Nashville, TN (June 13, 2017) – Galaxy Control Systems, a leading provider of integrated access control and security solutions, is demonstrating their recently introduced Galaxy Cloud Concierge solution at booth #927 this week at ESX 2017. Galaxy Cloud Concierge offers end users a complete turnkey, cloud-based, fully hosted and managed access control and monitoring solution that integrates video surveillance, visitor management, elevator control, locks and turnstiles onto a unified platform.
“Galaxy Cloud Concierge allows users to apply the numerous advantages that hosted access control solutions offer without the up-front investment in equipment and software, or the ongoing expense of maintaining their systems,” said Rick Caruthers, Executive Vice President, Galaxy Control Systems. “These services also present significant opportunities for integrators looking to grow their business with high value service offerings that address access control challenges.”
Recognizing that dealers and integrators have customers with a wide variety of budgets and needs, Galaxy Control Systems offers Cloud Concierge in three configurations:
- Option one is an on-site, user-managed, cloud-based system. Owners or managers purchase (or lease) the equipment from an authorized reseller/integrator who installs the system and provides training.
- Option two is a remote cloud-based, user-managed integrated system. Equipment is purchased or leased from an authorized reseller/integrator who installs the hardware and provides training. The reseller hosts the integrated system with Galaxy System tools, including the mobile apps, and the user manages the activity.
- Option three is a remote cloud-based, reseller/integrator managed integrated system. Equipment can be existing or new, and the reseller both hosts the system and manages the activity.
Cloud Concierge incorporates AES encryption to ensure the security of access control data. Multi-layered filtering/partitioning allows end users to access their information (cardholders, access groups, hardware, etc.) while protecting that data from unauthorized access.