At Unica Access & Security, we place great emphasis on the quality, performance, and availability of the products and (IT) services provided. Our goal is not only to implement technologies such as access control or surveillance cameras, but above all to provide a license to operate in the long term. Therefore, we establish clear KPIs when entering into a relationship.
Our customers can fully rely on us and be completely taken care of from A to Z within the entire access & security cycle. Thanks to our knowledge and years of experience in the industry, we can serve and manage all links within the access & security domain. The entire chain - From hosting and managing customer systems to the card readers at the door, the locks, the speed gates, etc. - is our responsibility. We are proud to completely unburden our customers in the field of access & security in this way. Service Level Management includes planning and coordinating preventive and corrective maintenance work and IT services, monitoring service levels, preparing and sharing reports, and making agreements with subcontractors. Together with a team of specialists, Unica Access & Security can fulfill this. The client also plays a crucial role in ensuring agreements, especially in allocating budgets and following advice.
Performance-driven maintenance: Customized to usage patterns
To maintain quality, performance, and availability at the highest level, the influence of data analysis and ICT is invaluable. Typically, we assume that systems receive timely maintenance and continue to operate until the next maintenance check. In the security landscape, there is often still a traditional view of maintenance, with the NEN 2767 standard as a guideline. However, for more complex systems, we recommend choosing a more efficient maintenance approach. We look ahead. The data from a security component provides insight into how frequently and intensively an asset is used. An access point that is used an average of ten times a year may require less maintenance than an access point that receives a card offering a thousand times a year. This also applies to the number of intercom calls, viewing hours, and movements of cameras or assets placed outside and therefore exposed to weather influences. In addition, the maintenance need of an asset changes when the software is (not) updated, which impacts the asset's lifespan.
Configuration Management Database
At Unica Access & Security, we look at the actual use and condition of a security system. This data analysis stems from the security systems and is recorded in our CMDB (Configuration Management Database): a central environment where customer configurations are managed to gain insight into processes, consumption, and maintenance needs of all security systems. By continuously monitoring and analyzing this data for deviations and trend breaks, faults are immediately detected and timely intervention is possible.
Remote services: Fixing before disruptions occur
Of course, unexpected situations can always arise, but we strive to limit them as much as possible. For example, when a controller of the access control system temporarily has no network connection, a notification is sent if this lasts longer than a certain number of minutes. By monitoring the system's performance remotely, we can intervene at the slightest deviation and rectify any issues before problems arise. Technical problems are not only detected in real-time but also resolved remotely 24/7 where possible. This reduces the dependency on service technicians having to come to the site in the event of a fault and saves unnecessary mileage. If the problem cannot be resolved remotely, we ensure through our one-time-fix principle that the right party comes directly to the site.
An innovative approach to management and maintenance
In terms of sustainability, the use of Predictive Maintenance has various benefits. The collected data can be converted into reports on the use of the technology within a location. This makes it easy to detect when a component of the system shows abnormal usage. By handling such data wisely and continuously measuring the performance of business processes, added value is created in various areas. Think of cost savings, sustainability, and efficiency. Security solutions no longer need to be automatically replaced based on depreciation because it can now be precisely monitored whether the functionality is still optimal. By proactively budgeting with a multi-year maintenance budget and planning based on usage data, unnecessary investments in replacement or service can be avoided. This way, the use of the system can be considered in a sustainable and more efficient manner.