Use Case

Access control records that tell investigators exactly who was where and when

Sealed entry/exit logs, credential verification records, and area restriction enforcement β€” the kind of access evidence that security investigations, audits, and regulators require.

Private deployment Β· Sovereign infrastructure Β· Architecture session included

The problem

Physical access logs that cannot be searched, are not linked to identity verification, and can be modified after the fact do not constitute security evidence.

  • Γ—Access logs in security systems not integrated with operational compliance records
  • Γ—Visitor credentials verified at reception but records not linked to the areas actually visited
  • Γ—Access records for restricted areas not systematically reviewed against authorization lists

The solution

How Certexi solves it

  • Unified access log: entry, exit, area, credential, and purpose β€” searchable across all access points
  • Visitor workflow: pre-registration, credential check, escort assignment, area restriction, and exit confirmation
  • Authorization review: periodic check of access rights against current role and need-to-know

Platform capabilities

What Certexi provides for access control records & visitor management

Entry/exit event logging with credential verification and purpose documentation
Visitor management: pre-approval, briefing records, escort tracking, and departure confirmation
Area restriction enforcement with configurable access rules by role and time
Access anomaly alerts: after-hours access, unauthorized area attempts, tailgating indicators
Regulatory access report: who accessed which areas during any specified period

Sector coverage

Industries that rely on access control records & visitor management

Compliance support

Regulatory frameworks this use case supports

PRICING

Aligned to Operational Value, Not User Count

Pricing scales with deployment scope, not headcount. Your data. Your infrastructure. Your rules.

All plans include private deployment. Your data never leaves your infrastructure.

ISO 27001 Aligned
Private Deployment
Unlimited Users
Currency

Pilot

Validate before you commit

Custom

5 spots per quarter

  • Full platform deployment
  • Configuration support
  • Onboarding and training
  • Direct product team access
  • Feedback-driven iteration
  • 8-week evaluation period

Standard

Single-location operations

From $4,800 / month

per month, billed annually

  • All core platform capabilities
  • Standard template library
  • Private deployment included
  • Email support (24h response)
  • Quarterly platform updates
  • Unlimited users

Enterprise

Multi-location, high-compliance

Custom

Based on deployment scope

  • Everything in Standard
  • Custom template development
  • Dedicated support engineer
  • SLA guarantees
  • Advanced integrations
  • Air-gapped deployment option

Private Deployment Included in All Plans

Every plan includes full deployment on your infrastructure β€” Nextcloud, Linux servers, Docker, Kubernetes, or air-gapped environments. Your data never leaves your control.

Every access event documented. Every unauthorized access detected.

Request a scoped deployment on your infrastructure.

Request Architecture Session