TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

Size: px
Start display at page:

Download "TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management"

Transcription

1 TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management

2 Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2

3 Market Scope MINING MILITARY HOSPITALS WAREHOUSES MUSEUMS OFFICES AIRPORTS RESIDENTIAL PORTS LOGISTICS POWER STATIONS RAIL &METRO GOVERNMENT RETAIL TELECOM CONTAINER HOUSES WATER COMPANIES ATM BANKS GUARDING 3

4 Acsys Solution Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 4

5 Acsys System Introduction Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro DIN cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the Acsys Keys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 5

6 Acsys Mechatronic VS Traditional Mechanical Traditional Mechanical Locks Issues Keys are usually distributed to users or stored in a central location, which requires people spend time to collect, return and manage those keys. Keys are often copied leading to theft/degradation and as a result unbudgeted maintenance, leading to service interruption. Once distributed there is no control over where and when the mechanical key is used. There is little or no traceability on how long the user spent on a site and this can have serious financial impact on operations, especially on remote sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the site. Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site. Despite security measures such as high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs. Acsys Mechatronic Solutions The Acsys solution offers controlled and secured access rights distribution. Acsys locks CANNOT be picked or bumped and are very difficult to drill. Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED. The main advantage is that keys can ONLY be used during the time the operator has configured them to work. The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed, giving the operator CONTROL over the amount of time spent by suppliers on sites (and the cost of the intervention). Keys cannot be copied, so no access is possible outside the access rights working hours. If someone TRIES to access without having rights, that will be stored in the key and lock. Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. If 3 WRONG codes are entered on the Keypad/CGS key it will automatically DISABLE itself. 6

7 Why Acsys? Office Gates Truck Assets USE ONE KEY FOR EVERY TRUCK USE ANY LOCK ON ANY TRUCK ONE SOLUTION FOR EVERY PLACE EASY TO INSTALL & MAINTAIN Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE LOST MECHANICAL KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN OPEN THE LOCK VERIFY WHERE AND WHEN USERS OPEN THE LOCK 7

8 Tank Truck Fleet and Workforce Management Solution 8

9 Project Background A state-owned petroleum company with the core business in oil, gas, renewable and new energy. Currently, there are needs to upgrade the existing passive one-time used security seal/tape solution on tank truck to improve the monitoring and control of the goods and assets throughout the whole distribution process. Secondly, despite some trucks have already fitted with GPS monitoring system, there is no correlation and computerized automation and integration with the security seal/tag solution. This makes the total fleet management solution less secure and less effective. Data: 650 tank trucks in CITY A and only a small amount is fitted with GPS In-vehicle system Each tank truck has 2-5 compartments and each needs 2 Padlocks 1 deport in CITY A 850 remote fuel stations in CITY A 9

10 Key Components of the Solution AcsysLogistics is a GPS location-based fleet and workforces management solution for enterprise. Through Acsys in-house GPS location system or by integration with an existing GPS system, AcsysLogistics provides the administrator a Live Dashboard (G.I.S.) showing WHERE about and WHAT status are the vehicles in real-time. The Live Dashboard also provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the job sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin-point where and by whom the activity is taking place. AcsysLogistics means SECURITY, VISIBILITY, EFFICIENCY & PRODUCTIVITY and FLEXIBILITY in managing the cargos, assets, fleets and workforces in REAL-TIME. Akey Gkey CGSPlus Key PL5 IP Programmer In-vehicle Programmer GPS System 10

11 Advantages SECURITY VISIBILITY EFFICIENCY & PRODUCTIVITY FLEXIBILITY Current challenges Key lost/stolen/no return = lock change Key is easy to be copied Key is copied = Lock change Locks can be bumped/picked easily Padlocks in used can be pretended to be closed Many keys are in used and hard to manage and control usage Cannot control who Attempts to open the unauthorized lock(s) and no record on such attempts Operators need different keys for different locks for different fuel brand trucks Operators need to collect/return keys before/after used No Record information about who goes where, when for how long Specific locks only can be used on specific trucks to specific destinations Specific key only can open specific lock Acsys solutions Key lost/stolen/no return = No need change lock Key cannot be copied Locks cannot be picked, bumped and hard to drill Each open/close of lock is clearly visible and recorded in the system AES 128-bit encryption Record who, when, where and use the key for how long Access logs on both keys and locks show who attempts to open the unauthorized lock(s) Key auto-blocked after 5 attempts to open unauthorized lock(s) One key per operator One key can open all locks depending on the Access Rights (No picking and breaking of lock due to lost/no return keys) Any lock can be used on any truck to any destination One key for any lock(s) 11

12 Advantages Acsys solutions answer to SECURITY Where are the trucks/assets? Is the truck locked (Locks closed)? VISIBILITY Is the truck loaded/unloaded/halfloaded? EFFICIENCY & PRODUCTIVITY FLEXIBILITY ALARM Why is an unlocked and loaded truck moving? E.g. theft, violation of work process etc. ALARM Why is a locked and loaded truck not moving? E.g. accident on site, broken down etc. 12

13 Monetary Benefits of Implementing Acsys Solutions Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced/copied, usually time, energy and money needs to be spent changing the locks. With the Acsys system, keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated. As the access to every oil truck is now remotely controlled, we see a great reduction in theft, which is often inside jobs due to the fact that keys are copied and then used illegally. Since Acsys locks require no maintenance and Acsys keys only need battery replacement 1x/year, the OPEX cost of running the Acsys system is minimal meaning little or no recurrent expenditure after deployment. As any Acsys lock can be used on any truck to any destination, no more time/energy/money wasted in collecting/returning/managing lockkey matching. The control center now has control over which trucks/sites need servicing and when and can verify how much time users spent on doing specific jobs, which allows to set KPI s for certain tasks to increase operational efficiency. The control center can view how long the users have spent on doing specific jobs, giving them a complete overview over billable hours. Through implementation of the Acsys solution access to site/assets is simplified but now also logged in realtime, so adherence to SLA s can now be verified. The software reports allow the control center to detect abnormal patterns of user behavior and act upon them, collusion between employees to circumvent the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized, there is no more need to have security guards on site, unauthorized access is eliminated. As well as to prevent vandalism to gain access to any assets. Through a better management, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced. 13

14 Acsys Keys are SMART Acsys AKey Key Features: One key can open up to 100,000 locks Keys keep track of the last 1,000 events (WHEN, WHERE, HOW LONG) Keys are encrypted with AES 128bit so they cannot be copied Keys power the lock. Typical battery life is 1 year or 25,000 times of access Keys can be programmed to work at different times and/or days for different locks Keypad key (optional) only works after correct passcode/pin is entered to prevent unauthorized people from using the key Keys can be fitted with Mifare coil (optional) and used as badges in traditional access control system Applications: Time & Attendance: Record user s activities Access control: Access locks depending on Access Rights 14

15 Acsys Keys are SMART Acsys GKey Key Features: A special key for Security Guard only GKey CANNOT open/close locks Guard uses GKey to verify and download the Access Logs of locks (WHO, WHEN, WHERE, HOW LONG, WHAT), i.e. lock opened/closed by who at what time and for how long GKeys can access 250 locks each time Gkeys are encrypted with AES 128bit so they cannot be copied GKeys power the lock. Typical battery life is 1 year or 25,000 times of access GKeys can be programmed to work at different times and/or days for different locks GKeys can be fitted with Mifare coil (optional) and used as badges in traditional access control system Applications: Time & Attendance: Record Guard s activities Access Monitoring: Verify and download Access Logs from locks to get computerized record of WHO, WHEN, WHRE, HOW LONG and WHAT Patrol Guard: Guard uses key for regular patrol tour operations 15

16 Acsys Keys are SMART Acsys CGSPlus Key Key Features: One key can open up to 100,000 locks Keys keep track of the last 1,000 events (WHEN, WHERE, HOW LONG) Keys are encrypted with AES 128bit so they cannot be copied Keys power the lock. Typical battery life is 1 year or 25,000 times of access Keys with patented keypad to prevent unauthorized usage. Two-factor authentication for enhance security Keys work on a random, single-usage, time-limited passcode generated by the Acsys s patented CGSPlus system only User must request the passcode from the system and enter to the key before usage Keys can be fitted with Mifare coil (optional) and used as badges in traditional access control system Applications: Access control: Access locks depending on time-limited, random and lock specific passcode. Administrator has full control of user s key usage and access rights can be issued on demand based only. 16

17 Typical Site Situations 17

18 Work Processes A: Depot GATE IN B: Depot GATE OUT C: Field Stations D: In Transit (Accidental / Emergency Open) 18

19 A: Depot GATE IN 19

20 A: Depot GATE IN 1. Operator A arrives at work & logs-in his attendance with key and gets access rights for the day 2. Operator A can ONLY OPEN locks to which he was given access ADMINISTRATOR CONTROL CENTER SERVER Activity Reports CONTROL CENTER To Refilling Zone 4. Control center receives daily detailed report of key usage (WHEN, WHERE, HOW LONG) 3. At preset intervals or at end of duty, the operator logs-out his attendance with key, all key access logs are uploaded to server, all access rights are removed 20

21 B: Depot GATE OUT 21

22 B: Depot GATE OUT 1.. Operator B arrives at work & logs-in his attendance with key and gets access rights for the day. Guard arrives at work & logs-in his attendance with his GKey. 2. Operator B can ONLY CLOSE locks to which he was given access 3. Guard visually check RED marks on locks and inserts GKey to each lock to VERIFY locks are properly closed ADMINISTRATOR CONTROL CENTER SERVER Activity Reports GPS System ALARM CONTROL CENTER Exit from Depot GEO-FENCE 6. Control center receives daily detailed report of key usage (WHEN, WHERE, HOW LONG) and any remaining rights are deleted from the key 5. GPS will detect and monitor the movement of the truck. The software will ALARM when the truck has left the GPS GEO-FENCE and not ALL locks are closed 4. After verifying all locks on truck(s), Guard inserts GKey to programmer to digitally file a report that all locks are closed properly and is free to go 22

23 C: Field Station 23

24 C: Field Station GPS System 1. Truck is fitted with GPS location tracking system and Acsys In-vehicle Programmer 2. GPS verifies truck at correct location. Field Station operator inserts key to Invehicle Programmer to get access rights for locks 3. Operator ONLY OPEN/CLOSE locks which he is authorized and this based on location ADMINISTRATOR CONTROL CENTER SERVER GPRS IN-VEHICLE GPS TERMINAL USB/RS232/RS485 DATA IN-VEHICLE PROGRAMMER GPS System ALARM Activity Reports GEO-FENCE 5. GPS detects truck moves out of the GPS GEO-FENCE (i.e. Field Station), the software will ALARM if not all locks are locked 4. After job done and insert key to programmer, Access logs are automatically uploaded and any remaining rights are deleted from the key 24

25 D: In Transit (Accidental / Emergency Open) 25

26 D: In Transit (Accidental / Emergency Open) REAL-TIME REAL-TIME 1. Truck has accident in transit 2. Driver has a CGSPlus passcode key but NO passcode 3. Driver CALL/SMS Administrator for a random, single-usage, time-limited passcode to OPEN/CLOSE locks ADMINISTRATOR CONTROL CENTER SERVER 4. Driver ONLY OPEN/CLOSE locks which he is authorized 26

27 Consolidated Reporting System 27

28 Consolidated Reporting System GPS Fleet Management Reports on trucks Positions Speed Routing Driving behavier Etc. CONSOLIDATED REPORT AcsysLogistics 28

29 Acsys Solution Architecture and How Keys get Access Rights 29

30 Acsysware Architecture Request & validation HQ CONTROL CENTER Global access and audit Reports Region A Region B Region C Region D Request & validation Sub-region 1 Sub-region 2 Sub-region 1 Sub-region 2 Sub-region 1 Sub-region 2 Sub-region 1 Sub-region 2 Program and Audit keys in a combination of USB/LAN/CGS/BLUETOOTH/3G depending on operational needs Regional access and audit Reports Sub-regional access and audit Reports Site Access Multi-Site/Region/Operator 30

31 Local Programming (USB/IP) USB CENTRAL LOCATION Computer USB MUTIPLE LOCATION Regional HQ Refueling company Control Center Acsys software IP VPN VPN Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Maintenance company Guarding company Regional HQ Acsys Keys Acsys Locks Activity Reports Regional HQ 1 Refueling company Maintenance company Guarding company CENTRAL LOACTION PROGRAMMING(USB): The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are downloaded to the key s memory. Logs of the key s usage can be uploaded to the database in exactly the same way. MUTIPLE LOCATION PROGRAMMING(IP): IP Programmers allow for distributing access rights across a virtual private network (VPN). It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company s operations (for convenient downloading/uploading). 31

32 Local Programming (USB/IP) 1. The user has an Acsys key with NO access rights 2. Access rights are downloaded to the key when inserted into the USB/IP Programmer 3. The key downloads the TIME LIMITED access right from the USB/IP programmer (ex 8:00-12:00 lock 24/25/32) 4. The user opens the lock within the fixed time (ex 08:00-12:00) Activity Reports ADMINISTRATOR CONTROL CENTER SERVER Activity Reports 8. Access logs are automatically uploaded and any remaining rights are deleted from the key 7. The user goes back to the office inserts the key into the USB/IP programmer 6. The user finishes work and close locks 5. The user carries out the task (ex 8:00-12:00) 32

33 Acsys CGSPlus Solution (Remote Key Activation) The Acsys Code Generating System Plus (CGSPlus) is a simple, yet powerful way to manage access to remote sites and assets in real-time. Through a phone and an Acsys CGSPlus Key with Keypad, the control center can grant access rights in real-time and be notified of site arrival and exit and accessing of assets. The patented CGSPlus solution is offered exclusively by Acsys and is a unique approach to remote site access control. The concept is simple, every user now has a key but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s). OPERATOR ANY PHONE ANY PHONE SMS Whenever a user requires access to a site or asset, he needs to request the code by call/sms to the control center. Upon verification of user credentials the code will be issued to the user, who in turn enters it on the key, granting him access and ONLY on the site and assets that the control center wants the user to access. The Acsys CGSPlus solution is the safest and most convenient way to control access to remote sites without the need for picking-up or returning keys. USER CGS Working Principle 33

34 Remote key Activation (Call/SMS) CALL SMS CODE CODE 1. The user has a passcode key and needs access to some locks 2. The user calls the operator, gives his PIN, then receives a code to use the key 1. The user has a passcode key and needs access to some locks 2. The user sends SMS and his PIN requesting access, then gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts code to use the key, GREEN FLASH= can use the key 34

35 Acsysware Introduction Reporting Tool Acsysware is a Key and Lock Management System specifically designed for industrial clients. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsysware provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks. Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys. Furthermore it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods,aes-128 bit, which prevents key duplication. Acsysware is supported by one of the most scalable and most stable databases, MS SQL Server 2008 R2, which permits the software platform to be installed across the network. Acsysware s wizard-like experience is designed to carry out error-free management of the keys and the locks. The reporting tool provides up-to-date information about all activities performed on the hardware and the software such as: access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, and user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore,with the new notification services the reports can be sent to individual users or user groups on a daily, weekly or monthly basis. 35

36 Special Solutions 36

37 Prevent Locks Swapping A B Cording Fix the lock to truck by clipping a cable to the lock body Fix the lock to truck by welding the shackle and metal chain 37

38 Acsys GPS Padlock Solution Control Center Independent GPS module with SIM card and battery inside. CLOUD Remotely Control Position Remotely Control Access GPS/SMS CGS/SMS TRACK YOUR ASSETS ANYTIME, ANYWHERE All data is encrypted using 128-bit AES ENCRYPTION Acsys lock CANNOT be BUMPED OR PICKED and very hard to DRILL The Acsys GPS padlock is a standard PL5 padlock that is equipped with an additional GPS module that will transmit its position at pre-set intervals The GPS padlock solution allows you to secure any asset, control when the asset is being used and by whom, but also allows you to monitor its position and track it when it is being moved The GPS padlock is battery-operated but should the battery be drained, the padlock will still function as its power supply is coming from the key and not from the GPS unit As standard the GPS padlock is able to send up to 10 status positions within one day giving a clear overview of its position on the web-service mapping software. The battery autonomy is 10 days. Should less status positions be required (ex not on weekends) then its autonomy can be increased to about 25 days using only 3 status positions per weekday. 38

39 Hardware Specifications 39

40 Acsys Keys Specifications AKEY NORMAL (Operator Key) AKEY GuardKey (Guard Key) AKEY CGSPlus (Driver Key) Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10 C to +65 C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) OPTIONAL : USE YOUR KEY AS A BADGE = ACSYS KEY PROXIMITY/RFID ACSYS PROXKEY 40

41 Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 41

42 Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with chrome plating with plastic cover finished Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with chrome plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Water Sealing Rubber Cap 42

43 Programmers Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by externaldc Power supply (IP version) In-vehicle Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by 16 volt power adapter or built-in battery 43

44 Other Products Specifications USB/IP Programmer 3G Programmer Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by externaldc Power supply (IP version) Reinforced ABS, UV proof IP 55, RoHS Powered by 6 Volt power adapter or by built-in battery Reinforced ABS, UV proof IP 55, RoHS Optional belt clip Recharge able battery 44

45 Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 45

46 It s All About Security & Productivity REAL TIME WORLD UNIQUE WIRE FREE CONTROL & SECURE Acsys KEY 46

CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of

More information

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics

More information

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TELECOM SECURITY & USER MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics access

More information

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com [email protected]

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com info@acsy.com SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com [email protected] COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader

More information

Global Asset Tracking & Identification System

Global Asset Tracking & Identification System ` Global Asset Tracking & Identification System 2 About GATIS Solutions Global Asset Tracking & Identification Systems GATIS is a robust, secure and comprehensive Auto-ID system, with a logistic and asset

More information

The company offers: Smart Tracker Are You in Control? EXECUTIVE SUMMARY

The company offers: Smart Tracker Are You in Control? EXECUTIVE SUMMARY Icom ltd. EXECUTIVE SUMMARY ICOM Ltd. is a technology provider specialized in the field of telematics, information security and mobile software, and custom hardware and firmware solutions. The company

More information

Autos Limited Ghana Vehicle Tracking Business Proposal

Autos Limited Ghana Vehicle Tracking Business Proposal Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize

More information

Electronic Cargo Tracking System (ECT-1)

Electronic Cargo Tracking System (ECT-1) A D VA N C E D F L E E T M A N A G E M E N T S Y S T E M S Electronic Cargo Tracking System (ECT-1) The UTrack ECT-1 system is ideal for monitoring and managing any fleet size of Tankers or Cargo Trucks

More information

SAMA Tracking Solutions

SAMA Tracking Solutions SAMA Tracking Solutions Vehicle Tracking System VTS SAMA Telecom 1 About SAMA Telecom SAMA TELECOM, is a leading company in telecommunication services, software application and system implementation. We

More information

Fleet management solutions for your business

Fleet management solutions for your business Fleet management solutions for your business IN PARTNERSHIP WITH 2 IN PARTNERSHIP WITH Make the right decisions based on facts In today s economic climate, businesses are working hard to improve processes

More information

TracKing. A complete web-enabled temperature management system.

TracKing. A complete web-enabled temperature management system. TracKing A complete web-enabled temperature management system. Wireless communications for improved asset utilization and fleet efficiency. T hermo King is proud to offer a new mobile communications system

More information

USER MANUAL V5.0 ST100

USER MANUAL V5.0 ST100 GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2

More information

ROUTE GPS. Vehicle Tracking & Fleet Management Providers

ROUTE GPS. Vehicle Tracking & Fleet Management Providers ROUTE GPS Vehicle Tracking & Fleet Management Providers ROUTE the vehicle's previous activity after selecting desired date and time as basic offering. Automatic Vehicle Location providers to manage entire

More information

Keep control is essential.

Keep control is essential. Keep control is essential. Visirun tracks your commercial fleet in real time, anytime and everywhere! You can get informations about position of your vehicles and what they re doing, about driver s driving

More information

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support

More information

Logitrac Fleet Tracking System

Logitrac Fleet Tracking System Logitrac Fleet Tracking System Overview Taking a look at Productivity Key Benefits of Logitrac Product Overview Controlling Costs In Depth look at User Interface Pricing Logitrac at a glance 2008 AT&T

More information

Vehicle Tracking System,

Vehicle Tracking System, Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show

More information

Reducing operating costs of power generators with cloud-based remote management

Reducing operating costs of power generators with cloud-based remote management Reducing operating costs of power generators with cloud-based remote management Whitepaper How remote management can be used to cut costs and improve maintenance. HMS Industrial Networks AB Stationsgatan

More information

Tracking & Fleet Management System. Itzik Baron, Mobile Satellite Sales Manager

Tracking & Fleet Management System. Itzik Baron, Mobile Satellite Sales Manager Tracking & Fleet Management System Itzik Baron, Mobile Satellite Sales Manager Overview Communication solutions provider offering domestic and international fiber & satellite based connectivity services

More information

Vehicle Tracking Solution

Vehicle Tracking Solution Vehicle Tracking Solution Business Challenges KeyTone Benefits Inbound/outbound trailer tracking process is manual, error prone and time consuming Not knowing where a given vehicle/trailer is result in

More information

Reducing operating costs of telecom base stations with remote management

Reducing operating costs of telecom base stations with remote management Reducing operating costs of telecom base stations with remote management Whitepaper How remote management can be used to cut operating expenses of existing telecom infrastructure. HMS Industrial Networks

More information

ELECTRIC VEHICLE CHARGING SOLUTIONS FOR FLEETS

ELECTRIC VEHICLE CHARGING SOLUTIONS FOR FLEETS ELECTRIC VEHICLE CHARGING SOLUTIONS FOR FLEETS Plug-in electric vehicles or EVs are ideal for fleet managers for numerous reasons: they are more energy efficient; they are less costly to operate and require

More information

WIRELESS TANKER TRUCK MONITORING SYSTEM (TTMS)

WIRELESS TANKER TRUCK MONITORING SYSTEM (TTMS) WIRELESS TANKER TRUCK MONITORING SYSTEM (TTMS) Hi-G-Tek Rockville, Maryland Logistics 1 Hi-G-Tek Electronic Tanker Truck Monitoring Expertise in wireless systems to ensure asset integrity Patented cargo

More information

Interlink. Live vehicle tracking. Always on always live. Cloud based system. Easy to use software. On-Target dashboard AGMTelematics

Interlink. Live vehicle tracking. Always on always live. Cloud based system. Easy to use software. On-Target dashboard AGMTelematics Live vehicle tracking Always on always live Easy to use software Cloud based system EcoDynamics monitoring On-Target dashboard AGMTelematics Interlink Dynamic fleet monitoring technology that radically

More information

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime Reltronics Technologies, Inc. specializes in Security and Tracking Solutions. The company focuses in manufacturing, deploying, and monitoring Security & Tracking systems that include radio frequency identification,

More information

www.utrackafrica.com Bush Tracker

www.utrackafrica.com Bush Tracker www.utrackafrica.com Bush Tracker D E S I G N E D F O R T H E T O U R O P E R AT O R Bush Tracker D E S I G N E D F O R T H E T O U R O P E R AT O R For many years Tour Operators in Tanzania have been

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Key Control Management and Guard Tour Solutions. think inside the box.

Key Control Management and Guard Tour Solutions. think inside the box. Key Control Management and Guard Tour Solutions think inside the box. think inside the box. KeyWatcher Touch and KeyWatcher Illuminated Systems are the modular, scalable solutions designed for interoperability

More information

USB Secure Management for ProCurve Switches

USB Secure Management for ProCurve Switches ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3

More information

LA-9011 GSM/GPS Tracker User Manual

LA-9011 GSM/GPS Tracker User Manual LA-9011 GSM/GPS Tracker User Manual GSM/GPS Tracker A GSM and GPS Tracking solution to locate and track the whereabouts of your vehicle in real time via the Internet on a computer or Smart phone. The device

More information

Proactive Monitoring of Friction Management Systems Reduces Costs and Downtime

Proactive Monitoring of Friction Management Systems Reduces Costs and Downtime Proactive Monitoring of Friction Management Systems Reduces Costs and Downtime By: Nicholas Dryer and David Mintskovsky Abstract The latest research shows that friction management systems reduce friction

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

GPS FLEET MANAGEMENT BUYER S GUIDE. Is fleet tracking right for my business?

GPS FLEET MANAGEMENT BUYER S GUIDE. Is fleet tracking right for my business? GPS FLEET MANAGEMENT BUYER S GUIDE Is fleet tracking right for my business? TABLE OF CONTENTS Why You Should Read This Guide 3 How GPS Fleet Tracking Works 4 Features & Benefits of GPS Fleet Tracking 6

More information

CCTR-800 Portable Real Time GPS Tracker

CCTR-800 Portable Real Time GPS Tracker CCTR-800 Portable Real Time GPS Tracker Welcome to use Real Time GPS tracker CCTR-800, This product is with GPS module and GSM module, It has many new and unique functions, such as real time uploading

More information

Discrete Wireless MARCUS Product Overview

Discrete Wireless MARCUS Product Overview Discrete Wireless MARCUS Product Overview Company Background Discrete Wireless, Inc. is a dynamic leader in GPS Fleet Management products and services. Discrete Wireless was incorporated May 12, 2000.

More information

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies Genius GPS / GSM 810 Real Time GPS Tracker User Manual Android App Download Iphone App Download www.geniuscaralarm.com 1 Genius GPS / GSM 810 Real Time GPS Tracker Welcome to use this real time car GPS

More information

WIFI OBD GPS Tracker T356 User Manual

WIFI OBD GPS Tracker T356 User Manual WIFI OBD GPS Tracker T356 User Manual Version:1.000 http://www.ulbotech.com [email protected] Document Title T356 User Manual Version 1.000 Date 2015-04-02 Status Release General Notes Ulbotech offers this

More information

The NexTraq Difference

The NexTraq Difference The NexTraq Difference Take Your Business to the Next Level 1 Agenda Who Is NexTraq? How NexTraq Benefits Your Business The NexTraq Difference The NexTraq Solution CFN Fuel Card Integration Benefits Summary

More information

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited (Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device

More information

Real-Time Car GPS Tracker (Portable, Weatherproof, Magnet, More)

Real-Time Car GPS Tracker (Portable, Weatherproof, Magnet, More) TK104 GPS Portable Asset Tracker Real-Time Car GPS Tracker (Portable, Weatherproof, Magnet, More) Product code: TK104 Real-Time Car GPS Tracker Meet the TK104. Our current top-of-the-line, heavy-duty GPS

More information

NAVMAN WIRELESS GPS FLEET AND ASSET MANAGEMENT SOLUTIONS A BETTER WAY TO MANAGE YOUR FLEET AND ASSETS

NAVMAN WIRELESS GPS FLEET AND ASSET MANAGEMENT SOLUTIONS A BETTER WAY TO MANAGE YOUR FLEET AND ASSETS NAVMAN WIRELESS GPS FLEET AND ASSET MANAGEMENT SOLUTIONS A BETTER WAY TO MANAGE YOUR FLEET AND ASSETS HOW REAL-TIME CONTROL CAN INCREASE EFFICIENCY, LOWER COSTS AND IMPROVE CUSTOMER SERVICE Navman Wireless

More information

GPS/GSM/ GPRS/ Web Based Real Time Vehicle Tracking System RFP

GPS/GSM/ GPRS/ Web Based Real Time Vehicle Tracking System RFP Introduction We are looking for a web based real time vehicle tracking software system to be used with all popular GPS/GSM/GPRS based tracking devices. We intend to provide GPS Tracking/ fleet management

More information

Trace Desktop Workforce / Fleet Management System

Trace Desktop Workforce / Fleet Management System Trace Desktop Workforce / Fleet Management System Introduction TRACE is an extension of SD s Geographical Information System (SPACE) which incorporates a range of GPS tracking devices that enable users

More information

RFID System Description for Logistics & Inventory

RFID System Description for Logistics & Inventory RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.

More information

Vehicle Monitoring Quick Reference Guide

Vehicle Monitoring Quick Reference Guide Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined

More information

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group SCORPION TRACK.COM Technologically Advanced Stolen Vehicle Tracking & Fleet Management System Award Winning Best Consumer Tracking System Best Security Product Best Fleet Management System Best British

More information

Total Security Surveillance Ltd. Vehicle Tracking Services BROCHURE

Total Security Surveillance Ltd. Vehicle Tracking Services BROCHURE Total Security Surveillance Ltd Vehicle Tracking Services BROCHURE Total Security Surveillance Ltd. Mucai Drive, Off Ngong Road, P.O Box 4243 00506 Nairobi. Tel: 020-2721218, 2017911/2, 020-6750440, Fax:

More information

TracKing. A complete web-enabled temperature management system.

TracKing. A complete web-enabled temperature management system. TracKing A complete web-enabled temperature management system. A state-of-the-art solution for cargo protection and improved asset utilization. TracKing is a dynamic, web-enabled trailer tracking system

More information

1. Vehicle Security/Tracking Device

1. Vehicle Security/Tracking Device GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and

More information

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS

More information

GPS Vehicle and personal location tracker. User manual

GPS Vehicle and personal location tracker. User manual GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...

More information

BIOMETRIC SOLUTIONS 2013 ISSUE

BIOMETRIC SOLUTIONS 2013 ISSUE BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise

More information

MCOM VEHICLE TRACKING SYSTEM MANUAL

MCOM VEHICLE TRACKING SYSTEM MANUAL 2015 MCOM VEHICLE TRACKING SYSTEM MANUAL Vehicle Tracking System allows the Department to track, trace and monitor their vehicles in real time using GSM / GPRS technology. It sends the location address,

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

Business Solution Suite

Business Solution Suite Business Solution Suite Overview Mobilize your entire business Sky Technologies has been mobilizing business systems for more than 12 years, and has hundreds of successful projects in more than 25 countries.

More information

1838AP 1810AP PG. 48 PG. 42

1838AP 1810AP PG. 48 PG. 42 Telephone Entry PLUS Computer Programming and Control. The DKS Access Plus product line is a true hybrid access control and telephone entry system that is ideal for residential, small apartment, condominium,

More information

Field Service Application

Field Service Application Field Service Terminal 3.5 TFT sunlight readable LCD touch screen Marvell PXA 310 624MHz CPU Built-in Windows Mobile 6.5 OS Wi-Fi, and WCDMA/HSDPA or GPRS wireless technology Built-in 1D Laser/2D Imager

More information

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait. SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL 2016 Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.indd 1 5/11/15 3:31 PM TM Foreword... 2 Welcome to SUBARU

More information

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4 Complete Security One Powerful Solution GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4 2 Complete Control GV4 panels are the product of choice for many of the

More information

These are but a few of the many scenarios that can fill your life with mental stress, anxiety, concern and worry.

These are but a few of the many scenarios that can fill your life with mental stress, anxiety, concern and worry. Worry? My car was just stolen, what do I do now?...will I ever get it back? Where is my car now? Where has it been? We have had a rash of thefts in the area, how can I protect my property? Responsibility?

More information

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X GPS Vehicle Tracker User Manual V5.4 VT600X 1 Preface VT600X USER MANUAL Thank you for purchasing our products. This deliberately edited manual is to introduce the tracker with the complete technical data

More information

Emerson Smart Firewall

Emerson Smart Firewall DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy

More information

HMS Industrial Networks

HMS Industrial Networks HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245

More information

MORE THAN DOTS ON A MAP. Optimizing Business Intelligence by Automating Fleet Management. 2014 MotionLink motionlink.com

MORE THAN DOTS ON A MAP. Optimizing Business Intelligence by Automating Fleet Management. 2014 MotionLink motionlink.com MORE THAN DOTS ON A MAP Optimizing Business Intelligence by Automating Fleet Management 2014 MotionLink motionlink.com GPS technology is increasingly transforming the way thousands of business and government

More information

HMS Industrial Networks. Putting industrial applications on the cloud

HMS Industrial Networks. Putting industrial applications on the cloud HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,

More information

Incisive Business Guide to Vehicle Tracking

Incisive Business Guide to Vehicle Tracking Incisive Business Guide to Vehicle Tracking Vehicle Tracking Guide Summary This guide from Incisive Business outlines the features and benefits for your business from managing your company vehicles using

More information

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

TURPAK Vehicle ID Solution Solution Overview for Oil Companies TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,

More information

User Guide for the Volvo On Call mobile application

User Guide for the Volvo On Call mobile application User Guide for the Volvo On Call mobile application This document provides basic information on the pre-requisites, functionalities and limitations of the Volvo On Call mobile application. General Information

More information

HELIUM PULSE FOR MONITORING AND ALERTING HELIUM SMART SENSORS HELIUM NETWORK HELIUM CLOUD HELIUM PULSE HP20160414-01

HELIUM PULSE FOR MONITORING AND ALERTING HELIUM SMART SENSORS HELIUM NETWORK HELIUM CLOUD HELIUM PULSE HP20160414-01 HELIUM PULSE FOR MONITORING AND ALERTING Helium Pulse enables organizations to make sense of their things; to easily and cost-effectively monitor their assets and the environment to maximize performance

More information

TRACKING AND SECURITY SYSTEM

TRACKING AND SECURITY SYSTEM TRACKING AND SECURITY SYSTEM WHAT IS PERGO? Pergo is the security system software and hardware developed in Turkey by Turkish engineers, which has special capabilities to identify the location of any attached

More information

GPS Vehicle Tracking. The Complete Reference Guide

GPS Vehicle Tracking. The Complete Reference Guide GPS Vehicle Tracking The Complete Reference Guide GPS Vehicle Tracking: The Complete Reference Guide GPS vehicle tracking has gained popularity in many segments of the business world. Two main reasons

More information

Intervid Fleet Management Fleet Telematics. Intervid, Inc. 5111 Pegasus Court, Suite C Frederick, MD 21704

Intervid Fleet Management Fleet Telematics. Intervid, Inc. 5111 Pegasus Court, Suite C Frederick, MD 21704 Intervid Fleet Management Fleet Telematics Intervid Fleet Management Intervid Fleet Management brings to market a leading Global Fleet Telematics Technology. Intervid Fleet Management solutions have assisted

More information

IMPLEMENTATION OF ELECTRONIC CARGO TRACKING SYSTEM (ECTS)

IMPLEMENTATION OF ELECTRONIC CARGO TRACKING SYSTEM (ECTS) KENYA REVENUE AUTHORITY. IMPLEMENTATION OF ELECTRONIC CARGO TRACKING SYSTEM (ECTS) PRESENTATION TO WCO TECHNOLOGY & INNOVATION FORUM, Smart Borders, Enabling Technologies. CAIRO, EGYPT 2 4 November, 2010.

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

TRANSIT TRACKING Location Tracking Solutions

TRANSIT TRACKING Location Tracking Solutions Enhance personnel safety and fleet security Improve resource allocation and responsiveness Motorola s Transit Tracking portfolio provides the total solution for organisations wishing to track and manage

More information

GPS TRACKING. Tracknology 2012 All Rights Reserved VEHICLE TRAILERS

GPS TRACKING. Tracknology 2012 All Rights Reserved VEHICLE TRAILERS GPS TRACKING Tracknology 2012 All Rights Reserved VEHICLE TRAILERS The Tracknology Difference Our Software & Hardware Difference Tracknology s competitive edge is our web-based software. We specialise

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

A fool proof Fleet Management System

A fool proof Fleet Management System A fool proof Fleet Management System for your business providing complete fleet management with customised solutions that not only ensure the safety of your goods, vehicles and personnel, but also enhances

More information

999GPS Tracking Platform Operation Guide

999GPS Tracking Platform Operation Guide 999GPS Tracking Platform Operation Guide Welcome to use this Real Time GPS tracking platform, This software is web based system, it is not necessary to download any software or any plug-in software, just

More information

How To Manage A Logistics Company

How To Manage A Logistics Company Logistics Business Suites by Esri Thailand Bridging the GAP between GIS and Logistics Solution GIS DATA COLLECTION & ANALYSIS Store Location (x,y) Picture Other store info Data Analysis Customer Density

More information

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n

More information

A Daimler company. Lower consumption greater transparency for your bus fleet.

A Daimler company. Lower consumption greater transparency for your bus fleet. A Daimler company Lower consumption greater transparency for your bus fleet. More profit with the click of the mouse. GPS satellite Savings from station to station. Now you can discover untapped potential

More information

Lower consumption greater transparency for your bus fleet.

Lower consumption greater transparency for your bus fleet. A Daimler company A Daimler company Lower consumption greater transparency for your bus fleet. FleetBoard A secure investment in the future Since 2000, Daimler FleetBoard GmbH has been developing and distributing

More information

is trademark of Mobiliz Information and Communication Technologies Inc.

is trademark of Mobiliz Information and Communication Technologies Inc. is trademark of Mobiliz Information and Communication Technologies Inc. WHO ARE WE? With its staff having more than 20 years of experience in the field of mobile tracking systems, Mobiliz carries out its

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Presented By : PERNEC TRANSMISSION BERHAD

Presented By : PERNEC TRANSMISSION BERHAD Fleet Management System Presented By : PERNEC TRANSMISSION BERHAD Agenda OBJECTIVE PROPOSED SOLUTION BUSINESS APPROACH Objective To propose a Fleet Management System To Manage Fleets For MAXIMISING PRODUCTIVITY

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

A&E Specifications RoadRunner HD High Definition Mobile Recording System

A&E Specifications RoadRunner HD High Definition Mobile Recording System RoadRunner HD High Definition Mobile Recording System Version 1.4 A. Recorder: 1. The system shall be provided in compatible and interchangeable formats that support simultaneous recording of up to four

More information

How To Use Netbiter

How To Use Netbiter - Remote management of industrial applications Save time, save energy, save resources! Your challenges Minimize scheduled and emergency on-site service Optimize service operations through efficient machine/device

More information

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS

More information

traka.com Intelligent management solutions for keys and equipment

traka.com Intelligent management solutions for keys and equipment traka.com Intelligent management solutions for keys and equipment Traka products and services Key Clever key Very clever key Security seal ifob Once securely attached to an existing key, the ifob electronically

More information

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch - Milestone Certified Solution Summary document 1 Table of Contents Products Tested

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today

More information

DriveRight. Fleet Management Software. Getting Started Guide. CarChip. DriveRight. Drivers. Vehicles. Product #8186

DriveRight. Fleet Management Software. Getting Started Guide. CarChip. DriveRight. Drivers. Vehicles. Product #8186 DriveRight Fleet Management Software Getting Started Guide CarChip DriveRight Drivers Vehicles Product #8186 DriveRight Fleet Management Software Getting Started Guide; P/N 8186 Davis Instruments Part

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information