When choosing a workspace management system, you may have considered whether
or not it is secure. However, once security becomes an issue for you, it is
probably already too late - your system has already been hacked, sensitive
information stolen, or data is being held to ransom and you face a world of
pain and recriminations.
Door Tablet is built with comprehensive security features in mind, not as a
mere afterthought or bolt-on. Enhanced security elements are integrated into
both software and purpose-built hardware. We are proud that a wide variety of
data-sensitive companies around the world trust Door Tablet.
Door Tablet runs only on your premises or in your private cloud, so you have
complete security control of your system.
This ensures that no one has access to your data but you. The solution
operates solely on your infrastructure and/or your cloud. Cyber Security audits
have ensured Door Tablet will never be a “weak link” within your
Administrators have full control of the Door Tablet system and may finetune
the levels of security and authorizations. Enable or disable security features
as needed, including booking and meeting information security.
Door Tablet offers different levels of authentication and authorizations for
users. Security restrictions can be applied at:
Different users may be allocated different booking privileges via PIN
numbers or RFD/NFC.
You decide which rooms are available, at what time and where these rooms may
be booked – from the booking system, or solely on the touchscreens
outside the room.
The Door Tablet system alerts the room booker when uninvited users check
into a room. If door unlocking is enabled, Door Tablet can physically restrict
room entry depending on authentication. Integrations with access control
systems ensure only authorized access by user type or schedule.
As well as being a secure environment, Door Tablet has robust system
durability. By taking advantage of multiple servers, the Door Tablet servers
can replicate each other, providing powerful redundancy. If one server goes
down, all the endpoints notice and they automatically switch to an alternate
server, maintaining seamless functionality. After this event, the system will
try to revert back to the original server, at 10 minute intervals, to maintain
Door Tablet runs opaque on the network - by default our devices do not
respond to any information other than the Door Tablet server.
Sometimes you may not want visitors or employees to know who is coming to a
meeting or what a meeting is about. Administrators are in complete control of
what information the system will show on display devices.
All Door Tablet layouts are fully customizable which means that you can decide
how much detail you want to show. This discretion can also be applied to all
our Wayfinding services.