WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL...

20
WE PROTECT ASSETS EVERYWHERE Sales Presentation IAMS ENTERPRISE September 2019

Transcript of WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL...

Page 1: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

Sales Presentation

IAMS ENTERPRISE

September 2019

Page 2: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

A. Acsys

Page 3: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

ABOUT US

Established in

2012

Positioned in

64 Countries Secured around the world

190,000 premises Effectively reduced

35% workload

Our Presence & Reach

3

Page 4: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

OUR CLIENT’S EXPERIENCE WITH ACSYS

Enhanced Security

Safer access to assets with Acsys lockswith CGS Plus encrypted technology, an

advanced redundant feature

Visibility Control

Improved control and visibility of each job

Simplified Maintenance

Sustainable and Secured locks with our Bluetooth locks and keys

only need battery replacement or recharge after 1-2 years.

Reduced Workload

Effective reduction in the downtime of O&M staff with iAMS

Ease of Operation

Simple centralized update access to locks and keys with Code Generation System (CGS)

4

Page 5: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

IN AGE OF DIGITAL TRANSFORMATION

A comprehensive 24/7 pro-active security of critical assets can help save thousand of $ annually

Internal & external theft, vandalism & sabotage of distributed assets results in thousands of $ losses to business

Regular monitoring of KPI (average number of interventions per technician, time to repair, time in the vehicle, etc.) dramatically and quickly enhances productivity

Optimize OPEX by better sizing of field force team & Improved KPI

high security of existing and new towers in with limited CAPEX and maximum SECURITY

With 5G & the need to for tower densification Tower companies will need

Telecom Tower companies need fool-proof security for their remote and critically distributed equipment's/ assets to drive…

5

Page 6: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

ACSYS HAVE DIGITIZED REMOTE LOCATIONS IN KEY INDUSTRIES LIKE

Banking Logistics Prisons

Telecom Utilities Oil & Gas6

Page 7: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

IAMS ENTERPRISE – MANAGE YOUR SECURITY WITH EASE

As business grows, they need physical security solution which is scalable, flexible & east to use

Remote sites require varying degrees of control. With ongoing changes to access rights, personnel, additional locations and security needs, tower companies need a security locking system that gives flexibility to make changes as per needs

Collaborative & Modular SoftwareReal time based, with Vendor and tenantportalSecure communication layer with multipletime zone between solution componentIntegrated with HTTP SMS provider

iAMS EnterpriseAllows you to communicate with yourentire locking system through micro-technology that is embedded into locksand keys. With it, you can convenientlymanage access rights and more, directlyfrom your computer or using the system’sProgramming Devices

iAMSENTERPRISE

Web-BasedAs a web-based solution, you don’t needto install any additional software. Yousimply sign in to the Web Managerwebsite, authenticate and you’ll be readyto control your entire security systemfrom anywhere you are.

Easy, Fast & ScalableSimple user interface and easy to trainand deploy.On-premise deployment and integrationwith various other systems like ERP orinventory management can be done inquick time.New sites can be added quickly alongwith user rights on the go.

7

Page 8: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

IAMS IS THE CENTER TO CRITICAL ASSET PROTECTION

Productivity – All field technician can have a keyed or Keyless (Bluetooth/ mobile) access of their own and thus reducing the time taken to visit site to and fro for keys

Flexibility – Option to give access rights for defined period or for a specific job and held technician or vendors the flexibility to work within the sites on the go

Efficiency – Define SLA’s & improve time taken to complete a task based on historical data, also avoid penalties due to various regulations as set up by regulatory authority in specific geo

Security – Reduce theft and vandalism or sabotage of equipment's to reduces annual losses to such incidents & protect capital expenditure

Health & Safety – Improve hazard prevention and control with identification and classification of key assets as per OSHA & FCC

8

Page 9: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

IAMS SOFTWARE MANAGES, MONITORS & CONTROLS TO GIVE YOUR CUSTOMERS CONTROL OF THEIR CRITICAL ASSETS

A software and hardware platform that wirelessly manages, verifies and controls Who goes Where, When, Why, for How Long

Access logs can be downloaded to give a complete overview of the following

9

Page 10: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

1 2 3 4

TOWER COMPANIES CAN GAIN COMPETITIVE ADVANTAGE WITH IAMSACROSS VALUE CHAIN

0. Acquire Land1. Construct

Site Infrastructure

2. Lease Site to Mobile Operators

3. Manage Site 4. Support Services

Access logs consolidated with work orders determines the hours billed by the O&M & can be compared and vetted against the information generated by iAMS Resulting in no overpayment to the O&M.

HR : Consolidated data determines the average time to carry out a maintenance. This information can plan the resources needed to carry out the maintenances job.

Protection of Capital Investmentfor passive infrastructure/equipment against internal/external theft during site building/upgrading Perimeter security: site fence, outdoor equipment fence, shelter, Uninterrupted power: transformers, genset, fuel tank, fuel, batteries , connection to the grid, solar panels, wind mills Network: tower, fiber

Effectively Manage SitesSLA & Efficiency: The field engineer can go to the site without collecting the key from the regional HQ.

Security: Physical traceability of where/when/how/why access requested for a site is recorded and consolidated with the work orders which helps to eliminate internal theft.

Generating Increased Revenueby providing access management services to the tenant’s active equipment (BTS, antennas…) by reducing their operational expenditures and protecting their capital investment.

10

Page 11: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

BASED ON OUR STUDY ACSYS SOLUTION CAN RESULT IN HIGHER OPERATIONAL EFFICIENCY, REDUCE OPERATIONAL EXPENDITURE

With thousands of distributed sites. And more than thousands technician, vendors and maintenance support personnel, a digitally secure solution can save hundred of dollars ($) annually to enterprises through secure management system equipped with user auditing and data analysis

11

No of distributed sites or critical assets# 5000 (A)

Maintenance per year # 5 (B)

Travelling time taken per maintenance (key pick and drop from center)

# 3 hrs (C)

Fuel Cost (per km) maintenance visit# 0.06 USD (D)

Man hour rate # $ 8 per hour (F)

Travelling distance Saved (kms)20 (E)

Estimated Time SavedA x C X B

750000 Hours saved

Estimated Man-power cost saving

A x D x F x B

$ 600,000 USDManpower savings

Estimated Fuel Savings

A x B x D x E

$30000 USDFuel Cost Savings

Total Saving Excluding Field services cost

$630,000 USDBased on a sample study of 5000 sites in Asia and Africa

Page 12: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

WE HAVE DIGITIZED REMOTE SITES WITH ACSYS TELECOM AT SOME OF THE MARQUEE ENTERPRISES

12

Page 13: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

MIGRATE FROM ACSYS TELECOM TO IAMS ENTERPRISE FOR…

• Secure access policy profiles, with a flexible set of operationalworkflows combining the power of CGS+ a unique, inimitable,single use, automatic access authorization.

• Real time visibility and control on who has access, to what, whenand for how long

• Modular platform that enables customers to choose functionalitiesto match their business requirements

• Connectivity and interoperability in mind, it enables you to fullyharness the power of all your security, monitoring andmanagement solutions

• iAMS enables you with various levels of access control, dependingon business need

• Manage access rights & key programming via iAMS app

• Manage access rights via web-based software

• Bluetooth (keyless) technology for businesses with remote sitesand workforces, that want to manage access rights via web-basedsoftware or mobile app

13

Page 14: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

14

SOFTWARE INTEGRATED HARDWARE FOR COMPLETE SOLUTIONAC

CESS

MED

IAPR

OG

RAM

MER

SAC

CESS

PO

INTS

AKEYSTANDARD

AKEYKEYPAD

AKEYSCGS

AKEYBLUETOOTH

CYLINDERS BOXERPADLOCK

PL2PADLOCK

PL5PADLOCK HASPLOCK HASP VL1 BLE PL5 BLE

USB / IP PROGRAMMER

3GPROGRAMMER

KEYED KEYLESS

Page 15: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

C. Solution Deep Dive

Page 16: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

A TOWER CO. CAN SOLVE KEY ISSUES WITH AN INTEGRATED ACCESS MANAGEMENT SOLUTION

16

ACCESS CONTROL AT SITESINDUSTRY ISSUE With iAMS You Can…

Access based on trouble ticket(s) within a work orderiAMS Enterprise has two solutions to implment a site access process based on trouble tickets whithin work orders.iAMS Field Operations Module & iAMS API Connect - Workforce Management Integration

Cant controls who, when, where and how assets are accessed Access rights defined – Fixed, Temp, Permanent, Weekly etc. along with Vitual access rights for remote site access

Need to collect access logs/requests, GPS data and visual data for each activity defined within the trouble ticket

Access logs are recorded on the access media and access points. They both contain 1000 access logs where the access los gathered and stored as First-In-First-Out. GPS data is collected through the site requests for entry and exit by using the Smart Access App.

No analyzes of activities and defines an efficiency score for the activities within a trouble ticket against a reference value

iAMS provides an interface where the efficiency score of the access media user can be recorded manually. Furthermore an efficiency scroe is recorded baseds on other criterias that are related to Time-To-Site and Time-On-Site compared to a reference value.

There is no zone based monitoring and notification of suspicious activities none-conforming to pre-defined process activities in a trouble ticket

With iAMS access logs are recorded wuth the date/time and the result of the attempted access. The result identifies whether access is granted or denied and contain the reason for denial. The result combined with the toruble ticket detects and notifies zone based activities on the site.

There are no alerts and notifications due to external attacksiAMS records the access logs and consolidates with the trouble ticket and specific maintenance of assets. The frequency of the maintenance determines the failure trends of the asset and helps to plan the preventive maintenance and increase the up time of the site

Page 17: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

A TOWER CO. CAN SOLVE KEY ISSUES WITH INTEGRATED ACCESS MANAGEMENT SOLUTION

17

ACCESS FOR INSTALLATION NEW EQUIPMENTINDUSTRY ISSUE With iAMS You Can…Need to prevents illegal installation of equipment at the site Access points prevents the field engineer to open the shelter or to cliimbe on the antenna.

Need to secures the site and assets during site building Access points can be used and asssigned to the new location as a temporary driver.

Require a permanent lock-up once the site is built and commissioned Access points have tested application to work with Alain's lock

To monitors that the assets are installed correctly at the assigned location

The access logs in conjunction with integrable devices for physical monitoring, iAMS can determine if the assets are installed correctly by using virtual geo-fencing gain access to the asset.

ACCESS FOR SERVICINGSecure lock swapping during asset and equipment replacement Access points can be swapped during installation and replacement of equipment at the site.

All tools and equipment relevant to the maintenance are picked up from the warehouse

The Smart Access App helps to track all pre and post activities of a site access. The APP records the GPS location of where and when the equipment was piced up or returned to the warehouse.

Site services are back online within the SLA according to the contract between the site owner and the tenant

Access logs consolidated with the request logs determines the time to site and time to maintain the asset. These two data help to determine whether or not the SLA to bring the site back online is respective as a prove o their tenants.

Closest and qualified user is reaches to the site to reducing the Time-To-Site

iAMS operation optimization module allows the field engineer to login at the start of the work shift through the sartaccess app. This module tracks all the field engineers during the work shifts and assign the trouble ticket to the field engineer closest to the site with the right qualification and certifications.

Page 18: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

IAMS ADD-ON MODULES

18

Page 19: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

IAMS ENTERPRISE - API CONNECT

It provides a low cost and fast-to-market architecture for adding hardware and software connection for the following types of integration; - RMS- Sensors- CCTV- Access Control- Workforce Management

19

Connection API – Layer 3Contains the interface linking the different types of communication protocols to the Open protocols, IOT and proprietary protocols may be used.

Business API – Layer 2Contains the business logic independent from the hardware and software for managing the different types of integration.

Enterprise – Layer 1Contains iAMS Core and Modules independent from the rest of the layers.

Page 20: WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL TRANSFORMATION A comprehensive 24/7 pro-active security of critical assets can help save

WE PROTECT ASSETS EVERYWHERE

THANK YOU