Total Solution Acsys Technologies Company Ltd EN1303(G5)

Slides:



Advertisements
Similar presentations
1 Re-Introduction to the Nexgen eration of eCylinders Products ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user.
Advertisements

Prevention : Protection : Support Nationwide Security incorporated ltd.
Introduction to Access Control
GCSE ICT Networks & Security..
New electromechanical ABLOY® cylinder.
RK-65K Product Training Installation Operation Troubleshooting
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Hardware Infotech International is pioneer in producing and providing advanced payment hardware.
Copyright ⓒ 2009, Seoul Commtech Co., Ltd 1 Samsung Security Solutions Digital Keypad Locks & Video Intercom AUGUST 2010 PRESENTED BY POWER TECHNOLGY,
G Dealer Security Have you ever experienced? Running around town to collect keys from owners to open the properties listed with you? Worried about leaving.
EUROPROFILE DIN CYLINDERS
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Access Control Line Up Samsung Techwin Europe Ltd.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
June 2006 SD Electroniks Products Catalog
Your New Laptop Toshiba 2430 Specifications Layout How to Use.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Iron Key and Portable Drive Security Zakary Littlefield.
1 ELECTRONIC LOCK. 2 Content System Integrators, Locksmiths What is Smart Air? General Overview Design, functions and added values Features and benefits.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Make your premises an Oasis of security Oasis_EN_1010_c1.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
Access Control Solution for Transportation and Logistics
© 2015 Vermason Ltd. SmartLog V5 ™ with Turnstile.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Nokia Bluetooth Headset BH-108 for Contact Centers
Trusted security for critical infrastructure. Utility companies face significant threats: Sabotage Terrorism Theft Fire.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
Product Description YDM3109
ICT in Banking.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
Abloy Africa High Security Locking Solutions. Abloy Africa Based in Joensuu, FinlandBased in Joensuu, Finland Abloy Africa is a fully owned subsidiary.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
NAVIGATOR™ Portable Balances
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
ABLOY® Padlocks security grades according to EN12320
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
RFID Parking Garage Matt Nichols Tony Nichols. Problem Statement Current parking garage systems are time inefficient The payment process slows down entry.
©Copyright 2015 SmartLog V5 ™ with Turnstile. SmartLog V5™ with Turnstile Charleswater.co.uk The patented* EMIT SmartLog V5™ is designed for fast, frequent,
2 Wire Door Entry System (DES of MH BT offer)
Physical Security Concerns for LAN Management By: Derek McQuillen.
Mechanics Security Solutions “Creating Next Generation Security Solutions”
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Computer Security Sample security policy Dr Alexei Vernitski.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Acsys System Introduction Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in various sizes AcsysLocks CANNOT be BUMPED.
Made in the United States of America DescoEMIT.com EMIT ESD RESULTS AT YOUR FINGERTIPS.
ESD RESULTS AT YOUR FINGERTIPS Charleswater.co.uk.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Code-It Product Presentation
SEETHRU 7 Color Hands-free VDP
ESD RESULTS AT YOUR FINGERTIPS
PARKING AUTOMATION SYSTEM
Hotel lock ASL411 ASL412 ASL413.
OFFLine Solution
Intorduction Manufacturing company establish with a group of engineers, management Graduates, manufacturing experts and other specialized manufacturing.
Classroom Digital Camera
KeyGuard Key Management System
EMIT DescoEMIT.com ESD RESULTS AT YOUR FINGERTIPS
WELCOME!.
Pressure Level Sensor OTT PLS
Customer Presentation
Intelligent Electronic Lock Cylinder System
Floor outlet boxes British Standard
Yale Digital Door Lock DDL Introduction
Crystalhills Turnstile Proposal
Presentation transcript:

Total Solution Acsys Technologies Company Ltd EN1303(G5)

Problems Solutions Associated Problems Copied Keys = Risk of Theft Acsys Keys = Cannot be copied Lost / Stolen Keys Acsys Keys can easily be Deleted Conventional Locks = Risk of Intrusion bumping / picking Acsys Locks are Impossible to pick or bump Doors left open = Risk of Theft Acsys Locks and Keys tell you Who didn’t lock the door Large installations require a Bundle of Keys Acsys Keys can open up to 100,000 Acsys Locks Control Who can open What Door at What Time Staff going to Restricted areas Access control systems installations are Lengthy / Dirty / Noisy Acsys Locks are Wire-Free and can be installed in less than 1 minute

? Why Acsys? 3 USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL NO MORE KEY BUNDLES Where and When was it used ??? ? MECHANICAL LOST KEY = LOCK CHANGE LOST ACSYSKEY = NO LOCK CHANGE CHECK WHERE THE KEY WAS USED AND WHEN Office Home Car Park Gates Containers ONE SOLUTION FOR EVERY DOOR 3

The Intelligent Key 4 AcsysKeys have built-in Clock Calendar LED light on the AcsysKeys gives user information: GREEN – ACCESS GRANTED ORANGE – ACCESS DENIED AT THIS TIME RED – ACCESS DENIED 4 blinks (color depending on the above) – LOW BATTERY AcsysKeys have built-in Keys can be programmed to be Time-limited (08:00 – 18:00) and / or Temporary (Monday – Friday) Clock and Calendar AcsysKeys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) AcsysKeys have built-in memory that stores the last 1000 accesslogs to inform you WHERE the Key went, at WHAT time and WHICH day and if the access was granted or refused. AcsysKeys are IMPOSSIBLE to copy as they are Electronically Encrypted This data can be stored on the system database and exported AcsysKeys are fitted with a chip that can be programmed to open up to 100,000 doors at the same or different times The ONLY power source for the Acsys system comes from the key Battery life-time = 2 years Optional Keypad Key – security against fraudulent usage 4

Making the communication very secure The Intelligent Lock AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL The communication between the AcsysLocks and AcsysKeys is encrypted using AES 128-bit Encryption Making the communication very secure Since there is no power in the locks We can offer Euro – Din cylinders and padlocks in various sizes All models are Wire-free EASY to install EASY to Maintain LOST / STOLEN AcsysKeys can be DELETED from the system and BLACKLISTED on the AcsysLocks where it had access The Double Entry and Button Locks are available in sizes ranging from 60mm to 140 mm The AcsysLock can be installed in LESS than 1 minute in a Euro – Din case lock AcsysLocks Have a built-in chip that stores the last 1000 events that can be downloaded from the lock WHO wen WHERE and WHEN? 5

The Acsys Solution CONTROL CENTER 6 Control SERVER Verify Desktop Office management (Indoor) USB CONTROL CENTER Control Who goes Where and When IP Programmer Building entrance (Outdoor ) SERVER MS-SQL Encrypted Database LAN / VPN Laptop Remote Sites (Outdoor) Export Reports 3G Verify Who went Where and When Handheld Programmer SD Card Check and Analyze Access logs to know WHO went WHERE and WHEN SD Card 6

Products Specifications – Keys Materials: Key housing – reinforced ABS Key blade in stainless steel Splash Water resistant Operating Temperature: -10oC to +50oC LED Information: Green: Access Granted Orange: Access refused because no access during that time period Red: Access Refused 4 blinks(Color depends on the above): Low Battery State Dimensions: Dimensions: 65 x 35 x 18mm Weight: 30g  Power source: Power source: Two 1.5v batteries Battery type : LR1/MN9100 Autonomy : 2 years Memory : Tracking history of the last 1000 logs Rohs and CE compliant, manufactured to ISO standards. Powered by 2 x LR1 batteries

Products Specifications – LOCKS Materials: Made of Brass with stainless steel plating Opening codes are purely electronic Operating Temperature: -20oC to + 65oC Dimensions: 10/30mm to 10/70mm for single entry locks 30/30mm to 70/70mm for double-entry & button locks European standards  Power source: None; powered by inserting key. Memory : Tracking history of the last 1000 logs Memory of blacklisted keys: 500 banned keys Rohs and CE compliant, manufactured to ISO standards. Single Entry MECHATRONIC Lock Double Entry MECHATRONIC Lock Button MECHATRONIC Lock EASY TO INSTALL Step 1 : remove screw Step 2 : remove old lock Step 3 : insert Acsys lock Step 4 : insert screw INSTANT ACCESS CONTROL

Products Specifications – PADLOCKS Materials: Shell in case hardened steel Shackle in case hardened boron steel Fitted with a 30/10 stainless steel cylinder Power source: None; powered by inserting key. Memory : Tracking history of the last 1000 logs Memory of blacklisted keys: 500 banned keys Rohs and CE compliant, manufactured to ISO standards. Products Specifications – PADLOCKS ACSYS PADLOCK PL3 ACSYS PADLOCK PL5

Acsys Dual-Technology solution Acsys Key + Proximity/RFID = Acsys ProxKey Use your key as a badge And use your key on a lock

ACSYS Advantages Control WHERE users can enter Control WHEN THE USERS ARE USING THEIR KEYS AND WHERE Control WHEN users can enter Mon-- Fri 08:00-17:00 07/2012 24hrs/ 7/7-365 Tuesday 4:00-18:00 Mon- Fri 24hrs No Access 08:00-20:00 Control WHERE users can enter 锁和钥匙管理软件

Better security, better life! Contact us: UTIS -Jeddah 6503650 WWW.UTIS.SA INFO@UTIS.SA 0504667387