Learn more

IMPLEMENTATION

QUICK & EASY

CORONA ACCESS RULES

Hintergrund von Self Check-in Kiosk AngebotLearn more

WITH THE JAMES SELF CHECK-IN KIOSK

DIGITIZE YOUR RECEPTION

DIGITAL VISITOR MANAGEMENT

YOUR ENTRY INTO THE

Angebot für Besucherkiosk mit Impfnachweis-ErkennungKiosk
Prozesse für die Pandemie

DIGITAL PROCESSES

IN THE PANDEMIC

WITH JAMES TO THE EFFECTIVE PANDEMIC

AND CRISIS MANAGEMENT

Learn more
jUniverse_Banner

PLAN PROCESSES SIMPLY

WITH JUNIVERSE

THE CONFIGURATION PLATFORM

FOR TAILOR-MADE PROCESSES

Discover now

Everyone is talking about critical infrastructure (KRITIS) – and so are we.

Logo_James

Never before have the demands for increased security and digitalization of critical infrastructures (KRITIS) been as great as they have been since this year. As the German government writes in its KRITIS Dachgesetzt: “The range of critical infrastructures is wide, the dangers are manifold and range from human error, terrorism and sabotage to an inadequate supply of necessary resources, e.g. due to the collapse of supply chains…”

These dangers and challenges must be countered. This presents companies with considerable challenges, e.g. when converting their digital infrastructure. It’s a good thing that we have the JAMES process management software, which not only allows us to map various processes such as reception at the gate through to the control of logistics processes, but also offers an omnipresent focus on security.

Our visitor management solution JAMES is a software that has grown in practice. Over time, the diverse needs of a wide range of customers from various industries have led to “creative misuse” of modules and functions. Due to constantly changing challenges and user demand for ever more specific functions, JAMES has evolved from a visitor management software to a holistic process management solution. JAMES thus combines functions such as visitor and contractor management, resource management, alerting and evacuation, connection to electronic security systems and access control in a single software solution.

The most important functions for interlinked critical infrastructure (KRITIS) processes

In order to integrate seamlessly into existing processes, a connection to existing and very different hardware and software is naturally required. That is why we have placed particular emphasis on the highest possible degree of flexibility in the development of JAMES.

KRITIS_Kernkraft

Warning if presence times are exceeded to protect against radiation damage

 

KRITIS_Schulungen und Unterweisungen

Training and safety instructions via web app or kiosk

KRITIS_Identitätsmanagement

Legally compliant verification processes for the identities of external workers, etc.

KRITIS_leitstand

Integration of the safety control center into all relevant processes

Connection of discontinued legacy systems

KRITIS_freigabeAuditable release structures for all processes

KRITIS_AlarmierungAlerting with connection to our ROGER alarm server and via voice consoles, SMS, e-mail, Twitter, Whatsapp, etc.

KRITIS_EvakuierungActive assembly point for evacuation with self check-in, control center dashboards, info panels and emergency conferences

KRITIS_Suspicious Activity ReportsGeneration of sustainable data for e.g. Suspicious Activity Reports (SAR)

KRITIS_MehrsprachigkeitMultilingual translation to reduce communication barriers at reception using the JAMESlingo translation software or the JAMESdialog dialog system

KRITIS_DokumentenscannerIdentity management by connecting biometric and document scanners and querying databases to verify identity

Checking direct manipulation of authorizations in access control

Process example: Resource management system (RMS) for a nuclear power plant

Below you will find a timeline in which we have illustrated an example of a resource management process for a nuclear power plant. It shows the possibilities that JAMES can offer you in the handling of various processes.

The entire process results from the interaction between our resource management software JAMES and other, external software solutions such as access control, etc.

An alarm or evacuation can also be supported by JAMES if necessary. This means that a complete security concept can be implemented in addition to the visitor process – with just one software solution.

Further advantages of JAMES include the transformation of paper-based processes into auditable end-to-end approval structures and real-time analyses for risk and presence at the respective power plant. These and many other safety-relevant functions ensure that the operator is released from liability.