Our security solutions for sensitive sites: military, prisons, airports, data centers...

Whether to isolate inmates, control access to important weapons and equipment, or protect confidential information, datacenters and strategic command areas, sensitive sites all require enhanced security measures.
 
Faced with the risks of piracy, espionage, sabotage or evasion, impermeability must be ensured by strong authentication solutions (Biometrics, dual identification, video control, etc.) and security (encryption, security keys, etc.).
 
Through its software and hardware solutions, TIL TECHNOLOGIES can meet all your high-security needs. 

Discover the right features

  • Authenticate people by Biometrics, Enhanced control (badge + keypad code) or visual control (video verification). 
  • Define access rights to sensitive areas according to precise profiles, grades, time schedules and validity dates. 
  • Monitor the site and its surroundings with video surveillance and perimeter intrusion detection (active fences, infrared barriers, etc.). 
  • Optimize field inspection with patrolling rounds or hand-held readers for on-the-fly checks. 

  •  Isolate access to hazardous goods storage areas (explosives, weapons, etc.) according to technical or rank-related accreditations. 
  • Limit the risk of forced entry by installing airlocks. 
  • Detect anomalies on field personnel by Supervision PTI (Protection du Travailleur Isolé) equipment. 
  • Crisis and evacuation management with assistance for the I.O.P. (Emergency response procedure): real-time census, area changes (secure/non-secure), trombinoscopes, etc. 

  • Set up single-user passage mechanisms (turnstiles, single-user airlocks, etc.). 
  • Manage external visitors and service providers via a dedicated interface: pre-registration, ID card scan, real-time presence... 
  • Supervise remote accesses by integrating Intercom and video alarm systems. 
  • Control and streamline vehicle access using long-distance tags or license plate recognition

  • Ensure continuity of offline operations in the event of Network outage (stand-alone LPUs) or server failure (redundancy). 
  • Make it impossible to clone badges by securing data access with encryption keys. 
  • Monitor the actions of safety personnel (Operator action history). 
  • Protect the confidentiality of certain badge holders on a red list: operators cannot see their entries (depending on their rights). 
  • Pool databases and avoid double data entry (errors, loopholes in rights management, etc.). 

They trust us

NAVAL GROUP

ARIANE GROUP

DASSAULT

THALES

OBERTHUR

AIEA

CEA

Armée de l’air

Armée de terre

Ministère de l'Intérieur

Prison de Casabianda

Prison de la Réunion

Etablissement pour Mineurs de Marseille

Palais de Justice de Charleroi

Tribunal de Marseille

Tribunal de Metz

Downloads

Would you like to find out more about our solutions for your business sector?