SlideShare una empresa de Scribd logo
1 de 15
Kshema Track- ZigBee Based Asset Tracking Solution




Track Assets Accurately, Anywhere
TYPICAL REQUIREMENTS



XXXX requires ZigBee Based Laptop Tracking & Access Control System.


 It currently has XXX wireless device/Laptops which is required to be
  tracked.
 The access card of each employee needs to be paired with laptop
  issued to them

 To begin with XXX plans to deploy the solution for its single office
  location in XXX & subsequently spread it across to other offices.
TYPICAL REQUIREMENTS



Xxxx believes the best approach for ZigBee based Wireless Device/
Laptop tracking & Access Control System can be deployed in two phases

Phase 1 : Installation & Commissioning of ZigBee Readers, Antennas &
Accessories at XXX, location (Onsite).

Project Scope during Phase 1
To provide ZigBee based hardware relating to:
 Automatic Laptop Check In & Check Out (Identification)
 Wireless Device/Laptop Registration
 Wireless Device/ Laptop Entry & Exit Monitoring
 Security Alert System for unauthorized exit of Wireless Device/laptops
TYPICAL REQUIREMENTS


To bring in the process improvements, enhance user experience &
improve security & administration staff productivity


Phase 1 : Activities
User requirement specification development
 Comprehensive Site Study & Site Engineering
 ZigBee Tag Design & Development
 ZigBee System (ZigBee Hardware, Accessories & Services)
  installation, commissioning & testing

Phase 2 : Activities
 Software application related work
 Integration to the customer’s existing software
 Any testing with the customer’s existing software
STAKEHOLDERS
                 Financial Controllers




Administrators                           Users




Gate Security                            IT/HR Heads




                 Lab Managers
PRODUCT FEATURES

 KATS
  KATS
Consol
 Consol
   e
     e                                                         Detector near
                                                                Entry/Exit
                              Detector in Facility




Administration
  Terminal


                                                           Exit/Entry Points




                 Laptop Tag                 Employee Tag
WORK FLOW
                 Labs
                                                 Employee tag is paired with the
                                                 issued laptop

                                                 Admin can remotely monitor if the
                                                 laptop is with the employee

                                                 Incase of misuse the gate security
                                                 will be alerted. Security/Admin can
                                Administration
                                                 then remotely disable the laptop
HR

                 Entry/Exit
                                                 IT/Asset Manager can accurately
                   points
                                                 keep tag of issued laptops &
                                                 prevent misuse
                              IT/Asset
      Support
                              Manager
     Functions
PRODUCT FEATURES
             with
                                                 Device Authentication
                 Labs

                                                 Location Intelligence

                                                 Application Run Control

                                                 Memory Clean

                                                 Encryption
                                Administration
                                                 Device Firewall
HR

                 Entry/Exit                      Over the air control
                   points

                                                 Easy to Deploy
                              IT/Asset
      Support                                    SMS alert & integrity management
                              Manager
     Functions

                                                 Device Quarantine

                                                 Real Time logging
WHY IMPRE ?


As devices converge & service providers test new technologies such as
Worldwide Interoperability for Microwave Access (WiMAX) &   Long Term
Evolution (LTE)

Cost of devices are bound to tumble & with the open source penetrating mobile
devices, adoption of Mobility solutions by enterprises will increase multifold.

This raises key issues on security of enterprise assets.

Security requirements is directly proportional to the transaction’s value, sensitivity
& volume.
PRODUCT FEATURES

impre provides mobile security for wireless
devices, it may be smart phone or a mobile
device for your business needs

impre protects our device from web based
attacks, & ensure that a lost or stolen device
&    data residing on the device, is not
compromised.

The objective is to sit at the critical junction
between wireless communications, secure
networking, &      enterprise impre aims at
protecting data at multiple levels
CONTROL CENTRE


                 impre Control Center provides organizations with a
Control Center
                 complete set of tools to centrally deploy, manage,
                 & support a mobile field force over wired or
                 wireless networks.

                 impre Control Center allows administrators to
                 automatically discover & configure new devices

                 Remotely deploy software/data to mobile devices,
                 manage & control devices remotely, monitor the
                 status of deployment operations
DEVICE INFORMATION


              Device information module helps to fetch Device
   Device
              specific information
Information


              Information like such as Device Location, Device
              information (Device –id, OEM –Id, Processor
              Architecture) & Activity log information


              It also provides the functionality for configuring the
              Device Wipe Threshold for a particular device.
USER INFORMATION


              User     information      module     provides     the
    User
              functionality of controlling the device features and
Information
              the applications running on the device.

              It also helps us to enforce policy to a particular
              user.
ADVANCED FEATURES

Remotely configure & disable the laptop/wireless device

Provide accurate information on status & location of the
laptop/employee

Can be configured for any type of Assets

Easy to install, manage & support

Can control misuse & improve productivity
Kshema Track- ZigBee Based
  Asset Tracking Solution           http://www.youtube.com/watch?v=ssp4cJyfOEU




Track Assets Accurately, Anywhere

Más contenido relacionado

La actualidad más candente

Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkawayrichardebowers
 
Introducing the Fujitsu fi-5950 Production Document Scanner
Introducing the Fujitsu fi-5950 Production Document ScannerIntroducing the Fujitsu fi-5950 Production Document Scanner
Introducing the Fujitsu fi-5950 Production Document ScannerKevin Neal
 
Introducing the ScanSnap N1800 network scanner
Introducing the ScanSnap N1800 network scannerIntroducing the ScanSnap N1800 network scanner
Introducing the ScanSnap N1800 network scannerKevin Neal
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification ManagementViper Web Solutions
 
Maximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementMaximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementSupply Chain Services
 
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...Charlie78horse
 
Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Digital Bond
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentationMaxpromotion
 
Smart workspaces-Faststream Technologies
Smart workspaces-Faststream TechnologiesSmart workspaces-Faststream Technologies
Smart workspaces-Faststream TechnologiesSudipta Maity
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix ComSec
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security CameraMatrix ComSec
 
Fisher FIELDVUE Instrument ValveLink Mobile Update
Fisher FIELDVUE Instrument ValveLink Mobile UpdateFisher FIELDVUE Instrument ValveLink Mobile Update
Fisher FIELDVUE Instrument ValveLink Mobile UpdateEmerson Exchange
 
Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Massimiliano Pellegrini
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Digital Bond
 

La actualidad más candente (19)

Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 
Introducing the Fujitsu fi-5950 Production Document Scanner
Introducing the Fujitsu fi-5950 Production Document ScannerIntroducing the Fujitsu fi-5950 Production Document Scanner
Introducing the Fujitsu fi-5950 Production Document Scanner
 
Introducing the ScanSnap N1800 network scanner
Introducing the ScanSnap N1800 network scannerIntroducing the ScanSnap N1800 network scanner
Introducing the ScanSnap N1800 network scanner
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
 
Maximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementMaximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_management
 
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
 
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
 
Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentation
 
Smart workspaces-Faststream Technologies
Smart workspaces-Faststream TechnologiesSmart workspaces-Faststream Technologies
Smart workspaces-Faststream Technologies
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
Aruba ClearPass_Onboard
Aruba ClearPass_OnboardAruba ClearPass_Onboard
Aruba ClearPass_Onboard
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
SMILE Commercial Flyer
SMILE Commercial FlyerSMILE Commercial Flyer
SMILE Commercial Flyer
 
Fisher FIELDVUE Instrument ValveLink Mobile Update
Fisher FIELDVUE Instrument ValveLink Mobile UpdateFisher FIELDVUE Instrument ValveLink Mobile Update
Fisher FIELDVUE Instrument ValveLink Mobile Update
 
Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition)
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)
 

Similar a K Two Asset Tracking Solutions Impre 090225

Onrego Ltd Company Presentation
Onrego Ltd Company PresentationOnrego Ltd Company Presentation
Onrego Ltd Company PresentationJarno Mäki
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
Intel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIntel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIşınsu Akçetin
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field IDField-ID
 
Schematic V-TAS Pro application software
Schematic V-TAS Pro application softwareSchematic V-TAS Pro application software
Schematic V-TAS Pro application softwarei-comply
 
Ajax World West I Phone Summit
Ajax World West I Phone SummitAjax World West I Phone Summit
Ajax World West I Phone Summitrajivmordani
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicIntel IT Center
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General OverviewMichael Starr
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White PaperSybase Türkiye
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheetMobileWorxs
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 

Similar a K Two Asset Tracking Solutions Impre 090225 (20)

Onrego Ltd Company Presentation
Onrego Ltd Company PresentationOnrego Ltd Company Presentation
Onrego Ltd Company Presentation
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Intel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIntel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and Aerospace
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field ID
 
Schematic V-TAS Pro application software
Schematic V-TAS Pro application softwareSchematic V-TAS Pro application software
Schematic V-TAS Pro application software
 
Ajax World West I Phone Summit
Ajax World West I Phone SummitAjax World West I Phone Summit
Ajax World West I Phone Summit
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - Infographic
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
Fingkey
FingkeyFingkey
Fingkey
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheet
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

K Two Asset Tracking Solutions Impre 090225

  • 1. Kshema Track- ZigBee Based Asset Tracking Solution Track Assets Accurately, Anywhere
  • 2. TYPICAL REQUIREMENTS XXXX requires ZigBee Based Laptop Tracking & Access Control System.  It currently has XXX wireless device/Laptops which is required to be tracked.  The access card of each employee needs to be paired with laptop issued to them  To begin with XXX plans to deploy the solution for its single office location in XXX & subsequently spread it across to other offices.
  • 3. TYPICAL REQUIREMENTS Xxxx believes the best approach for ZigBee based Wireless Device/ Laptop tracking & Access Control System can be deployed in two phases Phase 1 : Installation & Commissioning of ZigBee Readers, Antennas & Accessories at XXX, location (Onsite). Project Scope during Phase 1 To provide ZigBee based hardware relating to:  Automatic Laptop Check In & Check Out (Identification)  Wireless Device/Laptop Registration  Wireless Device/ Laptop Entry & Exit Monitoring  Security Alert System for unauthorized exit of Wireless Device/laptops
  • 4. TYPICAL REQUIREMENTS To bring in the process improvements, enhance user experience & improve security & administration staff productivity Phase 1 : Activities User requirement specification development  Comprehensive Site Study & Site Engineering  ZigBee Tag Design & Development  ZigBee System (ZigBee Hardware, Accessories & Services) installation, commissioning & testing Phase 2 : Activities  Software application related work  Integration to the customer’s existing software  Any testing with the customer’s existing software
  • 5. STAKEHOLDERS Financial Controllers Administrators Users Gate Security IT/HR Heads Lab Managers
  • 6. PRODUCT FEATURES KATS KATS Consol Consol e e Detector near Entry/Exit Detector in Facility Administration Terminal Exit/Entry Points Laptop Tag Employee Tag
  • 7. WORK FLOW Labs Employee tag is paired with the issued laptop Admin can remotely monitor if the laptop is with the employee Incase of misuse the gate security will be alerted. Security/Admin can Administration then remotely disable the laptop HR Entry/Exit IT/Asset Manager can accurately points keep tag of issued laptops & prevent misuse IT/Asset Support Manager Functions
  • 8. PRODUCT FEATURES with Device Authentication Labs Location Intelligence Application Run Control Memory Clean Encryption Administration Device Firewall HR Entry/Exit Over the air control points Easy to Deploy IT/Asset Support SMS alert & integrity management Manager Functions Device Quarantine Real Time logging
  • 9. WHY IMPRE ? As devices converge & service providers test new technologies such as Worldwide Interoperability for Microwave Access (WiMAX) & Long Term Evolution (LTE) Cost of devices are bound to tumble & with the open source penetrating mobile devices, adoption of Mobility solutions by enterprises will increase multifold. This raises key issues on security of enterprise assets. Security requirements is directly proportional to the transaction’s value, sensitivity & volume.
  • 10. PRODUCT FEATURES impre provides mobile security for wireless devices, it may be smart phone or a mobile device for your business needs impre protects our device from web based attacks, & ensure that a lost or stolen device & data residing on the device, is not compromised. The objective is to sit at the critical junction between wireless communications, secure networking, & enterprise impre aims at protecting data at multiple levels
  • 11. CONTROL CENTRE impre Control Center provides organizations with a Control Center complete set of tools to centrally deploy, manage, & support a mobile field force over wired or wireless networks. impre Control Center allows administrators to automatically discover & configure new devices Remotely deploy software/data to mobile devices, manage & control devices remotely, monitor the status of deployment operations
  • 12. DEVICE INFORMATION Device information module helps to fetch Device Device specific information Information Information like such as Device Location, Device information (Device –id, OEM –Id, Processor Architecture) & Activity log information It also provides the functionality for configuring the Device Wipe Threshold for a particular device.
  • 13. USER INFORMATION User information module provides the User functionality of controlling the device features and Information the applications running on the device. It also helps us to enforce policy to a particular user.
  • 14. ADVANCED FEATURES Remotely configure & disable the laptop/wireless device Provide accurate information on status & location of the laptop/employee Can be configured for any type of Assets Easy to install, manage & support Can control misuse & improve productivity
  • 15. Kshema Track- ZigBee Based Asset Tracking Solution http://www.youtube.com/watch?v=ssp4cJyfOEU Track Assets Accurately, Anywhere