Tue, 22 Oct 2024 08:26:23 GMTversion: 0.1.16
Background image
Products

Software Platforms

Integrated Corporation Logo

Software Platforms

We are one of the very few leading high-end security solution providers which have our own dedicated in-house research and development laboratory, we are passionate about technological innovation and software design. Built with flexibility and security in mind, our range of professional software platforms can bring out the maximum capabilities of hardware system.

iPlatform Smart Security Management
iPlatform Smart Security Management
  1. A powerful real-time security management platform for enterprise use
  2. Supports the latest biometric technologies including facial recognition and fingerprint verification
  3. Supports both industry standard and tailor-made applications, including Access Control, Attendance, POS, Lift Control, CCTV, e-Map, Alarm, Real-time Security Monitoring, Car Park, Service Subscription and third party applications
  4. Flexible and modularized design enabling an expanding network of access points
  5. Multiple time zones definition and grouping
Intervex IoT Platform
Intervex IoT Platform
  1. Powerful Device Management
  2. Smart IoT Alert
  3. Intelligent Sync
  4. Different kinds of scenarios
  5. Comprehensive security management platform
FaceX Face Recognition System
FaceX Face Recognition System
  1. Captures real-time faces for attendance
  2. Captures, compares and authorizes access
  3. Location tracking, time-zone setting, tracing on e-Map
  4. Customize VIP and blacklist face database
  5. Quick face registration
iScholar Smart Campus Management
iScholar Smart Campus Management
  1. Real-time attendance reports for students and teachers at your finger tips
  2. Supports web browsers and Wechat instant notification
  3. Boost the confidence of students by praising good work and achievements
  4. Ensures the efficient allocation of school resources, simplifying school management
Java Embedded Security System (JESS)
Java Embedded Security System (JESS)
  1. Point-to-point encryption in all data communication
  2. Mutual-authentication between server software, controllers and readers
  3. Utilizes Java EE n-Tier architecture to achieve enterprise-grade extensibility and scalability
  4. Real-time encrypted data upload (e.g. status, events and transactions)
  5. Unlimited shift table and roster table definitions
Our Customers

Contact Us

Get Started With A Product Demo

Schedule a demo with our team and see exactly how Integrated can work for you and your organization.

(852) 2544 8580