Access control with cloud technology
With this document we want to expose the main characteristics of access control based on cloud technology, from the point of view of who has to buy and install it, who has to control the spaces, and end users.

With this document we want to expose the main characteristics of access control based on cloud technology, from the point of view of who has to buy and install it, who has to control the spaces, and end users.