Your sector of activity - TIL Technologies

Sensitive sites, prisons and military sites

imprimer ajouter aux favoris

Regardless of the objective (prisoner isolation; access control to armament and equipment; protection of strategic comandment zones and confidential information), sensitive sites have a common point when it comes to putting in place reinforced security measures.
To prevent piracy, espionnage, sabotage or escape, strong authentication solutions must be implemented ensuring impermeability (biometry, double identification, video control…) and security (encryption, security keys…).

collectivites

TIL TECHNOLOGIES offers 4 different types of solutions:

Control access to sites and facilities

  • Authenticating users with biometry, reinforced controls (badge + keypad code) or visual control (video verification).
  • Customising access rights: access to sensitive zones based on specific profiles, grades, schedules and validity dates.
  • Monitoring sites and surrounding areas by implementing video surveillance and perimeter intrusion detection (active gates, infrarred barriers…) solutions.
  • Optimizing field inspection with the round assistance tool or portable readers for randomized controls.

Protect staff and individuals

  • Isolating access to areas where hazardous goods (explosives, guns, etc…) are stored. Access is granted depending on technical authorisations or staff grades.
  • Limiting access by implementing single access detection solutions.
  • Detecting any staff anomaly by monitoring LWP (Lone Worker Protection) equipments.
  • Managing crisis and evacuations with a POB (People on board) assistance plan: real-time inventory, zone updates (secured/ non secured areas), edition of organization charts…

Control circulation

  • Implementing single access detection solutions (turnstiles, controlled single-file lines…)
  • Managing site visitors and subcontractors via a specific interface containing preregistration, ID card scan, real-time presence and other features.
  • Monitoring distant access by integrating interphone and video verification solutions.
  • Facilitating car access by implementing long-distance badge readers or car plate recognition solutions.

Communication, data and system protection

  • Ensure offline availability in case of network failure (autonomous access control units) or server failure (redundancy).
  • Prevent badge piracy (cloning) by securing access to badge data via encrypted keys.
  • Control security staff actions (history of operator actions).
  • Protect confidentiality of certain badge carriers by using the invisible list feature: their circulation is not visible for certain operators (information will be displayed depending on access rights).
  • Share databases to prevent duplicates (errors, access rights failure, etc.).

Downloads

References

  • Naval Defense (DCNS)
  • Armée de l’air (French Air Force)
  • Armée de terre (French Army)
  • Casabianda prison
  • Prison of La Réunion
  • Marseille juvenile centre
  • Charleroi Law Court
  • Court of Marseille
  • Court of Metz
  • Ministry of Defense
  • AIEA
  • CEA
  • EADS
  • DASSAULT
  • GEMALTO
  • OBERTHUR


Commitment

Les engagements TIL TECHNOLOGIES

TIL wants to achieve economic performance in respecting the environment and social equity.

Support

HOTLINE, AND AFTER-SALES SERVICE

Download the after-sales service form

Newsletter

Stay informed on our latest news: receive our NEWSLETTER.

Quality approach

Quality approach

With the ISO 9001:2015 certification we ensure an ever-increasing level of quality.

Copyright © 2017 TIL TECHNOLOGIES. All rights reserved.

notre métieur: la sécurité sans faille