Traka intelligent, keyless, electronic lockers
Traka intelligent, keyless, electronic lockers

Managing assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case.  At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability;  wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment.  Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist tools

Add to Compare
Traka Touch key cabinet with standalone ‘plug & play’ system
Traka Touch key cabinet with standalone ‘plug & play’ system

Traka Touch is the newest addition to our range of integrated Key Management solutions, and it’s probably the most exciting development we’ve made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today. Put simply, when it comes to key management Traka Touch makes your life easier. It gives you an intelligent ‘out of the box’ Key Management solution which operates entirely independently of your IT systems. Everything is managed via the touch screen on the front panel, from the initial administrative set up of users and keys, right through to the day to day user access.  What is Traka Touch? Traka Touch is a sophisticated Key Management system which has the intelligence built in. And because it’s a standalone solution, there’s no need for a connection to your IT network and no server requirement to manage the database. Everything you need is embedded in the unit, so all you have to do is plug it in. Full audit capability of all key transactions is retained within the system using internal solid state memory and memory card. Customer comment: “With Traka Touch we have been able to quickly and easily improve our Key Management at store level. We are planning to install a system at every one of our stores throughout the UK. It’s a brilliantly simple but effective solution which makes efficient key management incredibly straightforward for both staff and managers. What’s more, because it’s stand alone, it is easy to deploy locally without having to involve staff from the corporate IT team or head office” Traka Touch at a glance Traka Touch makes keys readily available, but to authorised users only. Gives you control over who can use your keys, with access levels designated for each particular user. Each user must identify themselves at the cabinet using either a PIN code or a magnetic swipe card, or by using biometric fingerprint recognition. To remove any ambiguity, LEDs indicate which keys a user can and can’t take when they access the cabinet. Searching for an ‘out of system’ key is easy and Traka will also indicate who took it and when. Reporting functions enable transaction reports to be displayed on the screen – for example so that you can quickly see who took a key and when it was returned. Great if you need to know who accessed the store room out of hours last Friday, or who was driving the white Transit two weeks ago! For printed reports, simply plug a USB memory stick into the unit and reports can be automatically exported ready for use on a PC. With its touch screen technology and embedded processing, Traka Touch gives you all the Key Management capability that you require, but without the need for any complex integration with your IT systems. Traka Touch is the newest addition to its range of integrated Key Management solutions, and it’s probably the most exciting development Traka made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today.

Add to Compare
Combined with non-host dependant, fully distributed processing controllers, WinDSX provides total access control
Combined with non-host dependant, fully distributed processing controllers, WinDSX provides total access control

WinDSX is a powerful access control and system monitoring application that harnesses the power of the Windows XP, Vista, and 7 Professional™ operating systems. WinDSX combines point monitoring and access control with Photo ID Badging, Time and Attendance, Alarm Graphics, DVR/NVR Integration, Elevator Control, Alarm Email/Text Message Notification, Threat Level Management, HazMat / Emergency Lockdown, and FIPS/TWIC card compatibility.WinDSX can support your access control needs from a single PC or multi-user Local Area Network to an enterprise solution with SQL Server as the database engine. The system utilizes TCP/IP network communications to provide user interaction and real time monitoring to the workstation PC’s located anywhere on the LAN or WAN. Password protection allows for operator specific capabilities at each workstation.There are two Editions of Software. WinDSX comes standard with a Microsoft Access database engine. WinDSX SQL is designed to work with Microsoft SQL Server as the database engine. Both editions of WinDSX have similar features and capabilities. Microsoft SQL Server is user supplied.WinDSX implements Point and Click operation with hierarchical tree views and pop up menus for ease of use. I/O monitoring and control is achieved through animated icons that depict the real time status of each input or output. I/O points can also be assigned to an Override Group to allow for multiple inputs and outputs to be monitored and controlled from a single icon.Scheduled Overrides can be assigned to individual Inputs and Outputs as well as Override Groups. These schedules allow operators to quickly assign time and date sensitive instructions determining the open/secure status of outputs and the armed state of inputs.

Add to Compare
ASSA ABLOY Aperio®: Increase your data centre security with cost-effective access
ASSA ABLOY Aperio®: Increase your data centre security with cost-effective access

Who is accessing your company’s most sensitive data? Where? When? And if someone without authorisation did, how would you know? Some of the world’s best-known companies have succumbed to data breaches that proved expensive in terms of both cost and reputation. The focus is usually on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of our information lives in the cloud. However, there is another way that company data can fall into unauthorised hands: someone could walk right up to your server and access it physically, with equally disruptive results. Shared data centres The risks increase when companies use shared data centres, or ”colocation”, which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All our “big data” has to go somewhere and shared data centres provide a cost-effective solution, even for information of the most sensitive kind. Of course, data centres have stringent security procedures, but is it wise to fully entrust your valuable data -sensitive customer information- to a third party? Can you be certain that a third party’s security procedures meet your legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations? Further, do you even know who you share server space with? It could be a direct competitor. Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorised traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen. Data centre security management For these reasons, data centre security management needs to be high on any company’s agenda, as high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?” IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centres—cost a lot less than that. A high-security mechanical lock might seem like a solution, but a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail- who had access to your servers, when, for how long- will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if your server rack has an old-fashioned mechanical lock. Server cabinet locks are the last line of defence against a physical breach, yet mechanical keys are still a common sight in data centres. This is becoming increasingly unsatisfactory, especially when that server could hold the key to your business success. KS100 Server Cabinet Lock One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire. Installation is quick and easy, with power via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly. With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorised and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centres. Do you know exactly who last had access to your servers, and when? Install Aperio® and next time your data manager asks, the answer is yes. Key facts The data centre colocation market could be worth $37 billion by 2017 Companies have a legal requirement to protect sensitive customer data, under the European Data Protection Directive and other regulations Investigating any breach properly requires detailed audit trails, which mechanical keys cannot provide An Aperio® KS100 Server Cabinet Lock can integrate with an installed access control system, boosting security wirelessly and adding full audit trail capabilities to server space, even in shared data centres For more on how Aperio® can secure a data centre, see www.assaabloy.co.uk/securedata.

Add to Compare