1 Re-Introduction to the Nexgen eration of eCylinders Products ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user.

Slides:



Advertisements
Similar presentations
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Welcome to Cloud-hosted church management system - Version 2011 (Click the Next Slide icon, Previous Slide icon, or Home icon to move from page to page.
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
Offline and Web-based tools development to support the TSA By Reymar Gooding.
Cloud Computing at GES DISC Presented by: Long Pham Contributors: Aijun Chen, Bruce Vollmer, Ed Esfandiari and Mike Theobald GES DISC UWG May 11, 2011.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
1 Business Communication Systems (BCS) EXP1240 Series IP DECT Cordless System for Mobility EXP1240 Series.
Objectives Overview Define an operating system
Operating System Customization
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
ARE YOU SURFING WITHOUT A LIFE JACKET? LOOKING AT THE PROS AND CONS OF WEB BASED SOFTWARE Karen Burkhardt, Mobilitat Software.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
How to Go Digital (Advanced) Press Space Bar or Click Mouse to Advance.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
GV-Control Center Overview
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
 Cloud Computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.  Your software applications.
Student Financial Assistance. Edconnet SFA to the Internet: EDconnect Software Session 16.
Computer Applications Unit D Remote Desktop, Cloud Storage, Dropbox.
Welcome! West Allis: Yes you can!. Terms: Data – Any form of information stored in a computer Data – Any form of information stored in a computer Database.
NYS Forum IT Greening Workgroup Thin Client Devices DHCR Experience with Virtual Desktops June 12, 2010.
What is Ubiquity™? ubiquity (noun): the state of being, or seeming to be, everywhere at once Ubiquity™ is a powerful building management system that.
CLIENT SERVER VS PEER TO PEER Networks. Lesson objectives Candidates should understand the advantages and disadvantages of: client server networks peer.
Introduction to Cloud Computing
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Explain the purpose of an operating system
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Cloud Computing Changing the way business computing is (will be) done.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
1 BSG LeatherLink Make IT Happen. 2 BSG LeatherLink About - BSG LeatherLink Founded and run by professionals with experience in Leather industry – 47.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Introduction TO Network Administration
verifone HQtm Estate Management Solution
IT Support Packs. CUSTOMER SEGMENT IT Service Desk teams who provide internal and external support to traditional systems including desktops, laptops.
Thin Clienting Justin Spratt. What is thin clienting? Thin clienting is a form of cloud computing—running applications on a server rather than on a local.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Securing E-Transaction 1/24.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
IPEmotion License Management PM (V1.2).
“Business first, technology's the tool.”. The Application Hosting business model is based on a very simple idea:  Install application software on powerful.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Unit 3 Virtualization.
Trend Micro Consumer 2010 Easy. Fast. Smart.
November 2016.
Avenues International Inc.
Work on the Fly Hosted Solutions for Timeslips Customers
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
System Architecture & Hardware Configurations
What is Cloud Computing - How cloud computing help your Business?
3.1 Types of Servers.
System Architecture & Hardware Configurations
Get Office 2016 with Office 365 and get down to business
VIRTUALIZATION & CLOUD COMPUTING
BusinessObjects IN Cloud ……InfoSol’s story
Online software and backups
PLANNING A SECURE BASELINE INSTALLATION
Revision PowerPoint By Nicole Davidson.
Done by:Thikra abdullah
Presentation transcript:

1 Re-Introduction to the Nexgen eration of eCylinders Products ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience Selling the new

What we will cover Re-Intro to NexGen XT Software Overview –Web Based Cloud overview –Live Demo Support Materials available –Smart SFIC Sales & Marketing –eCylinder Sales & Marketing Summarize Call to Action 2

NexGen XT Cylinder –Tested Technology in high abuse industrial applications Features –Durable Indoor/Outdoor Use –Electronic core installation and removal –2000 audit events –Temp Range -40 F to 160 F –Pick & Bump Resistant –Fits 6 & 7 pin housings –Stores Blacklist of lost keys

NEXGEN XT Key Small, Rugged, Convenient Features –Rechargeable battery, 800 openings (1.75 hrs to recharge) –5,000 cylinders maximum –5,000 audit events maximum –All Access programming done at key –Key powers the cylinder –One Key-multiple functions –Operate – Audit – Control (remove cores) –Setup (load Blacklist)

LED Indicators 5

Nexgen XT Accessories Accessories Key Charger –Charge from PC, wall, or vehicle –Uses standard Micro-USB cable Programming Key Programmer –Programs and charges the key –Connects to PC USB port –Uses standard Micro-USB cable

NEXGEN XT Software Stand Alone or Web Based Activity reports display all accesses & unauthorized user activity. Exception reporting- Alarm indications provide instant notification of unauthorized user activity. Customizable reports show only the information you select. Keys can be programmed while software is unattended.

Web-Based Software Terminology Clarification What is web-based Cloud software? Cloud is a metaphor for the Internet. Applications based online accessed by Web Browser Data is stored on remote servers CMW & XTWM fit this description Cloud vs. SaaS (terms you need to know) SaaS – Software as a Service or Software on Demand Deployed over the internet Run behind a firewall on a local area network or personal computer Data typically stored locally

Advantages contributing to Higher ROI Web-Based Software Lower upfront costs Lower infrastructure costs - not having to manage and maintain internal systems Reduction of internal IT staff – no maintenance of software and systems Higher Security - keeping the data off of local laptops/desktops More Advantages NO CDs to install NO Large Downloads NO Upgrades to worry about: Youre always using the latest and greatest. No Technical Experience necessary - We handle all the security, uptime, backups, upgrades and other IT type stuff. No Sleepless nights - Data is stored on Secure Servers that are always-updated & backed-up and contained in a highly-secure data center.

Our Goal – Reduce upfront costs with monthly/annual contracts. Why? –Medeco System Hosting – –No ing of system files –Faster system implementation – no local installation –Easier to support (for EU & Dealers) – everything online –Easier upgrades – server based/no individual upgrades –NO system incompatibilities – on our servers –Ease of Use (locally) –Infrastructure savings – use any PC with web access –Data Maintenance – all done by Medeco –Data Backup – all done by Medeco –Data Security – one copy of data in secure server Web-Based Software

11 eCylinder Marketing/Sales Tools EU Want/Need Comparison will be available in Excel format