Enterprise access control system

,,Security is not a cost, but an investment”

  • less administration
  • greater efficiency
  • maximum security
Hardware access
Reference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner company
0+
systems
0+
users
0+ years
experience
Representation image for Integrated, automated software
Hex visual

Integrated, automated software

With the Predor Time and Attendance module, operating costs decrease and efficiency increases measurably. It can be flexibly integrated with existing enterprise management and security systems. You can manage multiple locations or even multiple companies at once, and monitor them on a single software interface.

Representation image for High security level - 
NIS2 compatible
Hex visual

High security level - NIS2 compatible

The Predor system fully complies with the NIS 2 (Network and Information Systems) cybersecurity directive requirements. The most modern encryption protocols protect the entire data line end-to-end. The Predor software monitors NIS2 compliance conditions and indicates on an interactive, graphical interface if the system does not meet any criteria.

Representation image for Vandal-proof, encrypted card readers
Hex visual

Vandal-proof, encrypted card readers

Use your mobile phone for access! We have integrated one of the world's safest card reader brands into our system. In addition to physical cards, you can also use a secure mobile application for access (NFC and Bluetooth®)

Representation image for Mobile application
Hex visual

Mobile application

Curious about who is working and how many are on break? Want to react immediately to any unexpected event? The solution is in your pocket. With the Predor mobile application, you can receive alerts, manage the evacuation list, view people's locations, disable people with one move, or even open and close doors remotely.

Additional elements of access control

Section image
Section image

When an alert is detected, the image from the cameras monitoring the gateway is automatically displayed, and the exact location of the alert is shown on a map, so security staff can respond more effectively.

Section image

In case of fire, the system automatically generates a photographic evacuation list. At the meeting point, the app can be used to find out more quickly who may still be in danger.

Section image

The system generates a unique QR code, which can be sent by email or printed instantly using a pre-configured printer. This way you can welcome guests automatically, even without staff.

Section image

We can implement any specific requirement, customise or extend the functionality of the system for our customers. Predor can be easily integrated with any system.

Section image

We offer customisable solutions for office buildings, transport companies, factories, parking facilities. Predor is integrated with, among others, Hikvision number plate recognition.

Section image

Guest cards can be issued in a single step using a desktop card reader. The issued card is automatically authorised for the corresponding areas and periods. A maximum of 5,000 guests can be handled simultaneously.

Get in touch with our team to receive a customized quote for your business

Call to visual purple background

Predor Phantom Controller

,,Element of a high-security access control system"

Predor Phantom

Custom solutions

“Cybersecurity starts with physical protection. It doesn't matter how well we protect the server with a firewall if anyone can still walk into the server room.”

Video Gallery

Did you know that your RFID access card can be copied by anyone in a matter of seconds?

In this video, we show how easy it is to copy, emulate, and duplicate RFID cards with a Flipper Zero. We want to draw attention to the weak points of access control systems and the importance of NIS2. The Predor system provides end-to-end secure communication.

Testimonials

Váradi Márk

Orange1 Hungary Kft

“The Predor system brought a real breakthrough to our HR processes. The application fits our needs perfectly and supports our day-to-day work efficiently. The information we need is easy to access and clear to review, so our payroll processes run smoothly. Thank you for the effective solution and the professional support during implementation.”

Földesi Gergő Balázs

TTSped Kft

“A complex and sophisticated system that can provide the right solution for any company.”

Tótfalusi Roland

Gravitáció Kft

“An ideal solution for small and medium-sized businesses, providing up-to-date attendance data through a user-friendly interface.”

Váradi Márk

Orange1 Hungary Kft

“Since introducing the system, we have been able to monitor our employees' working hours much more effectively than with our previous solution. This further strengthens compliance with company policies and allows us to handle discrepancies proactively. Leviathan Solutions Ltd also provides custom options within the software, so we can tailor and fine-tune it to our own needs.”

Kovács Kristóf

KBP GROUP Kft

“We are very pleased to have found such a reliable partner for the implementation of our access control containers. Flexible communication and quick issue resolution are very important to us when operating systems like these, and today I can confidently say that the Predor team delivers on all of this. Excellent communication, fast and flexible administration, and a professional implementation team support our work. Thank you.”

Kristóf Péter

Galaktika Kft

“I can only recommend the system, backed by an excellent support team with a high level of helpfulness, flexibility, and continuous availability.”