Traka Announces Integration with Open Options’ DNA Fusion Software

Traka Announces Integration with Open Options’ DNA Fusion Software

The new software can be used in retail, K-12, higher education, warehouse management, and more.

Traka recently announced that its Traka32 and Traka Web software are now integrated with Open Options' DNA Fusion platform extending its reach to secure, manage and audit physical keys, fleets and equipment at the core of any business.

"We're excited to offer a joint solution between our DNA Fusion access control software and Traka's key management systems," said Open Options President and General Manager Jonathan Berman. "Open Options is dedicated to providing open platform solutions, which is why we continually work with leading security providers to develop integrations that give end users a choice in their access control products."

DNA Fusion is the standard in open platform access control software and connects with leading security technologies to provide a best-of-breed security solution. DNA Fusion also contains numerous customer-centric features, allowing for effortless security management and a truly user-friendly experience.

"We're excited about this partnership. Open Options end users have been looking for ways to manage physical keys and equipment from the familiar DNA Fusion UI, and now it's possible," states Craig Newell, VP of Strategic Business Development at Traka USA. "The integration allows DNA Fusion admins to control access and report on assets held in Traka, while minimizing administrative overhead. It helps bridge a common gap between security teams and other areas of the business that benefit greatly from controlled access to physical assets such as laptops, radios, vehicles and facility keys."

Traka provides electronic key control and intelligent locker systems, allowing organizations to control, monitor and record the use of their important physical assets including facilities, equipment, machinery and vehicles. Their products can be used alone or integrated with many of the world's leading access control systems.

Featured

  • How Cloud Security Solutions Are Transforming Campus Safety

    Campus administrators today face a challenging mandate: deliver stronger security across their facilities while working within tighter budget constraints. From school districts focused on student safety to hospitals protecting patients and staff, the question remains the same: how do you build security infrastructure that evolves with your needs without requiring massive capital investments? Read Now

  • Rethinking Campus Security From the Inside

    For decades, campus security strategies focused on keeping threats outside school walls. But since the tragedy at Columbine High School, data has shown that many attacks begin inside the building, often in classrooms and corridors. This shift has prompted schools to rethink security from the inside and place greater emphasis on interior elements such as classroom doors. This shift is evidenced by a new generation of classroom door systems engineered to delay inside intruders and an ASTM standard that raises the bar on how these systems must be designed to defend against attack. Read Now

  • AI in Security: Advancing Campus Safety and Considerations for Implementing

    Artificial intelligence (AI) continues to capture attention across every sector, and the physical security industry is no exception. Once seen as experimental, AI-enabled analytics now underpin how organizations monitor environments, detect threats, and make decisions. What was once futuristic is now a practical necessity for safety professionals managing growing volumes of data, tighter resources, and increasing expectations for faster, more accurate responses. Read Now

  • How Cloud Security Solutions Are Transforming Campus Safety

    Campus administrators today face a challenging mandate: deliver stronger security across their facilities while working within tighter budget constraints. From school districts focused on student safety to hospitals protecting patients and staff, the question remains the same: how do you build security infrastructure that evolves with your needs without requiring massive capital investments? Read Now