Use Case

Access control records that tell investigators exactly who was where and when

Sealed entry/exit logs, credential verification records, and area restriction enforcement — the kind of access evidence that security investigations, audits, and regulators require.

100%Access event documentation rate

30-day free trial · Private deployment included · Cancel anytime

The problem

Physical access logs that cannot be searched, are not linked to identity verification, and can be modified after the fact do not constitute security evidence.

  • ×Access logs in security systems not integrated with operational compliance records
  • ×Visitor credentials verified at reception but records not linked to the areas actually visited
  • ×Access records for restricted areas not systematically reviewed against authorization lists

The solution

How Certexi solves it

  • Unified access log: entry, exit, area, credential, and purpose — searchable across all access points
  • Visitor workflow: pre-registration, credential check, escort assignment, area restriction, and exit confirmation
  • Authorization review: periodic check of access rights against current role and need-to-know

Platform capabilities

What Certexi provides for access control records & visitor management

Entry/exit event logging with credential verification and purpose documentation
Visitor management: pre-approval, briefing records, escort tracking, and departure confirmation
Area restriction enforcement with configurable access rules by role and time
Access anomaly alerts: after-hours access, unauthorized area attempts, tailgating indicators
Regulatory access report: who accessed which areas during any specified period

Sector coverage

Industries that rely on access control records & visitor management

Compliance support

Regulatory frameworks this use case supports

PRECIOS

Alineado al Valor Operativo, No al Número de Usuarios

El precio depende del alcance del despliegue, no del número de usuarios. Tus datos. Tu infraestructura. Tus reglas.

Todos los planes incluyen despliegue privado. Tu información permanece en tu infraestructura.

ISO 27001 Aligned
Private Deployment
Unlimited Users

Piloto

Valida antes de comprometerte

Personalizado

5 lugares por trimestre

  • Despliegue completo de plataforma
  • Soporte de configuración
  • Capacitación e incorporación
  • Acceso directo al equipo de producto
  • Iteración basada en retroalimentación
  • Período de evaluación de 8 semanas

Estándar

Operaciones de una ubicación

Desde $2,500

por mes, facturado anualmente

  • Todas las capacidades centrales
  • Biblioteca de plantillas estándar
  • Despliegue privado incluido
  • Soporte por email (respuesta 24h)
  • Actualizaciones trimestrales
  • Usuarios ilimitados

Enterprise

Multi-ubicación, alto cumplimiento

Personalizado

Basado en alcance del despliegue

  • Todo lo de Estándar
  • Desarrollo de plantillas personalizadas
  • Ingeniero de soporte dedicado
  • Garantías SLA
  • Integraciones avanzadas
  • Opción de despliegue air-gapped

Despliegue Privado Incluido en Todos los Planes

Cada plan incluye despliegue completo en tu infraestructura — Nextcloud, servidores Linux, Docker, Kubernetes o entornos air-gapped. Tu información nunca sale de tu control.

Every access event documented. Every unauthorized access detected.

Start with a 30-day free trial. Private deployment included.

Start Free Trial