Mobile credential supply & deployment
We live in a mobile-first world and these devices are used in all areas of our personal and professional lives. They bring many benefits when it comes to convenience, simplicity, application options and reliability, all with enhanced levels of security. Mobile devices have become even more important with the move to frictionless interaction and the reduction of contact.
The evolution of access control sees the credential now being deployed to a phone, tablet or wearable smart device to allow the owner to gain entry. This approach provides more convenience for the holder, reducing what they need to carry and reducing admin overheads by limiting the chance of lost or forgotten cards. The deployment, management, scaling and revoking processes are simplified and costs can be better predicted with a subscription-based pricing model.
QCIC designs, provides and deploys mobile credential solutions that enable our clients to leverage these benefits within their organisations and take their access control solutions into the mobile world.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services