Sector solutions

Data center

Create added value for your customers!

Servers and control cabinets are the heart of your data center. This is where your sensitive data is located, as well as the critical physical points of attack for you as the operator and your colocation customers.

With the modular security system TANlock, you can manage and document every type of access. Unauthorized access of the rack are being prevented, logged in case of abuse and messages are sent to your management system in real time – from any location in the world. The TANlock can be integrated into any management system and is software-independent.

Unauthorized access, such as sabotage, is immediately detected, documented and reported by our optionally available sensor technology. Factors such as temperature, humidity, vibration measurements and smoke detection can be easily integrated via additional sensor modules.

Furthermore, as an IoT device, the TANlock represents an essential component for a secure IT infrastructure. Create more security for yourself and your customers with the TANlock!

Rechenzentrum
Dctor work on digital tablet healthcare doctor technology tablet using computer

Access control for the healthcare sector

Protect sensitive patient data!

When it comes to IT security, the first thing that comes to mind is online attacks (hackers, script kiddies, Trojans, phishing, viruses, backdoors or exploits). The danger of unauthorized and mechanical access and misuse is often ignored. Especially for sensitive personal data such as: Medical records, patient data, insurance data, and health information are special legal protection measures (Patient Data Protection Act PDSG as well as the certification ISMS, Federal Office for Information Security (BSI) according to ISO 27001, the General Data Protection Regulation DSGVO) are mandatory.

The modular security system TANlock supports you by fulfilling the special protection requirements at all times, without gaps. With the TANlock modular security system, you manage and document every type of access. Unauthorized opening of the rack is prevented, logged in case of misuse and  messages are sent to your management system in real time – from any location in the world.

The TANlock can be integrated into any management system and is software-independent. Unauthorized access, such as sabotage, is immediately detected, documented and reported by our optionally available sensor technology. By investing in the TANlock security system, you meet the legal requirements and significantly guarantee the legal security standards.

Industry and commerce

Prevent virtual theft in your company!

Digitalization enables enormous potentials of efficiency and is an important success factor in globalization. This creates ever new challenges for the security of the IT infrastructure. Direct physical access to server cabinets is usually not sufficiently secured. The potential for danger through unauthorized access and misuse is constantly present. In the worst case, valuable data of your company (ERP, CRM, PSP, QS, FiBu) is stolen, manipulated or destroyed.

With the modular security system TANlock, you are able to manage and document every type of access. Unauthorized openings of the rack are prevented, logged in case of misuse and corresponding messages are sent to your management system in real time – from any location in the world. The TANlock can be integrated into any management system and is software-independent. Unauthorized access, such as sabotage, is immediately detected, documented and reported by our optionally available sensor technology. The complex protection of your IT infrastructure starts at the rack!

Industrial Solutions
Lady Justice statue in law firm office

Law, tax and economic consulting companies

Ensure security in the digital age!

Due to the rapid development of digitalization, the processing of sensitive client data and business information about companies requires special protection. When it comes to IT security, the first thing that comes to mind is online attacks (hackers, script kiddies, Trojans, phishing, viruses, backdoors or exploits). The danger of unauthorized, mechanical access and misuse is often ignored. A big challenge for consulting companies are the different locations and organizational structures.

With the modular security system TANlock, you are able to manage and document every type of access. Unauthorized opening of the rack is prevented, in case of misuse it is logged and corresponding messages are sent to your management system in real time – from any location in the world. The TANlock can be integrated into any management system and is software-independent. Unauthorized access, such as sabotage, is immediately detected, documented and reported by our optionally available sensor technology.

By investing in the TANlock access control system, you meet the requirements of the General Data Protection Regulation (GDPR) and protect your clients’ valuable data at a particularly high level.

Authorities and communities

Secure digitization everywhere!

Physical IT security at public authorities and local communities is increasingly a key issue. At many locations, sensitive data is processed, managed and stored on decentralized servers on site. Since the server cabinets are often inadequately secured, the risk of unauthorized access, manipulation and misuse increases.

With the modular security system TANlock, you can manage and document every type of access. Unauthorized opening of the rack is prevented, in case of misuse it is logged and corresponding messages are sent to your management system in real time – from any location in the world. The TANlock can be integrated into any management system and is software-independent. Unauthorized access, such as sabotage, is immediately detected, documented and reported by our optionally available sensor technology.

Due to the progress of digitalization in compliance with legal requirements, it is essential to include a TANlock as a fixed component of your IT security.

Stamp

Which TANlock is right for you?

TANlock 3

TANlock 3 Modul Grafik Neu

TANlock Zero

Aufreihung aller TANlock Zero