ENiQ Software

We offer solutions for the management of locking media. From programming, through commissioning, to management of all connected components. This means that you can quickly and easily add or modify users in an existing organisational structure - for example when departments relocate, or users are assigned new tasks. Operation is really easy and convenient with typical endpoints such as PCs or laptops.

Who is ENiQ software management system for?

Large and growing organisations

Scalable operating concept: from group and area permissions up to complex authorisation profiles.

Flexible authorisation systems

Flexible authorisation includes up to 256 daily and weekly schedules and various special functions, such as temporary releases or weekly schedules per device.

Online functionality - allows you to manage in real time

Modular in structure and upgradeable: functionality can be extended through additional modules at any time.


ENiQ software vs app - which one?

ENiQ Software
ENiQ Software
Windows
ENiQ App
ENiQ App
Android
DOM Tapkey
DOM Tapkey
iOS, Web & Android
Online real time monitoring and device management Yes - -
Integrate with other security protocols with DOMConnect Yes - -
Give access to non DOM tags Yes Yes -
Create masterkey plan Yes - No, but grouping is possible
Access data storage Data on device
Data on card
Data on device
Data on card
On cloud

ENiQ Software
ENiQ Software
Windows
Real-time monitoring
Yes
DOMConnect integration
Yes
Access for non DOM tags
Yes
Masterkey plan
Yes
ENiQ App
ENiQ App
Android
Real-time monitoring
-
DOMConnect integration
-
Access for non DOM tags
Yes
Masterkey plan
-
DOM Tapkey
DOM Tapkey
iOS, Web & Android
Real-time monitoring
-
DOMConnect integration
-
Access for non DOM tags
-
Masterkey plan
No, but grouping is possible
Data storage
On cloud

Enjoy more ENiQ Software benefits

Manage access from your laptop

Easy to create a new user

Every solution in your ENiQ® system is designed to be as close to ‘plug and play’ as possible, with simple installation processes and programming methods. What's more, it's easy to operate too. So, no matter how complex your security protocols may be, users can simply hold a transponder up to a wall reader.

Optimise your access control system by combining online and offline devices

Because every site is different, ENiQ Software empowers you to effectively manage both online and offline devices. This includes devices equipped with data-on-card and data-on-device functionality.



 

In this mode, the data is stored on your devices (locks). Every time the access rights change, you will need to synchronise the affected devices through a portable device such as a laptop or a Windows tablet with a USB RF stick. This mode is most suitable for centralised sites (devices accessible in the same location) with a moderate number of devices (or a large number of transponders to manage).


The DOM ENiQ Software will inform you if some actions are pending. Simply look for the indicators that mark the devices that need to be synchronised.

Simply place a portable device such as a laptop or a Windows tablet with a USB RF stick close to the device and let it sync!

In this mode, the data is stored on the transponders. Every time the access rights change, you will need to synchronise the affected transponders through a portable device such as a laptop or a Windows tablet with a USB RF stick.

DOM ENiQ Software will inform you when any actions are pending. Simply look out for the indicators that show you the transponders that need synchronising.

Simply sync your transponders using the ENiQ Software and a desk reader

Take full advantage of the superior control and insight of ENiQ software without having to invest heavily in a network to connect all your ENiQ devices. Use a portable device such as a laptop or a Windows tablet with a USB RF stick to program any device instantly. Perfect for buildings with a limited number of doors where multiple users require different access rights.


How does the offline method work?

The devices are not connected to the software. You will need to synchronize the devices using your laptop and an USB-RF stick in order to apply permission, configuration changes or to retrieve events.

By having the Data on Card module, you can also write the access data on the transponders. This way you only need to program the transponder, and it can already open doors.

For security reasons, the transponder needs to be blacklisted. Simply mark this transponder as lost in the software. You can easily replace it with another using the Desk reader. The blacklist will be automatically updated on all your online devices



Connecting your devices in real-time to the ENiQ Software allows you to maintain the synchronisation of devices automatically, to trigger the opening/closing of your devices remotely, and accessing the device events as they occur.

The devices that are online are connected in real-time to the software. Every change in permissions, configuration or events are transferred automatically.

Settings your devices online has a an infrastructure cost. The most added value of online connectivity is for devices at the entrance of your site, as it is the most sensitive point of any security system. With the online system, you can setup terminals that automatically update the transponders while they enter the site.

For security reasons, the transponder needs to be blacklisted. Simply mark this transponder as lost in the software. You can easily replace it with another using the Desk reader. The blacklist will be automatically updated on all your online devices.

Explore other ways to manage access control

Meet the products compatible with DOM’s Access Control solutions

Request our brochures

Would you like to know more about how the ENiQ ecosystem can help you? Download the brochure by filling in the form. We will send you the download link to your email.

By clicking submit on this form, you acknowledge that the information you provide will be transferred to DOM-Security for processing in accordance with our Data Protection Policy, in connection with applications with our Data Protection Policy for Applicants.