Acsys System Introduction Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in various sizes AcsysLocks CANNOT be BUMPED.

Slides:



Advertisements
Similar presentations
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Advertisements

Web Shift Booking System
New electromechanical ABLOY® cylinder.
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Copyright ⓒ 2009, Seoul Commtech Co., Ltd 1 Samsung Security Solutions Digital Keypad Locks & Video Intercom AUGUST 2010 PRESENTED BY POWER TECHNOLGY,
Motorcycle product sheets
OfficeTrack Mobile Employees and Fleet Management System.
Guard4Life Advanced GPS
Powerpoint Templates Page 1 Powerpoint Templates Page 2 Something you own that has value There can be assets that gain value over time…. What is an Asset?
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Don McCarty Manager Postal Service East Tennessee State University.
A Green Solution From. Challenges Security Control Energy Savings Lighting (CHPS) Maintenance Monitoring.
Pyronix Ltd. Secure House Braithwell Way, Hellaby, Rotherham, S66 8QY, UK T F E
Training Outline – Attendance Clerks
Web based payroll No software installation Upgrades and maintenance provided for you Secure connection via 128 bit SSL encryption Available anywhere,
Total Solution Acsys Technologies Company Ltd EN1303(G5)
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Iron Key and Portable Drive Security Zakary Littlefield.
10 Essential Security Measures PA Turnpike Commission.
Access Control Solution for Transportation and Logistics
10 February Setup Operators. 10 February Open the Setup Operators Window Open the Setup > Operators window via its pull-down menu option.
Lesson 4: Using the Calendar
Ch. 5 – Access Points. Overview Access Point Connection.
Authentication Approaches over Internet Jia Li
Data Security GCSE ICT.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
AZOR – easy solution GSM mini alarm Azor. AZOR - introduction Common alarm system = STRESSFUL Your home is changing to „PROTECTED PREMISES“ Complicated.
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
Product Description YDM3109
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
IT security By Tilly Gerlack.
Abloy Africa High Security Locking Solutions. Abloy Africa Based in Joensuu, FinlandBased in Joensuu, Finland Abloy Africa is a fully owned subsidiary.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Instructors begin using McGraw-Hill’s Homework Manager by creating a unique class Web site in the system. The Class Homepage becomes the entry point for.
Page 1 Onity OS Series Safes 20/03/2003. Page 2 Onity OS Series Safes 20/03/2003 Onity OS Series Safes.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Trackstar Navigations Pvt. Ltd. Presenting New Generation GPS Tracking System.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Presented by: Time & Pay. Web based payroll No software installation Upgrades and maintenance provided for you Secure connection via 128 bit SSL encryption.
The Monitor 4000 Alarm provides the most cost effective, worry-free method of keeping backdoors secure during business hours…protecting your business,
DIWICON AURA Services Szilárd SZAKÁCS Product Manager, DIWICON AURA CASON Engineering Plc. Hungary 2030 Érd, Velencei út. 37.
Training Outline – Attendance Clerks
Trey Herrington Electrical Engineer -Hardware Design -Hardware Design -Software Implementation -Software Implementation Samantha Prine Electrical Engineer.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CSCE 201 Identification and Authentication Fall 2015.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Zones 1 to 8 Siren Keypad Power 12V Data and clock By default: Zone 1 Entry Exit 2 Follower 3 Instant 4 Instant 5 Instant 6 Instant 7 Instant 8 Panic.
GMAP Grant Management, Application, and Planning Consolidate Application Training.
Estate MANAGEMENT. Estate MANAGEMENT Holistic solution to manage residential villages and estates. Developed by Impro.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
IPEmotion License Management PM (V1.2).
( ) 1 Chapter # 8 How Data is stored DATABASE.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Code-It Product Presentation
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
WELCOME!.
Digital $$ Quiz Test your knowledge.
Intelligent Electronic Lock Cylinder System
2N Access Unit 2.0 Multi-technology access control readers.
Yale Digital Door Lock DDL Introduction
San Joaquin Valley Camera Club Council
Presentation transcript:

Acsys System Introduction Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in various sizes AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Acsys Keys can be fitted with a Proxi allowing the key as a bad All models are Wire-Free EASY to Install EASY to Maintain The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 – 18:00) LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Reports It’s all about security & Productivity! / PL5 PL2 Button Lock Blind Lock Double Lock The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. LED light on the AcsysKeys gives user information: GREEN – ACCESS GRANTED ORANGE – ACCESS DENI RED – ACCESS DENIED 4 blinks (color depending on the above) – LOW BATTERY Activity The key has a chip that can be The key and lock each The lock has a built-in chip programmed to open one or have a built-in MEMORY that can be programmed to up to 100,000 locks that keeps track of the last accept the entry of 1,000 events, WHO went 1,000,000 keys WHERE and WHEN ED AT THIS TIME mity / RFID coil user to use the ge (optional)

Why Acsys ? Car Park HomeGates Containers Office Where and When was it used? Mon—Fri 08:00-20:00 Mon– Fri 24hrs 365Days 24hrs Activity Reports Activity Reports It’s all about security & Productivity! / EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER USE ONE KEY FOR EVERY DOORNO WIRING, EASY TO INSTALLONE SOLUTION FOR EVERY PLACENO MORE KEY BUNDLES

Acsys CGS Solution (Remote Key Activation) The Acsys Code Generating System (CGS) is a simple, yet powerful way to manage access to remote sites and assets in real-time. Through a phone and an Acsys CGS Key with Keypad, the NOC can grant access rights in real-time and be notified on site arrival and exit. The CGS solution is offered exclusively by Acsys and is unique approach to remote site access control. ANY PHONE ANY PHONE The concept is simple, every user now has a key, but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s). SMS OPERATOR Whenever a user requires Access to a site or asset, he needs to request the code by call/sms to the NOC and upon verification of the user credentials the code will be issued to the user who in turn enters it on the key allowing him to have access and ONLY on the site and assets where the NOC wants the user to have access. The Acsys CGS solution is the safest and most convenient way to control access to remote sites and assets and the best way to REDUCE DOWN-TIME by allowing users to get to the site without the need for picking-up or returning keys. USER It’s all about security & Productivity! / CGS Working Principle

Remote key Activation (Call/SMS) SMS CALL CODE operator, gives his code to use the key code to use the key, GREEN (5min/30min/1HR/8HRS) It’s all about security & Productivity! / 3. The user inserts PIN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 2. The user calls the password, and receives a 1. The user has a password key and needs access to some locks 2. The user sends SMS and password requesting access and gets a code to use the key 1. The user has a password key and needs access to some locks

Replace mechanical lock with an Acsys Blind Lock Close Open 360 ° turn Battery/AVR/3G/4G/LTE Cabinet Lock Wide Variety of Handles II Other Models Available ·; ~ ·. -~- - ·: OpenOpen Close It’s all about security & Productivity! / Acsys Blind Lock ' '.

High Security HASP for Front Gate and Storage Rooms,1/ Clolt - I... r-. ) L --, THE SAFEST PADLOCK IN THE WORLD l.... r s ~ '.f'.f \ ~ ®® ~ It’s all about security & Productivity! / STEP 4 STEP 3STEP 2STEP 1

Acsys Stackable Key Solution The stackable key solution is another world- unique Acsys development as it offers a previously unknown level of control over access to high-value or sensitive sites. The SK solution works as a bank safe where two keys are required but only requires one lock instead of two and can also be used on padlocks so the solution is available for indoor and outdoor applications. The system can be programmed so that up to 5 keys need to be used in order to open 1 lock The solution can be used in conjunction with Acsys CGS remote key activation. WorkerWorker Manager 11 WorkerWorker WorkerWorker 2 OR Manager 3 2 Security It’s all about security & Productivity! / Worker , Manager & Security staff together use 3 keys to open a lock Worker & Manager together use 2 keys to open a lock EXAMPLE Manager alone cannot open the lock! Worker alone cannot open the lock! CONCEPT

On-site Time & Attendance Solution site to report to duty, he inserts CGS 30 MINUTES 4. In case of emergency, if the guard CONTROL: · PREVENTIVE MAINTENANCE · SCHEDULED MAINTENANCE · EMERGENCY MAINTENANCE · ADHERENCE TO SLA · USER ON-SITE PRODUCTIVITY ADVANTAGES: · NO CABLE · NO POWER · NO BATTERY · NO MAINTENANCE It’s all about security & Productivity! / 5. During monthly site audit, the guard’s attendance information can be download from T&A logger or guard can upload key event log on USB/IP programmer 6. After the logs have been uploaded, a full report shows the guard attendance on site(when/where/how long) FUEL TANKBTS SHELTER 4. In case of emergency, if the guar need access to the site, he can request CGS code and enter site 3. The guard needs to re-insert his key at certain time interval (e.g. 30 minutes) to make sure he stays on- site. LTE CABINETGENERATOR 1. The guard has key for T&A but no access rights to locks on-site 2. When the guard arrives on- his key in logger BATTERIESTOWER