ContactPlease get in touch. We will be pleased to assist you.
+49 89 68004 - 0
(Mon. to Fri., 8:00 am to 5:00 pm)
Service & Repair
+49 89 68004 - 666
Mon. to Thurs., 8:00 am to 5:00 pm
Fri., 8:00 am to 4:00 pm
Questions concerning DEXICON: email@example.com
Questions concerning INTUS COM: firstname.lastname@example.org
Other questions: email@example.com
Our partnerPCS works with approximately 100 software and system house partners from all over the world. They offer security solutions based on INTUS products and addressing all areas of production data collection and security technology.
CareerWe are constantly looking for new, committed colleagues to strengthen our team.
The natural border to the outside world.
The perimeter of an enterprise defines its natural border separating it from the outside world.
All the business processes take place within one or several buildings. This means that perimeter protection is vital for the protection of the entire business.
It’s a good idea to integrate perimeter protection with the overarching security concept to efficiently secure the enterprise. Elements of perimeter protection include access control, fencing, barriers and video cameras.
- Multi-factor authentication for increased security:
RFID, PIN, biometrics.
- Customizable security profile for weekends and nighttime hours.
- Integrated video surveillance for critical insights.
- Integration with hazard management systems.
- Vehicle access control and perimeter protection.
The seamless interaction of perimeter protection and people access control with visitor management and vehicle access control increases security and is more convenient for your visitors and suppliers.
- Access control based on RFID technology.
During regular working hours, RFID access readers grant access to the premises upon presentation of an RFID card. At night or during weekends users may be additionally required to enter a PIN code for increased security.
- Multi-factor authentication using biometrics.
Checking a biometric characteristic enhances security even further. In perimeter protection, biometric technologies such as fingerprint reading or palm vein authentication are used to verify the holder of an employee ID card. Three-factor protection may be implemented by additionally requesting entry of a PIN code.
- Integration with a hazard management system.
Via the OPC server, DEXICON connects to a hazard management system such as WinGuard or GEMOS. This turns PCS access control into an integral part of building management.
- Video surveillance to brighten up dark corners.
Integrating access control with video surveillance allows your security personnel to see what’s going on when an alarm was triggered so that they immediately can take appropriate action. The solution also minimizes false alarms.
- Secure card management.
The right RFID card technology is the basis for many applications, from access control at online readers or door terminals to payment in the cafeteria or at a soda vending machine.
We recommend the following products for secure access control:
Services of PCS Systemtechnik.
We support you all the way from consulting to maintenance. You are free to choose the service you need and would like to make use of.
We create a sustainable security concept for all your needs together with you.
Developing a comprehensive security concept can be a challenge. We'll gladly assist you.
Based on your security concept we create a detailed project plan.
A professional installation is a prerequisite for a successfully use of software and years of trouble-free operation of the devices.
To ensure a smooth start to the new system, we train your employees in all necessary skills.
You have the choice: maintenance contracts, Software maintenance contracts, equipment service, remote maintenance, preventive maintenance. We’ll support you as you like.
Your PCS Contact
Managing Director - Sales
Phone.: +49 89 68004 - 0