{"id":2140,"date":"2022-10-26T14:56:44","date_gmt":"2022-10-26T18:56:44","guid":{"rendered":"https:\/\/groupeti.ca\/controle-dacces\/"},"modified":"2023-02-20T14:10:14","modified_gmt":"2023-02-20T19:10:14","slug":"access-control","status":"publish","type":"page","link":"https:\/\/groupeti.ca\/en\/access-control\/","title":{"rendered":"Access Control"},"content":{"rendered":"<div class=\"nicepage-container\"><div class=\"\" style=\"\" >        <script>\n            (function ($) {\n                var ResponsiveCms = window.ResponsiveCms;\n                if (!ResponsiveCms) {\n                    return;\n                }\n                ResponsiveCms.contentDom = $('script:last').parent();\n                ResponsiveCms.prevMode = \"XL\";\n\n                if (typeof ResponsiveCms.recalcClasses === 'function') {\n                    ResponsiveCms.recalcClasses();\n                }\n            })(jQuery);\n        <\/script>\n        \n    \n    <section class=\"u-align-center u-clearfix u-image u-shading u-section-2\" src=\"\" data-image-width=\"1280\" data-image-height=\"853\" id=\"sec-9581\" style=\"background-image: linear-gradient(0deg, rgba(0, 0, 0, 0.6), rgba(0, 0, 0, 0.6)), url(&quot;https:\/\/groupeti.ca\/wp-content\/uploads\/2022\/10\/c4dd551f0633dbf37e7fae17441c448d5e45ba040c472ef0af8844b1b6aa080c133b38ca5cc1b6e9302c7ddf7149bcc6fb9b6ac84e60737b905936_1280.jpg&quot;);\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h1 class=\"u-align-center u-text u-title u-text-1\"> Access Control <\/h1>\n        <p class=\"u-align-center u-custom-font u-font-open-sans u-text u-text-2\"> IT security and operational risk reduction start with perimeter protection and physical access controls for your organization. With the power of cloud management, modern access control systems are more cost-effective than ever and meet the mobility requirements of today\u2019s organizations. <\/p>\n      <\/div>\n    <\/section>\n    <section class=\"u-align-center u-clearfix u-section-3\" id=\"sec-dd19\">\n      <div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\"><span class=\"u-align-center u-icon u-text-palette-1-base u-icon-1\"><svg class=\"u-svg-link\" preserveAspectRatio=\"xMidYMin slice\" viewBox=\"0 0 60 60\" style=\"\"><use xlink:href=\"#svg-c97e\"><\/use><\/svg><svg class=\"u-svg-content\" viewBox=\"0 0 60 60\" x=\"0px\" y=\"0px\" id=\"svg-c97e\" style=\"enable-background:new 0 0 60 60;\"><g><path d=\"M38.914,0H6.5v60h47V14.586L38.914,0z M39.5,3.414L50.086,14H39.5V3.414z M8.5,58V2h29v14h14v42H8.5z\"><\/path><path d=\"M42.5,21h-16c-0.552,0-1,0.447-1,1s0.448,1,1,1h16c0.552,0,1-0.447,1-1S43.052,21,42.5,21z\"><\/path><path d=\"M22.875,18.219l-4.301,3.441l-1.367-1.367c-0.391-0.391-1.023-0.391-1.414,0s-0.391,1.023,0,1.414l2,2\n\t\tC17.987,23.901,18.243,24,18.5,24c0.22,0,0.441-0.072,0.624-0.219l5-4c0.432-0.346,0.501-0.975,0.156-1.406\n\t\tC23.936,17.943,23.306,17.874,22.875,18.219z\"><\/path><path d=\"M42.5,32h-16c-0.552,0-1,0.447-1,1s0.448,1,1,1h16c0.552,0,1-0.447,1-1S43.052,32,42.5,32z\"><\/path><path d=\"M22.875,29.219l-4.301,3.441l-1.367-1.367c-0.391-0.391-1.023-0.391-1.414,0s-0.391,1.023,0,1.414l2,2\n\t\tC17.987,34.901,18.243,35,18.5,35c0.22,0,0.441-0.072,0.624-0.219l5-4c0.432-0.346,0.501-0.975,0.156-1.406\n\t\tC23.936,28.943,23.306,28.874,22.875,29.219z\"><\/path><path d=\"M42.5,43h-16c-0.552,0-1,0.447-1,1s0.448,1,1,1h16c0.552,0,1-0.447,1-1S43.052,43,42.5,43z\"><\/path><path d=\"M22.875,40.219l-4.301,3.441l-1.367-1.367c-0.391-0.391-1.023-0.391-1.414,0s-0.391,1.023,0,1.414l2,2\n\t\tC17.987,45.901,18.243,46,18.5,46c0.22,0,0.441-0.072,0.624-0.219l5-4c0.432-0.346,0.501-0.975,0.156-1.406\n\t\tC23.936,39.943,23.306,39.874,22.875,40.219z\"><\/path>\n<\/g><\/svg><\/span>\n        <p class=\"u-text u-text-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"> Much more than a simple protection and deterrence solution, the physical access control solutions offered by TI Group contribute to improving the customer experience, for example, for retail businesses or helping increase productivity.&nbsp;<\/p>\n      <\/div>\n    <\/section>\n    <section class=\"u-align-center u-black u-clearfix u-section-4\" src=\"\" id=\"sec-ad52\">\n      <div class=\"u-clearfix u-sheet u-valign-middle-lg u-valign-middle-md u-valign-middle-sm u-valign-middle-xs u-sheet-1\">\n        <h1 class=\"u-text u-title u-text-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\"> Find out how access control solutions can protect you. Contact us today.&nbsp; &nbsp; &nbsp;<\/h1>\n        <ul class=\"u-align-left u-custom-list u-text u-text-2\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\">\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div> Camera\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Doorphone\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Fingerprint recognition\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Facial recognition\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Smartphone application\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>NFC and Bluetooth access key\n          <\/li>\n          <li>\n            <div class=\"u-list-icon u-text-palette-1-base\">\n              <div>\u276f<\/div>\n            <\/div>Computer management&nbsp;\n          <\/li>\n        <\/ul>\n        <a href=\"https:\/\/groupeti.ca\/nous-joindre\/\" class=\"u-border-none u-btn u-button-style u-palette-1-base u-btn-1\" data-animation-name=\"customAnimationIn\" data-animation-duration=\"1000\">CONTACT US<\/a>\n      <\/div>\n    <\/section>\n    \n    \n    \n  \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Access Control IT security and operational risk reduction start with perimeter protection and physical access controls for your organization. With the power of cloud management, modern access control systems are more cost-effective than ever and meet the mobility requirements of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2140","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Martin Ouzilleau","author_link":"https:\/\/groupeti.ca\/en\/blogue\/author\/martin-ouzilleau\/"},"uagb_comment_info":0,"uagb_excerpt":"Access Control IT security and operational risk reduction start with perimeter protection and physical access controls for your organization. With the power of cloud management, modern access control systems are more cost-effective than ever and meet the mobility requirements of [&hellip;]","_links":{"self":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/pages\/2140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/comments?post=2140"}],"version-history":[{"count":0,"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/pages\/2140\/revisions"}],"wp:attachment":[{"href":"https:\/\/groupeti.ca\/en\/wp-json\/wp\/v2\/media?parent=2140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}