.
Select the application you would like to learn more about, then Contact Us to discuss your specific needs.
Asset Tracking: The Tracking and Control of Corporate Assets includes company credit cards, laptop computers, camcorders, palm computers, cellular phones - tools. These items together amount to very large financial investment. It is important to know about each asset; model number, serial number, to whom it is assigned, expected return dates. Items not returned by the due date will be flagged for investigation. Build asset list for proper collection of assets when employees are terminated. Proper tracking of assets will quickly provide a return on investment.
Briefings: The briefings module efficiently distributes and tracks information within your organization to any and all personnel, including officers, or employees keeping them up to date with important information and training information. Information can be tracked in real time as to who received messages, when they read/acknowledged them ensuring everyone is aware of the latest SOP’s. Reports can be generated to display complete message info (dates, recipients, acknowledgements etc) or used for statistical analysis (number of briefings, read/unread counts etc).
Contractor Management: Vetting and tracking all information associated to contract employees, contract companies and their employees is made easy. Services not performed should not be paid for. Know what people are on your property. This practice has obvious financial benefits but also, for the uninitiated, some serious pitfalls, which can quickly erode the initial safety, security, and financial benefits of such a program. It is crucial to know what contractors will be on your site and when. It is also important to have a record of their site arrival and departure times for costing purposes. This information is also beneficial if an investigation is required.
Contract persons can be pre-registered to the database, with a record of their qualification expiry dates, security clearance level and its expiry date, frequency of visits(schedule). If the contractor fails to arrive for the scheduled maintenance visit, the guard or contract personnel can be notified and appropriate action taken. Fixed contract milestones can be tracked and reported on a daily or weekly basis, to ensure adherence to the contract schedule.
Daily Occurrence Log: The daily occurrence log is effectively two logs in one, namely, logs of expected and unexpected activities. The day’s expected activities can be entered by members of management or a designate, days or even hours before the activity occurs. E-Mail messages can be automatically sent to employees notifying them of an event that is occurring. This helps to ensure no surprises occur for those in charge. In the event of an emergency, appropriate instructions appear at the bottom of the screen, which must all be executed to clear the emergency. Speed keys can be used to enter occurrences as they happen, with the added ability to add freehand details of the occurrence as needed. In some organizations these occurrences can number 6000 to 8000 per month or more. The ability to quickly sort and report on that data is important, particularly if it is required as part of an internal or external investigation.
Emergency Broadcast: The Emergency Broadcast module is used by organizations to alert their employees of critical issues happening at their facilities either, automatically based on certain criteria or manually, by the security administrators or officers, of situations that may require urgent interventions or notifications to personnel. Messages can be sent using popup alerts, mass notifications via Email or to all workstations on the corporate network. Mass notifications to all workstations can also be targeted to specific locations.
Guard Tour: The use of the Guard Tour is a very important feature for large high risk facilities such as Government facilities, oil refineries, chemical plants, hospitals, research facilities, large shopping malls, colleges & universities. The Guard Tour device is a hand held computer and bar code scanner with a screen for instructions to the guard, which are associated with each bar code, these instructions must be performed. There is the capability of unlimited tours each with unlimited scan point locations per tour. Three types of tours can be selected, Random, Forced or Timed. In a Timed tour the device will advise the guard if he/she is late and also provide a distinct audible for a good read and bad read of the bar code. When the tour is completed the guard connects the hand held computer into its charger cradle and all the tours recorded data is automatically up loaded to the host Server for record storage and report generation.
HAZMAT Inventory: The HAZMAT Inventory System allows user to inventory all hazardous material stored at their facility.Each item is identified by chemical name, location(s) stored, WHMIS Classification, NFPA Rating, Quantities and usages, type of exposure, Owner/Contract. Labels can be printed for the shelf identification.Its is also possible to attach MSDS forms.This module will assist in reducing risk and meeting compliance standards.
Incident Reports: The Incident Report module is a management tool designed to quickly collate information on an urgent situation, to respond promptly and effectively, assist in determining trends to prevent re-occurrences, improve security, meet compliance standards and help mitigate risk within your organization. Incidents are classified by type and sub-category, classification etc. These incidents are automatically time & date stamped along with the operator’s name. Each report can be locked after a predetermined time and can only be modified by authorization of a Supervisor. Unlimited supplemental data may be inserted into the file to support the report for example Police and Fire department report numbers, photos, video clips, and audio clips as well as external text documents. The Incident Report module will manage incident tracking more effectively, allowing security personnel to spend less time on administration and more time spent on incident prevention.
Key Management: The Key Management Module will greatly assist anyone who must manage a large key inventory. This module is used to accurately track key transfers, issuance's, returns, replacements etc. It includes such features as automatic information links for re-keying, identification of old keys to be returned by users as well as all the necessary information for key re-issuance. Lock cylinders can be removed, catalogued for later re-use, biting codes can be encrypted for enhanced security. Extensive information can be kept on each door and associated hardware. Such information can be invaluable to the locksmith, since he can properly prepare himself for the door repair, thus reducing repair time. This module utilizes data from the Personnel Information Management Module to track who should have keys to where, validation of authorization to issue keys and the proof of identity required to receive keys.
Lost and Found: The processing and tracking of lost and found items is becoming more and more of a challenge for businesses and maintaining accurate records of these items can strain your resources. The Lost and Found module was specifically designed to help record the details of these items, the locations at which they were found, held and if transferred to a central storage area, it’s location and the date and time of transfer. It is possible to record every detail of a found item, the name of the finder, its present custodian and its estimated value. If the name and address of the owner is known, the software can send letters advising the owner that the item(s) have been found and where to claim them. Digital images of the items can be stored online and identifying tags printed as well as receipts for the claimant’s signature. If the item(s) are returned, the name, address and telephone number of the claimant is recorded as well as the date of return. If the article is not claimed after a predefined period of time, it may be liquidated via an auction or donated to a charity. The method of disposal is then recorded.
Package Tracking: The Package Tracking module can be an attractive feature to large corporations. This module allows you to record photo ID of deliverers for quick verification it records the time of arrival, the destined recipient, the sender and the deliverer. The database also allows detailed entry of package information, such as size, weight, color and the courier company’s tracking number. It is possible to record the date, time and who was notified of the arrival of a package as well as by whom and when, and if it was collected by the recipient department. Records of Outgoing packages are also kept with information of the designator and the time when the package was picked up. This module can quickly identify the fraudulent use of company courier services, by whom and the frequency.
Parking Control: The Parking Control Module allows for the continuous tracking of vehicles within a lot or multiple lots. The control includes the issuance of parking permits, temporary permits, free parking or fee for parking, allocation of parking spaces, record of user names and up to 4 license plate numbers per user with make and color of each vehicle, plus one loaner vehicle. Track all violations such as time expired, wrong lot, vehicle towed by whom and to where, ticket issuance, value of ticket if any, ticket paid yes or no, fee for parking or permit paid yes or no. Where parking is available in multiple lots only one vehicle at a time may be parked on a single permit.
Personnel Information Management: The Personnel Information Management module serves as the main database for recording personnel information on individuals within the organization. Displayed are employee related fields such as Name, employment status, office number, department, office phone etc. It also allows for detailed information on access limitations, parking permits, assets, badge and/or key issuance. Upon departure of employment, a form can be generated to ensure all corporate property is returned. It maintains the status of all individuals based on employment or expiry dates of such things as security clearances etc. This module maintains a record of those authorized to issue badges, keys, as well as individuals with access to site-specific rooms. The information can be shared with multiple locations on a need to know basis, with password protection to limit access. Identification pictures of all employees can be stored. When integrated to an access control system it can be possible to view the status, access privileges of card holders.
Restricted Access: The Restricted Access Person Module is particularly effective in screening the access of visitors, contractors or employees into the facilities. When authorized persons place restrictions upon individuals, such information is usually kept confidential until the restricted person tries to gain access to the facility. Every time a person’s name is entered into the system, Site-Secure searches it’s entire database for anyone with a restriction applied. The severity of the restriction and details on how to process the person can be viewed on screen. This module contains the names, sources, details of the restrictions and if available, images and aliases, of all individuals with any form of restriction. It is also possible to flag the number of days that a restriction has been imposed in order to allow compliance with any law or internal policy governing the removal or renewal of any restriction. If a restricted person is attempting to gain entry, it is possible to send an Emergency Broadcast with a warning and description of the person(s).
Threat and Risk Assessment: The threat and risk assessment module is a designed to identify threats and determine your risk of the threat happening. As a fully integrated solution with many of already powerful suite of 17 modules. With other modules running you are able to leverage information on your company, employees, visitors, assets, officers, and buildings directly from entries made in other modules as data is entered. The objective with an integrated threat and risk assessment module is to assist our Clients in reducing losses, achieving corporate policy requirement, ensure departmental designations, and to ensure classified information and other assets are safeguarded in an appropriate manner. The results of your assessments will help you to determine the best recommendations that will support your business objectives to safeguarding employees and assets and assuring the continued delivery of services.
Trouble Call/ Facility Management: This software module is particularly helpful to the success of a company by quickly and efficiently streamlining service calls. Such calls can vary from emergency help to routine request. This module is multi-user and multi-tasking, hence trouble calls can be received from anywhere within the organization (Multi-site), recorded and dispatched to the appropriate business sector for action. Upon receipt, the trouble call is time stamped with the name of the operator who received it and again the person who placed the call. When the appropriate technical resources arrives at the site it is possible to time stamp their arrival time and departure time and can be processed or rerouted to the appropriate resource if an error in routing had been made. Once the call is completed, a report can be closed and time stamped. For those calls that must be serviced by off site contractors, an email can be automatically sent calling for service. This gives you, the client, and the contractor written proof of the call and a means to gauge response to down times, contract terms etc.
Visitor Registration: With the Visitor Registration module, visitors can be manually registered upon their arrival, pre-registered by their host or self-register using kiosk. It is also possible to register by passing their driver’s license through a scanner. These methods speed up entry and provide the visitor with a positive impression of the company’s efficiency upon his/her arrival. Typical saving in time processing visitors is upwards of 1 minute per person. Visitors can be issued ID badges, self-adhesive badges or an electronic access card. The Visitors station can also be used to determine if the visitor needs an escort or is under a «restriction» of any kind. It can also store a visitor’s picture for verification purposes. Records are kept of the visitor’s times and dates of entry and exits to a facility and their host’s names. The visitor station will instantly inform the operator if a visitor has or requires, a security clearance level, requires a signature to gain access, is early or late for the appointment, as well as the type of identification deposit required in exchange for an electronic access badge.