Software House CC9-AWF100KPK access management workflow

Technical Specification

Features:
Additional info:

Additional 100,000 Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control software
Model code CC9-AWF100KPK
Series C-CURE 9000 Access Management v2.80
Central / Remote Monitoring Yes
Web-enabled software Yes
System Requirements Web Browser: Microsoft Internet Explorer, Microsoft Edge, Google Chrome, Firefox v53 or greater, Safari
Additional info
  • Additional 100,000 Approvers/Requesters
  • Sends access requests to the owner of a specified clearance directly thereby streamlining the process
  • Configure multiple levels of approvers and minimum number of approvers per level
  • Define approval hierarchy
  • Specify recurring clearance review activity
  • Escalate missed clearance reviews
  • Reduce workload on security personnel
  • Empower cardholders to make access requests
  • Entrust clearance owners with the control to approve, deny and revoke clearances
  • Maintain security by turning company policies into automated workflows
  • Comprehensive log for review and audit purposes
  • Optionally configure doors to automatically initiate requests upon “access denied” events
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Access and security in the age of hybrid working

Quick poll
What's the primary benefit of integrating access control with video surveillance?