WE PROTECT ASSETS EVERYWHERE - TowerXchange WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL...

download WE PROTECT ASSETS EVERYWHERE - TowerXchange WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION

of 20

  • date post

    16-Jun-2020
  • Category

    Documents

  • view

    1
  • download

    0

Embed Size (px)

Transcript of WE PROTECT ASSETS EVERYWHERE - TowerXchange WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL...

  • WE PROTECT ASSETS EVERYWHERE

    Sales Presentation

    IAMS ENTERPRISE

    September 2019

  • WE PROTECT ASSETS EVERYWHERE

    A. Acsys

  • WE PROTECT ASSETS EVERYWHERE

    ABOUT US

    Established in

    2012

    Positioned in

    64 Countries Secured around the world 190,000 premises Effectively reduced

    35% workload

    Our Presence & Reach

    3

  • WE PROTECT ASSETS EVERYWHERE

    OUR CLIENT’S EXPERIENCE WITH ACSYS

    Enhanced Security

    Safer access to assets with Acsys locks with CGS Plus encrypted technology, an

    advanced redundant feature

    Visibility Control

    Improved control and visibility of each job

    Simplified Maintenance

    Sustainable and Secured locks with our Bluetooth locks and keys

    only need battery replacement or recharge after 1-2 years.

    Reduced Workload

    Effective reduction in the downtime of O&M staff with iAMS

    Ease of Operation

    Simple centralized update access to locks and keys with Code Generation System (CGS)

    4

  • WE PROTECT ASSETS EVERYWHERE

    IN AGE OF DIGITAL TRANSFORMATION

    A comprehensive 24/7 pro-active security of critical assets can help save thousand of $ annually

    Internal & external theft, vandalism & sabotage of distributed assets results in thousands of $ losses to business

    Regular monitoring of KPI (average number of interventions per technician, time to repair, time in the vehicle, etc.) dramatically and quickly enhances productivity

    Optimize OPEX by better sizing of field force team & Improved KPI

    high security of existing and new towers in with limited CAPEX and maximum SECURITY

    With 5G & the need to for tower densification Tower companies will need

    Telecom Tower companies need fool-proof security for their remote and critically distributed equipment's/ assets to drive…

    5

  • WE PROTECT ASSETS EVERYWHERE

    ACSYS HAVE DIGITIZED REMOTE LOCATIONS IN KEY INDUSTRIES LIKE

    Banking Logistics Prisons

    Telecom Utilities Oil & Gas 6

  • WE PROTECT ASSETS EVERYWHERE

    IAMS ENTERPRISE – MANAGE YOUR SECURITY WITH EASE

    As business grows, they need physical security solution which is scalable, flexible & east to use

    Remote sites require varying degrees of control. With ongoing changes to access rights, personnel, additional locations and security needs, tower companies need a security locking system that gives flexibility to make changes as per needs

    Collaborative & Modular Software Real time based, with Vendor and tenant portal Secure communication layer with multiple time zone between solution component Integrated with HTTP SMS provider

    iAMS Enterprise Allows you to communicate with your entire locking system through micro- technology that is embedded into locks and keys. With it, you can conveniently manage access rights and more, directly from your computer or using the system’s Programming Devices

    iAMS ENTERPRISE

    Web-Based As a web-based solution, you don’t need to install any additional software. You simply sign in to the Web Manager website, authenticate and you’ll be ready to control your entire security system from anywhere you are.

    Easy, Fast & Scalable Simple user interface and easy to train and deploy. On-premise deployment and integration with various other systems like ERP or inventory management can be done in quick time. New sites can be added quickly along with user rights on the go.

    7

  • WE PROTECT ASSETS EVERYWHERE

    IAMS IS THE CENTER TO CRITICAL ASSET PROTECTION

    Productivity – All field technician can have a keyed or Keyless (Bluetooth/ mobile) access of their own and thus reducing the time taken to visit site to and fro for keys

    Flexibility – Option to give access rights for defined period or for a specific job and held technician or vendors the flexibility to work within the sites on the go

    Efficiency – Define SLA’s & improve time taken to complete a task based on historical data, also avoid penalties due to various regulations as set up by regulatory authority in specific geo

    Security – Reduce theft and vandalism or sabotage of equipment's to reduces annual losses to such incidents & protect capital expenditure

    Health & Safety – Improve hazard prevention and control with identification and classification of key assets as per OSHA & FCC

    8

  • WE PROTECT ASSETS EVERYWHERE

    IAMS SOFTWARE MANAGES, MONITORS & CONTROLS TO GIVE YOUR CUSTOMERS CONTROL OF THEIR CRITICAL ASSETS

    A software and hardware platform that wirelessly manages, verifies and controls Who goes Where, When, Why, for How Long

    Access logs can be downloaded to give a complete overview of the following

    9

  • WE PROTECT ASSETS EVERYWHERE

    1 2 3 4

    TOWER COMPANIES CAN GAIN COMPETITIVE ADVANTAGE WITH IAMS ACROSS VALUE CHAIN

    0. Acquire Land 1. Construct

    Site Infrastructure

    2. Lease Site to Mobile Operators

    3. Manage Site 4. Support Services

    Access logs consolidated with work orders determines the hours billed by the O&M & can be compared and vetted against the information generated by iAMS Resulting in no overpayment to the O&M.

    HR : Consolidated data determines the average time to carry out a maintenance. This information can plan the resources needed to carry out the maintenances job.

    Protection of Capital Investment for passive infrastructure/equipment against internal/external theft during site building/upgrading Perimeter security: site fence, outdoor equipment fence, shelter, Uninterrupted power: transformers, genset, fuel tank, fuel, batteries , connection to the grid, solar panels, wind mills Network: tower, fiber

    Effectively Manage Sites SLA & Efficiency: The field engineer can go to the site without collecting the key from the regional HQ.

    Security: Physical traceability of where/when/how/why access requested for a site is recorded and consolidated with the work orders which helps to eliminate internal theft.

    Generating Increased Revenue by providing access management services to the tenant’s active equipment (BTS, antennas…) by reducing their operational expenditures and protecting their capital investment.

    10

  • WE PROTECT ASSETS EVERYWHERE

    BASED ON OUR STUDY ACSYS SOLUTION CAN RESULT IN HIGHER OPERATIONAL EFFICIENCY, REDUCE OPERATIONAL EXPENDITURE

    With thousands of distributed sites. And more than thousands technician, vendors and maintenance support personnel, a digitally secure solution can save hundred of dollars ($) annually to enterprises through secure management system equipped with user auditing and data analysis

    11

    No of distributed sites or critical assets # 5000 (A)

    Maintenance per year # 5 (B)

    Travelling time taken per maintenance (key pick and drop from center)

    # 3 hrs (C)

    Fuel Cost (per km) maintenance visit # 0.06 USD (D)

    Man hour rate # $ 8 per hour (F)

    Travelling distance Saved (kms) 20 (E)

    Estimated Time Saved A x C X B

    750000 Hours saved

    Estimated Man-power cost saving

    A x D x F x B

    $ 600,000 USD Manpower savings

    Estimated Fuel Savings

    A x B x D x E

    $30000 USD Fuel Cost Savings

    Total Saving Excluding Field services cost

    $630,000 USD Based on a sample study of 5000 sites in Asia and Africa

  • WE PROTECT ASSETS EVERYWHERE

    WE HAVE DIGITIZED REMOTE SITES WITH ACSYS TELECOM AT SOME OF THE MARQUEE ENTERPRISES

    12

  • WE PROTECT ASSETS EVERYWHERE

    MIGRATE FROM ACSYS TELECOM TO IAMS ENTERPRISE FOR…

    • Secure access policy profiles, with a flexible set of operational workflows combining the power of CGS+ a unique, inimitable, single use, automatic access authorization.

    • Real time visibility and control on who has access, to what, when and for how long

    • Modular platform that enables customers to choose functionalities to match their business requirements

    • Connectivity and interoperability in mind, it enables you to fully harness the power of all your security, monitoring and management solutions

    • iAMS enables you with various levels of access control, depending on business need

    • Manage access rights & key programming via iAMS app

    • Manage access rights via web-based software

    • Bluetooth (keyless) technology for businesses with remote sites and workforces, that want to manage access rights via web-based software or mobile app

    13

  • WE PROTECT ASSETS EVERYWHERE

    14

    SOFTWARE INTEGRATED HARDWARE FOR COMPLETE SOLUTION AC

    CE SS

    M ED

    IA PR

    O G

    RA M

    M ER

    S AC

    CE SS

    P O

    IN TS

    AKEY STANDARD

    AKEY KEYPAD

    AKEY SCGS

    AKEY BLUETOOTH

    CYLINDERS BOXERPADLOCK PL2

    PADLOCK PL5

    PADLOCK HASPLOCK HASP VL1 BLE PL5 BLE

    USB / IP PROGRAMMER

    3G PROGRAMMER

    KEYED KEYLESS

  • WE PROTECT ASSETS EVERYWHERE

    C. Solution Deep Dive

  • WE PROTECT ASSETS EVERYWHERE

    A TOWER CO. CAN SOLVE KEY ISSUES WITH AN INTEGRATED ACCESS MANAGEMENT SOLUTION