November 2016.

Slides:



Advertisements
Similar presentations
1 Re-Introduction to the Nexgen eration of eCylinders Products ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user.
Advertisements

New electromechanical ABLOY® cylinder.
Your future is bright blue! So Smart, Its Simple..
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
S pectrum Group Connie TM Advanced Key Management Software Simply … the BEST! PRESENTS.
Videx CyberLock Access Control System
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Comprehensive IT Consulting Services an innovative approach to business.
Auditing Computerized Information Systems
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
Introducing… …taking desktop computing to the cloud making business effortless!
Abloy Africa High Security Locking Solutions. Abloy Africa Based in Joensuu, FinlandBased in Joensuu, Finland Abloy Africa is a fully owned subsidiary.
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Neil Sanderson 24 October, Early days for virtualisation Virtualization Adoption x86 servers used for virtualization Virtualization adoption.
Zulhizam Bin Ebrahim Mohd Shamir Bin Abd Azia Muhammad Salehin Bin Suhaimi
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Stone Lock ® Pro Facial Recognition for Access Control TM.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Support Packs. CUSTOMER SEGMENT IT Service Desk teams who provide internal and external support to traditional systems including desktops, laptops.
Physical security By Ola Abd el-latif Abbass Hassan.
Providing Security - One Door At a Time. Multifamily Housing, What Landlords Should Know When It Comes To Protecting Tenants  Landlords are responsible.
Locksmiths are skilled in different techniques for installing, repairing and maintaining both traditional mechanical locks and electronic locking systems.
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
Blackboard Security System
Identity and Access Management
The Revolutionary Benefits Of Blockchain
COSEC ARC IP based Access Control Panel.
INFORMATION SYSTEMS SECURITY AND CONTROL.
Smart Building Solution
Self-service enrollment for Windows desktops
Cloud computing-The Future Technologies
Controlling Computer-Based Information Systems, Part II
Smart Building Solution
APPLICATION RISK AND CONTROLS
UNIT 19 Data Security 2.
Security managed from the cloud.
The advantages of going wireless
Your home is your sanctuary. It is a place where fond memories are made and relaxing evenings are spent after a busy day. Your home is a safe haven where.
Computer-Based Processing: Developing an Audit Assessment Approach
WELCOME!.
Wavestore Integrates… Paxton Net2 Access Control
Managing data Resources:
Check Point Connectra NGX R60
County HIPAA Review All Rights Reserved 2002.
Introduction to Information Systems
INFORMATION SYSTEMS SECURITY and CONTROL
Intelligent Electronic Lock Cylinder System
Managing the IT Function
DEPLOYING SECURITY CONFIGURATION
Chapter Goals Discuss the CIA triad
Cloud Computing for Wireless Networks
Presentation transcript:

November 2016

What is VeraPass? VeraPass is a comprehensive electronic locking solution. VeraPass is comprised of enterprise management software, high security kiosks, remote programmers, and Medeco NexGen XT programmable keys & electromechanical lock cores. VeraPass is easy to use and administer, yet it provides a highly secure locking solution with enhanced compliance and audit trail reporting. VeraPass is unique in that it combines the attributes and advantages of physical keys and mechanical locks with the reporting and auditing capabilities of traditional electronic access control at a fraction of the cost.

Why VeraPass? VeraPass solves complex operational, security & compliance issues. VeraPass streamlines procedures by mandating routine security policies are adhered to and followed. VeraPass provides significant operational benefits through data analytics & proactive reporting capabilities. VeraPass works in single-use and interactive dual-person applications. VeraPass eliminates lock/combo changes and key management concerns. VeraPass deploys easily and cost-effectively in new and existing facilities. VeraPass operates in standalone, subordinate & enterprise capacities.

eCylinders secure…

Medeco XT Hardware Low risk High reliability Ease of Use No risk of unauthorized mechanical key duplication Proven operation in harsh environments Attack and tamper-proof design High reliability Thousands of openings with fully charged key Cylinder memory: 2,000 audit events Key memory: 5,000 authorizations and audit events Ease of Use No wiring or power supplies required at the lock Retrofit cylinders install in standard hardware Key changes are programmed via software Rechargeable keys eliminate battery maintenance

Lockers, Containers, Computer Racks, Cash Cassettes, How VeraPass works Supervised & Controlled by Lockers, Containers, Computer Racks, Cash Cassettes, Padlocks, Man Doors, Pedestals, ATM Toppers, Machine Beauty Doors, etc. Multi-Factor Programmer Activated XT Key (Biometric, Credential and/or PIN authentication) VeraPass Enterprise Management Software

How VeraPass works User profiles are imported into the software in order to provision programmable keys for individuals at deployed kiosks. Kiosks and/or client software are deployed at new/existing facilities. Medeco XT electromechanical lock cores (eCylinders) are installed in virtually any opening/container/locker/door/padlock where controlled access and user history is required. Provisioned keys, based on each individual’s profile, record data through normal usage at every eCylinder. No wireless connections are used, or needed, with VeraPass.

VeraPass Screen Shot Fingerprint Enrollment

VeraPass Screen Shot User Maintenance

VeraPass Screen Shot User Permissions

VeraPass Screen Shot User & Container Groups

VeraPass Benefits VeraPass kiosks & software operate virtually anywhere, requiring only local power and network connectivity. eCylinders fit the vast majority of lock openings, in both new or existing locations, and take just minutes to install. eCylinders are powered solely through normal usage of provisioned keys. VeraPass eliminates code-sharing and access violations. VeraPass – Truth in Access.

Q & A