TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
|
|
|
- Dwayne Atkinson
- 10 years ago
- Views:
Transcription
1 TELECOM SECURITY & USER MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management
2 Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2
3 Telecom Solutions Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 3
4 Acsys System Introduction The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro Din cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the AcsysKeys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 4
5 Why Acsys? Office Home Gates Containers Car Park USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER 5
6 Acsys Mechatronic VS Traditional Mechanical Traditional Mechanical Locks Issues BTS sites require frequent maintenance/support and sometimes because the mast has stopped responding or ran out of power. Keys are usually distributed to users or stored in a central location, which require suppliers to spend time to collect and return those keys and requires operator to manage those keys. Keys are often copied leading to theft/degradation which has as a result that sites go offline or need unbudgeted maintenance leading to service interruption. Once distributed there is no control over where and when the mechanical key is used. There is little or no traceability on how long the supplier spent on site and this can have serious financial impact on operations, especially on remote sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the site. Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site. Despite high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs. Acsys Mechatronic Solutions The Acsys solution offers controlled and secured access rights distribution. Acsys locks CANNOT be picked or bumped and are very difficult to drill. Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED, which means keys can ONLY be used when the operator has allowed them to work. The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed giving the operator CONTROL over the amount of time spent by supplier on site (and the cost of the intervention). Keys cannot be copied, so no access is possible outside the access rights working hours. If someone TRIES to access without having rights, that will be stored in the key and lock. Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. If 3 WRONG codes are entered on Keypad/CGS key it will automatically DISABLE itself. 6
7 Acsys Base Station Workflow Revolution Traditional Mechanical Base Station Support Workflow Acsys Mechatronic Base Station Support Workflow 1 Technician HQ 2 3 Key can be copied / lost / stolen Cell Tower A HQ 1 Technician 2 3 Cell Tower A 4 5 Key can be copied / lost / stolen Cell Tower B Cell Tower B 1. Mast down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ 4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ 1. Master down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site 3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via AcsysCGS and/or AcsysMobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly. 7
8 The Monetary Benefits of Implementing the Acsys Solution Efficiency VALUE Safety Data Cost Reduction A site that is well secured and well managed is a site that increases in value to operator and tenants! 8
9 The Monetary Benefits Of Implementing The Acsys Solution Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced or copied usually time, energy, and money needs to be spent changing the locks, with the Acsys CGS system keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated. As the access to every asset is now remotely controlled, we see a great reduction in theft, which is often inside jobs due to the fact that keys are copied and then used post-maintenance to gain access to sites and assets. Since the locks require no maintenance and the keys only need battery replacement 1x/year the OPEX cost of running the Acsys system is minimal meaning little or no recurrent expenditure after deployment. As every user has a key the downtime of towers is reduced as the O&M staff can now go directly to the site, no more time/energy/money wasted in collecting/returning /managing keys which is a win-win for both Operator/Towerco and O&M suppliers. The NOC now has control over which sites need servicing and when and can verify how much time users spent on site doing specific maintenances, which allows them to set KPI s for certain tasks to increase operational efficiency. By using the Acsys App the users service time and location is logged, allowing the NOC to increase the amounts of sites that can be serviced in one day. The NOC can view how long the users have spent on site doing specific maintenances, giving them a complete overview over billable hours. Through implementation of the Acsys solution access to site is simplified but now also logged in realtime, so adherence to SLA s can now be verified, good suppliers rewarded and bad suppliers eliminated. As access to sites is controlled the false and real alarms can be differentiated. The software reports allow the NOC to detect abnormal patterns of user behavior and act upon them, collusion between employees to circumvent the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized there is no more need to have security guards on site and unauthorized access is eliminated. As the system can automatically detect which site is being serviced, if the servicing time is abnormal (caused by a vendor being on site and injured) the NOC will be informed which in some cases can save lives. Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced. 9
10 HOW TO PROGRAM KEYS & PROVIDE ACCESS CGS APP IT S ALL ABOUT SECURITY & PRODUCTIVITY! MOPRO CUSTOMIZED IP USB 10
11 Acsys CGS Solution (Remote Key Activation) The Acsys Code Generating System (CGS) is a simple, yet powerful way to manage access to remote sites and assets in real-time. Through a phone and an Acsys CGS Key with Keypad, the NOC can grant access rights in real-time and be notified on site arrival and exit. The CGS solution is offered exclusively by Acsys and is unique approach to remote site access control. The concept is simple, every user now has a key, but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s). OPERATOR ANY PHONE ANY PHONE SMS Whenever a user requires Access to a site or asset, he needs to request the code by call/sms to the NOC and upon verification of the user credentials the code will be issued to the user who in turn enters it on the key allowing him to have access and ONLY on the site and assets where the NOC wants the user to have access. The Acsys CGS solution is the safest and most convenient way to control access to remote sites and assets and the best way to REDUCE DOWN-TIME by allowing users to get to the site without the need for picking-up or returning keys. USER CGS Working Principle 11
12 Remote key Activation (Call/SMS) OPERATOR Need Access Get Code REAL-TIME REAL-TIME Code Generating System SMS The CGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the NOC. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the NOC (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, for example 5 minutes, to allow for access to the site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG. Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple sites and is especially useful when a user needs to access remote sites where there might not be any coverage. At any time, all access logs of the key can be downloaded (using the USB/IP Programmer or the MoPro) to give the NOC a full overview of the following : -Access request time -Access request location (site/asset) -Time of Entry -Time of Exit -Attempted access to other sites/assets without authorization Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at any time without prior approval of the NOC. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entering a special software generated code. 12
13 Remote key Activation (Call/SMS) CALL SMS CODE CODE 1. The user has a password key and needs access to some locks 2. The user calls the operator, gives his password, and receives a code to use the key 1. The user has a password key and needs access to some locks 2. The user sends SMS and password requesting access and gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 13
14 Acsys Smartphone Solutions For contractors and vendors with smart phones, Acsys offers NOCs even more administrative flexibility and control with our newest innovation. ASSIGNED TASK Introducing AcsysMobile, a multifunctional site security, user management, and ERP platform. This frontend software can be combined with our Acsysware Telecom backend software to provide a total security and staff management solution specifically designed for the telecom industry. NOC ACSYS APP CONTROL WHO GOES WHERE, WHEN AND FOR HOW LONG BASED ON: + LOCATION USER When the AcsysMobile app for Android is combined with our other new innovation, the Acsys MoPro, the platform s full power can be harnessed. MoPro, short for Mobile Programmer, is a hardened and stylish key carrying case and protective pouch, that doubles as a programmer to connect an AcsysKey directly to a smart phone for programming via the AcsysMobile app. This is achieved via a micro-usb connector built into the MoPro to form a direct connection with the chip inside the user s AcsysKey. AcsysMobile plus Acsys MoPro means NOC s no longer require contractors to visit their offices or any other set location for key programming or downloading of access logs which can now be done remotely. Apart from the above, Acsys s Mobile Programming Solutions offer a multitude of other possibilities to optimize operational efficiency, reduce OPEX, prevent theft and make sure that SLA terms are met. 14
15 Acsys Mobile Smartphone APP Locate App users in real-time Assign tasks to users in real-time ACSYS APP for remote site and user control Fully redundant solution when used with CGS App stores all key data in case of network failure Be informed when a user arrives on-site Allow users to have access to technical datasheets Remotely Control what site and asset(s) can be opened and for how long Get user reports from the site Get alerts when a user leaves a site Obtain pictures of executed jobs from the site Verify how long the user was on-site 15
16 Acsys Smartphone APP UI SETUP MAIN MENU TICKET LIST GET CODE 16
17 Location-base Remote Key Activation (APP) Grant and Program Access Rights Authorize Access GPS Control Center Upload and Send Access Logs Verify Access 1. The Acsys Mobile Smartphone App for Android is a revolution in terms of real-time remote key and lock control. 2. This Access solution is called Location-Based as access and related CGS code will only be issued if and when the user smartphone GPS has reached the desired location. 3. The Acsys Mobile App is a fully customize-able EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App. 4. When a user accepts a task that has been assigned to him, the NOC will be informed. 5. When the user arrives on site, and he is on the desired location (based on his real-time smartphone GPS location), a CGS code will be automatically sent to the user allowing him to OPEN the site and start his duties, The NOC will also be informed of user arrival. 6. Upon completion of his tasks, the user can send Pictures/Reports of his executed tasks in real-time to the NOC after which a LOCKING code will be issued. 7. The real-time report and information is perfect to check COMPLIANCE with SLA terms. 17
18 Location-base Remote Key Activation (APP) Latitude longitude NOC NOC SUPPLIER SITE A OPEN CODE SITE A 1. NOC gets notification of event that requires actions of user 2. NOC sends out task + information to the user through Acsys App 3. When the user arrives on location, his GPS position is transmitted through Acsys App 4. If the user is in correct location Acsys CGS will automatically issue an OPEN CODE to open the locks CENTER Activity Reports LOCK CODE SITE A Task completed 8. The NOC knows when the event was created, when the user went/left site in one report 7. The user locks all the assets where he was given access 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user 5. When the user is finished he logs in the Acsys App and reports the event closed + comments 18
19 Acsys Mobile Programmer (MoPro) ASSIGNED TASK + Grant and Program Access Right GET CODE REQUEST CODE OR CONTROL CENTER REPORTS + Bluetoot h MoPr o Upload and Send Access Logs LOCATION The Acsys MoPro (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with micro USB connection to facilitate communication between the Acsys Key and ANY Android-based Smartphone. MoPro is Acsys s solution to streamlining Operation & maintenance while increasing security. The Acsys MoPro allows technicians at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the NOC. At the same time the NOC can control each and every access right, effectively creating a real-time, remote key and user management platform. MoPro removes the need to plug in the key in USB/IP programmers. It is the best answer for site security, MTTR tracking, and supplier management anywhere, anytime, without wires. 19
20 Acsys Mobile Programmer (MoPro) Latitude longitude NOC NOC SUPPLIER SITE A OPEN CODE SITE A 1. NOC gets notification of event that requires actions of user 2. NOC sends out task + information to the user through Acsys App 3. When the user arrives on location, his GPS position is transmitted through Acsys App 4. If the user is in correct location Acsys CGS will automatically issue an OPEN CODE to open the locks CENTER Activity Reports LOCK CODE SITE A Task completed 8. The NOC knows when the event was created, when the user went/left site in one report 7.The user inserts his key in the MoPro and the access logs (ENTRY/EXIT) of his Key are downloaded to the App and sent to the NOC 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user and the user closes the locks 5. When the user is finished he logs in the Acsys App and reports the event closed + comments 20
21 Local Programming (USB/IP) USB CENTRAL LOCATION Computer USB MUTIPLE LOCATION Regional HQ Refueling company Control Center Acsys software IP VPN VPN Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Maintenance company Guarding company Regional HQ Acsys Keys Acsys Locks Activity Reports Regional HQ 1 Refueling company Maintenance company Guarding company CENTRAL LOACTION PROGRAMMING(USB): The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key s memory. Logs of the key s usage can be downloaded to the database in exactly the same way. MUTIPLE LOCATION PROGRAMMING(IP): IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company s operations (for convenient downloading/uploading). 21
22 Local Programming (USB/IP) 1. The user has an Acsys key, with NO access rights 2. Access rights are uploaded to the key when inserted into the USB/IP Programmer 3. The key downloads the TIME LIMITED access right from the USB/IP programmer ex 8:00-12:00 lock 24/25/32 4. The user opens the lock within the fixed time (08:00-12:00) Control Center Activity Reports 8. Access logs are automatically downloaded and any remaining rights are deleted from the key 7. The user goes back to the office, inserts the key into the USB/IP programmer 6. The user finishes work and locks the door/gate 5. The user carries out the maintenance(ex 8:00-12:00) 22
23 Acsysware Architecture Multi-Site/Country/Operator Request & validation HQ NOC Country A Country B Country C Country D Global access And audit Reports Request & validation Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 National access And audit Reports Program and Audit keys in a combination of USB/LAN/CGS/BLUETOOTH/3G depending on the needs Regional access And audit Reports Site Access 23
24 Acsysware introduction Architecture CGS CALL CGS SMS CGS APP Server Acsysware MoPro USB/IP PROGRAMMER Combined with various technology, Acsysware developed a variety of flexible system (such as USB Programmer, IP Programmer, Calling, SMS, Smartphone App and MoPro ) according to different industry characteristics. Modular Software Acsys Telecom is a Key and Lock Management System specifically designed for Telecom and Tower Companies. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsys Telecom provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks. The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods AES-128 bit which prevents key duplication. Acsys Telecom is supported by one of the most scalable and most stable database MS SQL Server 2008 R2 which permits the software platform to be installed across the network. The Acsys Telecom wizard-like experience is designed to carry out error-free management of the keys and the locks. Server Acsysware CGS Module Watch Dog Module Human Resources Module Activity Report Module Acsys software platform comes with the standard Acsys Telecom software system. All features are added as modules such as the Acsys CGS +, Acsys IP Server, Acsys SMS Gateway Server without any modification or re-installation of the platform. 24
25 Acsysware Report Reporting Tool Live Dashboard The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new notification services, the reports can be sent to individual users or user groups on daily, weekly and monthly basis. Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS + platform is a newly designed revolutionary module which provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the job sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin point the location where and by whom the maintenance is taken place. 25
26 Acsys Customized Solutions Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements. Whether integrating with other on-site security equipment, lifecycle management or site monitoring systems, asset-specific mechanical integrations, high security solutions that require multiple person presence for access (see Stackable Key Solution ), anti-destructive technology to secure your locks (see High Security Hasp Solution ) and beyond, Acsys takes pride in going the extra mile. We don t just collect invaluable customer input, but utilize it to solve issues that our clients may have formerly thought unsolvable. If you don t see something that perfectly fits your unique situation, don t worry, we are happy to discuss how to make something that does. 26
27 Battery/AVR/3G/4G/LTE Cabinet Lock Wide Variety of Handles Replace mechanical lock with an Acsys Blind Lock Other Models Available Acsys Blind Lock Close Open Open Close 360 turn 27
28 High Security HASP for Front Gate and Storage Rooms Bolted Bolted and welded THE SAFEST PADLOCK IN THE WORLD STEP 1 STEP 2 STEP 3 STEP 4 28
29 RSM Integration Solution By integrating the Acsys IP Programmer with existing RSM (remote site monitoring) devices, we have created a HotSpot scenario with the following advantages : 1. Users are able to download access rights and upload access logs of their key at any of the installed sites 2. The NOC can get real-time notification of arrival/presence/departure 3. The NOC can update key access rights remotely without having to ask the user to come to an office. (for example allow a supplier of Cluster Nr 1 to get temporary/extended access to Cluster Nr 2) CONTROL CENTER OPTIONAL ENABLE/ DISABLE CCTV ELECTRIC FENCE The Acsys OUTDOOR IP Key Programmer 1. IP 66 Rating 2. Power and data come from RSM unit 3. Self-shutting design 4. Easy to use 5. Visual aids to inform user of status 6. Real-time connection with NOC 7. Real-time notification of user arrival/departure RMS ALARM Compatible with: 29
30 4G/LTE Cabinet Real Time Solution The Acsys LAN Lock solution is a unique solution developed by Acsys specifically for Huawei 4G LTE cabinets. Those cabinets have a built-in modem which allows connections from 1/3 party devices including the Acsys Lan Lock. The main advantage of this solution are that it is fully redundant, it allows the NOC to be alerted in real-time when the lock is opened, allows the NOC to refuse access in real-time and allows for controlled access even when the LTE cabinet is not operational offering a total and fully redundant solution for controlled access NOC REAL-TIME IP 1. NOC gets notification of event that requires actions of user 2. The user is notified and goes on-site with a preprogrammed key 3. The user arrives on-site and opens the lock 4. When the key is inserted the NOC gets an ALERT that the door has been OPENED REDUNDANT SOLUTION REAL-TIME IP REAL-TIME IP Activity Reports 7. After completion of maintenance a report will be issued to the NOC informing them when the event was created, and when the user arrived/left the site 6. In case the Cabinet is not functioning, Access can still be granted remotely (CGS-App) and the lock opened as the key powers the lock 5. When work is complete the key is inserted in the lock again the NOC gets an ALERT that the door has been CLOSED 30
31 Acsys Stackable Key Solution The stackable key solution is another worldunique Acsys development as it offers a previously unknown level of control over access to high-value or sensitive sites. The SK solution works as a bank safe where two keys are required but only requires one lock instead of two and can also be used on padlocks so the solution is available for indoor and outdoor applications. The system can be programmed so that up to 5 keys need to be used in order to open 1 lock The solution can be used in conjunction with Acsys CGS remote key activation. EXAMPLE 1 CONCEPT Worker Manager Worker alone cannot open the lock! Manager alone cannot open the lock! 1 Worker 2 OR Worker Manager 2 3 Manager Worker & Manager together use 2 keys to open a lock Security Worker,Manager & Security staff together use 3 keys to open a lock 31
32 On-site Time & Attendance Solution TOWER BATTERIES 1. The guard has key for T&A but no access rights to locks on-site 2. When the guard arrives onsite to report to duty, he inserts his key in logger CGS GENERATOR LTE CABINET 4. In case of emergency, if the guard need access to the site, he can request CGS code and enter site 30 MINUTES 3. The guard needs to re-insert his key at certain time interval (e.g. 30 minutes) to make sure he stays onsite. BTS SHELTER FUEL TANK CONTROL: PREVENTIVE MAINTENANCE SCHEDULED MAINTENANCE EMERGENCY MAINTENANCE ADHERENCE TO SLA USER ON-SITE PRODUCTIVITY ADVANTAGES: NO CABLE NO POWER NO BATTERY NO MAINTENANCE 5. During monthly site audit, the guard s attendance information can be download from T&A logger or guard can upload key event log on USB/IP programmer 6. After the logs have been uploaded, a full report shows the guard attendance on site(when/where/how long) 32
33 Ladder Access Control & Safety Solution Unlock the ladder s lock, the user can go up after turning the steps horizontally In order to further increase safety on the workplace, Acsys and Karam( have designed the world s first integrated fall prevention solution combined with realtime access control. There by preventing un-authorized people from ascending the mast. The solution allows the NOC to control in real-time and wirelessly who is ascending which mast and for what reason, at the same time ensuring the user is properly fastened to the fall prevention equipment before starting this ascent. SMS/CALL CODE Activity Reports 1. The user has a keypad key and needs access to ladder 2. The user sends SMS or CALL to gets a code to use the key to open the ladder s lock 3. The user inserts PIN code to open the ladder s Lock for a defined duration (5min/30min/1HR/8HRS) 4. The NOC notified in real-time and a report shows ladder s using information(who/when/where) 33
34 Acsys Key Specifications CGS AKEY OPTIONAL USE YOUR KEY AS A BADGE PASSWORD AKEY Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10C to +65C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) FINGERPRINT KEY Acsys Key = Acsys ProxKey Proximity/RFID PASSWORD IKEY PASSWORD AKEY WITH LCD CGS IKEY 34
35 Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 35
36 Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations 36
37 Other Products Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by DC Power supply Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by Micro USB Optional Belt-Clip 37
38 Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 38
39 It s All About Security & Productivity! REAL TIME WORLD UNIQUE WIRE FREE REDUCE DOWN-TIME/PREVENT THEFT SMS KEY 39
TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics
SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com [email protected]
SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com [email protected] COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader
TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics
CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of
What is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Autos Limited Ghana Vehicle Tracking Business Proposal
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
1838AP 1810AP PG. 48 PG. 42
Telephone Entry PLUS Computer Programming and Control. The DKS Access Plus product line is a true hybrid access control and telephone entry system that is ideal for residential, small apartment, condominium,
ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.
MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard
SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.
SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL 2016 Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.indd 1 5/11/15 3:31 PM TM Foreword... 2 Welcome to SUBARU
User Guide. Vehicle Diagnostics by Delphi
User Guide Vehicle Diagnostics by Delphi Table Of Contents Welcome...9 Is My Vehicle Compatible?...9 Equipment Overview...10 Package Contents...10 System Requirements...11 Installation Requirements...11
mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start
mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
GPS Vehicle and personal location tracker. User manual
GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...
DriveRight. Fleet Management Software. Getting Started Guide. CarChip. DriveRight. Drivers. Vehicles. Product #8186
DriveRight Fleet Management Software Getting Started Guide CarChip DriveRight Drivers Vehicles Product #8186 DriveRight Fleet Management Software Getting Started Guide; P/N 8186 Davis Instruments Part
Vehicle Monitoring Quick Reference Guide
Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined
EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE
EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE You can program online 24/7 giving you the freedom to work when and where you want. From remote bookkeeping and access, to security control on the ground
Emerson Smart Firewall
DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy
WIFI OBD GPS Tracker T356 User Manual
WIFI OBD GPS Tracker T356 User Manual Version:1.000 http://www.ulbotech.com [email protected] Document Title T356 User Manual Version 1.000 Date 2015-04-02 Status Release General Notes Ulbotech offers this
2. DESIGN REQUIREMENTS
2. DESIGN REQUIREMENTS The Smart Lock Security system will give the user the ability to control his or her door lock from the convenience of texting from the user s cell phone. The device can be controlled
Vehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
SafeMobile, Inc. 3601 E. Algonquin Road, Rolling Meadows, IL 60008 Tel: (847) 818-1649 Fax: (847) 818-9190 E-mail: safemobile@safemobile.
SafeDispatch Mobile SafeMobile, Inc. 3601 E. Algonquin Road, Rolling Meadows, IL 60008 Tel: (847) 818-1649 Fax: (847) 818-9190 E-mail: [email protected] Website: www.safemobile.com Communication
User's Guide. [Home Network] app. Model No.
User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System
Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n
USB Secure Management for ProCurve Switches
ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3
Quick Start Guide. Rev. 1.0
Quick Start Guide Rev. 1.0 WARNING TO PREVENT SERIOUS INJURY OR DEATH FROM MOVING GARAGE DOORS OR GATES: DO NOT let children use the Gogogate product and app without adult supervision. ONLY operate your
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
Reducing operating costs of telecom base stations with remote management
Reducing operating costs of telecom base stations with remote management Whitepaper How remote management can be used to cut operating expenses of existing telecom infrastructure. HMS Industrial Networks
Are apps available for Virtual Water Assistant? No. We use a mobile website.
What is a battery backup unit (BBU) sump pump? A battery backup unit (BBU) sump pump is a secondary sump pump powered by a 12V deep cycle battery that automatically protects your basement if power goes
Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
mysensors mysensors Wireless Sensors and and Cellular Gateway Quick Start Guide Information to Users Inside the Box
mysensors mysensors Wireless Sensors and and Cellular Gateway Quick Start Guide Information to Users The mysensors wireless products referenced in this Quick Start Guide have been tested to comply with
Key Control Management and Guard Tour Solutions. think inside the box.
Key Control Management and Guard Tour Solutions think inside the box. think inside the box. KeyWatcher Touch and KeyWatcher Illuminated Systems are the modular, scalable solutions designed for interoperability
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app.
PayClip User Guide The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Contents Getting started made easy 2 Information for Merchants....................................................2
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Smart Anytime, Safe Anywhere. Home Passport Gateway-G Series. The Epitome of Smart Living
Smart Anytime, Safe Anywhere Home Passport Gateway-G Series The Epitome of Smart Living Index Introduction to the HPGW-G Series 1 Features 2 The HPGW-G Comparison Chart 5 Ordering Information 6 Home Passport
Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock.
P CCTV rk Camera UAE Smart Office ameras oke Detectors Surveillance Camera Distribution Exper Budget-friendly Advanced IP CCTV NVR Fire Detectors Maintenance Smart Office IP Cam Plug N Play Remote Monitors
A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications
RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support
868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms
DIY Friendly Easy Fit Range of Alarms 60% of burglaries attempted on UK homes fitted with burglar alarms are unsuccessful. Introducing the new Easy Fit range of alarms With decades of experience in residential
Access Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services
Designed by Business Phone Systems Managed IT Services Access Control & Surveillance Data Storage & Recovery FOR MORE INFORMATION, CONTACT TCT TODAY: Toll free 1.800.800.7806 454 Moore Lane, Suite 4 &
1. Vehicle Security/Tracking Device
GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and
Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:
//DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,
VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X
GPS Vehicle Tracker User Manual V5.4 VT600X 1 Preface VT600X USER MANUAL Thank you for purchasing our products. This deliberately edited manual is to introduce the tracker with the complete technical data
Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM
RUSSIAN DESIGN CAR SECURITY SYSTEMS YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM Welcome to your guide for Pandora car security systems. This guide is mainly focused on our flagman Pandora 5OOO product
USER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
AIO Remote Site Security Solution
AIO Remote Site Security Solution AIO Systems Ltd. 5, Hacarmel st. Southern High-Tech Park Yokneam ILit 20692 POB 216 Israel Tel: +972 4 9590940 Fax: +972 4 9590921 www.aiosystems.com Security Solutions
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
AC-115 Compact Networked Single Door Controller. Installation and User Manual
AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
ACCESS CONTROL SYSTEMS USER MANUAL
Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic
WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F
Wireless Asset Monitoring - Local Food Safety Software BA/WAM-L-F Software Installation and User Guide System Overview The BAPI Wireless Asset Monitoring Local (WAM Local) Software receives temperature
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
Precise innovation presents: USer manual
Precise innovation presents: USer manual Let the FUn Begin! The goal of Caref is simple to give parents greater peace of mind and children a greater sense of freedom when they should be focusing as much
SMARTair TM. It s time to change!
SMARTair TM » Changing to SMARTair was the best decision I made, it makes my job so much easier. «Facilities Manager Sometimes the best solution is also the simplest Why is SMARTair the best choice? Easy
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
Welcome to Bell Aliant NextGen Home Security
Quick Start Guide Welcome to Bell Aliant NextGen Home Security Congratulations! Your home is now protected by the most advanced security technology available. This guide is intended to familiarize you
Flexible access control for all enterprises Building access and workforce management
Flexible access control for all enterprises Building access and workforce management Kaba have for over 100 years been providing solutions of quality from simple locking systems to complex electronic access
Reducing operating costs of power generators with cloud-based remote management
Reducing operating costs of power generators with cloud-based remote management Whitepaper How remote management can be used to cut costs and improve maintenance. HMS Industrial Networks AB Stationsgatan
USB-500/600 Series Low-Cost Data Loggers and Accessories
Low-Cost Data Loggers and Accessories Features Stand-alone, remote data loggers and portable logger assistant Measure temperature, humidity, voltage, current, or event/state change 1 or 2 channels Low
Aeroqual Connect and Cloud
Aeroqual Connect and Cloud Page 1 Contents 1. Introduction to Aeroqual Connect and Cloud... 3 1.2. Aeroqual Connect... 3 1.3. Aeroqual Cloud... 3 2. How to Connect... 4 2.1. Aeroqual Connect... 4 2.1.1.
BIOMETRIC SOLUTIONS 2013 ISSUE
BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise
Industrial IOT Gateway Family Datasheet
Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and
Using triggers and actions
Using triggers and actions Important For Triggers and Actions to function correctly, the server PC must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on
Web-Based QUANTUM Monitoring
BROCK QUANTUM Controller Owner/Operator Manual Features allows the viewing of the QUANTUM drying process remotely via a smart phone, tablet, PC or Mac with an internet connection. The following features
Questions and answers (FAQ) Reliance Protectron Go! Control security system
Questions and answers (FAQ) Reliance Protectron Go! Control security system Question: Who is Reliance Protectron? Answer: Reliance is the Canadian Leader in Electronic Security and Home Automation. Incorporated
HyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group
SCORPION TRACK.COM Technologically Advanced Stolen Vehicle Tracking & Fleet Management System Award Winning Best Consumer Tracking System Best Security Product Best Fleet Management System Best British
SANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
System off. Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork
System off Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork Security comes first You naturally want to provide the best possible protection
How To Use Netbiter
- Remote management of industrial applications Save time, save energy, save resources! Your challenges Minimize scheduled and emergency on-site service Optimize service operations through efficient machine/device
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Data Logging Solutions from Lascar Electronics
Data Logging Solutions from Lascar Electronics Remote Monitoring EL-BT-2 Bluetooth and Humidity Data Logging The EL-BT-2 data logger measures and stores over 1 million temperature and humidity readings.
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
GETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G
GETTING TO KNOW YOUR NEW TELSTRA MOBILE WI-FI 4G LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Mobile Wi-Fi 4G. This guide will help you get started as quickly and easily
XIGHTOR DOOR ENTRY SYSTEM. Company Name company address line 1 company address line 2 www.schneider-electric.com
DOOR ENTRY SYSTEM SE002-0115-00 Schneider Electric - All rights reserved Company Name company address line 1 company address line 2 www.schneider-electric.com As standards, specifications and designs change
Bell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
Easy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
Technical and Troubleshooting. Guide AIRAVE 2.5
Technical and Troubleshooting Guide AIRAVE 2.5 Welcome! Sprint is committed to developing technologies addressing in-home coverage and ensuring you have a great wireless experience. This booklet provides
Field Service Application
Field Service Terminal 3.5 TFT sunlight readable LCD touch screen Marvell PXA 310 624MHz CPU Built-in Windows Mobile 6.5 OS Wi-Fi, and WCDMA/HSDPA or GPRS wireless technology Built-in 1D Laser/2D Imager
ACCESS CONTROL SYSTEM
ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
GET THE ALARM.COM ADVANTAGE.
BETTER SECURITY REMOTE WEB CONTROL MOBILE APPS GET THE ALARM.COM ADVANTAGE. STAY SECURE. STAY CONNECTED. WIRELESS TECHNOLOGY VIDEO MONITORING INTERACTIVE SERVICES HOME AUTOMATION ENERGY MANAGEMENT Alarm.com
USB-500 Series Low-Cost Data Loggers and Accessories
Low-Cost Data Loggers and Accessories Features Stand-alone, remote data loggers and portable logger assistant Measure temperature, humidity, voltage, current, or event/state change 1 or 2 channels Low
/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and
