When choosing a workspace management system, you may have considered whether or not it is secure. However, once security becomes an issue for you, it is probably already too late - your system has already been hacked, sensitive information stolen, or data is being held for ransom and you face a world of pain and recriminations.
Door Tablet is built with comprehensive security features in mind, not as a mere afterthought or bolt-on. Enhanced security elements are integrated into both software and purpose-built hardware. We are proud that a wide variety of data-sensitive companies around the world trust Door Tablet.
Door Tablet runs only on your premises or in your private cloud, so you have complete security control of your system.
This ensures that no one has access to your data but you. The solution operates solely on your infrastructure and/or your cloud. Cyber Security audits have ensured Door Tablet will never be a “weak link” within your ecosystem.
Administrators have full control of the Door Tablet system and may finetune the levels of security and authorizations. Enable or disable security features as needed, including booking and meeting information security.
Door Tablet offers different levels of authentication and authorizations for users. Security restrictions can be applied at:
Different users may be allocated different booking privileges via PIN numbers or RFD/NFC.
You decide which rooms are available, at what time and where these rooms may be booked – from the booking system, or solely on the touchscreens outside the room.
The Door Tablet system alerts the room booker when uninvited users check into a room. If door unlocking is enabled, Door Tablet can physically restrict room entry depending on authentication. Integrations with access control systems ensure only authorized access by user type or schedule.
As well as being a secure environment, Door Tablet has robust system durability. By taking advantage of multiple servers, the Door Tablet servers can replicate each other, providing powerful redundancy. If one server goes down, all the endpoints notice and they automatically switch to an alternate server, maintaining seamless functionality. After this event, the system will try to revert back to the original server, at 10 minute intervals, to maintain load balancing.
Door Tablet runs opaque on the network - by default our devices do not respond to any information other than the Door Tablet server.
Sometimes you may not want visitors or employees to know who is coming to a meeting or what a meeting is about. Administrators are in complete control of what information the system will show on display devices.
All Door Tablet layouts are fully customizable which means that you can decide how much detail you want to show. This discretion can also be applied to all our Wayfinding services.