i3TECH Solutions

System Consultation

Site Visits

Complementary site visits are encouraged to determine a site’s suitability for new, upgraded, additional, or decommissioned systems, including the realization of scope of work; re-utilization of existing structures; power sources; environmental factors that may possibly cause interference or downtime in the foreseeable future; and address any concerns that may affect the design of the proposed system. Site visits can also be the venue for further explanation of the proposed system; different user experiences; and more accurate cost estimation of needed resources.

System Concept Development

The system concept development phase narrows down the objectives of the system based on the client’s requirements from a user experience, technical, and operational perspective. In this phase, system design, development, cost-benefit analysis, budget considerations, technology collaborations, and other matters are discussed with both manufacturers and clients in order to develop a custom solution for every client. Recommended technologies, scope of work, required manpower, and timeline can be discussed in order to finalize the requirement before development of the proposal.

Terms of Reference Development

i3 Technologies can also develop a TOR (terms of reference) document for our system solutions, including system background, objectives per user profile, functional and operational requirements defined to its specifications, main and variant use cases, additional features, and different types of system set ups in the case of multi-tenant and multi-building systems. The document enlists preconditions, critical system components, possible system integrations, supplementary system capabilities, and datasheets of the main system for reference.

Technical
Compliance Review

Technical compliance is the examination and confirmation of a system’s design and technical specifications to its adherence to a technical rule or standard based on the system concept or technical requirements. i3’s close collaboration with manufacturer’s key design and technical teams ensure operational efficiency of the system, considering system scalability, downtime possibilities, future-proof upgrades, single or multi-site configurations, variant system concept user flows, and company and international adherence to standards as required.

Latest Projects

Turnstile and Elevator Integration
with Mobile QR Code Access

The commercial building required a secure and contactless access control system using digital QR codes to be used by employees and visitors. The elevator integration provided another layer of security in the building, as employees’ access are limited to their office floors, and visitors’ access are limited to their designated meeting floors. Access is provided through digital QR codes in people’s mobile phones.

Secure Visitor Management System with Face Recognition Verification

Propelled by COVID-19 safety protocols, this commercial building decided to onboard visitors by pre-registering them in the safety of their own homes before their scheduled visit. This process does not require them to sign in using a logbook, exchange IDs, and be given access cards, all of which would require contact. Instead, identity verification is used through face recognition technology, which only requires a camera.

RFID Sticker and Automated Boom Barrier for Parking Management

This mixed commercial and retail building required exclusive contactless access using RFID stickers to automatically enable access to employees but paid parking to retail customers. If the system detects the RFID sticker on the authorized employee’s vehicle or the customer’s successful parking transaction the boom raises. Otherwise, the person can contact the administrator for assistance via intercom.

System Solutions Overview

Below are security systems that are commonly installed. For other systems, please conduct a search, check one of our solutions or contact us.

IP Surveillance is the “successor” to closed-circuit television (CCTV) systems. An internet protocol “IP” camera receives and sends data over an IP network, saving costs on cabling and local recording devices. This system also enables system integration, remote and mobile surveillance, and heavier-processing technologies such as face recognition and video analytics on the edge. Read more about IP Surveillance here.

An access control system lets you manage the access of: incoming and outgoing people and vehicles; proprietary information; exclusive areas and devices using doors, turnstiles, boom gates, and credentials such as access cards or badges; keyfobs; RFID stickers; biometrics; mobile IDs; face IDs and others. Read more about access control here.

Metal detectors or screening technology are used to detect hazardous or dangerous materials or substances in-baggage, on-person, or hidden from plain view for internal safety and security. More recent screening technology are safe for those who are pregnant or wear pacemakers. Formats include walk-through metal detectors for people; and baggage and vehicle screening equipment. Read more about screening technology here.

Fire Detection and Alarm systems (FDAS) are designed to identify fire hazards in their early stages to trigger audio and visual alarms that notify and assist area occupants to evacuate safely. They also provide information about the location of the fire hazard for emergency responders to attend to immediately. FDAS systems can either be manually triggered or automatically detect fire hazards. Read more about FDAS here

A Public Address and Background Music (PABGM) system is used for broadcasting announcements or enhancing sound in places where they need to be heard in a remote or large area, such as emergency information, evacuation instructions, and background music to enhance user experience. A PABGM system may include multiple microphones, amplifiers, and speakers for wider distribution or higher volume. Read more about PABGM here.

A visitor management system keeps track of incoming and outgoing visitors at your premises. Our iConcierge system can provide multi-level security through system integration with access control systems; authenticated identities of visitors in the database using face recognition; and streamline the visitor management process for an easy and convenient experience for visitors, hosts, and administrators. Read more about the iConcierge here.

Video analytics are technologies that automatically analyze videos in order to identify threats, emergencies, hazards or any event that requires closer investigation. This technology is available on servers or on the edge, and have a wide range of applications from recognizing blacklisted vehicles using license plate recognition to identifying criminals using face recognition. Read more about video analytics here.

Smart Command Centers centralize different integrated systems to manage security event easier, enabling security personnel to respond faster, preventing risks from escalating. It provides comprehensive reports on the security and safety status of the areas managed, and relate security events despite coming from different systems to provide an overview of the situation. To know more about Smart Command Centers, click here.

A properly designed and installed structured cabling system provides predictable performance and flexibility for additional cabling components; maximizing system availability and providing space for redundancy. It also assists maintenance personnel in finding root causes to faster address connection issues, prevents data theft, and protects unhindered business operations. To learn more about structured cabling, click here.

Secure network infrastructure establishes connection for communication, not just between people, but between devices and integrated systems. A proper network infrastructure encourages speed, agility, and flexibility in an organization. Therefore it must be protected against unauthorized access; spam; or malware with firewalls, antivirus protections, VPNs, and detection systems. To learn more about Network Infrastructure, please click here.

Technology News

TECHNOLOGIES

Contacts

Main Office

610 Mayon St.
Brgy. Malamig
Mandaluyong City,
Philippines 1550

+632 7 753 1000
+1 571 266 8052
+63 917 839 3333 (Call)

Cebu Office

Phase 4, Lot 41 Barcelona St.
Villa del Rio,
Bacayan, Cebu City 6000

 

 

Sales

sales@i3tech.com.ph

Support

support@i3tech.com.ph

 

 

Main Office
610 Mayon St. Brgy. Malamig
Mandaluyong City
Philippines 1550

+632 7753 1000
+1 571 266 8052
+63 917 839 3333 (Call)

Sales
sales@i3tech.com.ph

Support
support@i3tech.com.ph

Cebu Office
Phase 4, Lot 41 Barcelona St.
Villa del Rio, Bacayan
Cebu City 6000

Copyright © 2019 – 2023, i3 Technologies Corp. All Rights Reserved.