Soluciones de Seguridad en Infraestructuras

Centro de control

The control center is the most important part of an integrated security solution. It is the place where all the physical/electronic security systems operate and all the decisions are taken.

Ikusi offers a specific solution and control center design and implementation from a total vision:

  • Purpose of the control center. Knowledge of its specific use to adapt resources to its utilization.
  • Operation and functions of the control center to optimize its internal design (operations zone, crisis room, technical area).
  • Design of technological HW and SW platform necessary to implement the physical/electronic security management systems.
  • Communications infrastructure on which it is to operate, whether dedicated or integrated into an already-existing system

privacy policy

Privacy Policy

The privacy policy of the VELATIA S.L., is in accordance with the Organic act 15/1999, for the Protection of Data of a Personal Nature, and other regulations that develop it.

Notwithstanding the foregoing, the VELATIA S.L., informs the users of the following:

All the information expressely provided by the user shall be included in an automated data file. This information may be used to carry out statistical research, general or otherwise; for the personalization of the services provided and for the transmission to the user of advertising, offers or products, in accordance with the characteristics obtained from the information provided.

The user accepts the sending of information to the physical or e-mail addresses provided.

The VELATIA S.L., is committed to ensuring the privacy of personal information and treating it with the inspections and under the supervision defined by law 15/1999 and other applicable legislation.

The user has the right to request information and verification of the recorded information and to request, should it be necessary, the total or partial rectification of said information. Similarly, they have the right to request the cancellations of all information.

Minors are not permitted to provide information, nor exercise the above-mentioned rights, without the consent of their parents or guardians.

The user shall respond, in all cases, for the authenticity of the information provided by them.