{"id":8955,"date":"2022-04-07T11:41:36","date_gmt":"2022-04-07T09:41:36","guid":{"rendered":"https:\/\/www.inaz.it\/software-and-solutions\/detection-and-access-control-systems\/"},"modified":"2022-05-09T13:17:56","modified_gmt":"2022-05-09T11:17:56","slug":"detection-and-access-control-systems","status":"publish","type":"page","link":"https:\/\/www.inaz.it\/en\/software-and-solutions\/detection-and-access-control-systems\/","title":{"rendered":"Detection and access control systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8955\" class=\"elementor elementor-8955 elementor-1300\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8e00b85 elementor-section-height-min-height elementor-section-items-stretch elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default\" data-id=\"8e00b85\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d22658a\" data-id=\"d22658a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69b60bb elementor-widget elementor-widget-heading\" data-id=\"69b60bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Detection and access control systems<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b381583 elementor-widget elementor-widget-heading\" data-id=\"b381583\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprehensive solutions that integrate systems for detection, control and authorization of access in the company<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5062911 elementor-widget elementor-widget-text-editor\" data-id=\"5062911\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Choose Inaz solutions to securely manage access and attendance tracking in the workplace.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f4d8e1 elementor-section-height-min-height elementor-section-items-stretch elementor-hidden-desktop elementor-section-full_width elementor-section-height-default\" data-id=\"4f4d8e1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d34f1d2\" data-id=\"d34f1d2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96ad741 elementor-widget elementor-widget-spacer\" data-id=\"96ad741\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe26438 elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe26438\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7328415\" data-id=\"7328415\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ff6bdc elementor-widget elementor-widget-heading\" data-id=\"6ff6bdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detection and access control systems<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e1ef8a elementor-widget elementor-widget-heading\" data-id=\"4e1ef8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprehensive solutions that integrate systems for detection, control and authorization of access in the company<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-754dd8a elementor-widget elementor-widget-text-editor\" data-id=\"754dd8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Choose Inaz solutions to securely manage access and attendance tracking in the workplace.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d48ec12 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d48ec12\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-237ec49\" data-id=\"237ec49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25f88da elementor-widget elementor-widget-heading\" data-id=\"25f88da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your work environment with Inaz access control and detection systems<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7773ba elementor-widget elementor-widget-text-editor\" data-id=\"d7773ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many people come in and out of the company every day: from employees, to external suppliers, to visitors, and the need for companies to have greater protection and security in terms of access to company premises is growing.<\/p><p>Inaz offers a range of comprehensive and flexible solutions that integrate <strong>detection, control<\/strong>, <strong>access<\/strong> <strong>authorization<\/strong> and <strong>data acquisition<\/strong> <strong>systems<\/strong> with an innovative and comprehensive set of <strong>hardware components<\/strong>.<\/p><p>We provide<strong> web-based systems<\/strong> that are simple to configure and easy to use, yet capable of <strong>monitoring from one to hundreds of gates<\/strong>.<\/p><p>All company <strong>access detection and control<\/strong> systems can be customized and integrated with the solutions already implemented in the company:<\/p><ul><li>personnel management and attendance recording<\/li><li>license plate reading and recognition<\/li><li>anti-intrusion and anti-fire systems<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd0aad2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd0aad2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0b4a77\" data-id=\"e0b4a77\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f73428 elementor-widget elementor-widget-heading\" data-id=\"5f73428\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Control, security and access: the advantages  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d1a412 elementor-widget elementor-widget-text-editor\" data-id=\"2d1a412\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With <strong>access control and security software, <\/strong>your business will benefit from multiple <strong>advantages<\/strong>:<\/p><ul><li>Increased safety in the workplace, with control of the passage and stay of employees, collaborators and external visitors<\/li><li>Improved management control of the movement of people and resources<\/li><li>Simple, fast and automatic logging and access authorization<\/li><li>Centralization of information for statistical and business intelligence purposes<\/li><li>Fairness in data access and cost control<\/li><li>Choice of various communication protocols and operational access management through a single database<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d73fd2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d73fd2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e881d48\" data-id=\"e881d48\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a5d25c0 elementor-widget elementor-widget-heading\" data-id=\"a5d25c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">See the solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6a5cdf elementor-posts--thumbnail-top elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"b6a5cdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;custom_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:64,&quot;sizes&quot;:[]},&quot;custom_columns&quot;:&quot;3&quot;,&quot;custom_columns_tablet&quot;:&quot;2&quot;,&quot;custom_columns_mobile&quot;:&quot;1&quot;,&quot;custom_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;custom_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.custom\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t      <div class=\"ecs-posts elementor-posts-container elementor-posts   elementor-grid elementor-posts--skin-custom\" data-settings=\"{&quot;current_page&quot;:1,&quot;max_num_pages&quot;:0,&quot;load_method&quot;:&quot;&quot;,&quot;widget_id&quot;:&quot;b6a5cdf&quot;,&quot;post_id&quot;:8955,&quot;theme_id&quot;:8955,&quot;change_url&quot;:false,&quot;reinit_js&quot;:false}\">\n      <div class=\"elementor-posts-nothing-found\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Detection and access control systems Comprehensive solutions that integrate systems for detection, control and authorization of access in the company Choose Inaz solutions to securely manage access and attendance tracking in the workplace. Detection and access control systems Comprehensive solutions that integrate systems for detection, control and authorization of access in the company Choose Inaz [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":8947,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8955","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/pages\/8955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/comments?post=8955"}],"version-history":[{"count":5,"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/pages\/8955\/revisions"}],"predecessor-version":[{"id":16624,"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/pages\/8955\/revisions\/16624"}],"up":[{"embeddable":true,"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/pages\/8947"}],"wp:attachment":[{"href":"https:\/\/www.inaz.it\/en\/wp-json\/wp\/v2\/media?parent=8955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}