Electronic security

A reliable partner in security questions

We are a security partner with global presence, vast experience, and products and solutions backed by customized service – for today and tomorrow.

There is a great potential for risk – terrorism and extremism, environmental catastrophes, fire, robbery, burglary and spying, theft and vandalism. These risks must be identified and analyzed and the appropriate security concepts have to be developed.

Prevention, intervention and rescue measures can be implemented for many of these risks within the framework of legal standards and guidelines. The aim is to make the future more secure through defined risk management. This means investment for companies, but also benefits:

  • Transparency

  • Confidence of staff members and business partners

  • Improvement in company image

  • Better credit ranking and clarity about the risk situation

Expert risk assessment

  • Risk identification
    Definition of value-added areas, consideration of the macro environment, analysis of weak points, risk determination, analysis of effects.

  • Risk assessment
    According to effect and probability, quantitative evaluations, representation of a risk portfolio.

  • Risk measures
    Organizational measures, e.g. a crisis management organization, technical measures such as the introduction of security equipment and systems

  • Risk controlling
    In addition to activities that are your personal responsibility, we also offers “extended services” – a wide range of services that support holistic risk control for the property or building.

Based on our experience of more than 30 years in security, combined with our in-depth understanding of the security risks in the hospitality industry, we provide unique tailored solutions. We are a reliable solution provider able to support you with a global presence, having executed projects all over the world in every type of application.

Intrusion detection

Naivety and carelessness help burglars just as much as inadequate security measures. Therefore, protection must be both passive and active:

  • Passive through mechanical protection equipment

  • Active with an electronic alarm system

The additional observance of simple security rules and the necessary everyday prudence are another significant contribution to minimize risk. Optimum protection of people and buildings is based on the following four pillars:

  • Prudence as free-of-charge protection

  • Mechanical protection equipment as the first line of defense

  • Electronic robbery and burglar alarm systems for the reliable detection of dangers

  • Forwarding alarms for the immediate notification of personnel providing assistance

Access control

In the open hotel environment,  ensuring that the right people have access to the right areas is crucial to safeguard guests, staff and assets. At Siemens, we know that the future of a company is also a question of security technology and therefore, the right technology for access control. The aim is to qualify access authorization and, at the same time, flexibly adapt the authentication of persons to the individual corporate requirements, as well as to be able to individually configure access rights both geographically and chronologically.

The requirements mentioned  can only be resolved with the aid of modern systems for access control. Therefore, open system solutions with flexible networks are required. They are only configured under consideration of the intended use of the building and the organization involved. Its special structures and the specific workflows also have an effect. Factors such as the size of the company, the number of people, doors, elevator and access gate control as well as additional functions also have to be taken into account.

Future-oriented solutions include not only the linking of business management applications, but also the integration of other security systems. When linked to the building management systems, the information can also be optimally used under energy performance aspects. Our products and systems provide high levels of security and convenience, offering freedom of movement in a secure environment everywhere they are installed.

The products and systems are flexible, scalable and easy to use. They meet customer needs that range from providing security at a single entry point to overcoming the security challenges faced by large multinational corporations with thousands of doors and cardholders at different locations around the world.

Video Surveillance

Video surveillance has a proven a key element of any modern security system, acting both as a deterrent and a valuable asset in post-event analysis.

In sophisticated security concepts, the video system provides the visual basis for decisions and plays a central role – in addition to real-time monitoring of critical areas – in the identification of persons with the aid of biometric processes, and in the detection of dangers.

Communication between the video system and the control center is performed using TCP/IP via any Ethernet, ATM or TN network structure. In conjunction with a video web client, operation, control and access is possible from anywhere in the world.   

Mobile video systems
Whether for the monitoring of external installations, live coordination of service personnel or the management of mobile business activities, the high-speed availability of data and images is a task performed by mobile multimedia monitoring systems. Numerous detectors and cameras aregrouped around a mobile digital system that can store multimedia information and quickly pass this on via modern communication networks.

Stationary digital room surveillance
Stationary systems are used for specific room surveillance using the existing IT infrastructures. These systems detect changes and monitor various alarm zones. If an alarm is triggered, the video sequences are recorded digitally and forwarded to higher-level management systems.

Recording alarm situations
Video surveillance not only detects incidents, but documents the entire process when an incident occurs – from the recording of the video images, the transmission and storage of this information, the initiation of automatic measures through to centralized data evaluation and archiving.

Video control centers
Communication between the video system and the control center is performed using TCP/IP via any Ethernet, ATM or TN network structure. In conjunction with a video web client, operation, control and access is possible from anywhere in the world.