Single Unified Platform
Enterprise-Wide | Compliance-Based | Audit-Ready | Risk Mitigation | Self-Service | Biometrics | Limited Back Office Requirements
Logging for Physical Security Perimeters
Gatekeeper’s escort centric features, visit logging, dashboards, awareness tools, and reports are all built to meet CIP regulation requirements.
Point of Entry Compliance
Enterprise level contractor access logging to your facilities. Perimeter enForce is offered as individual sets or in temporary, mobile modular units.
Gatekeeper Certification Tracking module allows your enterprise to manage, grant, and track required certifications for plant or specified area entry.
Powerful identity, certification, visit logging, advanced scheduling, alerts, dashboards, and reporting tools simplify the management of your contractors.
Key & Object Management
Securely manage and track physical keys. Dynamic reporting and dashboard tools provide real-time escort and location data of your physical items.
Gatekeeper Front Desk delivers point of entry and secured area visitor management with easy enrollment, fast visit logging, real-time activity/risk awareness.
Contractor Access Control
Gatekeeper’s Device Control capabilities facilitate control of perimeter and secure area physical access with identifiers such as badges and fingerprint.
Mobile Muster Kiosks provide a near real-time roster of visitors in case of emergency. Muster Kiosks feature visitor roll-call, safety information, and emergency contact capabilities.
NERC CIP & OSHA Compliance Management Solutions for Utilities
Today’s utilities are faced with having to vet and log all visitors and temporary workers as they move through designated physical areas. Processes and controls must be in place to manage the physical identity of an individual, to show they adhere to an area’s access requirements. Force 5 worked alongside utility subject matter experts to develop Gatekeeper. Built specifically to meet safety and security regulatory audit requirements, Gatekeeper combines physical log and identity management with physical security controls to mitigate risk and exceed compliance requirements.
Visitor Log Retention
Each visit logged in our system is retained for historical logs and audit reports.
Audit reporting, streamlined visit flows, and certification tracking bring return on your investment.
The Force 5 team brings world-class service to every client.
Our solutions come with round-the-clock support to ensure you are secure and in compliance.
Force 5 Named Top 20 Most Promising Compliance Solution Provider
Force 5 was recognized today by CIO Review magazine as a Top 20 Most Promising Compliance Solution provider for 2016.