SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com info@acsy.com
COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity!
ACSYS SYSTEM INTRODUCTION A software and hardware platform that wirelessly manages, verifies and controls who goes where, when, why, for how long and COMPLEMENTS existing ERP/MRP & OSS solutions TTS HRM ERP CREATE & ASSIGN TASKS Front Gate SMART PHONE WITH APP & SMS ANY PHONE WITH SMS Tower BTS Shelter RSM Fuel Tank MRP BILLING OSS LOOPBACK DATA Batteries Generator Cabinet ACCESS CONTROL TIME & ATTENDANCE KEY MANAGEMENT
ACSYS MECHATRONIC VS TRADITIONAL MECHANICAL TRADITIONAL MECHANICAL LOCKS ISSUES Keys are usually distributed to users or stored in a central location, which requires people spend time to collect, return and manage those keys. Keys are often copied leading to theft/degradation and as a result unbudgeted maintenance, leading to service interruption. Once distributed there is no control over where and when the mechanical key is used. There is little or no traceability on how long the user spent on a site and this can have serious financial impact on operations, especially on remote sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the site. Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site. Despite security measures such as high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs. ACSYS MECHATRONIC SOLUTIONS The Acsys solution offers controlled and secured access rights distribution. Acsys locks CANNOT be picked or bumped and are very difficult to drill. Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED. The main advantage is that keys can ONLY be used during the time the operator has configured them to work. The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed, giving the operator CONTROL over the amount of time spent by suppliers on sites (and the cost of the intervention). Keys cannot be copied, so no access is possible outside the access rights working hours. If someone TRIES to access without having rights, that will be stored in the key and lock. Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. If 3 WRONG codes are entered on the Keypad/CGS key it will automatically DISABLE itself.
ACSYS BASE STATION WORKFLOW REVOLUTION TRADITIONAL MECHANICAL BASE STATION SUPPORT WORKFLOW ACSYS MECHATRONIC BASE STATION SUPPORT WORKFLOW 1 Technician HQ 2 3 Key can be copied / lost / stolen Cell Tower A HQ 1 Technician 2 3 Cell Tower A 4 5 Key can be copied / lost / stolen Cell Tower B Cell Tower B 1. Mast down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ 4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ 1. Master down/maintenance (e.g. refuel) at cell tower A. Technician receives a service call request 2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site 3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via Acsys CGS and/or Acsys Mobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly.
THE BENEFITS OF IMPLEMENTING THE ACSYS SOLUTION PRODUCTIVITY TOOL EFFICIENCY TOOL FLEXIBILITY TOOL SECURITY TOOL Complements most ERP/MRP/TTS & OSS software Provides real-time visibility on execution & quality of work Clear control of which site/asset can be accessed and at what time Real-time record of how much time was spent on site/asset Immediate control and reduction of site OPEX Time spent on site = quality of work benchmark Site data = establishment of KPI s No geographical limitations, solution can be used anywhere indoor/outdoor Allow but control any user to access anything, anywhere, anytime Cloud solutions provide multi-region and country overview and comparison Internal and external system reports are sent automatically for processing/verification Customizable alarms allow users to control what information is displayed and escalated System records can confirm adherence to SLA s and escalation clauses Real-time visibility of sites and users = realtime triage of tasks and actions Any access point can be secured and monitored More site(s)/asset(s) can be serviced in one day Real-time site/asset visibility = real-time operational control Tasks can be re-allocated to other users in real-time without updates User(s) can be added/removed or edited on the system remotely Remotely control all outsourced and adhoc vendors from a central location Fully redundant solution, works anywhere / anytime with 99.9% uptime Keys cannot be copied or duplicated Keys can only be used when code has been issued, fraudulent requests = alarm Codes are only issued to users when tasks have been created by ERP/MRP/OSS Location based access control = selective code issuance based on GPS position Secure solution - Access points cannot be picked, bumped or drilled easily Internal and external theft is mostly eradicated Lost/stolen/un-returned keys are simply deleted from software and cannot be reused OPEX REDUCTION Was the Job done? When was it done? How long did they stay? When did they arrive? What did they fix and why? How well did they do the job? Ease of Access Theft prevention & control DATA PRODUCTIVITY INCREASE ERP/MRP Integration & Loopback Site attendance integration Site visit and billing integration Time to site integration Trouble ticketing Integration KPI/SLA adherence Flexibility of Access Secured and controlled access Predictive maintenance DATA
ACCESS MANAGEMENT SOLUTIONS From USB or IP Programmers, the Acsys Code Generation System (CGS) to the AcsysMobile App for Remote Management, patented mobile key programmer (MOPRO) and ERP/MRP/RSM integrations, the options are nearly limitless. Acsys ensures that the optimal solution exists for projects of even the most complex nature.
ACSYSCGS SOLUTION (CALL/SMS) NOC USER KEY X ACSYSCLOUD MANAGEMENT SOFTWARE USER KEY Y NOC LEVEL AUTHORIZATION USER LEVEL The AcsysCGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he must make a code request to the NOC. When his access is validated, a random 10-digits time limited code is delivered to the user. This request can be made by sending an SMS or via calling an operator at the NOC. When the user receives the code, he enters it on the key and only then the key will become useable for a fixed amount of time (ex: 10 minutes) to allow for access to the door and will become the ENTRY/EXIT ACCESS LOG. Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at anytime without prior approval of the NOC. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entry of a special software generated code. AcsysCGS solution is the safest and most convenient way to control access to remote sites and assets by allowing users to get to the site without the need for picking up or returning keys. At any time, all of the key s access logs can be downloaded to give the NOC a complete overview of the following : Access Request Time, Access Request Location (site/asset), Time of Entry / Time of Exit, Attempted Access to Other Sites/Assets Without Authorization
ACSYSMOBILE SOLUTION (APP) LOCATION BASED NOC USER KEY X ACSYSCLOUD MANAGEMENT SOFTWARE USER KEY Y NOC LEVEL TICKETING TOOL/WORK ORDER AUTHORIZATION USER LEVEL Instead of sending/receiving SMS for opening and closing of Acsys locks using the Acsys CGS solution, the user can now use the App to make the Open/Close code requests This solution is called Location-Based as access and related CGS code will only be issued when the user s smartphone s GPS has reached the desired location. The NOC will also be informed of user arrival The Acsys App is fully REDUNDANT, in case data is not available the App will automatically switch to SMS mode The Acsys Mobile App is a fully customizable EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App Whenever a user arrives on site and requests a code, a real-time notification is sent to the NOC, The real-time report and information is a powerful means to check COMPLIANCE with SLA terms If a user is trying to generate a code for a specific site whilst physically being on another site, the NOC will be notified in real-time on the dashboard. The NOC can view the position in real-time of all the smartphone users on the software GIS interface User can locate the site/asset on Google maps directly through the App and use the Google navigation tool on the phone to get to the site/asset
ACSYSMOPRO SOLUTION LOCATION BASED NOC USER KEY X BLUETOOTH ACSYSCLOUD MANAGEMENT SOFTWARE MOPRO NOC LEVEL TICKETING TOOL WORK ORDER AUTHORIZATION USER KEY Y USER LEVEL The AcsysMOPRO (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with Bluetooth connection to facilitate communication between the Acsys Key and ANY Smartphone. It is a world-unique patented Key programming solution designed and developed by Acsys. MOPRO is Acsys solution to streamlining operations & maintenance while increasing security. The Acsys MOPRO allows users at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the NOC. The NOC can control each and every access right, effectively creating a real-time, remote key and user management platform. MOPRO removes the need to plug in the key in USB/IP programmers. It is the best answer for job site security, MTTR tracking, and supplier management anywhere, anytime, without wires. The MOPRO also allows for the real-time downloading of Key access logs. The MOPRO can detect and warn users about Key battery level. The MOPRO has an independent power supply so even if the MOPRO battery is empty, the user can still use the App and punch in codes manually making the solution fully REDUNDANT.
ACSYSUSP/IP/3G PROGRAMMERS SOLUTION USB PROGRAMMER USER KEY X ACSYS SOFTWARE 3G PROGRAMMER IP PROGRAMMER USER KEY Y NOC LEVEL AUTHORIZATION USER LEVEL USB PROGRAMMING: The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsys software client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key s memory. Logs of the key s usage can be downloaded to the database in exactly the same way. IP PROGRAMMING: IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company s operations (for convenient downloading/uploading). 3G PROGRAMMING: The 3G Programmer is used to connect Acsys mechatronic keys and locks with the Acsys software database remotely. Each programmer transfers the access rights assigned to specific user keys and users can enjoy a more convenient manner to update their user keys remotely. Through the 3G/2G network, an 3G Programmer can be placed in any location and is used to quickly edit or delete user keys and to upload access logs from user keys or locks through the transfer keys.
ACSYSTELECOM ACSYSTELECOM is a key and lock management software. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. ACSYSTELECOM provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks. The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods which prevents key duplication. The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer key operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new Email notification services, the reports can be sent to individual users or user groups on a daily, weekly and monthly basis. A Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS+ platform is a revolutionary module which provides up-to-date real time information of key, lock, user activities and site/asset status. The dashboard identifies the location of each lock, the location of each key user and their activities on and off the sites. Through the power of the integrated Google maps GIS system, the NOC can quickly pin point the location where and by whom the maintenance is taken place. The Acsys Telecom wizard-like experience is designed to carry out error-free management.
ACSYS MODULAR SOFTWARE APPROACH ACSYS RM Remote Management ACSYS APP Smartphone App module ACSYS CLOUD Cloud Hosting Module ACSYS ERP/MRP ERP/MRP/OSS Integration SOFTWARE PLATFORM ACSYSWATCHDOG Customized Alerts & Alarms ACSYS TICKETING Remedy & Footprint module ACSYS CGS+ Real-time Remote Key Control ACSYS RMS Remote Monitoring The Acsys Telecom software adopts a module architecture, allowing the customer to select and only pay for what they really need, and the stack approach enables easy upgrade/downgrade without affecting operations
ACSYS APP The Acsys App for smartphones has been designed to be a supplemental control and management tool for the ACSYSMOBILE & ACSYSMOPRO solution. The Acsys App is designed to increase security, increase visibility, reduce NOC workload and automate internal processes such as the request of entry/exit codes. Instead of sending/receiving SMS, user now can use the App to make the Open/Close code requests Acsys APP solution is called LOCATION-BASED as access and related CGS code only be issued when user reached desired location(within 50 meters ) User arrives on site & requests a code, a real-time notification is sent to NOC User generate code for a specific site whilst physically being on another site, the NOC will be notified in real-time on the dashboard User moves off-site without locking the site an Alarm will be generated User can locate the site/asset on Google maps directly through the App and use the native phone or Google navigation tool to get the site/asset The In-App picture taking feature(pictures report) makes the job tamper-proof If the App detects that data coverage is switched off it will automatically request code by SMS, which provided a fully redundant solution. NOC can in real-time view the position of all the users on the software GIS interface APP VERSION ACSYSMOBILE APP 1.0 ACSYSMOBILE APP 1.5 ACSYSMOBILE APP 2.0 ACSYSMOPRO APP Generate lock/unlock code Yes Yes Yes Yes Automatic code generation Yes Based on GPS Based on GPS Based on GPS Wrong site Alarm No Yes Yes Yes Real-Time view of user No Yes Yes Yes Google map site visibility No Yes Yes Yes Google maps to site navigation On-site arrival software alert No Yes Yes Yes No Yes Yes Yes Before & after picture No Yes Yes Yes Safety pack No No Yes Yes
ACSYSTELECOM ARCHITECTURE (MUTI-SITE/COUNTRY/OPERATOR ARCHITECTURE) Request & validation Country A Country B NOC Country C Country D HQ CENTRALIZED Access and audit Reports Request & validation Region 1 Region 2 Region 1 Region 2 REGIONAL access And audit Reports PROGRAM AND AUDIT KEYS IN A COMBINATION OF USB/LAN/CGS/BLUETOOTH/3G/4G/MOPRO DEPENDING ON OPERATIONAL NEEDS Site access And audit Reports Site Access Region 1 Region 2 Region 1 Region 2 The software is designed to operate in a multi-country, multi-region, multi-cluster and multi-vendor format providing a flexible and easy way to manage each access. The flexible hierarchy provides a clear visibility over what is going on.
ACSYS CUSTOMIZED SOLUTIONS AND PRODUCTS Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements. www.acsys.com info@acsy.com
ACSYS CABINET SOLUTION NO POWER WIRE-FREE EASY TO INSTALL NO MAINTENANCE REAL-TIME REPLACE MECHANICAL LOCK WITH AN ACSYS BLIND LOCK 1. Use mechanical key to open cabinet lock 2.Remove mechanical cylinder with screwdriver 3. Put Acsys cylinder in & fix it with screwdriver 4. Cabinet lock now secured WIDE VARIETY OF HANDLES ACSYS BLIND LOCK INDUSTRY DATA CENTERS POWER COMPANIES TELECOM
HIGH SECURITY HASP FOR FRONT GATE AND STORAGE ROOMS Bolted Bolted and welded 1. Install HASP on gate, using stainless steel bolts and/or weld to the frame. 2. Close the gate. THE SAFEST PADLOCK IN THE WORLD 3. Insert shackle from top and padlock body from bottom to lock and secure. 4. Padlock is now protected against any outside attack.
LADDER ACCESS CONTROL & SAFETY SOLUTION PREVENT UN-AUTHORIZED & UN-SCHEDULED TOWER ASCENT In order to further increase safety on the workplace, Acsys and KARAM (www.karam.in) have designed the world s first integrated fall prevention solution combined with real-time access control. There by preventing un-authorized people from ascending the mast. The solution allows the NOC to control in real-time and wirelessly who is ascending which mast and for what reason, at the same time ensuring the user is properly fastened to the fall prevention equipment before starting this ascent.
ACSYS STACKABLE KEY SOLUTION The stackable key solution is another world-unique Acsys development as it offers a previously unknown level of control over access to high-value or sensitive sites. The stackable key solution works as a bank safe where two keys are required but only requires one lock instead of two. Since it can also be used on padlocks the solution is available for indoor and outdoor applications. The system can be programmed so that up to 5 keys need to be used in order to open 1 lock. The solution can be used in conjunction with Acsys CGS remote key activation. CONCEPT Worker Manager Worker alone cannot open the lock Manager alone cannot open the lock EXAMPLE Worker Worker OR Manager Manager Worker & Manager together use 2 keys to open a lock Security Worker,Manager & Security staff together use 3 keys to open a lock
ACSYS RSM INTEGRATION SOLUTION BATTERIES GENERATORS FUEL TANK BTS CAMERA SITE GATE BTS ACSYSRSM solution integrated hardware & software, it is a easy to install, easy to use, maintenance free, remote sites/asset monitoring system, include Fuel tank/genset /Shelter monitoring,hybrid power management & Green power management etc, which can compatible with Mainstream RSM brand, such as Invendis, Kentrox, Sagemcom, Inala and Qowwisio.
ACSYS PRODUCTS Akey keypad with LCD Akey keypad Akey Blind lock Double lock Button lock PL5 PL2 USB/IP Programmer 3G Programmer MoPro
THE ESTABLISHED TELECOM MARKET ECOSYSTEM MOBILE NETWORK OPERATORS TOWER MANAGEMENT COMPANIES TELECOM OPERATIONS & MAINTENANCE CO S SALES PARTNERS
SECURE IT CONTROL IT MONETIZE IT www.acsys.com info@acsy.com