1 1.

Slides:



Advertisements
Similar presentations
Application Guide For Mesh AP – MAP-3120
Advertisements

Total HVAC Control from anywhere Easy control that can save a fortune
Guide to Network Defense and Countermeasures Second Edition
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Remote Desktop Connection Techniques Wireless Communication Networks.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
M2M Gateway Features Jari Lahti, CTO
A Guide to major network components
PATENTED SOLUTION Patents covering the Connection method and device arrangement World’s First Plug & Go Remote Access Device.
Topics 1.Taking the Lock into use – physical serialization 2.Detailed setup options 3.Using mobile broadband 4.Taking the Key into use.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Copyright © Tekes Tosibox Easy device for encrypting remote access DM.
Netop Remote Control Trusted. Secure. Experienced.
MULTIMEDIA ALARM SERVICES. The current Alarms Business Model.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Proximus Push solutions Welcome Direct & BlackBerry.
Milestone Systems Architecture and Engineering (A&E) Program
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Case Study Portable Wireless Network for Emergency Response.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Unpack From Box and Inventory Technical Bulletin User’s Manual Assembly Procedure Direct or Strap Pole Mounting Kit Face to Southern Sky High Temperature.
ThruLink™ Fixed or mobile security systems Streaming secure, live video over a public network Replacement for leased lines Transmitting data securely from.
TOSIBOX LOCK security options 1 1.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
 2013, Infotecs ViPNet Technology Advantages.  2013, Infotecs GmbH In today’s market, along with the ViPNet technology, there are many other technologies.
Service Section Technical Training Dec A Standard Wireless Networking Protocol Zigbee Wireless Technology.
Welcome! Agenda 1.Introduction 2.Key and Lock basics 3.Managing Keys 4.Technology and security overview (lunch break) 5.Advanced features 6.Scaling with.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
SoMac Software All about Access Control & Attendance
C © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 C © 2013 Cisco and/or its affiliates. All rights.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Professional Solution for Central Management and Visual Alarm Verification Presentation by TeleEye Group Presentation by TeleEye Group TeleEye Central.
Installation And Troubleshooting Guide. PHONE REQUIREMENTS High Speed Internet Connection Using DSL Modem, Cable Modem or Wireless Canopy With a minimum.
Networking Basics Lesson 1 Introduction to Networks.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Topics 1.Product information 2.Distinct features 3.Building large systems with the Central Lock.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Communications Telemetry Radio. Copyright © 2010 In-Situ® Inc. This document is confidential and is the property of In-Situ Inc. Do not distribute without.
PATENTED SOLUTION Patents covering the Connection method and device arrangement World’s First Plug & Go Remote Access Device.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
In Partnership with. PATENTED SOLUTION Patents covering the Connection method and device arrangement World’s First Plug-and-Play Remote Access Device.
Basic Computer Knowledge. Outline Notes 1 Notes 2 Assessment.
PATENTED SOLUTION Patents covering the Connection method and device arrangement World’s First Plug & Go Remote Access Device.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction to Networking
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
© Accelerated Concepts, Inc. All rights reserved..
WHAT IS SO SPECIAL? Wireless Router Analogue Telephone Adaptor + SMCWTVG.
Remote Access Using a Netgear DG834 Router 1http://
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
Secure, Industrial Transmission
Virtual Private Networks
Wireless Access Point Product Overview
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
COSEC ARC IP based Access Control Panel.
Virtual Private Networks (VPN)
Configure Instruction
Wireless Access Point Product Overview
1 1.
Wavestore Integrates… Paxton Net2 Access Control
The Introduction of ECD-1000
© Accelerated Concepts, Inc. All rights reserved.
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Presentation transcript:

1 1

TOSIBOX Company Highlights Based in Finland Patented solution 12 people + subcontractors Locations: Oulu, Finland London (Reading), UK 2

World’s First Plug & Go Remote Access Device PATENTED SOLUTION Patents covering the Connection method and device arrangement 3 3

PROBLEM Customers don’t have easy solution to access and control remote devices and it is difficult to scale up the system when needed When the network devices are connected to each other over the Internet, they do not get connected automatically Connecting and controlling those devices remotely, an expert on DYN DNS, fixed IP addresses, firewalls and involvement of network operators are required ? 4 4

TOSIBOX SOLUTION TOSIBOX automatically connects the network devices over the internet in minutes and it is fully scalable system Lower IT costs, lower capital cost, lower maintenance cost, faster connectivity to end-users Mobile Client

TOSIBOX USECASES (EXAMPLES) Continuous communication (M2M) and remote access key Access to many Locks With a single key * x pcs Multiple Connections to Lock If necessary, keys will get limited user rights * x pcs NOTE: Several Keys can be connected to one/several Lock(s) 6

Lock Lock can also be set to work in Client mode, based on the network environment and what is the intended purpose of use. Factory default setting is Lock Lock, Client mode 7

Remote Connections and M2M (Continuous data flow) 1/4 8

Security Control Room 2/4 INTERNET 9 9

Support TOSIBOX 3/4 Maintenance person uses Tosibox which he connects to remote location -Burglary alarm, crime alarm, IP Camera, Building Automation etc. Software engineer makes connections by TOSIBOX key

TOSIBOX 3G/4G Router 4/4

TOSIBOX BENEFITS TAKE INTO USE ONLY IN 5 MINUTES HIGH LEVEL DATA SECURITY FLEXIBLE AND EXPANDABLE SOLUTION WORKS RELIABLY IN ALL KINDS OF INTERNET CONNECTIONS 12 12

TOSIBOX CENTRAL LOCK TOSIBOX Central Lock provides an easy and scalable solution Hub of the TOSIBOX ecosystem, allowing hundreds of connections from TOSIBOX Keys or Sub Locks. Over 700 Mbit/s encryption throughput up to 4000 concurrent VPN connections (TOSIBOX Lock or Key connection) Option to collect audit log data from other TOSIBOX devices

TOSIBOX – SECURITY Customer Case Service people serilized and naming TOSIBOX locks by MASTER Key Lock installation Provide access to Central Lock and service people TOSIBOX – SECURITY Customer Case Service people Group A Group B Automatically access to dedicated Locks Business server continuous (M2M) access to all locks * x pcs TOSIBOX Central Lock Access to all Locks This is in Customer’s side Internet Several Locks in B mode

Available Accessories 2G/3G/4G Modem -Huawei E3131 (2G/3G) -Huawei E392 (4G) Modem to Antenna RF adaptor -Adaptor to connect Antenna connector to TOSIBOX supported Huawei modems -Huawei E3131: CRC-9 to RP-SMA male -Huawei E392: TS9 to RP-SMA male Antenna for 2G/3G/4G modem -Universal Omnidirectional Antenna -Weatherproof -Height 600mm -Product code: OMNI-A0121-V3 DIN rail mounting bracket -Used for mounting TOSIBOX Lock into 35-mm wide Top hat DIN rail (EN 50022) -Allows the mounting of TOSIBOX Lock into any orientation: Horizontal/vertical/inline with the rail/straight angle with the rail 15 15 15

SALES AND MARKETING MATERIAL LINK: www.tosibox.com/files User Manual Quick Guide TOSIBOX brochures TOSIBOX Data Security sheet TOSIBOX introduction video http://www.youtube.com/watch?v=stpRLXMLv1U&feature=youtu.be 16 16

TOSIBOX SUPPORT TOSIBOX Help http://help.tosibox.com TOSIBOX Support +46 40 6688059 (in Sweden) +358 44 7440065 (in Finland) +44 1183 150 213 (in UK) support@tosibox.com TOSIBOX Training +358 40 5599045 jussi.paakinaho@tosibox.com 17 17

THANK YOU !