{"id":404,"date":"2015-06-17T18:59:31","date_gmt":"2015-06-17T22:59:31","guid":{"rendered":"http:\/\/www.burdinesecuritygroup.com\/?page_id=404"},"modified":"2017-10-05T10:25:48","modified_gmt":"2017-10-05T14:25:48","slug":"keys-high-security-key-systems","status":"publish","type":"page","link":"https:\/\/burdinesecurity.com\/?page_id=404","title":{"rendered":"High Security Key Systems"},"content":{"rendered":"<div id=\"pl-404\"  class=\"panel-layout\" ><div id=\"pg-404-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-404-0\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-404-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-404-0-0-0\" class=\"so-panel widget widget_layerslider_widget layerslider_widget panel-first-child panel-last-child\" data-index=\"0\" ><script type=\"text\/javascript\">jQuery(function() { _initLayerSlider( '#layerslider_15_qw014vr2bgm0', {sliderVersion: '6.6.5', type: 'fullwidth', maxRatio: 1, hideUnder: 400, skin: 'v6', sliderFadeInDuration: 350, navStartStop: false, thumbnailNavigation: 'disabled', useSrcset: true, skinsPath: 'https:\/\/burdinesecurity.com\/wp-content\/plugins\/LayerSlider\/assets\/static\/layerslider\/skins\/', performanceMode: true}); });<\/script><link href=\"https:\/\/fonts.googleapis.com\/css?family=Poppins:100,100i,200,200i,300,300i,400,400i,500,500i,600,600i,700,700i,800,800i,900,900i%7COrbitron:100,100i,200,200i,300,300i,400,400i,500,500i,600,600i,700,700i,800,800i,900,900i\" rel=\"stylesheet\"><div id=\"layerslider_15_qw014vr2bgm0\"  class=\"ls-wp-container fitvidsignore ls-selectable\" style=\"width:1200px;height:720px;margin:0 auto;margin-bottom: 0px;\"><div class=\"ls-slide\" data-ls=\"duration:4000;parallaxevent:scroll;parallaxdurationmove:0;\"><img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/04\/litkey1.jpg\" class=\"ls-bg\" alt=\"\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/04\/litkey1.jpg 600w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/04\/litkey1-300x200.jpg 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/04\/litkey1-272x182.jpg 272w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><div style=\"top:50%;left:50%;text-align:initial;font-weight:400;font-style:normal;text-decoration:none;width:100%;height:100%;background:rgba(51, 9, 23, 0.2);\" class=\"ls-l ls-html-layer\" data-ls=\"showinfo:1;static:forever;position:fixed;\"><\/div><a style=\"\" class=\"ls-l\" href=\"https:\/\/burdinesecurity.com\/?page_id=77\" target=\"_blank\" data-ls=\"showinfo:1;offsetyin:-20;delayin:100;hover:true;hoverdurationin:300;hovereasingin:easeInOutQuint;hoveropacity:1;hoverbgcolor:#0000fe;static:forever;position:relative;\"><p style=\"top:408px;text-align:initial;font-weight:600;font-style:normal;text-decoration:none;font-family:Poppins;font-size:16px;line-height:46px;padding-right:30px;padding-left:30px;left:523px;color:#ffffff;border-top:3px solid #ffffff;border-right:3px solid #ffffff;border-bottom:3px solid #ffffff;border-left:3px solid #ffffff;border-radius:1px;padding-top:5px;padding-bottom:5px;\" class=\"ls-text-layer\">Contact Us<\/p><\/a><h2 style=\"text-shadow: 0 1px 2px rgba(0,0,0,0.3);top:317px;left:240px;text-align:initial;font-weight:500;font-style:normal;text-decoration:none;color:#ffffff;font-family:Orbitron;font-size:48px;z-index:500;\" class=\"ls-l ls-text-layer\" data-ls=\"showinfo:1;offsetyin:-20;static:forever;position:relative;\">High Security Key Systems<\/h2><div style=\"top:10px;left:10px;text-align:initial;font-weight:400;font-style:normal;text-decoration:none;mix-blend-mode:normal;\" class=\"ls-l ls-html-layer\" data-ls=\"position:relative;\"><\/div><img decoding=\"async\" width=\"146\" height=\"174\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/04\/sheild.png\" class=\"ls-l ls-img-layer\" alt=\"\" style=\"top:131px;left:524px;text-align:initial;font-weight:400;font-style:normal;text-decoration:none;mix-blend-mode:normal;\" data-ls=\"static:forever;position:relative;\"><\/div><div class=\"ls-slide\" data-ls=\"duration:4000;\"><img decoding=\"async\" width=\"2241\" height=\"1230\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/medecokey.jpg\" class=\"ls-bg\" alt=\"\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/medecokey.jpg 2241w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/medecokey-300x165.jpg 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/medecokey-768x422.jpg 768w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/medecokey-1024x562.jpg 1024w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/medecokey-800x439.jpg 800w\" sizes=\"(max-width: 2241px) 100vw, 2241px\" \/><\/div><div class=\"ls-slide\" data-ls=\"duration:4000;\"><img loading=\"lazy\" decoding=\"async\" width=\"2621\" height=\"1377\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/cliq.jpg\" class=\"ls-bg\" alt=\"\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/cliq.jpg 2621w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/cliq-300x158.jpg 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/cliq-768x403.jpg 768w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/cliq-1024x538.jpg 1024w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/cliq-800x420.jpg 800w\" sizes=\"(max-width: 2621px) 100vw, 2621px\" \/><\/div><div class=\"ls-slide\" data-ls=\"duration:4000;\"><img loading=\"lazy\" decoding=\"async\" width=\"1953\" height=\"1081\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/aperio.jpg\" class=\"ls-bg\" alt=\"\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/aperio.jpg 1953w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/aperio-300x166.jpg 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/aperio-768x425.jpg 768w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/aperio-1024x567.jpg 1024w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/09\/aperio-800x443.jpg 800w\" sizes=\"(max-width: 1953px) 100vw, 1953px\" \/><img loading=\"lazy\" decoding=\"async\" width=\"2955\" height=\"2571\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/08\/homeslide4.jpg\" class=\"ls-l ls-hide-desktop ls-hide-tablet ls-img-layer\" alt=\"\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/08\/homeslide4.jpg 2955w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/08\/homeslide4-300x261.jpg 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/08\/homeslide4-768x668.jpg 768w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/08\/homeslide4-1024x891.jpg 1024w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2017\/08\/homeslide4-800x696.jpg 800w\" sizes=\"(max-width: 2955px) 100vw, 2955px\" style=\"top:10px;left:10px;text-align:initial;font-weight:400;font-style:normal;text-decoration:none;mix-blend-mode:normal;\" data-ls=\"position:relative;\"><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-404-1\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-404-1\" ><div id=\"pgc-404-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-404-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-eec5715cd058-404\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tKEY CONTROL &amp; SECURITY\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"sow-sub-headline\">\n\t\t\t\t\t\tWe offer a full range of high security options.  From Medeco, Miwa, Abloy, Primus, you name it, our high security keyways do more than just key control.  As you can see in the example below, high security cylinders have additional features and protections against unwanted intruders.\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-404-2\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-404-2\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-404-2-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-404-2-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-404-2-1-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-c67d20f9f743-404\"\n\t\t\t\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img loading=\"lazy\" \n\tsrc=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecocut.png\" width=\"829\" height=\"700\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecocut.png 829w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecocut-300x253.png 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecocut-768x648.png 768w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecocut-800x676.png 800w\" sizes=\"(max-width: 829px) 100vw, 829px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><div id=\"pgc-404-2-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-404-3\"  class=\"panel-grid panel-has-style\" ><div class=\"so-parallax siteorigin-panels-stretch panel-row-style panel-row-style-for-404-3\" data-stretch-type=\"full-stretched\" ><img decoding=\"async\" width=\"2328\" height=\"305\" src=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecogroup.jpg\" class=\"attachment-full size-full\" alt=\"\" data-siteorigin-parallax=\"true\" loading=\"eager\" srcset=\"https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecogroup.jpg 2328w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecogroup-300x39.jpg 300w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecogroup-768x101.jpg 768w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecogroup-1024x134.jpg 1024w, https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/medecogroup-800x105.jpg 800w\" sizes=\"(max-width: 2328px) 100vw, 2328px\" \/><div id=\"pgc-404-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-404-3-0-0\" class=\"so-panel widget widget_sow-hero panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-hero so-widget-sow-hero-default-5459c1987fed-404 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t>\t\t\t\t<div class=\"sow-slider-base\" style=\"display: none\" tabindex=\"0\">\n\t\t\t\t\t<ul\n\t\t\t\t\tclass=\"sow-slider-images\"\n\t\t\t\t\tdata-settings=\"{&quot;pagination&quot;:true,&quot;speed&quot;:800,&quot;timeout&quot;:8000,&quot;paused&quot;:false,&quot;pause_on_hover&quot;:false,&quot;swipe&quot;:true,&quot;nav_always_show_desktop&quot;:&quot;&quot;,&quot;nav_always_show_mobile&quot;:&quot;&quot;,&quot;breakpoint&quot;:&quot;780px&quot;,&quot;unmute&quot;:false,&quot;anchor&quot;:null}\"\n\t\t\t\t\t\t\t\t\t\tdata-anchor-id=\"\"\n\t\t\t\t>\t\t<li class=\"sow-slider-image\" style=\"visibility: visible;\" >\n\t\t\t\t\t<div class=\"sow-slider-image-container\">\n\t\t\t<div class=\"sow-slider-image-wrapper\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t<\/ul>\t\t\t\t<ol class=\"sow-slider-pagination\">\n\t\t\t\t\t\t\t\t\t\t\t<li><a href=\"#\" data-goto=\"0\" aria-label=\"Display slide 1\"><\/a><\/li>\n\t\t\t\t\t\t\t\t\t<\/ol>\n\n\t\t\t\t<div class=\"sow-slide-nav sow-slide-nav-next\">\n\t\t\t\t\t<a href=\"#\" data-goto=\"next\" aria-label=\"Next slide\" data-action=\"next\">\n\t\t\t\t\t\t<em class=\"sow-sld-icon-thin-right\"><\/em>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\n\t\t\t\t<div class=\"sow-slide-nav sow-slide-nav-prev\">\n\t\t\t\t\t<a href=\"#\" data-goto=\"previous\" aria-label=\"Previous slide\" data-action=\"prev\">\n\t\t\t\t\t\t<em class=\"sow-sld-icon-thin-left\"><\/em>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-404-4\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-404-4\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-404-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-404-4-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-4735d59d1de2-404\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tINTELLIGENT KEYS\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"sow-sub-headline\">\n\t\t\t\t\t\tIntelligent keys give additional layers of security to your key system.  These intelligent keys provide audit and scheduling features and will retrofit into your existing technology.\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-404-5\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-404-5\" data-stretch-type=\"full-stretched\" ><div id=\"pgc-404-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-404-5-0-0\" class=\"so-panel widget widget_sow-features panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"panel-widget-style panel-widget-style-for-404-5-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-features so-widget-sow-features-default-cc5bb16e04de-404\"\n\t\t\t\n\t\t><ul\n\tclass=\"sow-features-list\n\tsow-features-responsive\">\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Audit Accountability\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/Audit3.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tAudit Accountability\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Audit information recorded in both the lock and key shows a time-and-date stamped record of every event, including authorized accesses and unauthorized attempts<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Electronic Scheduling\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/Scheduling.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tElectronic Scheduling\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tIntelligent Keys are programmed for specific openings with fully flexible scheduling. Access Profiles can be created where programming updates are generated automatically when an opening is added or removed.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Uses Existing Hardware\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/Existing_Hardware.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tUses Existing Hardware\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tThe Medeco XT intelligent key provides all power to the cylinder, eliminating the need for any hard wiring or power supply. Simply remove the existing mechanical cylinder and install the Medeco XT cylinder.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Reduces Risk of Lost Keys\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/Risk.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tReduces Risk of Lost Keys\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tCover and entire showroom or office space with a single cameras. \u00a0These cameras use special technology to capture an entire room.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Physical Security\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/Durable.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tPhysical Security\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tMedeco XT products add a wide variety of intelligent features without compromising on physical security. Attack-resistant design and tamper-proof features on the Medeco XT cylinder provide strong protection against forced entry.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Efficient System Management\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/laptop.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tEfficient System Management\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tMedeco XT software contains tools that will help you manage your security more efficiently. Flexible programming, scheduled access and full audit reports are offered with the convenience of stand-alone or web-based software.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Data Dashboard\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/Dashboard.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tData Dashboard\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tGlances display system data in a new graphical way on the Medeco dashboard. The \u2018Glances\u2019 display consists of several mini-dashboards that provide insight into your system configurationand audit events.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-top\"\n\t\t\tstyle=\"display: flex; flex-direction: column; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-none\"\n\t\t\t\tstyle=\"color: ; \"\n\t\t\t\ttitle=\"Bluetooth\"\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/burdinesecurity.com\/wp-content\/uploads\/2015\/06\/wireless.png); font-size: 48px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tBluetooth\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\tBluetooth enabled option with iOS and Android App support.\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-404-6\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-404-6\" data-stretch-type=\"full\" ><div id=\"pgc-404-6-0\"  class=\"panel-grid-cell\" ><div id=\"panel-404-6-0-0\" class=\"so-panel widget widget_sow-button panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-wire-93b17922fa2b-404\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/burdinesecurity.com\/?page_id=77\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" target=\"_blank\" rel=\"noopener noreferrer\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tgive us a shout\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Contact UsHigh Security Key Systems KEY CONTROL &amp; SECURITY We offer a full range of high security options. From Medeco, Miwa, Abloy, Primus, you name it, our high security keyways do more than just key control. As you can see in the example below, high security cylinders have additional features and protections against unwanted intruders. INTELLIGENT KEYS Intelligent keys give additional layers of security to your key system. These intelligent<\/p>\n<p><a class=\"more-link\" href=\"https:\/\/burdinesecurity.com\/?page_id=404\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":73,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-404","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=404"}],"version-history":[{"count":98,"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/404\/revisions"}],"predecessor-version":[{"id":2264,"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/404\/revisions\/2264"}],"up":[{"embeddable":true,"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/73"}],"wp:attachment":[{"href":"https:\/\/burdinesecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}