What Integrates with Feenics Access Control?
Find out what Feenics Access Control integrations exist in 2025. Learn what software and services currently integrate with Feenics Access Control, and sort them by reviews, cost, features, and more. Below is a list of products that Feenics Access Control currently integrates with:
-
1
Envoy
Envoy, Inc.
Free 42 RatingsEnvoy is changing workplaces for hybrid work by safely bringing people together to connect, collaborate, and thrive. Envoy's workplace platform has revolutionized how companies welcome visitors, keep their employees safe, book conference rooms and desks, and manage deliveries in more than 14,000 locations around world. Envoy Visitors welcomes guests with more than 100,000 sign-ins per day. They also protect people, property, ideas, and their personal information. Envoy Protect ensures that employees are well and coordinates their schedules before they arrive on-site. Employees can reserve a desk at Envoy Desks for any day they are in the office to work with colleagues. Envoy Rooms is a simple way to book meeting rooms and free up space. Envoy Deliveries ensures that packages reach their recipients without any mailroom pile-ups. -
2
If you're in need of computing power, database solutions, content distribution, or various other functionalities, AWS offers a wide array of services designed to assist you in developing advanced applications with enhanced flexibility, scalability, and reliability. Amazon Web Services (AWS) stands as the most extensive and widely utilized cloud platform globally, boasting over 175 fully functional services spread across data centers worldwide. A diverse range of customers, from rapidly expanding startups to major corporations and prominent government bodies, are leveraging AWS to reduce expenses, enhance agility, and accelerate innovation. AWS provides a larger selection of services, along with more features within those services, compared to any other cloud provider—covering everything from fundamental infrastructure technologies like computing, storage, and databases to cutting-edge innovations such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. This breadth of offerings facilitates a quicker, simpler, and more cost-effective transition of your current applications to the cloud, ensuring that you can stay ahead in a competitive landscape while taking advantage of the latest technological advancements.
-
3
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
4
Ava
Ava
$119 per monthAva is dedicated to equipping individuals who are deaf or hard of hearing, as well as inclusive organizations, with an exceptional live captioning solution suitable for any circumstance. With just a single click, you can instantly generate captions for your conference calls, regardless of the platform you utilize. To enhance accuracy, you can also enlist a professional scribe for immediate corrections in real time. Ava Closed Captions, compatible with both Mac and Windows, ensures that captions are always visible above the video call, shared screen, or presentation, allowing you to engage comfortably. Our collaboration extends to employers, educators, event planners, and accessibility advocates who aim to fully integrate their deaf and hard-of-hearing participants. By using Ava, you gain a significant degree of independence in various aspects of your daily routine. Everyone deserves access to effective communication, and we encourage you to spread the word about Ava to your friends, family, and colleagues. With a mission to empower 450 million deaf and hard-of-hearing individuals, Ava strives to create a world where accessibility is the norm. This vision not only enhances communication but also promotes inclusivity across all sectors of society. -
5
exacqVision
exacq
FreeSafeguard your essential assets with Exacq's advanced video surveillance solutions, which include integrated access control and smart analytics. Tailored to suit both small-scale setups and extensive enterprise requirements, Exacq's video solutions offer a security framework that adapts to your current and future demands. Since its inception in 2002, Exacq has developed robust and scalable surveillance options featuring open platform software that simplifies integration. Their products are versatile enough to function across various sectors while seamlessly connecting with numerous access control systems, video analytics software, and thousands of IP cameras. By opting for an Exacq video surveillance system, you gain the flexibility to link cameras, expand access points, and choose the appropriate storage solutions for your needs. Furthermore, exacqVision software empowers you to tailor deep learning analytics specifically to your business requirements. You can either maintain your existing IP or analog cameras or opt for modern alternatives, which range from high-quality video systems to compact, unobtrusive devices that deliver excellent performance. Ultimately, Exacq provides a comprehensive approach to surveillance, ensuring your security needs are consistently met. -
6
Active Directory
Microsoft
$1 per user per monthActive Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective. -
7
Arcules
Arcules
Arcules is a user-friendly, cloud-based solution that consolidates and clarifies your surveillance system's data for enhanced security and more. Our platform is device-agnostic, featuring a straightforward plug-and-play setup that can be completed in mere minutes, thereby conserving both time and resources while allowing for seamless adaptation as your business evolves. Regular updates and security enhancements are included in our cost-effective subscription model, ensuring your security infrastructure remains current and reliable. Investing in security is crucial, but it shouldn't necessitate the purchase of an entirely new hardware system or the hiring of a specialist for effective use. As Arcules continues to expand, we are integrating even greater levels of security, simplicity, and flexibility into our offerings. Envision having your entire organization easily accessible through a single interface—it's a reality! With the ability to access any camera from any device at any time, the need for extensive overhauls to enjoy the advantages of integrated cloud security is obsolete. You can continue utilizing your current IP cameras and network equipment without disruption. Furthermore, our commitment to innovation means that we are always looking for ways to enhance your experience and security capabilities. -
8
Avigilon
Avigilon
Our comprehensive video security, cloud, and access control solutions work in harmony throughout your entire security framework, ensuring you receive critical information precisely when you need it, enabling you to respond swiftly and effectively. With cutting-edge AI and innovative video analytics driving our technology, we prioritize simplicity and user-friendliness, allowing you to concentrate on what truly counts. Operators typically invest most of their time searching for suspicious activities, achieving a detection rate of under 5% after just 20 minutes, which highlights the challenge they face. Additionally, around 10% of their time is dedicated to verifying security events—an area where human judgment excels when sufficient time is available. This leaves minimal opportunity for operators to engage in proactive collaboration on strategies that could avert adverse incidents. By integrating our video security, cloud, and access control systems with advanced AI, we ensure that the information you receive is timely and actionable, empowering you to make informed decisions swiftly and effectively. In doing so, we not only enhance security measures but also optimize operator efficiency and collaboration. -
9
Milestone CMS
Milestone
The Milestone CMS stands out as the first and only content management system designed with SEO as its primary focus. By tackling various technical SEO challenges at the platform level, it eliminates the need for users to constantly check for issues such as crawlability, indexability, sitemaps, broken links, and redirects. Additionally, it uniquely ensures that your website meets the guidelines set by Google's Core Web Vitals, guaranteeing a swift and engaging mobile experience. With deployment across over 10,000 websites and more than 26 million page views monthly spanning various industries, this cloud-based CMS is not only the fastest and mobile-first solution available but also incorporates schema and technologies tailored for sectors including hospitality, restaurants, automotive, banking, retail, healthcare, and technology. Clients have reported impressive outcomes, such as a 100% increase in page load speed and a significant 20-30% boost in leads and revenue following the implementation of the Milestone CMS. Furthermore, the system's adaptability and robust features make it a preferred choice for businesses aiming to enhance their digital presence and performance. -
10
HID Origo
HID
HID Origo is a cloud-based platform developed by HID Global that facilitates the creation of integrated physical access control solutions by technology partners. This innovative platform not only enhances service consistency but also transforms the delivery of access control systems. Furthermore, HID Origo paves the way for the implementation of adaptable subscription models while simultaneously lowering expenses and boosting operational productivity. Rely on a secure framework supported by leading cloud service providers, recognized through industry certifications, and delivered according to HID Global’s service agreements and support structures. In one centralized location, users can access and manage a reliable network of cloud-connected access control devices, applications, and secure mobile identities. Leveraging data effectively ensures a smooth user experience, supports operational efficiency, and informs strategic business decision-making. Ultimately, HID Origo delivers a robust and scalable infrastructure that guarantees exceptional service quality and reliability. With its comprehensive capabilities, HID Origo empowers organizations to navigate the complexities of modern access control with confidence and ease. -
11
Savance Enterprise
Savance Enterprise
Savance offers a highly automated solution that is user-friendly, whether deployed on-premise or in the cloud. With Savance, you can rest assured that there are no unexpected costs, as our pricing is straightforward, transparent, and comprehensive. Savance Enterprise is not only a robust software solution but also comes with personalized support, where we prioritize listening to and addressing our clients' needs. Unlike other wholesale distribution software, Savance Enterprise places a strong emphasis on being customer-driven and focused. As a privately held and funded company, our commitment lies in enhancing our product and ensuring our customers receive top-notch service. Over more than two decades, we have built our reputation by responding to customer feedback, maintaining high standards, delivering exceptional service, and providing innovative solutions that offer the best value. Savance Enterprise is crafted using the latest technology, guaranteeing its relevance and effectiveness for future demands. Our system is designed to be user-friendly, fully scalable to accommodate businesses of any size, and highly automated, ensuring it meets a diverse range of operational needs. This commitment to excellence and innovation sets Savance apart in the industry. -
12
YourSixOS
YourSix
Bid farewell to old-fashioned, on-premise security solutions. With YourSixOS, you can embrace a contemporary security model through our serverless, cloud-centric system. Say goodbye to the burdens of bulky hardware and outdated software – experience a user-friendly, secure, and adaptable security solution right at your fingertips. When it comes to operational insights and reliable physical security, YourSixOS is the definitive choice. Our cloud-native platform offers unmatched scalability, robust data protection, and an exceptional level of visibility into your organization. By closing the gaps in your business's oversight, you can harness your visual intelligence to gain a comprehensive understanding of all aspects of your operations. Visual intelligence transcends mere protection against risks such as threats to physical assets or inventory loss. It empowers you to enhance customer experiences, boost productivity, and foster operational enhancements. In essence, it delivers a real-time view of every threat that could impact your profitability, allowing for proactive management and strategic decision-making. -
13
OpenEye
OpenEye
Maintain your concentration on the most crucial elements by utilizing actionable insights that allow you to identify opportunities for enhancing and expanding your environments. Our advanced cloud-managed video solutions seamlessly integrate with your current business frameworks, enabling you to elevate your surveillance capabilities while improving experiences for customers, employees, and students alike. OpenEye Web Services enhances organizational intelligence, minimizes IT workload, and maximizes value throughout your entire operation. With a diverse clientele spanning various sectors, OpenEye adapts its features and integrations to suit your specific requirements, thereby enriching everyone's experience. Discover the advantages of OpenEye Web Services through a concise demonstration presented by our knowledgeable security professionals. Join the growing community of satisfied users reaping the benefits of OpenEye's innovative products, and see how they can make a difference in your organization. -
14
ASSA ABLOY Academy
ASSA ABLOY Academy
The Academy provides a combination of online and practical courses specifically designed for end-users, installers, architects, integrators, and others, emphasizing the effective integration of modern complex door openings within architectural designs. With training paths crafted to accommodate all experience levels, it serves newcomers who are just starting their careers and also caters to seasoned professionals eager to keep up with evolving technologies. ASSA ABLOY Academy collaborates with businesses to develop tailored training initiatives for their workforce. In addition to its ongoing advancements in online training, the Academy offers certification exams and educational resources for technicians and sales representatives through its Learning Management System (LMS), accessible to all participants. Furthermore, the innovative mobile installation training showroom, housed in a specially designed tractor trailer, is fully equipped as a mobile classroom and is staffed by expert instructors from ASSA ABLOY Academy, facilitating on-site training directly for clients. This commitment to education ensures that all participants are well-prepared to tackle the challenges of the industry. -
15
SiteMaster 200
Allegion
The SiteMaster 200, a pivotal key control software from Schlage, is engineered to help organizations efficiently manage their mechanical key systems. This software provides the capability for users to monitor various key systems categorized by client, manufacturer, and top master key while also facilitating the creation of new key systems and the expansion or duplication of those already in use. It meticulously tracks key histories, reveals interchanges between different key systems, and preserves a comprehensive record from inception to issuance, loss, return, damage, or when a key is left unassigned. Users have the flexibility to modify and add doors instantly, search for keys, and assign them to doors without needing prior product assignments for cylinders, while also enjoying the convenience of importing existing systems and personnel data swiftly via user-friendly import wizards. Additionally, there is an upgrade option for a lock shop enhancement that provides further advantages for locksmiths and their teams. The software's electronic validation feature streamlines the management of all order approvals for restricted key systems, thereby reducing the reliance on paperwork and enhancing overall efficiency. This comprehensive suite of features makes SiteMaster 200 an invaluable tool for organizations looking to optimize their key management processes. -
16
HID Global's cloud-driven card issuance solution, HID Fargo Connect, streamlines intricate processes, lowers expenses, and consolidates all components of a secure card issuance program into a cohesive and integrated framework. It adheres to HIPAA and FERPA data privacy standards by employing end-to-end encryption for enhanced protection. The platform enables users to create new card templates that can be easily shared within the system using a user-friendly, web-based card design tool. By efficiently managing smart cards during the issuance phase, it saves valuable time, minimizes mistakes, and boosts production rates. Users benefit from comprehensive visibility, improved efficiency, and heightened security throughout the entire card issuance workflow while also reducing overall complexity. Moreover, HID Fargo Connect's secure cloud-based architecture includes a combination of hardware, software, consumables, and services, thereby simplifying operations and support in ID card issuance offices, ultimately enhancing control and security measures. This innovative approach not only transforms card issuance but also positions organizations to adapt swiftly to evolving needs.
- Previous
- You're on page 1
- Next