Smart Solutions for Security

Seguridad lógica aplicada

Ikusi is aware of the closely dependent relations between physical electronic security solutions and information systems. Ikusi is experienced in both fields. Ikusi bases its applied software security solutions on the combination of professional services and technological tools from the software area with physical and electronic security solutions. The result: an operating environment secure in itself.

This solution guarantees physical security system availability, integrity, confidentiality and traceability throughout the phases of design, implementation and maintenance. Likewise, Ikusi offers the possibility of integrating physical/electronic security systems into a software security architecture, facilitating systems monitoring through security software event management tools. This integrated architecture also makes it possible to incorporate automated data exchange mechanisms between the physical/electronic and software decision-making centers, offering an added value that would otherwise be unattainable.


privacy policy

Privacy Policy

The privacy policy of the VELATIA S.L., is in accordance with the Organic act 15/1999, for the Protection of Data of a Personal Nature, and other regulations that develop it.

Notwithstanding the foregoing, the VELATIA S.L., informs the users of the following:

All the information expressely provided by the user shall be included in an automated data file. This information may be used to carry out statistical research, general or otherwise; for the personalization of the services provided and for the transmission to the user of advertising, offers or products, in accordance with the characteristics obtained from the information provided.

The user accepts the sending of information to the physical or e-mail addresses provided.

The VELATIA S.L., is committed to ensuring the privacy of personal information and treating it with the inspections and under the supervision defined by law 15/1999 and other applicable legislation.

The user has the right to request information and verification of the recorded information and to request, should it be necessary, the total or partial rectification of said information. Similarly, they have the right to request the cancellations of all information.

Minors are not permitted to provide information, nor exercise the above-mentioned rights, without the consent of their parents or guardians.

The user shall respond, in all cases, for the authenticity of the information provided by them.