SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com info@acsy.com



Similar documents
TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

2. DESIGN REQUIREMENTS

Building tomorrow s solutions.

ConnectM M2M Application Services

DataSource Online Security Account Management Portal. Security System Management at Your Fingertips.

Mobile Device Management

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group

GROUPTALK FOR ANDROID VERSION for Android

Administrator's Guide

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

Verizon Wireless Field Force Manager Device User Guide

Vehicle Monitoring Quick Reference Guide

Welcome to Bell Aliant NextGen Home Security

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

Interlink. Live vehicle tracking. Always on always live. Cloud based system. Easy to use software. On-Target dashboard AGMTelematics

TracKing. A complete web-enabled temperature management system.

See all, manage all is the new mantra at the corporate workplace today.

Welcome to a whole new level of interactive home security

ADDING STRONGER AUTHENTICATION for VPN Access Control

GET THE ALARM.COM ADVANTAGE.

Access Control & Surveillance. Business Phone Systems. Data Storage & Recovery. Managed IT Services

How To Manage A Mobile Device Management (Mdm) Solution

User Guide. Vehicle Diagnostics by Delphi

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users Charging your PayClip. 2. Downloading the PayClip app.

Quick Start Guide.

NAVMAN WIRELESS GPS FLEET AND ASSET MANAGEMENT SOLUTIONS A BETTER WAY TO MANAGE YOUR FLEET AND ASSETS

workforceiq Job Despatch and Workforce Management software for Smartphones

Home Monitoring and Control service provided by Verizon Online LLC

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.

GPS TRACKING. Tracknology 2012 All Rights Reserved VEHICLE TRAILERS

Smart Home Monitoring Powered by Honeywell Total TM Connect Remote Services Basic User Guide

Quick Start Guide For Vera Small Business Solution

SECURITY & MONITORING QUICK GUIDE

Autos Limited Ghana Vehicle Tracking Business Proposal

AIO Remote Site Security Solution

White Paper. Business Service Management Solution

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

WALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world

How To Use Uniflow

BroadTouch Business Communicator

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

User Guide for the Volvo On Call mobile application

YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM

Key Control Management and Guard Tour Solutions. think inside the box.

SECURITY SOLUTIONS BANKING AND FINANCE

Quick Start Guide: Iridium GO! Advanced Portal

Remote MasterMind for Mobility. Mobile Device Management Software

Keep control is essential.

Bright House Networks Home Security and Control. Peace of mind included. QUICK START GUIDE

Are apps available for Virtual Water Assistant? No. We use a mobile website.

Business Mobile Banking Features

KX-NCP500 / KX-NCP1000

SAMA Tracking Solutions

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

User Manual GSM Alarm System. All rights reserved by Delta Security Co., Ltd

Table Of Contents. System Monitoring System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

Are free Android virus scanners any good?

Junos Pulse for Google Android

CA Enterprise Mobility Management MSO

PhoneWatch Smart Security System User Manual - Domonial

GPS Vehicle Tracking. The Complete Reference Guide

Network Management System (NMS) FAQ

Canada ACN Home Security

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

iloq Digital Locking. No Batteries.

Intelligent Network Management System. Comprehensive Network Visibility and Management for Wireless and Fixed Networks

mcashier User Guide To accept payments To cancel a payment

101 ways to use SysAid

NCR APTRA PASSPORT Part of NCR s enterprise hub for remote deposit capture

Integrated Multi-Client Platform for Smart Meters

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 7.0. English

Trace Desktop Workforce / Fleet Management System

Monitoring, Managing, Remediating

Power for the 21st Century. Managed Power. Solutions & Consulting for Mobile Operators and Tower Companies. TELECOM SOLUTIONS

Smart Anytime, Safe Anywhere. Home Passport Gateway-G Series. The Epitome of Smart Living

tattletale User Guide Consumer unit version P a g e

Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by

Product Data Sheet.

Web-Based QUANTUM Monitoring

White Rabbit Mobile App. Quick Reference

Remote MasterMind for Mobility 2.5. Mobile Device Management Software

Adding intelligence to BTS site management

Agenda. ARITHMOS Presents: Introduction to epro. EDC and epro integration General Overview. epro and ecrf Integration: a case study

Tk20 Network Infrastructure

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Transcription:

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com info@acsy.com

COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity!

ACSYS SYSTEM INTRODUCTION A software and hardware platform that wirelessly manages, verifies and controls who goes where, when, why, for how long and COMPLEMENTS existing ERP/MRP & OSS solutions TTS HRM ERP CREATE & ASSIGN TASKS Front Gate SMART PHONE WITH APP & SMS ANY PHONE WITH SMS Tower BTS Shelter RSM Fuel Tank MRP BILLING OSS LOOPBACK DATA Batteries Generator Cabinet ACCESS CONTROL TIME & ATTENDANCE KEY MANAGEMENT

ACSYS MECHATRONIC VS TRADITIONAL MECHANICAL TRADITIONAL MECHANICAL LOCKS ISSUES Keys are usually distributed to users or stored in a central location, which requires people spend time to collect, return and manage those keys. Keys are often copied leading to theft/degradation and as a result unbudgeted maintenance, leading to service interruption. Once distributed there is no control over where and when the mechanical key is used. There is little or no traceability on how long the user spent on a site and this can have serious financial impact on operations, especially on remote sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the site. Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site. Despite security measures such as high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs. ACSYS MECHATRONIC SOLUTIONS The Acsys solution offers controlled and secured access rights distribution. Acsys locks CANNOT be picked or bumped and are very difficult to drill. Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED. The main advantage is that keys can ONLY be used during the time the operator has configured them to work. The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed, giving the operator CONTROL over the amount of time spent by suppliers on sites (and the cost of the intervention). Keys cannot be copied, so no access is possible outside the access rights working hours. If someone TRIES to access without having rights, that will be stored in the key and lock. Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. If 3 WRONG codes are entered on the Keypad/CGS key it will automatically DISABLE itself.

ACSYS BASE STATION WORKFLOW REVOLUTION TRADITIONAL MECHANICAL BASE STATION SUPPORT WORKFLOW ACSYS MECHATRONIC BASE STATION SUPPORT WORKFLOW 1 Technician HQ 2 3 Key can be copied / lost / stolen Cell Tower A HQ 1 Technician 2 3 Cell Tower A 4 5 Key can be copied / lost / stolen Cell Tower B Cell Tower B 1. Mast down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ 4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ 1. Master down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site 3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via Acsys CGS and/or Acsys Mobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly.

THE BENEFITS OF IMPLEMENTING THE ACSYS SOLUTION PRODUCTIVITY TOOL EFFICIENCY TOOL FLEXIBILITY TOOL SECURITY TOOL Complements most ERP/MRP/TTS & OSS software Provides real-time visibility on execution & quality of work Clear control of which site/asset can be accessed and at what time Real-time record of how much time was spent on site/asset Immediate control and reduction of site OPEX Time spent on site = quality of work benchmark Site data = establishment of KPI s No geographical limitations, solution can be used anywhere indoor/outdoor Allow but control any user to access anything, anywhere, anytime Cloud solutions provide multi-region and country overview and comparison Internal and external system reports are sent automatically for processing/verification Customizable alarms allow users to control what information is displayed and escalated System records can confirm adherence to SLA s and escalation clauses Real-time visibility of sites and users = realtime triage of tasks and actions Any access point can be secured and monitored More site(s)/asset(s) can be serviced in one day Real-time site/asset visibility = real-time operational control Tasks can be re-allocated to other users in real-time without updates User(s) can be added/removed or edited on the system remotely Remotely control all outsourced and adhoc vendors from a central location Fully redundant solution, works anywhere / anytime with 99.9% uptime Keys cannot be copied or duplicated Keys can only be used when code has been issued, fraudulent requests = alarm Codes are only issued to users when tasks have been created by ERP/MRP/OSS Location based access control = selective code issuance based on GPS position Secure solution - Access points cannot be picked, bumped or drilled easily Internal and external theft is mostly eradicated Lost/stolen/un-returned keys are simply deleted from software and cannot be reused OPEX REDUCTION Was the Job done? When was it done? How long did they stay? When did they arrive? What did they fix and why? How well did they do the job? Ease of Access Theft prevention & control DATA PRODUCTIVITY INCREASE ERP/MRP Integration & Loopback Site attendance integration Site visit and billing integration Time to site integration Trouble ticketing Integration KPI/SLA adherence Flexibility of Access Secured and controlled access Predictive maintenance DATA

ACCESS MANAGEMENT SOLUTIONS From USB or IP Programmers, the Acsys Code Generation System (CGS) to the AcsysMobile App for Remote Management, patented mobile key programmer (MOPRO) and ERP/MRP/RSM integrations, the options are nearly limitless. Acsys ensures that the optimal solution exists for projects of even the most complex nature.

ACSYSCGS SOLUTION (CALL/SMS) NOC USER KEY X ACSYSCLOUD MANAGEMENT SOFTWARE USER KEY Y NOC LEVEL AUTHORIZATION USER LEVEL The AcsysCGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he must make a code request to the NOC. When his access is validated, a random 10-digits time limited code is delivered to the user. This request can be made by sending an SMS or via calling an operator at the NOC. When the user receives the code, he enters it on the key and only then the key will become useable for a fixed amount of time (ex: 10 minutes) to allow for access to the door and will become the ENTRY/EXIT ACCESS LOG. Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at anytime without prior approval of the NOC. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entry of a special software generated code. AcsysCGS solution is the safest and most convenient way to control access to remote sites and assets by allowing users to get to the site without the need for picking up or returning keys. At any time, all of the key s access logs can be downloaded to give the NOC a complete overview of the following : Access Request Time, Access Request Location (site/asset), Time of Entry / Time of Exit, Attempted Access to Other Sites/Assets Without Authorization

ACSYSMOBILE SOLUTION (APP) LOCATION BASED NOC USER KEY X ACSYSCLOUD MANAGEMENT SOFTWARE USER KEY Y NOC LEVEL TICKETING TOOL/WORK ORDER AUTHORIZATION USER LEVEL Instead of sending/receiving SMS for opening and closing of Acsys locks using the Acsys CGS solution, the user can now use the App to make the Open/Close code requests This solution is called Location-Based as access and related CGS code will only be issued when the user s smartphone s GPS has reached the desired location. The NOC will also be informed of user arrival The Acsys App is fully REDUNDANT, in case data is not available the App will automatically switch to SMS mode The Acsys Mobile App is a fully customizable EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App Whenever a user arrives on site and requests a code, a real-time notification is sent to the NOC, The real-time report and information is a powerful means to check COMPLIANCE with SLA terms If a user is trying to generate a code for a specific site whilst physically being on another site, the NOC will be notified in real-time on the dashboard. The NOC can view the position in real-time of all the smartphone users on the software GIS interface User can locate the site/asset on Google maps directly through the App and use the Google navigation tool on the phone to get to the site/asset

ACSYSMOPRO SOLUTION LOCATION BASED NOC USER KEY X BLUETOOTH ACSYSCLOUD MANAGEMENT SOFTWARE MOPRO NOC LEVEL TICKETING TOOL WORK ORDER AUTHORIZATION USER KEY Y USER LEVEL The AcsysMOPRO (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with Bluetooth connection to facilitate communication between the Acsys Key and ANY Smartphone. It is a world-unique patented Key programming solution designed and developed by Acsys. MOPRO is Acsys solution to streamlining operations & maintenance while increasing security. The Acsys MOPRO allows users at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the NOC. The NOC can control each and every access right, effectively creating a real-time, remote key and user management platform. MOPRO removes the need to plug in the key in USB/IP programmers. It is the best answer for job site security, MTTR tracking, and supplier management anywhere, anytime, without wires. The MOPRO also allows for the real-time downloading of Key access logs. The MOPRO can detect and warn users about Key battery level. The MOPRO has an independent power supply so even if the MOPRO battery is empty, the user can still use the App and punch in codes manually making the solution fully REDUNDANT.

ACSYSUSP/IP/3G PROGRAMMERS SOLUTION USB PROGRAMMER USER KEY X ACSYS SOFTWARE 3G PROGRAMMER IP PROGRAMMER USER KEY Y NOC LEVEL AUTHORIZATION USER LEVEL USB PROGRAMMING: The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsys software client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key s memory. Logs of the key s usage can be downloaded to the database in exactly the same way. IP PROGRAMMING: IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company s operations (for convenient downloading/uploading). 3G PROGRAMMING: The 3G Programmer is used to connect Acsys mechatronic keys and locks with the Acsys software database remotely. Each programmer transfers the access rights assigned to specific user keys and users can enjoy a more convenient manner to update their user keys remotely. Through the 3G/2G network, an 3G Programmer can be placed in any location and is used to quickly edit or delete user keys and to upload access logs from user keys or locks through the transfer keys.

ACSYSTELECOM ACSYSTELECOM is a key and lock management software. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. ACSYSTELECOM provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks. The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods which prevents key duplication. The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer key operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new Email notification services, the reports can be sent to individual users or user groups on a daily, weekly and monthly basis. A Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS+ platform is a revolutionary module which provides up-to-date real time information of key, lock, user activities and site/asset status. The dashboard identifies the location of each lock, the location of each key user and their activities on and off the sites. Through the power of the integrated Google maps GIS system, the NOC can quickly pin point the location where and by whom the maintenance is taken place. The Acsys Telecom wizard-like experience is designed to carry out error-free management.

ACSYS MODULAR SOFTWARE APPROACH ACSYS RM Remote Management ACSYS APP Smartphone App module ACSYS CLOUD Cloud Hosting Module ACSYS ERP/MRP ERP/MRP/OSS Integration SOFTWARE PLATFORM ACSYSWATCHDOG Customized Alerts & Alarms ACSYS TICKETING Remedy & Footprint module ACSYS CGS+ Real-time Remote Key Control ACSYS RMS Remote Monitoring The Acsys Telecom software adopts a module architecture, allowing the customer to select and only pay for what they really need, and the stack approach enables easy upgrade/downgrade without affecting operations

ACSYS APP The Acsys App for smartphones has been designed to be a supplemental control and management tool for the ACSYSMOBILE & ACSYSMOPRO solution. The Acsys App is designed to increase security, increase visibility, reduce NOC workload and automate internal processes such as the request of entry/exit codes. Instead of sending/receiving SMS, user now can use the App to make the Open/Close code requests Acsys APP solution is called LOCATION-BASED as access and related CGS code only be issued when user reached desired location(within 50 meters ) User arrives on site & requests a code, a real-time notification is sent to NOC User generate code for a specific site whilst physically being on another site, the NOC will be notified in real-time on the dashboard User moves off-site without locking the site an Alarm will be generated User can locate the site/asset on Google maps directly through the App and use the native phone or Google navigation tool to get the site/asset The In-App picture taking feature(pictures report) makes the job tamper-proof If the App detects that data coverage is switched off it will automatically request code by SMS, which provided a fully redundant solution. NOC can in real-time view the position of all the users on the software GIS interface APP VERSION ACSYSMOBILE APP 1.0 ACSYSMOBILE APP 1.5 ACSYSMOBILE APP 2.0 ACSYSMOPRO APP Generate lock/unlock code Yes Yes Yes Yes Automatic code generation Yes Based on GPS Based on GPS Based on GPS Wrong site Alarm No Yes Yes Yes Real-Time view of user No Yes Yes Yes Google map site visibility No Yes Yes Yes Google maps to site navigation On-site arrival software alert No Yes Yes Yes No Yes Yes Yes Before & after picture No Yes Yes Yes Safety pack No No Yes Yes

ACSYSTELECOM ARCHITECTURE (MUTI-SITE/COUNTRY/OPERATOR ARCHITECTURE) Request & validation Country A Country B NOC Country C Country D HQ CENTRALIZED Access and audit Reports Request & validation Region 1 Region 2 Region 1 Region 2 REGIONAL access And audit Reports PROGRAM AND AUDIT KEYS IN A COMBINATION OF USB/LAN/CGS/BLUETOOTH/3G/4G/MOPRO DEPENDING ON OPERATIONAL NEEDS Site access And audit Reports Site Access Region 1 Region 2 Region 1 Region 2 The software is designed to operate in a multi-country, multi-region, multi-cluster and multi-vendor format providing a flexible and easy way to manage each access. The flexible hierarchy provides a clear visibility over what is going on.

ACSYS CUSTOMIZED SOLUTIONS AND PRODUCTS Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements. www.acsys.com info@acsy.com

ACSYS CABINET SOLUTION NO POWER WIRE-FREE EASY TO INSTALL NO MAINTENANCE REAL-TIME REPLACE MECHANICAL LOCK WITH AN ACSYS BLIND LOCK 1. Use mechanical key to open cabinet lock 2.Remove mechanical cylinder with screwdriver 3. Put Acsys cylinder in & fix it with screwdriver 4. Cabinet lock now secured WIDE VARIETY OF HANDLES ACSYS BLIND LOCK INDUSTRY DATA CENTERS POWER COMPANIES TELECOM

HIGH SECURITY HASP FOR FRONT GATE AND STORAGE ROOMS Bolted Bolted and welded 1. Install HASP on gate, using stainless steel bolts and/or weld to the frame. 2. Close the gate. THE SAFEST PADLOCK IN THE WORLD 3. Insert shackle from top and padlock body from bottom to lock and secure. 4. Padlock is now protected against any outside attack.

LADDER ACCESS CONTROL & SAFETY SOLUTION PREVENT UN-AUTHORIZED & UN-SCHEDULED TOWER ASCENT In order to further increase safety on the workplace, Acsys and KARAM (www.karam.in) have designed the world s first integrated fall prevention solution combined with real-time access control. There by preventing un-authorized people from ascending the mast. The solution allows the NOC to control in real-time and wirelessly who is ascending which mast and for what reason, at the same time ensuring the user is properly fastened to the fall prevention equipment before starting this ascent.

ACSYS STACKABLE KEY SOLUTION The stackable key solution is another world-unique Acsys development as it offers a previously unknown level of control over access to high-value or sensitive sites. The stackable key solution works as a bank safe where two keys are required but only requires one lock instead of two. Since it can also be used on padlocks the solution is available for indoor and outdoor applications. The system can be programmed so that up to 5 keys need to be used in order to open 1 lock. The solution can be used in conjunction with Acsys CGS remote key activation. CONCEPT Worker Manager Worker alone cannot open the lock Manager alone cannot open the lock EXAMPLE Worker Worker OR Manager Manager Worker & Manager together use 2 keys to open a lock Security Worker,Manager & Security staff together use 3 keys to open a lock

ACSYS RSM INTEGRATION SOLUTION BATTERIES GENERATORS FUEL TANK BTS CAMERA SITE GATE BTS ACSYSRSM solution integrated hardware & software, it is a easy to install, easy to use, maintenance free, remote sites/asset monitoring system, include Fuel tank/genset /Shelter monitoring,hybrid power management & Green power management etc, which can compatible with Mainstream RSM brand, such as Invendis, Kentrox, Sagemcom, Inala and Qowwisio.

ACSYS PRODUCTS Akey keypad with LCD Akey keypad Akey Blind lock Double lock Button lock PL5 PL2 USB/IP Programmer 3G Programmer MoPro

THE ESTABLISHED TELECOM MARKET ECOSYSTEM MOBILE NETWORK OPERATORS TOWER MANAGEMENT COMPANIES TELECOM OPERATIONS & MAINTENANCE CO S SALES PARTNERS

SECURE IT CONTROL IT MONETIZE IT www.acsys.com info@acsy.com