TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

Size: px
Start display at page:

Download "TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management"

Transcription

1 TELECOM SECURITY & USER MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management

2 Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2

3 Telecom Solutions Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 3

4 Acsys System Introduction The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro Din cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the AcsysKeys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 4

5 Why Acsys? Office Home Gates Containers Car Park USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER 5

6 Acsys Mechatronic VS Traditional Mechanical Traditional Mechanical Locks Issues BTS sites require frequent maintenance/support and sometimes because the mast has stopped responding or ran out of power. Keys are usually distributed to users or stored in a central location, which require suppliers to spend time to collect and return those keys and requires operator to manage those keys. Keys are often copied leading to theft/degradation which has as a result that sites go offline or need unbudgeted maintenance leading to service interruption. Once distributed there is no control over where and when the mechanical key is used. There is little or no traceability on how long the supplier spent on site and this can have serious financial impact on operations, especially on remote sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the site. Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site. Despite high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs. Acsys Mechatronic Solutions The Acsys solution offers controlled and secured access rights distribution. Acsys locks CANNOT be picked or bumped and are very difficult to drill. Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED, which means keys can ONLY be used when the operator has allowed them to work. The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed giving the operator CONTROL over the amount of time spent by supplier on site (and the cost of the intervention). Keys cannot be copied, so no access is possible outside the access rights working hours. If someone TRIES to access without having rights, that will be stored in the key and lock. Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. If 3 WRONG codes are entered on Keypad/CGS key it will automatically DISABLE itself. 6

7 Acsys Base Station Workflow Revolution Traditional Mechanical Base Station Support Workflow Acsys Mechatronic Base Station Support Workflow 1 Technician HQ 2 3 Key can be copied / lost / stolen Cell Tower A HQ 1 Technician 2 3 Cell Tower A 4 5 Key can be copied / lost / stolen Cell Tower B Cell Tower B 1. Mast down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ 4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ 1. Master down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site 3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via AcsysCGS and/or AcsysMobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly. 7

8 The Monetary Benefits of Implementing the Acsys Solution Efficiency VALUE Safety Data Cost Reduction A site that is well secured and well managed is a site that increases in value to operator and tenants! 8

9 The Monetary Benefits Of Implementing The Acsys Solution Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced or copied usually time, energy, and money needs to be spent changing the locks, with the Acsys CGS system keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated. As the access to every asset is now remotely controlled, we see a great reduction in theft, which is often inside jobs due to the fact that keys are copied and then used post-maintenance to gain access to sites and assets. Since the locks require no maintenance and the keys only need battery replacement 1x/year the OPEX cost of running the Acsys system is minimal meaning little or no recurrent expenditure after deployment. As every user has a key the downtime of towers is reduced as the O&M staff can now go directly to the site, no more time/energy/money wasted in collecting/returning /managing keys which is a win-win for both Operator/Towerco and O&M suppliers. The NOC now has control over which sites need servicing and when and can verify how much time users spent on site doing specific maintenances, which allows them to set KPI s for certain tasks to increase operational efficiency. By using the Acsys App the users service time and location is logged, allowing the NOC to increase the amounts of sites that can be serviced in one day. The NOC can view how long the users have spent on site doing specific maintenances, giving them a complete overview over billable hours. Through implementation of the Acsys solution access to site is simplified but now also logged in realtime, so adherence to SLA s can now be verified, good suppliers rewarded and bad suppliers eliminated. As access to sites is controlled the false and real alarms can be differentiated. The software reports allow the NOC to detect abnormal patterns of user behavior and act upon them, collusion between employees to circumvent the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized there is no more need to have security guards on site and unauthorized access is eliminated. As the system can automatically detect which site is being serviced, if the servicing time is abnormal (caused by a vendor being on site and injured) the NOC will be informed which in some cases can save lives. Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced. 9

10 HOW TO PROGRAM KEYS & PROVIDE ACCESS CGS APP IT S ALL ABOUT SECURITY & PRODUCTIVITY! MOPRO CUSTOMIZED IP USB 10

11 Acsys CGS Solution (Remote Key Activation) The Acsys Code Generating System (CGS) is a simple, yet powerful way to manage access to remote sites and assets in real-time. Through a phone and an Acsys CGS Key with Keypad, the NOC can grant access rights in real-time and be notified on site arrival and exit. The CGS solution is offered exclusively by Acsys and is unique approach to remote site access control. The concept is simple, every user now has a key, but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s). OPERATOR ANY PHONE ANY PHONE SMS Whenever a user requires Access to a site or asset, he needs to request the code by call/sms to the NOC and upon verification of the user credentials the code will be issued to the user who in turn enters it on the key allowing him to have access and ONLY on the site and assets where the NOC wants the user to have access. The Acsys CGS solution is the safest and most convenient way to control access to remote sites and assets and the best way to REDUCE DOWN-TIME by allowing users to get to the site without the need for picking-up or returning keys. USER CGS Working Principle 11

12 Remote key Activation (Call/SMS) OPERATOR Need Access Get Code REAL-TIME REAL-TIME Code Generating System SMS The CGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the NOC. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the NOC (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, for example 5 minutes, to allow for access to the site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG. Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple sites and is especially useful when a user needs to access remote sites where there might not be any coverage. At any time, all access logs of the key can be downloaded (using the USB/IP Programmer or the MoPro) to give the NOC a full overview of the following : -Access request time -Access request location (site/asset) -Time of Entry -Time of Exit -Attempted access to other sites/assets without authorization Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at any time without prior approval of the NOC. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entering a special software generated code. 12

13 Remote key Activation (Call/SMS) CALL SMS CODE CODE 1. The user has a password key and needs access to some locks 2. The user calls the operator, gives his password, and receives a code to use the key 1. The user has a password key and needs access to some locks 2. The user sends SMS and password requesting access and gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 13

14 Acsys Smartphone Solutions For contractors and vendors with smart phones, Acsys offers NOCs even more administrative flexibility and control with our newest innovation. ASSIGNED TASK Introducing AcsysMobile, a multifunctional site security, user management, and ERP platform. This frontend software can be combined with our Acsysware Telecom backend software to provide a total security and staff management solution specifically designed for the telecom industry. NOC ACSYS APP CONTROL WHO GOES WHERE, WHEN AND FOR HOW LONG BASED ON: + LOCATION USER When the AcsysMobile app for Android is combined with our other new innovation, the Acsys MoPro, the platform s full power can be harnessed. MoPro, short for Mobile Programmer, is a hardened and stylish key carrying case and protective pouch, that doubles as a programmer to connect an AcsysKey directly to a smart phone for programming via the AcsysMobile app. This is achieved via a micro-usb connector built into the MoPro to form a direct connection with the chip inside the user s AcsysKey. AcsysMobile plus Acsys MoPro means NOC s no longer require contractors to visit their offices or any other set location for key programming or downloading of access logs which can now be done remotely. Apart from the above, Acsys s Mobile Programming Solutions offer a multitude of other possibilities to optimize operational efficiency, reduce OPEX, prevent theft and make sure that SLA terms are met. 14

15 Acsys Mobile Smartphone APP Locate App users in real-time Assign tasks to users in real-time ACSYS APP for remote site and user control Fully redundant solution when used with CGS App stores all key data in case of network failure Be informed when a user arrives on-site Allow users to have access to technical datasheets Remotely Control what site and asset(s) can be opened and for how long Get user reports from the site Get alerts when a user leaves a site Obtain pictures of executed jobs from the site Verify how long the user was on-site 15

16 Acsys Smartphone APP UI SETUP MAIN MENU TICKET LIST GET CODE 16

17 Location-base Remote Key Activation (APP) Grant and Program Access Rights Authorize Access GPS Control Center Upload and Send Access Logs Verify Access 1. The Acsys Mobile Smartphone App for Android is a revolution in terms of real-time remote key and lock control. 2. This Access solution is called Location-Based as access and related CGS code will only be issued if and when the user smartphone GPS has reached the desired location. 3. The Acsys Mobile App is a fully customize-able EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App. 4. When a user accepts a task that has been assigned to him, the NOC will be informed. 5. When the user arrives on site, and he is on the desired location (based on his real-time smartphone GPS location), a CGS code will be automatically sent to the user allowing him to OPEN the site and start his duties, The NOC will also be informed of user arrival. 6. Upon completion of his tasks, the user can send Pictures/Reports of his executed tasks in real-time to the NOC after which a LOCKING code will be issued. 7. The real-time report and information is perfect to check COMPLIANCE with SLA terms. 17

18 Location-base Remote Key Activation (APP) Latitude longitude NOC NOC SUPPLIER SITE A OPEN CODE SITE A 1. NOC gets notification of event that requires actions of user 2. NOC sends out task + information to the user through Acsys App 3. When the user arrives on location, his GPS position is transmitted through Acsys App 4. If the user is in correct location Acsys CGS will automatically issue an OPEN CODE to open the locks CENTER Activity Reports LOCK CODE SITE A Task completed 8. The NOC knows when the event was created, when the user went/left site in one report 7. The user locks all the assets where he was given access 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user 5. When the user is finished he logs in the Acsys App and reports the event closed + comments 18

19 Acsys Mobile Programmer (MoPro) ASSIGNED TASK + Grant and Program Access Right GET CODE REQUEST CODE OR CONTROL CENTER REPORTS + Bluetoot h MoPr o Upload and Send Access Logs LOCATION The Acsys MoPro (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with micro USB connection to facilitate communication between the Acsys Key and ANY Android-based Smartphone. MoPro is Acsys s solution to streamlining Operation & maintenance while increasing security. The Acsys MoPro allows technicians at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the NOC. At the same time the NOC can control each and every access right, effectively creating a real-time, remote key and user management platform. MoPro removes the need to plug in the key in USB/IP programmers. It is the best answer for site security, MTTR tracking, and supplier management anywhere, anytime, without wires. 19

20 Acsys Mobile Programmer (MoPro) Latitude longitude NOC NOC SUPPLIER SITE A OPEN CODE SITE A 1. NOC gets notification of event that requires actions of user 2. NOC sends out task + information to the user through Acsys App 3. When the user arrives on location, his GPS position is transmitted through Acsys App 4. If the user is in correct location Acsys CGS will automatically issue an OPEN CODE to open the locks CENTER Activity Reports LOCK CODE SITE A Task completed 8. The NOC knows when the event was created, when the user went/left site in one report 7.The user inserts his key in the MoPro and the access logs (ENTRY/EXIT) of his Key are downloaded to the App and sent to the NOC 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user and the user closes the locks 5. When the user is finished he logs in the Acsys App and reports the event closed + comments 20

21 Local Programming (USB/IP) USB CENTRAL LOCATION Computer USB MUTIPLE LOCATION Regional HQ Refueling company Control Center Acsys software IP VPN VPN Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Maintenance company Guarding company Regional HQ Acsys Keys Acsys Locks Activity Reports Regional HQ 1 Refueling company Maintenance company Guarding company CENTRAL LOACTION PROGRAMMING(USB): The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key s memory. Logs of the key s usage can be downloaded to the database in exactly the same way. MUTIPLE LOCATION PROGRAMMING(IP): IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company s operations (for convenient downloading/uploading). 21

22 Local Programming (USB/IP) 1. The user has an Acsys key, with NO access rights 2. Access rights are uploaded to the key when inserted into the USB/IP Programmer 3. The key downloads the TIME LIMITED access right from the USB/IP programmer ex 8:00-12:00 lock 24/25/32 4. The user opens the lock within the fixed time (08:00-12:00) Control Center Activity Reports 8. Access logs are automatically downloaded and any remaining rights are deleted from the key 7. The user goes back to the office, inserts the key into the USB/IP programmer 6. The user finishes work and locks the door/gate 5. The user carries out the maintenance(ex 8:00-12:00) 22

23 Acsysware Architecture Multi-Site/Country/Operator Request & validation HQ NOC Country A Country B Country C Country D Global access And audit Reports Request & validation Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 National access And audit Reports Program and Audit keys in a combination of USB/LAN/CGS/BLUETOOTH/3G depending on the needs Regional access And audit Reports Site Access 23

24 Acsysware introduction Architecture CGS CALL CGS SMS CGS APP Server Acsysware MoPro USB/IP PROGRAMMER Combined with various technology, Acsysware developed a variety of flexible system (such as USB Programmer, IP Programmer, Calling, SMS, Smartphone App and MoPro ) according to different industry characteristics. Modular Software Acsys Telecom is a Key and Lock Management System specifically designed for Telecom and Tower Companies. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsys Telecom provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks. The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods AES-128 bit which prevents key duplication. Acsys Telecom is supported by one of the most scalable and most stable database MS SQL Server 2008 R2 which permits the software platform to be installed across the network. The Acsys Telecom wizard-like experience is designed to carry out error-free management of the keys and the locks. Server Acsysware CGS Module Watch Dog Module Human Resources Module Activity Report Module Acsys software platform comes with the standard Acsys Telecom software system. All features are added as modules such as the Acsys CGS +, Acsys IP Server, Acsys SMS Gateway Server without any modification or re-installation of the platform. 24

25 Acsysware Report Reporting Tool Live Dashboard The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new notification services, the reports can be sent to individual users or user groups on daily, weekly and monthly basis. Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS + platform is a newly designed revolutionary module which provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the job sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin point the location where and by whom the maintenance is taken place. 25

26 Acsys Customized Solutions Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements. Whether integrating with other on-site security equipment, lifecycle management or site monitoring systems, asset-specific mechanical integrations, high security solutions that require multiple person presence for access (see Stackable Key Solution ), anti-destructive technology to secure your locks (see High Security Hasp Solution ) and beyond, Acsys takes pride in going the extra mile. We don t just collect invaluable customer input, but utilize it to solve issues that our clients may have formerly thought unsolvable. If you don t see something that perfectly fits your unique situation, don t worry, we are happy to discuss how to make something that does. 26

27 Battery/AVR/3G/4G/LTE Cabinet Lock Wide Variety of Handles Replace mechanical lock with an Acsys Blind Lock Other Models Available Acsys Blind Lock Close Open Open Close 360 turn 27

28 High Security HASP for Front Gate and Storage Rooms Bolted Bolted and welded THE SAFEST PADLOCK IN THE WORLD STEP 1 STEP 2 STEP 3 STEP 4 28

29 RSM Integration Solution By integrating the Acsys IP Programmer with existing RSM (remote site monitoring) devices, we have created a HotSpot scenario with the following advantages : 1. Users are able to download access rights and upload access logs of their key at any of the installed sites 2. The NOC can get real-time notification of arrival/presence/departure 3. The NOC can update key access rights remotely without having to ask the user to come to an office. (for example allow a supplier of Cluster Nr 1 to get temporary/extended access to Cluster Nr 2) CONTROL CENTER OPTIONAL ENABLE/ DISABLE CCTV ELECTRIC FENCE The Acsys OUTDOOR IP Key Programmer 1. IP 66 Rating 2. Power and data come from RSM unit 3. Self-shutting design 4. Easy to use 5. Visual aids to inform user of status 6. Real-time connection with NOC 7. Real-time notification of user arrival/departure RMS ALARM Compatible with: 29

30 4G/LTE Cabinet Real Time Solution The Acsys LAN Lock solution is a unique solution developed by Acsys specifically for Huawei 4G LTE cabinets. Those cabinets have a built-in modem which allows connections from 1/3 party devices including the Acsys Lan Lock. The main advantage of this solution are that it is fully redundant, it allows the NOC to be alerted in real-time when the lock is opened, allows the NOC to refuse access in real-time and allows for controlled access even when the LTE cabinet is not operational offering a total and fully redundant solution for controlled access NOC REAL-TIME IP 1. NOC gets notification of event that requires actions of user 2. The user is notified and goes on-site with a preprogrammed key 3. The user arrives on-site and opens the lock 4. When the key is inserted the NOC gets an ALERT that the door has been OPENED REDUNDANT SOLUTION REAL-TIME IP REAL-TIME IP Activity Reports 7. After completion of maintenance a report will be issued to the NOC informing them when the event was created, and when the user arrived/left the site 6. In case the Cabinet is not functioning, Access can still be granted remotely (CGS-App) and the lock opened as the key powers the lock 5. When work is complete the key is inserted in the lock again the NOC gets an ALERT that the door has been CLOSED 30

31 Acsys Stackable Key Solution The stackable key solution is another worldunique Acsys development as it offers a previously unknown level of control over access to high-value or sensitive sites. The SK solution works as a bank safe where two keys are required but only requires one lock instead of two and can also be used on padlocks so the solution is available for indoor and outdoor applications. The system can be programmed so that up to 5 keys need to be used in order to open 1 lock The solution can be used in conjunction with Acsys CGS remote key activation. EXAMPLE 1 CONCEPT Worker Manager Worker alone cannot open the lock! Manager alone cannot open the lock! 1 Worker 2 OR Worker Manager 2 3 Manager Worker & Manager together use 2 keys to open a lock Security Worker,Manager & Security staff together use 3 keys to open a lock 31

32 On-site Time & Attendance Solution TOWER BATTERIES 1. The guard has key for T&A but no access rights to locks on-site 2. When the guard arrives onsite to report to duty, he inserts his key in logger CGS GENERATOR LTE CABINET 4. In case of emergency, if the guard need access to the site, he can request CGS code and enter site 30 MINUTES 3. The guard needs to re-insert his key at certain time interval (e.g. 30 minutes) to make sure he stays onsite. BTS SHELTER FUEL TANK CONTROL: PREVENTIVE MAINTENANCE SCHEDULED MAINTENANCE EMERGENCY MAINTENANCE ADHERENCE TO SLA USER ON-SITE PRODUCTIVITY ADVANTAGES: NO CABLE NO POWER NO BATTERY NO MAINTENANCE 5. During monthly site audit, the guard s attendance information can be download from T&A logger or guard can upload key event log on USB/IP programmer 6. After the logs have been uploaded, a full report shows the guard attendance on site(when/where/how long) 32

33 Ladder Access Control & Safety Solution Unlock the ladder s lock, the user can go up after turning the steps horizontally In order to further increase safety on the workplace, Acsys and Karam( have designed the world s first integrated fall prevention solution combined with realtime access control. There by preventing un-authorized people from ascending the mast. The solution allows the NOC to control in real-time and wirelessly who is ascending which mast and for what reason, at the same time ensuring the user is properly fastened to the fall prevention equipment before starting this ascent. SMS/CALL CODE Activity Reports 1. The user has a keypad key and needs access to ladder 2. The user sends SMS or CALL to gets a code to use the key to open the ladder s lock 3. The user inserts PIN code to open the ladder s Lock for a defined duration (5min/30min/1HR/8HRS) 4. The NOC notified in real-time and a report shows ladder s using information(who/when/where) 33

34 Acsys Key Specifications CGS AKEY OPTIONAL USE YOUR KEY AS A BADGE PASSWORD AKEY Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10C to +65C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) FINGERPRINT KEY Acsys Key = Acsys ProxKey Proximity/RFID PASSWORD IKEY PASSWORD AKEY WITH LCD CGS IKEY 34

35 Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 35

36 Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations 36

37 Other Products Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by DC Power supply Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by Micro USB Optional Belt-Clip 37

38 Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 38

39 It s All About Security & Productivity! REAL TIME WORLD UNIQUE WIRE FREE REDUCE DOWN-TIME/PREVENT THEFT SMS KEY 39

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics

More information

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com [email protected]

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com info@acsy.com SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com [email protected] COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader

More information

TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics

More information

CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of

More information

What is Bitdefender BOX?

What is Bitdefender BOX? Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Autos Limited Ghana Vehicle Tracking Business Proposal

Autos Limited Ghana Vehicle Tracking Business Proposal Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize

More information

1838AP 1810AP PG. 48 PG. 42

1838AP 1810AP PG. 48 PG. 42 Telephone Entry PLUS Computer Programming and Control. The DKS Access Plus product line is a true hybrid access control and telephone entry system that is ideal for residential, small apartment, condominium,

More information

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD. MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard

More information

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait. SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL 2016 Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.indd 1 5/11/15 3:31 PM TM Foreword... 2 Welcome to SUBARU

More information

User Guide. Vehicle Diagnostics by Delphi

User Guide. Vehicle Diagnostics by Delphi User Guide Vehicle Diagnostics by Delphi Table Of Contents Welcome...9 Is My Vehicle Compatible?...9 Equipment Overview...10 Package Contents...10 System Requirements...11 Installation Requirements...11

More information

mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start

mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

GPS Vehicle and personal location tracker. User manual

GPS Vehicle and personal location tracker. User manual GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...

More information

DriveRight. Fleet Management Software. Getting Started Guide. CarChip. DriveRight. Drivers. Vehicles. Product #8186

DriveRight. Fleet Management Software. Getting Started Guide. CarChip. DriveRight. Drivers. Vehicles. Product #8186 DriveRight Fleet Management Software Getting Started Guide CarChip DriveRight Drivers Vehicles Product #8186 DriveRight Fleet Management Software Getting Started Guide; P/N 8186 Davis Instruments Part

More information

Vehicle Monitoring Quick Reference Guide

Vehicle Monitoring Quick Reference Guide Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined

More information

EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE

EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE You can program online 24/7 giving you the freedom to work when and where you want. From remote bookkeeping and access, to security control on the ground

More information

Emerson Smart Firewall

Emerson Smart Firewall DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy

More information

WIFI OBD GPS Tracker T356 User Manual

WIFI OBD GPS Tracker T356 User Manual WIFI OBD GPS Tracker T356 User Manual Version:1.000 http://www.ulbotech.com [email protected] Document Title T356 User Manual Version 1.000 Date 2015-04-02 Status Release General Notes Ulbotech offers this

More information

2. DESIGN REQUIREMENTS

2. DESIGN REQUIREMENTS 2. DESIGN REQUIREMENTS The Smart Lock Security system will give the user the ability to control his or her door lock from the convenience of texting from the user s cell phone. The device can be controlled

More information

Vehicle Tracking System,

Vehicle Tracking System, Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show

More information

SafeMobile, Inc. 3601 E. Algonquin Road, Rolling Meadows, IL 60008 Tel: (847) 818-1649 Fax: (847) 818-9190 E-mail: safemobile@safemobile.

SafeMobile, Inc. 3601 E. Algonquin Road, Rolling Meadows, IL 60008 Tel: (847) 818-1649 Fax: (847) 818-9190 E-mail: safemobile@safemobile. SafeDispatch Mobile SafeMobile, Inc. 3601 E. Algonquin Road, Rolling Meadows, IL 60008 Tel: (847) 818-1649 Fax: (847) 818-9190 E-mail: [email protected] Website: www.safemobile.com Communication

More information

User's Guide. [Home Network] app. Model No.

User's Guide. [Home Network] app. Model No. User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n

More information

USB Secure Management for ProCurve Switches

USB Secure Management for ProCurve Switches ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3

More information

Quick Start Guide. Rev. 1.0

Quick Start Guide. Rev. 1.0 Quick Start Guide Rev. 1.0 WARNING TO PREVENT SERIOUS INJURY OR DEATH FROM MOVING GARAGE DOORS OR GATES: DO NOT let children use the Gogogate product and app without adult supervision. ONLY operate your

More information

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS

More information

Reducing operating costs of telecom base stations with remote management

Reducing operating costs of telecom base stations with remote management Reducing operating costs of telecom base stations with remote management Whitepaper How remote management can be used to cut operating expenses of existing telecom infrastructure. HMS Industrial Networks

More information

Are apps available for Virtual Water Assistant? No. We use a mobile website.

Are apps available for Virtual Water Assistant? No. We use a mobile website. What is a battery backup unit (BBU) sump pump? A battery backup unit (BBU) sump pump is a secondary sump pump powered by a 12V deep cycle battery that automatically protects your basement if power goes

More information

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational

More information

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited (Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

mysensors mysensors Wireless Sensors and and Cellular Gateway Quick Start Guide Information to Users Inside the Box

mysensors mysensors Wireless Sensors and and Cellular Gateway Quick Start Guide Information to Users Inside the Box mysensors mysensors Wireless Sensors and and Cellular Gateway Quick Start Guide Information to Users The mysensors wireless products referenced in this Quick Start Guide have been tested to comply with

More information

Key Control Management and Guard Tour Solutions. think inside the box.

Key Control Management and Guard Tour Solutions. think inside the box. Key Control Management and Guard Tour Solutions think inside the box. think inside the box. KeyWatcher Touch and KeyWatcher Illuminated Systems are the modular, scalable solutions designed for interoperability

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app.

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app. PayClip User Guide The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Contents Getting started made easy 2 Information for Merchants....................................................2

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names

More information

Smart Anytime, Safe Anywhere. Home Passport Gateway-G Series. The Epitome of Smart Living

Smart Anytime, Safe Anywhere. Home Passport Gateway-G Series. The Epitome of Smart Living Smart Anytime, Safe Anywhere Home Passport Gateway-G Series The Epitome of Smart Living Index Introduction to the HPGW-G Series 1 Features 2 The HPGW-G Comparison Chart 5 Ordering Information 6 Home Passport

More information

Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock.

Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock. P CCTV rk Camera UAE Smart Office ameras oke Detectors Surveillance Camera Distribution Exper Budget-friendly Advanced IP CCTV NVR Fire Detectors Maintenance Smart Office IP Cam Plug N Play Remote Monitors

More information

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support

More information

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms DIY Friendly Easy Fit Range of Alarms 60% of burglaries attempted on UK homes fitted with burglar alarms are unsuccessful. Introducing the new Easy Fit range of alarms With decades of experience in residential

More information

Access Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services

Access Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services Designed by Business Phone Systems Managed IT Services Access Control & Surveillance Data Storage & Recovery FOR MORE INFORMATION, CONTACT TCT TODAY: Toll free 1.800.800.7806 454 Moore Lane, Suite 4 &

More information

1. Vehicle Security/Tracking Device

1. Vehicle Security/Tracking Device GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and

More information

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology: //DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,

More information

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X GPS Vehicle Tracker User Manual V5.4 VT600X 1 Preface VT600X USER MANUAL Thank you for purchasing our products. This deliberately edited manual is to introduce the tracker with the complete technical data

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM

YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM RUSSIAN DESIGN CAR SECURITY SYSTEMS YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM Welcome to your guide for Pandora car security systems. This guide is mainly focused on our flagman Pandora 5OOO product

More information

USER MANUAL V5.0 ST100

USER MANUAL V5.0 ST100 GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

AIO Remote Site Security Solution

AIO Remote Site Security Solution AIO Remote Site Security Solution AIO Systems Ltd. 5, Hacarmel st. Southern High-Tech Park Yokneam ILit 20692 POB 216 Israel Tel: +972 4 9590940 Fax: +972 4 9590921 www.aiosystems.com Security Solutions

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

AC-115 Compact Networked Single Door Controller. Installation and User Manual

AC-115 Compact Networked Single Door Controller. Installation and User Manual AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

ACCESS CONTROL SYSTEMS USER MANUAL

ACCESS CONTROL SYSTEMS USER MANUAL Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic

More information

WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F

WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F Wireless Asset Monitoring - Local Food Safety Software BA/WAM-L-F Software Installation and User Guide System Overview The BAPI Wireless Asset Monitoring Local (WAM Local) Software receives temperature

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

Precise innovation presents: USer manual

Precise innovation presents: USer manual Precise innovation presents: USer manual Let the FUn Begin! The goal of Caref is simple to give parents greater peace of mind and children a greater sense of freedom when they should be focusing as much

More information

SMARTair TM. It s time to change!

SMARTair TM. It s time to change! SMARTair TM » Changing to SMARTair was the best decision I made, it makes my job so much easier. «Facilities Manager Sometimes the best solution is also the simplest Why is SMARTair the best choice? Easy

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Welcome to Bell Aliant NextGen Home Security

Welcome to Bell Aliant NextGen Home Security Quick Start Guide Welcome to Bell Aliant NextGen Home Security Congratulations! Your home is now protected by the most advanced security technology available. This guide is intended to familiarize you

More information

Flexible access control for all enterprises Building access and workforce management

Flexible access control for all enterprises Building access and workforce management Flexible access control for all enterprises Building access and workforce management Kaba have for over 100 years been providing solutions of quality from simple locking systems to complex electronic access

More information

Reducing operating costs of power generators with cloud-based remote management

Reducing operating costs of power generators with cloud-based remote management Reducing operating costs of power generators with cloud-based remote management Whitepaper How remote management can be used to cut costs and improve maintenance. HMS Industrial Networks AB Stationsgatan

More information

USB-500/600 Series Low-Cost Data Loggers and Accessories

USB-500/600 Series Low-Cost Data Loggers and Accessories Low-Cost Data Loggers and Accessories Features Stand-alone, remote data loggers and portable logger assistant Measure temperature, humidity, voltage, current, or event/state change 1 or 2 channels Low

More information

Aeroqual Connect and Cloud

Aeroqual Connect and Cloud Aeroqual Connect and Cloud Page 1 Contents 1. Introduction to Aeroqual Connect and Cloud... 3 1.2. Aeroqual Connect... 3 1.3. Aeroqual Cloud... 3 2. How to Connect... 4 2.1. Aeroqual Connect... 4 2.1.1.

More information

BIOMETRIC SOLUTIONS 2013 ISSUE

BIOMETRIC SOLUTIONS 2013 ISSUE BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise

More information

Industrial IOT Gateway Family Datasheet

Industrial IOT Gateway Family Datasheet Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and

More information

Using triggers and actions

Using triggers and actions Using triggers and actions Important For Triggers and Actions to function correctly, the server PC must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on

More information

Web-Based QUANTUM Monitoring

Web-Based QUANTUM Monitoring BROCK QUANTUM Controller Owner/Operator Manual Features allows the viewing of the QUANTUM drying process remotely via a smart phone, tablet, PC or Mac with an internet connection. The following features

More information

Questions and answers (FAQ) Reliance Protectron Go! Control security system

Questions and answers (FAQ) Reliance Protectron Go! Control security system Questions and answers (FAQ) Reliance Protectron Go! Control security system Question: Who is Reliance Protectron? Answer: Reliance is the Canadian Leader in Electronic Security and Home Automation. Incorporated

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group SCORPION TRACK.COM Technologically Advanced Stolen Vehicle Tracking & Fleet Management System Award Winning Best Consumer Tracking System Best Security Product Best Fleet Management System Best British

More information

SANGFOR SSL VPN. Quick Start Guide

SANGFOR SSL VPN. Quick Start Guide SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully

More information

System off. Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork

System off. Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork System off Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork Security comes first You naturally want to provide the best possible protection

More information

How To Use Netbiter

How To Use Netbiter - Remote management of industrial applications Save time, save energy, save resources! Your challenges Minimize scheduled and emergency on-site service Optimize service operations through efficient machine/device

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Data Logging Solutions from Lascar Electronics

Data Logging Solutions from Lascar Electronics Data Logging Solutions from Lascar Electronics Remote Monitoring EL-BT-2 Bluetooth and Humidity Data Logging The EL-BT-2 data logger measures and stores over 1 million temperature and humidity readings.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

GETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G

GETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G GETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Mobile Wi-Fi 4G. This guide will help you get started as quickly and easily

More information

XIGHTOR DOOR ENTRY SYSTEM. Company Name company address line 1 company address line 2 www.schneider-electric.com

XIGHTOR DOOR ENTRY SYSTEM. Company Name company address line 1 company address line 2 www.schneider-electric.com DOOR ENTRY SYSTEM SE002-0115-00 Schneider Electric - All rights reserved Company Name company address line 1 company address line 2 www.schneider-electric.com As standards, specifications and designs change

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Easy Data Centralization with Webster. User Guide

Easy Data Centralization with Webster. User Guide Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing

More information

Technical and Troubleshooting. Guide AIRAVE 2.5

Technical and Troubleshooting. Guide AIRAVE 2.5 Technical and Troubleshooting Guide AIRAVE 2.5 Welcome! Sprint is committed to developing technologies addressing in-home coverage and ensuring you have a great wireless experience. This booklet provides

More information

Field Service Application

Field Service Application Field Service Terminal 3.5 TFT sunlight readable LCD touch screen Marvell PXA 310 624MHz CPU Built-in Windows Mobile 6.5 OS Wi-Fi, and WCDMA/HSDPA or GPRS wireless technology Built-in 1D Laser/2D Imager

More information

ACCESS CONTROL SYSTEM

ACCESS CONTROL SYSTEM ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

GET THE ALARM.COM ADVANTAGE.

GET THE ALARM.COM ADVANTAGE. BETTER SECURITY REMOTE WEB CONTROL MOBILE APPS GET THE ALARM.COM ADVANTAGE. STAY SECURE. STAY CONNECTED. WIRELESS TECHNOLOGY VIDEO MONITORING INTERACTIVE SERVICES HOME AUTOMATION ENERGY MANAGEMENT Alarm.com

More information

USB-500 Series Low-Cost Data Loggers and Accessories

USB-500 Series Low-Cost Data Loggers and Accessories Low-Cost Data Loggers and Accessories Features Stand-alone, remote data loggers and portable logger assistant Measure temperature, humidity, voltage, current, or event/state change 1 or 2 channels Low

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175

/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175 / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI

GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and

More information