Available in Europe through Genetec Accredited Channel Partners

High assurance access control system components

High assurance access control

Advanced encryption from end to end, by design

Jump to

Unmatched cybersecurity from door to data

The high assurance Genetec access control system is built to meet the highest cybersecurity standards. It’s designed to help you comply with strict European cybersecurity regulations.

The system combines Synergis™ access control software, Synergis Cloud Link, smart cards, readers operating in transparent mode, I/O modules, and Secure Access Modules (SAM).

*The STid secure I/O module is only available in Europe through Genetec Accredited Channel Partners.

How does it work?

Each system component uses advanced end-to-end encryption and cybersecurity capabilities to ensure your access control deployment is secure. Protect sensitive information from credentials to readers - all the way to controllers and software, whether on-premises or in the cloud with Security Center SaaS.

Access control end-to-end encryption diagram

Key system components

Get modern and secure access control software

Synergis protects your access control deployment with advanced cryptographic protocols like Transport Layer Security (TLS) and layered defenses. These include encryption, authentication, and authorization.

It’s also truly open access control software, and part of our unified security portfolio. So, you can add third-party solutions and combine access control with video and other security systems. With Synergis, you get a comprehensive view of your security environment.

Learn more about Synergis >

Key features

Security operator monitoring Security Center dashboard

Centralized configuration

Centralize all access control configurations, like access permissions, SAM settings, and MIFARE DESFire cards into a single, intuitive application. Our high assurance access control system simplifies operations and reduces training costs. Your operators won’t have to switch between multiple applications to manage your security.

Card being scanned on door reader

Secure Access Models (SAM)

Protect sensitive data with the Secure Access Module (SAM). The solution makes sure that decryption happens securely within your building and supports up to three SAM card slots. This means that if multiple cardholders badge in at the same time, it doesn’t slow things down.

*The Secure Access Module is supported on Synergis Cloud Link with expansion module
 
Operator monitoring large area on one dashboard

Unparalleled reader support

Scale and adapt your security system as your organization grows, while maintaining a strong cybersecurity posture. Included in the high assurance access control system, Synergis Cloud Link with expansion module offers 12 ports. This gives you support for up to 48 readers so you can continue building for future needs.

Security operator working in control room

Offline capabilities

Ensure uninterrupted operations, even during server outages and connectivity challenges. The offline capabilities of the Synergis Cloud Link support peer-to-peer communication. This allows your security team to maintain global operations and local management.

Why choose a high assurance access control system?

  • Advanced cybersecurity

    Protection at every level of the architecture allows you to take advantage of the highest level of end-to-end encryption designed to enhance your system’s cybersecurity.

  • Open architecture

    Break free from proprietary solutions with a high assurance system built on open architecture. Support for OSDP and SSCP protocols offers hardware flexibility without compromising security.

  • Flexible deployments

    On-premises, cloud or hybrid? It’s up to you. Compatible with Security Center SaaS, our high assurance system allows your organization to choose the deployment that works for you.

  • Compliance with the highest standards

    Meet the highest cybersecurity standards and achieve compliance with an access control solution that aligns with European cybersecurity regulations.

The highest cybersecurity standards

Get on the path to high assurance access control

Download the brochure