-
Who We Are
PSG is a team of highly skilled computer programmers, IT professionals, engineers, and project managers who collaborate directly with end users and manufacturers to extend and integrate security systems beyond their normal off-the-shelf capabilities end-users
-
What We Do
PSG routinely handles the deployment of mission-critical IT infrastructure, including redundant, high-availability server configurations and centralized storage systems. PSG installs and configures servers, storage arrays, and networking equipment on existing customer networks and is also capable of building an entire IT infrastructure from the ground up.
Published Price List - July 2024
-
This module shows a current list of people in each building as well as the last time they used their access control card. By utilizing exit readers and/or configurable timeouts, a fairly accurate list of people in the building is maintained throughout the day. This allows them to keep higher levels of auditing and accountability should there be any reason to evacuate a building
-
These Windows tablets work over WiFi and/or Cellular data coverage to allow for mustering outside a building in a parking lot or nearby outdoor location. Multiple muster stations may be deployed at each site location and allows for tracking general inside/mustered data or even who is at each specific muster location.
-
The Visitor Management software application tracks visitors across their enterprise using intuitive smart-matching technology and who the visitor is there to see. It searches for a list of current employees and checks users in and out of the building.
-
The Lockdown application secures various areas on campus based on various threats or testing scenarios. They are quickly and easily able to lock buildings down by group or individually if desired. This prevents normal personnel traffic but allows configured “first responder” type personnel free access throughout the facility.
-
Alarm Viewer and Status Viewer are best utilized for real-time alarm management with customized workflows. This allows for proper tracking and response to alarms and reportability to duration, response, and closeout of any alarms. They can also see the live status of hardware within the underlying systems.