Electronic Weapon Storage and Access System Armory Management



Similar documents
IS-TG501MS IS-TG100MS L-TG700 XS-PLINTH01

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

Using Contactless Smart Cards for Secure Applications

APPENDIX E FIREARMS AND AMMUNITION STORAGE SITE CHECKLIST Date: Name and Telephone Number of Regional Firearms Manager:

Answering the Security Challenge

Subj: U.S. NAVAL ACADEMY RIFLE AND PISTOL TEAM ARMORY STANDARD OPERATING PROCEDURES

A guide to access control for manufacturing sites

DATA CENTER PHYSICAL INFRASTRUCTURE

BUILDING SECURITY & ACCESS CONTROL

Middleborough Police Electronic Security Narrative

CenterMind G+ Smart and Proactive Environment Monitoring

Security Guidelines for. Agricultural distributors

IT - General Controls Questionnaire

Electronic Access Control Solutions

Plantcom s. Fleet Management. solutions are your competitive advantage. plantcom.com.au. l

WHITE PAPER. Extending the Reach of the Help Desk With Web-based Asset Management Will Significantly Improve Your Support Operations

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

An Introduction to Electronic Data Capture Software. Learn the basics to find the right system for your needs

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

AXS Biometric Security System

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

ป งบประมาณ พ.ศ.๒๕๕๘ ( ๑ ต ลาคม ๒๕๕๗ ถ ง 30 ก นยายน ๒๕๕๘ ) สร ปผลปร มาณงานพ สด การจ ดซ อ/จ าง/เช า ในรอบเด อนพฤศจ กายน ๒๕๕๗ ส าน กงานท ด นจ งหว ดเช

IAPE STANDARDS SECTION 10 - MONEY

>>IP. VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert

Contra Costa Community College District Business Procedure SECURITY CAMERA OPERATING PROCEDURE

Access Control Regulations

Security at San Onofre

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

iloq S10 locking system

INFORMATION TECHNOLOGY CONTROLS

A Model-based Methodology for Developing Secure VoIP Systems

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

Introduction. Network Basics. Workstations. Server. Hub

Physical Security to mitigate Social Engineering Risks

VEHICLE SECURITY SYSTEM OPERATOR'S INSTRUCTIONS

Safety and security are simply good business.

CFCFA Logistics Management Training Supply Chain Management Technology

Access Control Management Software

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

GPS Vehicle Tracking. The Complete Reference Guide

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL

Military Usage of Passive RFID 1

AN INTRODUCTION TO THE GLOBAL INDIVIDUAL ASSET IDENTIFIER (GIAI) TABLE OF CONTENTS

UCSD Controlled Substances Program Procedures

General Open Land Areas

Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER

A guide to Access Control in care homes

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Governance of Controlled Drugs using Automated Cabinet-based Stock-control Systems

Healthcare versus Biochemical Industries

Access Control Policy

SECURITY & MONITORING QUICK GUIDE

ZKAccess User Manual. Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011

Tnet WIRELESS MESH SENSOR NETWORKS

Smart Anytime, Safe Anywhere. Home Passport Gateway-G Series. The Epitome of Smart Living

A guide to access control for offices


1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Integrated Physical Security and Incident Management

Patient Safety Applications for Bar Code and RFID Technology APPLICATION WHITE PAPER

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Recording Server RS100 series

Concepts of Database Management Seventh Edition. Chapter 7 DBMS Functions

Digitus Biometrics Product Catalogue. Request a quote or design assistance by ing sales@digitus-biometrics.com or calling

Bike Sharing/Public Bikes:

Lawrence Police Department Administrative Policy. August A. Access to CJIS sensitive data is only available to authorized users.

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)

Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008

Asset management systems increase reliability and efficiency

Information Technology Solutions

Monitoring solar PV output

Access Control, Integrated

Cube. Access control and intrusion detection

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Automated Security System using ZigBee

RFID in Document Tracking

User and Iot Data Analytics. Empowered by Ericsson User Data Consolidation (UDC)

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Transcription:

Electronic Weapon Storage and Access System Armory Management

COMPARISON CHART Electronic Weapon Storage and Access System () Designed to prevent misuse and to securely manage weapon access Individual Shutter Chain and Padlock LOCK MECHANISM Mechanical iron shutter to lock individual weapon Poor design where all weapons are chained together and padlocked Computerized Event Record Logbook Accurate Fingerprint Access (Unique Identity) Card Access Numeric Pad Access Reliable weapon management Reliable and secure Armory management Automated Access System Emergency Release Heavy Duty Components Easy to Use, User Friendly Adaptation to customer preferences Independent Single Interface Stand Alone system or multiple systems connected with single interface RFID Radio Frequency Identification Secure and Reliable weapon Assignment Electronic process registration in database for Auditing / Logbase The system offers Officer Identification through Fingerprint, Access Card or Numeric Pad to access weapons assigned to that particular officer only. Takes care of Missing Firearms Issues and security of Firearm storage This innovative product combines Fingerprint Identification with real time transaction record for monitoring purposes to help eliminate manual recording errors Each transaction will be recorded directly to PC database Computerized Weapon Audit Comprehensive report of user database, schedule of weapon retrieval, collection, transaction of retrieval, collection, etc RECORDING METHOD REPORTING Log book can be misplaced, unclear handwritten, possibilities of being illegible and erroneous Can be manipulated Manual Audit A manual audit can cause discrepancy 2 3

COMPARISON CHART COMPARISON CHART Emergency Release at Rack or Software Unlock Chain or Open Cabinet CCTV or Alarm Normal Monitoring EMERGENCY RELEASE INTERGRATION Full weapon release by manual override or software In a emergency situation, time will be wasted in unlocking chains or opening cabinet Able to integrate with other systems such as CCTV and Alarm system for extra security Increase of manpower for monitoring purpose due to lack of security Individual Fingerprint Identification Identification via Letter / Schedule Fast Individual Firearms Access Trouble Firearm Collection IDENTIFICATION WEAPON ACCESS Fingerprint validation for each weapon user Fake identities, duplicate identities, letter and unreliable schedules Convenient and efficient access Fingerprint Smart Card No more fumbling with keys, padlocks and chains in a messy process Online Monitoring via LAN /WAN/ Internet Offline monitoring / Visiting Strong room Duress Alarm No Duress Alarm MONITORING DURESS ALARM Online realtime monitoring via LAN /WAN and remote monitoring through internet Personnel to be physically present to monitor and visit the site at all times Duress Alarm system is integrated to protect weapon user Lack of duress alarm to prevent undesired or unauthorized intruder 4 5

COMPARISON CHART Built in RFID No Sensor BUILT IN SENSOR Lack of security to prevent undesired or unauthorized intruders Each weapon will have built in sensor for transaction tracking and to protect against unauthorized removal, Chemical and temper proof Alarm Spray Intergration to delay intruder Electronic Weapon Storage and Access System () Designed to prevent misuse and to securely manage weapon access STOP Unauthorized duplication of keys, internal manipulations of data and unauthorized Access No Integration DEFENSE SYSTEM Alam spray protects the weapon storage area Organic based susbstance will paralyse the intruder for a certain period Lack of capability on integration with other systems such as alarm spray, CCTV to prevent undesired or unauthorized intruders Time schedule Control on Weapon Collection For use by Military Forces, Law Enforcement Agencies, Police, Customs, Border Patrol, Immigration Authorities and Private Securities Control by Armourer WEAPON COLLECTION Weapon can be collected on specific time schedule set for each firearm user 6 No weapon usage time logging and monitoring can cause unreliable record tracking 7

Swissloxx Technical Products, Oberglatterstrasse 35, 8153 Rümlang, Switzerland T: +41 43 211 03 22, F: +41 43 211 03 21, E: office@swissloxx.com www.swissloxx.com