{"id":2224,"date":"2023-08-23T09:32:45","date_gmt":"2023-08-23T13:32:45","guid":{"rendered":"https:\/\/inversetech.com\/?page_id=2224"},"modified":"2023-10-09T14:12:46","modified_gmt":"2023-10-09T18:12:46","slug":"security","status":"publish","type":"page","link":"https:\/\/inversetech.com\/security\/","title":{"rendered":"Security"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000d2b&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;90deg&#8221; background_color_gradient_stops=&#8221;rgba(0,13,43,0.85) 56%|rgba(0,13,43,0.25) 79%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,13,43,0.93)&#8221; background_color_gradient_end=&#8221;rgba(0,13,43,0.82)&#8221; background_image=&#8221;https:\/\/inversetech.com\/wp-content\/uploads\/2023\/09\/shutterstock_1680278362-min.jpg&#8221; background_position=&#8221;top_center&#8221; min_height=&#8221;558.6px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;100px||100px||true|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; title_text=&#8221;shutterstock_1680278362-min&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;e864d11f-3dab-4fa3-ac06-4f0e1a260807&#8243; header_font=&#8221;Barlow Condensed||||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;85px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;|||15px|false|false&#8221; header_font_size_tablet=&#8221;85px&#8221; header_font_size_phone=&#8221;63px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; header_text_shadow_style=&#8221;preset3&#8243; border_width_left=&#8221;1px&#8221; border_color_left=&#8221;#2ED4EA&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h1>Security<\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;41d5859c-fbaa-458a-88e4-5d886857f235&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;20px||||false|false&#8221; text_font_size_tablet=&#8221;16px&#8221; text_font_size_phone=&#8221;13px&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; text_text_shadow_blur_strength=&#8221;0.75em&#8221; text_text_shadow_color=&#8221;#000000&#8243; header_text_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\">We provide state-of-the-art access control systems and security camera systems, and surveillance. We start with a system design based on a customer\u2019s needs and carry through expert deployment and 24\/7 monitoring. Consider us your expert security partner.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_color_gradient_direction=&#8221;-130deg&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;75px|75px|75px|75px|true|true&#8221; custom_padding_tablet=&#8221;75px||75px||true|true&#8221; custom_padding_phone=&#8221;30px|30px|30px|30px|true|true&#8221; custom_css_main_element=&#8221;align-items: center&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#2ED4EA&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|30px||30px|true|true&#8221; custom_padding_phone=&#8221;76px|20px|76px|20px|true|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;#e8702f&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Barlow Semi Condensed|700||on|||||&#8221; header_3_text_color=&#8221;#002975&#8243; header_3_font_size=&#8221;20px&#8221; header_3_letter_spacing=&#8221;5px&#8221; header_3_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||16px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h2>From an on-premise single location system to a cloud-based system that provides a dashboard to monitor multiple locations, we can tailor your system to your particular requirements.<\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;5ff55506-da7d-4dd7-b409-9d62c7203201&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.72)&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; width=&#8221;85%&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_font_size_tablet=&#8221;55px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>Your security needs depend on the type of your business, its size, location, and other factors. The following are security considerations for single-location firms and multi-location organizations.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|30px||30px|true|true&#8221; custom_padding_phone=&#8221;76px|20px|76px|20px|true|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;#e8702f&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/inversetech.com\/wp-content\/uploads\/2023\/08\/Inverse-Icons-07b.png&#8221; title_text=&#8221;Inverse-Icons-07b&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;130%|130%&#8221; transform_scale_tablet=&#8221;100%|100%&#8221; transform_scale_phone=&#8221;100%|100%&#8221; transform_scale_last_edited=&#8221;on|phone&#8221; transform_translate_tablet=&#8221;&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|desktop&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|phone&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; body_font_size_tablet=&#8221;13px&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;52px&#8221; header_2_line_height=&#8221;1.1em&#8221; width=&#8221;78%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||16px||false|false&#8221; custom_margin_tablet=&#8221;||16px||false|false&#8221; custom_margin_phone=&#8221;||16px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|100px||100px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;52px&#8221; header_2_font_size_phone=&#8221;36px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Single-Location Business:<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Surveillance Cameras:&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf03d;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\">Security cameras can be strategically placed throughout your premises to monitor entry and exit points and critical areas inside. Systems can provide high-resolution video if needed, as well as monitoring capabilities.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Intrusion Detection System (IDS):&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf554;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\">We can install motion sensors, door\/window contacts, and glass break detectors to detect unauthorized access. You can choose the type of alarm triggers and notifications you want.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Access Control:&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x7e;||divi||400&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>Access control has become increasingly important in healthcare, education, and government buildings. These allow you to restrict entry to authorized personnel only. Key cards, fingerprint or facial recognition, or keypad entry are some access techniques.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Alarm Systems:&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0f6;||divi||400&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>Again, clients may choose audible or silent alarms based on their industry, location, etc.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;19.2px&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;70px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;df96b77a-cd4f-44a8-a771-2d6347592b53&#8243; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;52px&#8221; header_2_line_height=&#8221;1.1em&#8221; width=&#8221;78%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||16px||false|false&#8221; custom_margin_tablet=&#8221;||16px||false|false&#8221; custom_margin_phone=&#8221;||16px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|100px||100px|false|true&#8221; custom_padding_tablet=&#8221;|0px||0px|false|true&#8221; custom_padding_phone=&#8221;|0px||0px|false|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;52px&#8221; header_2_font_size_phone=&#8221;36px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Multi-Site Business:<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Centralized Monitoring: &#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe070;||divi||400&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>The cloud-based dashboard, which allows monitoring of multiple locations, is the way to go here.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Video Management Software (VMS):&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf144;||fa||400&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>Another essential security tool is VMS, designed to manage and analyze video feeds from cameras at various sites.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.17.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Remote Access:&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe066;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>We highly recommend remote access because it puts you in control and allows you to respond to security incidents wherever you are.<\/p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Integrated Access Control:&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf3ed;||fa||900&#8243; icon_color=&#8221;#2ED4EA&#8221; icon_alignment=&#8221;left&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;58e41a12-d2dc-4bc3-82a3-e7e2a77a32bd&#8221; header_font=&#8221;Barlow Condensed|||on|||||&#8221; header_text_color=&#8221;#002975&#8243; header_font_size=&#8221;33px&#8221; header_line_height=&#8221;1.2em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;rgba(0,0,0,0.66)&#8221; body_line_height=&#8221;1.6em&#8221; animation=&#8221;off&#8221; header_font_size_tablet=&#8221;18px&#8221; header_font_size_phone=&#8221;16px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; body_font_size_phone=&#8221;13px&#8221; body_font_size_last_edited=&#8221;off|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<p>Just like the single location access control. Integrated access control can be managed centrally but applied to all sites ensuring consistent security protocols.<\/p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||50px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;Barlow Condensed||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#002975&#8243; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Barlow Semi Condensed|700||on|||||&#8221; header_3_text_color=&#8221;#002975&#8243; header_3_font_size=&#8221;20px&#8221; header_3_letter_spacing=&#8221;5px&#8221; header_3_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||16px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h2>Inverse Technology Solutions has partnered with some of the US\u2019s leading security providers. Our job is to ensure that your security system is the right solution for your business.\u00a0\u00a0<\/h2>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/calendly.com\/raymond-richeson\/30min&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Schedule a free consultation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.6&#8243; _module_preset=&#8221;94ef7aca-dcd9-4f9d-93b2-efa3466cebc7&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;19px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#0096d0&#8243; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_direction=&#8221;152deg&#8221; button_bg_color_gradient_stops=&#8221;#267cc1 0%|#2ed4ea 100%&#8221; button_bg_color_gradient_start=&#8221;#267cc1&#8243; button_bg_color_gradient_end=&#8221;#2ed4ea&#8221; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#2ED4EA&#8221; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;1px&#8221; button_font=&#8221;Barlow Condensed|600||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;15px||15px||true|false&#8221; custom_padding=&#8221;15px|80px|15px|80px|true|true&#8221; button_text_size_tablet=&#8221;19px&#8221; button_text_size_phone=&#8221;16px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; box_shadow_style=&#8221;preset3&#8243; global_module=&#8221;800&#8243; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_bg_use_color_gradient__hover=&#8221;off&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_color_gradient_end__hover=&#8221;#00bfbf&#8221; button_bg_color_gradient_start__hover=&#8221;#002975&#8243; button_bg_color_gradient_start_position__hover=&#8221;0%&#8221; button_bg_color_gradient_end_position__hover=&#8221;100%&#8221; button_bg_color_gradient_stops__hover=&#8221;#002975 0%|#00bfbf 100%&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#002975&#8243; button_border_width__hover_enabled=&#8221;off|desktop&#8221; button_border_width__hover=&#8221;2px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>SecurityWe provide state-of-the-art access control systems and security camera systems, and surveillance. We start with a system design based on a customer\u2019s needs and carry through expert deployment and 24\/7 monitoring. Consider us your expert security partner.From an on-premise single location system to a cloud-based system that provides a dashboard to monitor multiple locations, we [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2224","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Business Security: Cameras, IDS, Access Control, &amp; Alarms<\/title>\n<meta name=\"description\" content=\"Enhance your business security with our access control and surveillance camera systems. Tailored solutions and 24\/7 monitoring. Schedule a consultation!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inversetech.com\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Security: Cameras, IDS, Access Control, &amp; Alarms\" \/>\n<meta property=\"og:description\" content=\"Enhance your business security with our access control and surveillance camera systems. Tailored solutions and 24\/7 monitoring. Schedule a consultation!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inversetech.com\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inverse\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-09T18:12:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/inversetech.com\/security\/\",\"url\":\"https:\/\/inversetech.com\/security\/\",\"name\":\"Business Security: Cameras, IDS, Access Control, & Alarms\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/#website\"},\"datePublished\":\"2023-08-23T13:32:45+00:00\",\"dateModified\":\"2023-10-09T18:12:46+00:00\",\"description\":\"Enhance your business security with our access control and surveillance camera systems. Tailored solutions and 24\/7 monitoring. Schedule a consultation!\",\"breadcrumb\":{\"@id\":\"https:\/\/inversetech.com\/security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/inversetech.com\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/inversetech.com\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/inversetech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/inversetech.com\/#website\",\"url\":\"https:\/\/inversetech.com\/\",\"name\":\"Inverse\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/inversetech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/inversetech.com\/#organization\",\"name\":\"Inverse\",\"url\":\"https:\/\/inversetech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"width\":202,\"height\":130,\"caption\":\"Inverse\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Security: Cameras, IDS, Access Control, & Alarms","description":"Enhance your business security with our access control and surveillance camera systems. Tailored solutions and 24\/7 monitoring. Schedule a consultation!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inversetech.com\/security\/","og_locale":"en_US","og_type":"article","og_title":"Business Security: Cameras, IDS, Access Control, & Alarms","og_description":"Enhance your business security with our access control and surveillance camera systems. Tailored solutions and 24\/7 monitoring. Schedule a consultation!","og_url":"https:\/\/inversetech.com\/security\/","og_site_name":"Inverse","article_modified_time":"2023-10-09T18:12:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/inversetech.com\/security\/","url":"https:\/\/inversetech.com\/security\/","name":"Business Security: Cameras, IDS, Access Control, & Alarms","isPartOf":{"@id":"https:\/\/inversetech.com\/#website"},"datePublished":"2023-08-23T13:32:45+00:00","dateModified":"2023-10-09T18:12:46+00:00","description":"Enhance your business security with our access control and surveillance camera systems. Tailored solutions and 24\/7 monitoring. Schedule a consultation!","breadcrumb":{"@id":"https:\/\/inversetech.com\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inversetech.com\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/inversetech.com\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/inversetech.com\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/inversetech.com\/#website","url":"https:\/\/inversetech.com\/","name":"Inverse","description":"","publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inversetech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/inversetech.com\/#organization","name":"Inverse","url":"https:\/\/inversetech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","width":202,"height":130,"caption":"Inverse"},"image":{"@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages\/2224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/comments?post=2224"}],"version-history":[{"count":11,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages\/2224\/revisions"}],"predecessor-version":[{"id":2492,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/pages\/2224\/revisions\/2492"}],"wp:attachment":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media?parent=2224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}