Solution Components
Electronic compartment system
- Compartments available in various sizes and combinable
- Extendable column by column
- Individual equipment e.g. vision panel, socket or network cable connection
- Optional compartment monitoring
- Mechanical emergency release
- Installable into walls, mountable on walls or to set up as a stand-alone system
- Reliable, robust and durable
- Smart locker system with flexible colour design according to your company colours
Modular System
- Any combination of drawer, compartment module, storebox, etc. based on a modular system
- Expandable by column
- Optional compartment monitoring
- Mechanical emergency release
- Installation as in-wall solution, wall-mounted, or freestanding system
- Proven, durable, and robust
- Flexible color design aligned with your corporate branding
Reservation platform
Easy and time-accurate reservation - exactly when you need the object. And if you do not need it in the end, an overdue booking is automatically cancelled and released again for other employees.
System platform
The software platform KeMas NET ® is the basis for the administration of all system solutions:
Cross-location administration of all authorisations for persons, objects and devices
Definition of roles and rightsAutomatic report generation of your most important key figures
Can be integrated into your existing software
Interfaces
Interfaces avoid media discontinuity and doubled data maintenance.
- CSV - Import of personnel master data
- XML - Import / export of master data and authorisations
- Webservice - Library for master data, authorisations and actions
- OPC server - Display of alarms and events
- LDAP - Import of HR master data and system statuses
- NFC - Alignment of system-specific features, data (person-, action-related)
Identification
For quick and clear identification of persons and objects. If you already use an identification procedure, we may as well integrate this without high additional effort.
- Personal identification, e.g. pin code, ID card, biometrics, QR
- Object identification, e.g. RFID tag or label, optical recognition or by weight
Hosting
GDPR-compliant SaaS hosting without the need for your own IT infrastructure
Operations are fully managed in European data centers - secure, scalable, and with clearly defined responsibilities.
- No need to operate your own infrastructure or servers: reduces complexity, operational risks, and internal IT effort
- GDPR-compliant operation within the EU: data processing takes place exclusively in European data centers
- No data transfers to third countries
- High availability & operational reliability: redundant infrastructure, 24/7 monitoring, and defined operational processes
- Scalability without upfront investment: computing power, storage, and resources can be adjusted flexibly
- Transparent costs & clear responsibilities
Which requirements is this hosting suitable for?
- Migration from on-premises systems
- Professionalization of existing SaaS operating models
- Hosting of security-critical applications
- Reduction of internal IT operational effort
- Preparation for audits, compliance, and security requirements
European hosting with clear governance
The physical data center operations are handled by Hetzner, one of Europe’s leading hosting and data center providers. We take care of the application, operations, and service.
CIO-relevant benefits:
- ISO/IEC 27001:2022-certified data centers
- Multi-layered physical security
- Redundant power supply (UPS, backup power)
- High-availability cooling (N+2)
- Operations powered by renewable energy
- Data centers: Operated in European data centers with separated zones
- Tenant model: Strict data isolation, optional dedicated instances
- Operations & patching: Regular hardening, security patches, and updates
- Network: Multiple uplinks, firewalling, DDoS protection
- Monitoring: 24/7 monitoring of availability and security
- Terminal communication: Secure VPN connections
Security & Data Protection
- GDPR-compliant data processing
- No transfer of data to third countries
- TLS-encrypted communication
- Role-based access control
- Logging of security-relevant events
- Data processing agreement (DPA) available
Backup & Disaster Recovery
- Automated, encrypted backups
- Separate backup location
- Defined RTO/RPO for predictable recovery times
Locations
Newsroom
Edge
Chrome
Safari
Firefox