List of Feenics Access Control Integrations
This is a list of platforms and tools that integrate with Feenics Access Control. This list is updated as of April 2025.
-
1
Envoy is transforming the landscape of hybrid workplaces by facilitating safe connections and collaborations among individuals. With its innovative workplace platform, Envoy has redefined the visitor experience, enhanced employee safety, streamlined the booking of conference rooms and desks, and optimized delivery management across over 14,000 locations globally. The Envoy Visitors feature accommodates more than 100,000 sign-ins daily, prioritizing the security of individuals, property, ideas, and personal data. Meanwhile, Envoy Protect is dedicated to ensuring employee well-being by effectively organizing their schedules prior to their arrival at the office. Additionally, Envoy Desks allows employees to secure a workspace for any day they choose to be in the office, fostering teamwork with their peers. Envoy Rooms simplifies the process of reserving meeting spaces, ensuring efficient use of office real estate, while Envoy Deliveries guarantees that packages are successfully delivered to their intended recipients without causing congestion in mailrooms. This comprehensive approach by Envoy not only enhances operational efficiency but also enriches the overall workplace experience for everyone involved.
-
2
Amazon Web Services (AWS)
Amazon
Empower your innovation with unparalleled cloud resources and services.For those seeking computing power, data storage, content distribution, or other functionalities, AWS offers the essential resources to develop sophisticated applications with improved adaptability, scalability, and reliability. As the largest and most prevalent cloud platform globally, Amazon Web Services (AWS) features over 175 comprehensive services distributed across numerous data centers worldwide. A wide array of users, from swiftly evolving startups to major enterprises and influential governmental organizations, utilize AWS to lower costs, boost efficiency, and speed up their innovative processes. With a more extensive selection of services and features than any other cloud provider—ranging from fundamental infrastructure like computing, storage, and databases to innovative technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things—AWS simplifies the transition of existing applications to the cloud. This vast range of offerings not only enables businesses to harness the full potential of cloud technologies but also fosters optimized workflows and heightened competitiveness in their industries. Ultimately, AWS empowers organizations to stay ahead in a rapidly evolving digital landscape. -
3
A single platform offers endless opportunities to engage with both your customers and staff. Any application can be made secure with authentication capabilities. Okta enables you to swiftly develop experiences that are both secure and enjoyable. By integrating Okta's Customer ID products, you can assemble the necessary framework to ensure security, scalability, and dependability. Safeguard and empower your employees, contractors, and partners effectively. Okta’s workforce identification solutions ensure that your employees remain protected regardless of their location. You will be equipped with essential tools to streamline cloud transitions and facilitate hybrid work environments. Trusted by organizations worldwide, Okta is committed to safeguarding workforce identities while promoting seamless connectivity across various platforms. This reliability and trust make Okta a go-to choice for businesses aiming to enhance their security infrastructure.
-
4
exacqVision
exacq
Elevate security with adaptable, intelligent surveillance solutions today!Protect your vital assets with Exacq's state-of-the-art video surveillance systems, which incorporate integrated access control and intelligent analytics. Designed to accommodate both smaller installations and larger enterprise needs, Exacq's solutions deliver a security framework that evolves alongside your requirements. Established in 2002, Exacq has produced strong and adaptable surveillance systems featuring open platform software, allowing for easier integration with other technologies. Their offerings are versatile enough to serve multiple industries while effortlessly connecting with various access control systems, video analytics tools, and an extensive range of IP cameras. By choosing an Exacq video surveillance setup, you can easily link cameras, expand access points, and select the most suitable storage options for your specific situation. Moreover, exacqVision software enables you to customize deep learning analytics to fit your unique business needs. You have the flexibility to keep your current IP or analog cameras or switch to newer models, which can vary from high-resolution video systems to discreet, compact devices that still maintain top performance. In summary, Exacq delivers a holistic approach to surveillance, consistently addressing your security challenges while allowing for future growth and adaptability. This comprehensive solution ensures that your surveillance infrastructure remains robust and responsive to changing demands. -
5
Active Directory
Microsoft
Streamline management and secure access in your network.Active Directory functions as a central hub for storing information about a variety of objects in a network, which simplifies management and access for both users and administrators. It utilizes a structured format for data storage, allowing for a logical and hierarchical organization of directory information. This central repository, known as the directory, contains information about different Active Directory entities, typically including shared assets like servers, volumes, printers, along with user and computer accounts within the network. To gain a more comprehensive understanding of the Active Directory data repository, one can consult the section dedicated to the Directory data store. Integrated security protocols within Active Directory ensure secure logon authentication and regulate access to directory objects. With a single network logon, administrators can efficiently manage directory information and organizational hierarchies across the entire network while authorized users can easily access resources from any point within that network. Furthermore, policy-based administration enhances the management process, increasing efficiency even in complex network configurations. This system not only fortifies security measures but also optimizes resource management, thereby improving overall network operation effectiveness. By centralizing these functions, Active Directory becomes a vital component in maintaining a well-organized and secure networking environment. -
6
Ava
Ava
Empowering communication through inclusive, real-time captioning solutions.Ava is committed to delivering the best live captioning services for those who are deaf or hard-of-hearing, as well as for organizations that value inclusivity. By simply clicking a button, users can instantly generate captions during conference calls, no matter the platform they are using. To improve accuracy, bringing in a professional scribe can help make real-time adjustments. The Ava Closed Captions app, which works on both Mac and Windows, ensures captions appear over your video calls, shared screens, or presentations for a smooth viewing experience. Our collaborations include employers, educators, event planners, and advocates for accessibility who are dedicated to fostering an inclusive atmosphere for their deaf and hard-of-hearing attendees. Ava provides a transformative sense of independence in many areas of everyday life, reinforcing the idea that communication should be accessible to everyone. We invite you to share the Ava experience with your friends, family, and colleagues. With a goal to empower 450 million deaf and hard-of-hearing individuals, Ava envisions a future where accessibility is recognized as a fundamental right for all. Together, let us take part in this vital mission to promote inclusivity and support for everyone in our communities. This is not just about technology; it's about creating a world where everyone can communicate freely. -
7
Milestone CMS
Milestone
"Transform your website's performance with unparalleled SEO focus."Milestone CMS is distinguished as the first and only content management system that prioritizes SEO at its core. By addressing a range of technical SEO issues at the platform level, it frees users from the constant worry of monitoring problems related to crawlability, indexability, sitemaps, broken links, and redirects. It also ensures compliance with Google's Core Web Vitals, providing a fast and engaging mobile experience for users. Deployed on over 10,000 websites and generating more than 26 million page views each month across diverse sectors, this cloud-based CMS is recognized for being the quickest and most mobile-centric solution on the market. In addition to its speed, it integrates schema and specialized technologies for industries such as hospitality, restaurants, automotive, banking, retail, healthcare, and technology. Users have seen remarkable results, including a 100% increase in page load speed and a noteworthy 20-30% rise in leads and revenue after switching to Milestone CMS. Moreover, its versatility and comprehensive features make it an ideal selection for businesses looking to boost their online visibility and overall performance. This unique combination of attributes positions Milestone CMS as a leading choice for organizations striving to stay ahead in the digital landscape. -
8
Arcules
Arcules
Streamline security effortlessly with cloud-based surveillance solutions.Arcules is a cloud-based solution that consolidates data from various surveillance systems for enhanced security and more, designed to be user-friendly and efficient. The platform is compatible with multiple devices and can be deployed within minutes, significantly reducing both time and costs, which ultimately supports your business’s expansion. Our cost-effective subscription model guarantees that Arcules remains consistently updated with the latest security enhancements and patches. While investing in security is crucial, there's no need to overhaul your entire system or hire additional experts to implement it. Arcules is experiencing rapid growth, continuously adding more features that emphasize security, ease of use, flexibility, and overall quality. Picture having your entire organization accessible through a single interface; it's entirely achievable! You can conveniently access any camera from any device at any time. Furthermore, to benefit from integrated cloud security, there is no requirement for a complete system overhaul; you can easily utilize your current IP cameras and network equipment without any hassle. This adaptability makes Arcules an ideal choice for businesses looking to enhance their security without incurring excessive costs. -
9
HID Origo
HID
Revolutionizing access control with cloud-based efficiency and reliability.HID Origo is an innovative cloud-based platform created by HID Global that enables technology partners to develop cohesive physical access control solutions. This platform significantly improves service consistency while revolutionizing the way access control systems are implemented. In addition, HID Origo introduces flexible subscription models, leading to cost reductions and enhanced operational efficiency. It operates on a secure infrastructure backed by top-tier cloud service providers and adheres to industry certifications, all while conforming to HID Global’s service agreements and support frameworks. Users can conveniently manage a dependable network of cloud-connected access control devices, applications, and secure mobile identities from a single interface. By utilizing data efficiently, HID Origo ensures a seamless user experience, bolsters operational productivity, and aids in making informed strategic decisions. Ultimately, HID Origo establishes a strong and scalable framework that promises outstanding service quality and reliability. With such extensive features, HID Origo allows organizations to tackle the challenges of contemporary access control systems with both confidence and simplicity, positioning them for future growth and adaptability. -
10
Savance Enterprise
Savance Enterprise
Automated solutions, transparent pricing, tailored support, customer-driven excellence.Savance provides an automated and intuitive solution available for both on-premise and cloud deployment. Customers can have peace of mind knowing that our pricing model is clear, transparent, and all-inclusive, which eliminates any hidden charges. Not only is Savance Enterprise a strong software solution, but it also offers tailored support that emphasizes understanding and fulfilling our clients' requirements. In contrast to other wholesale distribution software, Savance Enterprise is distinctly customer-centric. As a privately owned and funded organization, we are dedicated to refining our offerings and ensuring that our clients receive outstanding service. Over the past twenty years, we have established our reputation by actively listening to customer input, upholding high standards, delivering exceptional service, and offering innovative solutions that provide optimal value. Built with cutting-edge technology, Savance Enterprise is designed to remain relevant and effective for future needs. Our platform is not only user-friendly but also fully scalable, allowing it to adapt to businesses of all sizes while automating various operational processes. This unwavering commitment to quality and innovation truly distinguishes Savance within the competitive landscape. Furthermore, we continuously strive to enhance our services, ensuring that we meet the evolving demands of our clients in an ever-changing market. -
11
YourSixOS
YourSix
Elevate security effortlessly with cloud-based intelligence and insights.Say goodbye to traditional, on-premise security solutions and welcome the future with YourSixOS, a modern, cloud-based security model. Our serverless system eliminates the hassle of cumbersome hardware and outdated software, providing you with a secure, user-friendly, and flexible security solution that fits seamlessly into your operations. YourSixOS stands out as the ultimate option for obtaining operational insights and dependable physical security. Our cloud-native platform guarantees exceptional scalability, strong data protection, and unparalleled visibility into your organization. By effectively bridging any gaps in your business oversight, you can leverage visual intelligence to gain a well-rounded understanding of every facet of your operations. This visual intelligence goes beyond simply safeguarding against risks like threats to physical assets or inventory shrinkage. It equips you with the tools needed to enhance customer experiences, improve productivity, and drive operational improvements. In short, it offers a real-time perspective on potential threats that could affect your bottom line, enabling proactive management and informed decision-making. Moreover, with YourSixOS, you can stay ahead of the curve and adapt to the ever-changing landscape of security needs. -
12
OpenEye
OpenEye
Unlock insights, enhance security, and elevate experiences effortlessly.Focus on the essential aspects by leveraging actionable insights that help you pinpoint opportunities for improving and expanding your environments. Our sophisticated cloud-managed video solutions integrate flawlessly with existing business frameworks, allowing you to enhance surveillance capabilities while simultaneously enriching the experiences of customers, employees, and students. OpenEye Web Services boosts organizational intelligence, reduces IT burdens, and maximizes overall value across your operations. With a wide-ranging clientele across different industries, OpenEye customizes its features and integrations to meet your unique needs, thus enhancing the experience for all stakeholders involved. Explore the benefits of OpenEye Web Services through a brief demonstration led by our experienced security experts. As you join the ever-growing community of satisfied users, you'll witness firsthand how OpenEye's cutting-edge products can significantly impact your organization, fostering a safer and more efficient environment for everyone involved. -
13
ASSA ABLOY Academy
ASSA ABLOY Academy
Empowering professionals with innovative training for modern openings.The Academy offers an extensive range of both digital and hands-on courses specifically tailored for end-users, installers, architects, integrators, and other relevant parties, focusing on the seamless incorporation of today’s complex door openings within buildings. These training pathways are designed to accommodate individuals at various skill levels, from beginners acquiring basic knowledge to experienced professionals seeking to stay updated on the latest technological innovations. In partnership with organizations, ASSA ABLOY Academy creates customized training programs that meet the specific needs of their employees. Additionally, the Academy has made notable advancements in its online training capabilities, providing certification evaluations and learning materials for technicians and sales staff that are now available through their Learning Management System (LMS). Moreover, they offer a mobile installation training showroom, a specially outfitted tractor trailer that functions as a comprehensive mobile classroom and display area, staffed by ASSA ABLOY Academy instructors, which facilitates on-site training for clients. This creative strategy not only guarantees that training is easily accessible but also keeps it aligned with the evolving demands of the industry, ensuring that all participants can benefit from high-quality educational experiences. Such initiatives underline the Academy’s commitment to fostering a skilled workforce adept at navigating the complexities of modern building requirements. -
14
SiteMaster 200
Allegion
Streamline key management for enhanced security and efficiency.The SiteMaster 200, an essential key control software developed by Schlage, is designed to assist organizations in effectively managing their mechanical key systems. Users can oversee various key systems by categorizing them according to client, manufacturer, and top master key, while also having the capability to create new systems and expand or duplicate existing ones. This software meticulously tracks key histories, displays interchanges across different key systems, and maintains a thorough record from the moment of issuance to instances of loss, return, damage, or when keys are left unassigned. Users can quickly modify and add doors, search for specific keys, and assign them to doors without needing to have prior product assignments for cylinders, and they can also import existing systems and personnel data efficiently using intuitive import wizards. Furthermore, there is an upgrade option available that enhances the lock shop functionality, providing additional benefits specifically for locksmiths and their teams. The inclusion of an electronic validation feature simplifies the management of order approvals for restricted key systems, thereby minimizing the need for paperwork and boosting overall efficiency. This extensive range of features positions SiteMaster 200 as an indispensable resource for organizations aiming to streamline and optimize their key management processes, ultimately leading to improved operational effectiveness and security. -
15
HID Fargo Connect
HID
Streamline card issuance with enhanced security and efficiency.HID Global's innovative card issuance solution, HID Fargo Connect, revolutionizes complex procedures, reduces costs, and integrates all elements of a secure card issuance program into a unified platform. It maintains compliance with HIPAA and FERPA standards by utilizing end-to-end encryption to ensure data security. Users can effortlessly design and share new card templates through an intuitive web-based tool, enhancing collaboration within the system. By streamlining the management of smart cards during the issuance process, it significantly saves time, reduces errors, and increases production efficiency. The platform provides users with clear visibility into the workflow, leading to improved operational efficiency and enhanced security, all while simplifying the overall process. Furthermore, HID Fargo Connect's secure cloud-based infrastructure integrates hardware, software, consumables, and services, which simplifies the operations and support required in ID card issuance offices. This comprehensive system not only enhances control and security but also empowers organizations to respond rapidly to changing demands, making it a transformative solution in the realm of card issuance. Ultimately, the adaptive features of HID Fargo Connect position organizations to meet future challenges effectively. -
16
Avigilon
Avigilon
Empowering proactive security with seamless, AI-driven solutions.Our integrated solutions for video surveillance, cloud services, and access management seamlessly function within your overall security system, guaranteeing that you receive essential information right when you need it—allowing for confident decision-making. Fueled by advanced AI and video analytics, our approach emphasizes ease of use, enabling you to focus on what is most important. Operators frequently spend a large amount of their time trying to identify suspicious activity, resulting in detection rates dropping to below 5% after just 20 minutes of observation. In addition, they dedicate only about 10% of their efforts to verifying security incidents—tasks that are best performed by humans when they have sufficient time. This situation severely limits the chance for operators to collaborate actively on implementing effective measures that could prevent negative outcomes. To address this, our comprehensive video security, cloud, and access control solutions, enhanced by AI, provide you with timely and pertinent insights that empower you to make well-informed choices. By optimizing these workflows, we strive to enhance the overall effectiveness and efficiency of your security operations while also fostering a more proactive security posture. Thus, our innovation not only bolsters your current measures but also opens new avenues for safeguarding your environment.
- Previous
- You're on page 1
- Next