
Frequently asked questions
Why can’t I just use a more secure key?
Will I have to modify my infrastructure cabinets to install your solution?
How does this improve my management process?
Who manages the software?

Frequently asked questions
Why can’t I just use a more secure key?
A simple key replacement allows you to control who has access to your infrastructure until you issue the first key. Due to the nature of physical keys, there’s no audit trail or way of preventing sharing.
Will I have to modify my infrastructure cabinets to install your solution?
How does this improve my management process?
Who manages the software?

Frequently asked questions
Why can’t I just use a more secure key?
Will I have to modify my infrastructure cabinets to install your solution?
All of our solutions are made to install quickly and covertly on existing mounting points that are concealed within the enclosure. The online solution does not require any drilling for the access control reader.
How does this improve my management process?
Who manages the software?

Frequently asked questions
Why can’t I just use a more secure key?
Will I have to modify my infrastructure cabinets to install your solution?
How does this improve my management process?
With real-time data and control over your assets, you’re able to better protect your infrastructure and use reports to identify trends in access requests and visits, as well as access offenders.
Who manages the software?

Frequently asked questions
Why can’t I just use a more secure key?
Will I have to modify my infrastructure cabinets to install your solution?
How does this improve my management process?
Who manages the software?
Genetec understands that organizations may not always have the resourses to manage daily access management and changes. That’s why we developed a simple cloud-based access management tool that’ll distribute the management of the software to the individual and area owners.