SlideShare uma empresa Scribd logo
1 de 15
Kshema Track- ZigBee Based Asset Tracking Solution




Track Assets Accurately, Anywhere
TYPICAL REQUIREMENTS



XXXX requires ZigBee Based Laptop Tracking & Access Control System.


 It currently has XXX wireless device/Laptops which is required to be
  tracked.
 The access card of each employee needs to be paired with laptop
  issued to them

 To begin with XXX plans to deploy the solution for its single office
  location in XXX & subsequently spread it across to other offices.
TYPICAL REQUIREMENTS



Xxxx believes the best approach for ZigBee based Wireless Device/
Laptop tracking & Access Control System can be deployed in two phases

Phase 1 : Installation & Commissioning of ZigBee Readers, Antennas &
Accessories at XXX, location (Onsite).

Project Scope during Phase 1
To provide ZigBee based hardware relating to:
 Automatic Laptop Check In & Check Out (Identification)
 Wireless Device/Laptop Registration
 Wireless Device/ Laptop Entry & Exit Monitoring
 Security Alert System for unauthorized exit of Wireless Device/laptops
TYPICAL REQUIREMENTS


To bring in the process improvements, enhance user experience &
improve security & administration staff productivity


Phase 1 : Activities
User requirement specification development
 Comprehensive Site Study & Site Engineering
 ZigBee Tag Design & Development
 ZigBee System (ZigBee Hardware, Accessories & Services)
  installation, commissioning & testing

Phase 2 : Activities
 Software application related work
 Integration to the customer’s existing software
 Any testing with the customer’s existing software
STAKEHOLDERS
                 Financial Controllers




Administrators                           Users




Gate Security                            IT/HR Heads




                 Lab Managers
PRODUCT FEATURES

 KATS
  KATS
Consol
 Consol
   e
     e                                                         Detector near
                                                                Entry/Exit
                              Detector in Facility




Administration
  Terminal


                                                           Exit/Entry Points




                 Laptop Tag                 Employee Tag
WORK FLOW
                 Labs
                                                 Employee tag is paired with the
                                                 issued laptop

                                                 Admin can remotely monitor if the
                                                 laptop is with the employee

                                                 Incase of misuse the gate security
                                                 will be alerted. Security/Admin can
                                Administration
                                                 then remotely disable the laptop
HR

                 Entry/Exit
                                                 IT/Asset Manager can accurately
                   points
                                                 keep tag of issued laptops &
                                                 prevent misuse
                              IT/Asset
      Support
                              Manager
     Functions
PRODUCT FEATURES
             with
                                                 Device Authentication
                 Labs

                                                 Location Intelligence

                                                 Application Run Control

                                                 Memory Clean

                                                 Encryption
                                Administration
                                                 Device Firewall
HR

                 Entry/Exit                      Over the air control
                   points

                                                 Easy to Deploy
                              IT/Asset
      Support                                    SMS alert & integrity management
                              Manager
     Functions

                                                 Device Quarantine

                                                 Real Time logging
WHY IMPRE ?


As devices converge & service providers test new technologies such as
Worldwide Interoperability for Microwave Access (WiMAX) &   Long Term
Evolution (LTE)

Cost of devices are bound to tumble & with the open source penetrating mobile
devices, adoption of Mobility solutions by enterprises will increase multifold.

This raises key issues on security of enterprise assets.

Security requirements is directly proportional to the transaction’s value, sensitivity
& volume.
PRODUCT FEATURES

impre provides mobile security for wireless
devices, it may be smart phone or a mobile
device for your business needs

impre protects our device from web based
attacks, & ensure that a lost or stolen device
&    data residing on the device, is not
compromised.

The objective is to sit at the critical junction
between wireless communications, secure
networking, &      enterprise impre aims at
protecting data at multiple levels
CONTROL CENTRE


                 impre Control Center provides organizations with a
Control Center
                 complete set of tools to centrally deploy, manage,
                 & support a mobile field force over wired or
                 wireless networks.

                 impre Control Center allows administrators to
                 automatically discover & configure new devices

                 Remotely deploy software/data to mobile devices,
                 manage & control devices remotely, monitor the
                 status of deployment operations
DEVICE INFORMATION


              Device information module helps to fetch Device
   Device
              specific information
Information


              Information like such as Device Location, Device
              information (Device –id, OEM –Id, Processor
              Architecture) & Activity log information


              It also provides the functionality for configuring the
              Device Wipe Threshold for a particular device.
USER INFORMATION


              User     information      module     provides     the
    User
              functionality of controlling the device features and
Information
              the applications running on the device.

              It also helps us to enforce policy to a particular
              user.
ADVANCED FEATURES

Remotely configure & disable the laptop/wireless device

Provide accurate information on status & location of the
laptop/employee

Can be configured for any type of Assets

Easy to install, manage & support

Can control misuse & improve productivity
Kshema Track- ZigBee Based
  Asset Tracking Solution           http://www.youtube.com/watch?v=ssp4cJyfOEU




Track Assets Accurately, Anywhere

Mais conteúdo relacionado

Mais procurados

Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
richardebowers
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
Viper Web Solutions
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentation
Maxpromotion
 

Mais procurados (19)

Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 
Introducing the Fujitsu fi-5950 Production Document Scanner
Introducing the Fujitsu fi-5950 Production Document ScannerIntroducing the Fujitsu fi-5950 Production Document Scanner
Introducing the Fujitsu fi-5950 Production Document Scanner
 
Introducing the ScanSnap N1800 network scanner
Introducing the ScanSnap N1800 network scannerIntroducing the ScanSnap N1800 network scanner
Introducing the ScanSnap N1800 network scanner
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
 
Maximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementMaximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_management
 
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
End User Computing & Server Licensing Slides - Nhs Microsoft Licensing Wo...
 
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
 
Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)Industrial Wireless Security (Japanese)
Industrial Wireless Security (Japanese)
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentation
 
Smart workspaces-Faststream Technologies
Smart workspaces-Faststream TechnologiesSmart workspaces-Faststream Technologies
Smart workspaces-Faststream Technologies
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
Aruba ClearPass_Onboard
Aruba ClearPass_OnboardAruba ClearPass_Onboard
Aruba ClearPass_Onboard
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
SMILE Commercial Flyer
SMILE Commercial FlyerSMILE Commercial Flyer
SMILE Commercial Flyer
 
Fisher FIELDVUE Instrument ValveLink Mobile Update
Fisher FIELDVUE Instrument ValveLink Mobile UpdateFisher FIELDVUE Instrument ValveLink Mobile Update
Fisher FIELDVUE Instrument ValveLink Mobile Update
 
Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition)
 
Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)Application Whitelisting and DPI in ICS (English)
Application Whitelisting and DPI in ICS (English)
 

Semelhante a K Two Asset Tracking Solutions Impre 090225

MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
Charles McNeil
 
Intel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIntel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and Aerospace
Işınsu Akçetin
 
Schematic V-TAS Pro application software
Schematic V-TAS Pro application softwareSchematic V-TAS Pro application software
Schematic V-TAS Pro application software
i-comply
 
Ajax World West I Phone Summit
Ajax World West I Phone SummitAjax World West I Phone Summit
Ajax World West I Phone Summit
rajivmordani
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
Advantec Distribution
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
Michael Starr
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
Sybase Türkiye
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
RoutecoMarketing
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
hemanth102030
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
lucpaquin
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
Andris Soroka
 

Semelhante a K Two Asset Tracking Solutions Impre 090225 (20)

Onrego Ltd Company Presentation
Onrego Ltd Company PresentationOnrego Ltd Company Presentation
Onrego Ltd Company Presentation
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Intel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIntel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and Aerospace
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field ID
 
Schematic V-TAS Pro application software
Schematic V-TAS Pro application softwareSchematic V-TAS Pro application software
Schematic V-TAS Pro application software
 
Ajax World West I Phone Summit
Ajax World West I Phone SummitAjax World West I Phone Summit
Ajax World West I Phone Summit
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - Infographic
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
Fingkey
FingkeyFingkey
Fingkey
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheet
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

K Two Asset Tracking Solutions Impre 090225

  • 1. Kshema Track- ZigBee Based Asset Tracking Solution Track Assets Accurately, Anywhere
  • 2. TYPICAL REQUIREMENTS XXXX requires ZigBee Based Laptop Tracking & Access Control System.  It currently has XXX wireless device/Laptops which is required to be tracked.  The access card of each employee needs to be paired with laptop issued to them  To begin with XXX plans to deploy the solution for its single office location in XXX & subsequently spread it across to other offices.
  • 3. TYPICAL REQUIREMENTS Xxxx believes the best approach for ZigBee based Wireless Device/ Laptop tracking & Access Control System can be deployed in two phases Phase 1 : Installation & Commissioning of ZigBee Readers, Antennas & Accessories at XXX, location (Onsite). Project Scope during Phase 1 To provide ZigBee based hardware relating to:  Automatic Laptop Check In & Check Out (Identification)  Wireless Device/Laptop Registration  Wireless Device/ Laptop Entry & Exit Monitoring  Security Alert System for unauthorized exit of Wireless Device/laptops
  • 4. TYPICAL REQUIREMENTS To bring in the process improvements, enhance user experience & improve security & administration staff productivity Phase 1 : Activities User requirement specification development  Comprehensive Site Study & Site Engineering  ZigBee Tag Design & Development  ZigBee System (ZigBee Hardware, Accessories & Services) installation, commissioning & testing Phase 2 : Activities  Software application related work  Integration to the customer’s existing software  Any testing with the customer’s existing software
  • 5. STAKEHOLDERS Financial Controllers Administrators Users Gate Security IT/HR Heads Lab Managers
  • 6. PRODUCT FEATURES KATS KATS Consol Consol e e Detector near Entry/Exit Detector in Facility Administration Terminal Exit/Entry Points Laptop Tag Employee Tag
  • 7. WORK FLOW Labs Employee tag is paired with the issued laptop Admin can remotely monitor if the laptop is with the employee Incase of misuse the gate security will be alerted. Security/Admin can Administration then remotely disable the laptop HR Entry/Exit IT/Asset Manager can accurately points keep tag of issued laptops & prevent misuse IT/Asset Support Manager Functions
  • 8. PRODUCT FEATURES with Device Authentication Labs Location Intelligence Application Run Control Memory Clean Encryption Administration Device Firewall HR Entry/Exit Over the air control points Easy to Deploy IT/Asset Support SMS alert & integrity management Manager Functions Device Quarantine Real Time logging
  • 9. WHY IMPRE ? As devices converge & service providers test new technologies such as Worldwide Interoperability for Microwave Access (WiMAX) & Long Term Evolution (LTE) Cost of devices are bound to tumble & with the open source penetrating mobile devices, adoption of Mobility solutions by enterprises will increase multifold. This raises key issues on security of enterprise assets. Security requirements is directly proportional to the transaction’s value, sensitivity & volume.
  • 10. PRODUCT FEATURES impre provides mobile security for wireless devices, it may be smart phone or a mobile device for your business needs impre protects our device from web based attacks, & ensure that a lost or stolen device & data residing on the device, is not compromised. The objective is to sit at the critical junction between wireless communications, secure networking, & enterprise impre aims at protecting data at multiple levels
  • 11. CONTROL CENTRE impre Control Center provides organizations with a Control Center complete set of tools to centrally deploy, manage, & support a mobile field force over wired or wireless networks. impre Control Center allows administrators to automatically discover & configure new devices Remotely deploy software/data to mobile devices, manage & control devices remotely, monitor the status of deployment operations
  • 12. DEVICE INFORMATION Device information module helps to fetch Device Device specific information Information Information like such as Device Location, Device information (Device –id, OEM –Id, Processor Architecture) & Activity log information It also provides the functionality for configuring the Device Wipe Threshold for a particular device.
  • 13. USER INFORMATION User information module provides the User functionality of controlling the device features and Information the applications running on the device. It also helps us to enforce policy to a particular user.
  • 14. ADVANCED FEATURES Remotely configure & disable the laptop/wireless device Provide accurate information on status & location of the laptop/employee Can be configured for any type of Assets Easy to install, manage & support Can control misuse & improve productivity
  • 15. Kshema Track- ZigBee Based Asset Tracking Solution http://www.youtube.com/watch?v=ssp4cJyfOEU Track Assets Accurately, Anywhere