UEDA Summit 2012: Assets and Costs Everywhere, Grow Investment Here (Moudry & Velasquez)
WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL...
Transcript of WE PROTECT ASSETS EVERYWHERE - TowerXchange · WE PROTECT ASSETS EVERYWHERE IN AGE OF DIGITAL...
WE PROTECT ASSETS EVERYWHERE
Sales Presentation
IAMS ENTERPRISE
September 2019
WE PROTECT ASSETS EVERYWHERE
A. Acsys
WE PROTECT ASSETS EVERYWHERE
ABOUT US
Established in
2012
Positioned in
64 Countries Secured around the world
190,000 premises Effectively reduced
35% workload
Our Presence & Reach
3
WE PROTECT ASSETS EVERYWHERE
OUR CLIENT’S EXPERIENCE WITH ACSYS
Enhanced Security
Safer access to assets with Acsys lockswith CGS Plus encrypted technology, an
advanced redundant feature
Visibility Control
Improved control and visibility of each job
Simplified Maintenance
Sustainable and Secured locks with our Bluetooth locks and keys
only need battery replacement or recharge after 1-2 years.
Reduced Workload
Effective reduction in the downtime of O&M staff with iAMS
Ease of Operation
Simple centralized update access to locks and keys with Code Generation System (CGS)
4
WE PROTECT ASSETS EVERYWHERE
IN AGE OF DIGITAL TRANSFORMATION
A comprehensive 24/7 pro-active security of critical assets can help save thousand of $ annually
Internal & external theft, vandalism & sabotage of distributed assets results in thousands of $ losses to business
Regular monitoring of KPI (average number of interventions per technician, time to repair, time in the vehicle, etc.) dramatically and quickly enhances productivity
Optimize OPEX by better sizing of field force team & Improved KPI
high security of existing and new towers in with limited CAPEX and maximum SECURITY
With 5G & the need to for tower densification Tower companies will need
Telecom Tower companies need fool-proof security for their remote and critically distributed equipment's/ assets to drive…
5
WE PROTECT ASSETS EVERYWHERE
ACSYS HAVE DIGITIZED REMOTE LOCATIONS IN KEY INDUSTRIES LIKE
Banking Logistics Prisons
Telecom Utilities Oil & Gas6
WE PROTECT ASSETS EVERYWHERE
IAMS ENTERPRISE – MANAGE YOUR SECURITY WITH EASE
As business grows, they need physical security solution which is scalable, flexible & east to use
Remote sites require varying degrees of control. With ongoing changes to access rights, personnel, additional locations and security needs, tower companies need a security locking system that gives flexibility to make changes as per needs
Collaborative & Modular SoftwareReal time based, with Vendor and tenantportalSecure communication layer with multipletime zone between solution componentIntegrated with HTTP SMS provider
iAMS EnterpriseAllows you to communicate with yourentire locking system through micro-technology that is embedded into locksand keys. With it, you can convenientlymanage access rights and more, directlyfrom your computer or using the system’sProgramming Devices
iAMSENTERPRISE
Web-BasedAs a web-based solution, you don’t needto install any additional software. Yousimply sign in to the Web Managerwebsite, authenticate and you’ll be readyto control your entire security systemfrom anywhere you are.
Easy, Fast & ScalableSimple user interface and easy to trainand deploy.On-premise deployment and integrationwith various other systems like ERP orinventory management can be done inquick time.New sites can be added quickly alongwith user rights on the go.
7
WE PROTECT ASSETS EVERYWHERE
IAMS IS THE CENTER TO CRITICAL ASSET PROTECTION
Productivity – All field technician can have a keyed or Keyless (Bluetooth/ mobile) access of their own and thus reducing the time taken to visit site to and fro for keys
Flexibility – Option to give access rights for defined period or for a specific job and held technician or vendors the flexibility to work within the sites on the go
Efficiency – Define SLA’s & improve time taken to complete a task based on historical data, also avoid penalties due to various regulations as set up by regulatory authority in specific geo
Security – Reduce theft and vandalism or sabotage of equipment's to reduces annual losses to such incidents & protect capital expenditure
Health & Safety – Improve hazard prevention and control with identification and classification of key assets as per OSHA & FCC
8
WE PROTECT ASSETS EVERYWHERE
IAMS SOFTWARE MANAGES, MONITORS & CONTROLS TO GIVE YOUR CUSTOMERS CONTROL OF THEIR CRITICAL ASSETS
A software and hardware platform that wirelessly manages, verifies and controls Who goes Where, When, Why, for How Long
Access logs can be downloaded to give a complete overview of the following
9
WE PROTECT ASSETS EVERYWHERE
1 2 3 4
TOWER COMPANIES CAN GAIN COMPETITIVE ADVANTAGE WITH IAMSACROSS VALUE CHAIN
0. Acquire Land1. Construct
Site Infrastructure
2. Lease Site to Mobile Operators
3. Manage Site 4. Support Services
Access logs consolidated with work orders determines the hours billed by the O&M & can be compared and vetted against the information generated by iAMS Resulting in no overpayment to the O&M.
HR : Consolidated data determines the average time to carry out a maintenance. This information can plan the resources needed to carry out the maintenances job.
Protection of Capital Investmentfor passive infrastructure/equipment against internal/external theft during site building/upgrading Perimeter security: site fence, outdoor equipment fence, shelter, Uninterrupted power: transformers, genset, fuel tank, fuel, batteries , connection to the grid, solar panels, wind mills Network: tower, fiber
Effectively Manage SitesSLA & Efficiency: The field engineer can go to the site without collecting the key from the regional HQ.
Security: Physical traceability of where/when/how/why access requested for a site is recorded and consolidated with the work orders which helps to eliminate internal theft.
Generating Increased Revenueby providing access management services to the tenant’s active equipment (BTS, antennas…) by reducing their operational expenditures and protecting their capital investment.
10
WE PROTECT ASSETS EVERYWHERE
BASED ON OUR STUDY ACSYS SOLUTION CAN RESULT IN HIGHER OPERATIONAL EFFICIENCY, REDUCE OPERATIONAL EXPENDITURE
With thousands of distributed sites. And more than thousands technician, vendors and maintenance support personnel, a digitally secure solution can save hundred of dollars ($) annually to enterprises through secure management system equipped with user auditing and data analysis
11
No of distributed sites or critical assets# 5000 (A)
Maintenance per year # 5 (B)
Travelling time taken per maintenance (key pick and drop from center)
# 3 hrs (C)
Fuel Cost (per km) maintenance visit# 0.06 USD (D)
Man hour rate # $ 8 per hour (F)
Travelling distance Saved (kms)20 (E)
Estimated Time SavedA x C X B
750000 Hours saved
Estimated Man-power cost saving
A x D x F x B
$ 600,000 USDManpower savings
Estimated Fuel Savings
A x B x D x E
$30000 USDFuel Cost Savings
Total Saving Excluding Field services cost
$630,000 USDBased on a sample study of 5000 sites in Asia and Africa
WE PROTECT ASSETS EVERYWHERE
WE HAVE DIGITIZED REMOTE SITES WITH ACSYS TELECOM AT SOME OF THE MARQUEE ENTERPRISES
12
WE PROTECT ASSETS EVERYWHERE
MIGRATE FROM ACSYS TELECOM TO IAMS ENTERPRISE FOR…
• Secure access policy profiles, with a flexible set of operationalworkflows combining the power of CGS+ a unique, inimitable,single use, automatic access authorization.
• Real time visibility and control on who has access, to what, whenand for how long
• Modular platform that enables customers to choose functionalitiesto match their business requirements
• Connectivity and interoperability in mind, it enables you to fullyharness the power of all your security, monitoring andmanagement solutions
• iAMS enables you with various levels of access control, dependingon business need
• Manage access rights & key programming via iAMS app
• Manage access rights via web-based software
• Bluetooth (keyless) technology for businesses with remote sitesand workforces, that want to manage access rights via web-basedsoftware or mobile app
13
WE PROTECT ASSETS EVERYWHERE
14
SOFTWARE INTEGRATED HARDWARE FOR COMPLETE SOLUTIONAC
CESS
MED
IAPR
OG
RAM
MER
SAC
CESS
PO
INTS
AKEYSTANDARD
AKEYKEYPAD
AKEYSCGS
AKEYBLUETOOTH
CYLINDERS BOXERPADLOCK
PL2PADLOCK
PL5PADLOCK HASPLOCK HASP VL1 BLE PL5 BLE
USB / IP PROGRAMMER
3GPROGRAMMER
KEYED KEYLESS
WE PROTECT ASSETS EVERYWHERE
C. Solution Deep Dive
WE PROTECT ASSETS EVERYWHERE
A TOWER CO. CAN SOLVE KEY ISSUES WITH AN INTEGRATED ACCESS MANAGEMENT SOLUTION
16
ACCESS CONTROL AT SITESINDUSTRY ISSUE With iAMS You Can…
Access based on trouble ticket(s) within a work orderiAMS Enterprise has two solutions to implment a site access process based on trouble tickets whithin work orders.iAMS Field Operations Module & iAMS API Connect - Workforce Management Integration
Cant controls who, when, where and how assets are accessed Access rights defined – Fixed, Temp, Permanent, Weekly etc. along with Vitual access rights for remote site access
Need to collect access logs/requests, GPS data and visual data for each activity defined within the trouble ticket
Access logs are recorded on the access media and access points. They both contain 1000 access logs where the access los gathered and stored as First-In-First-Out. GPS data is collected through the site requests for entry and exit by using the Smart Access App.
No analyzes of activities and defines an efficiency score for the activities within a trouble ticket against a reference value
iAMS provides an interface where the efficiency score of the access media user can be recorded manually. Furthermore an efficiency scroe is recorded baseds on other criterias that are related to Time-To-Site and Time-On-Site compared to a reference value.
There is no zone based monitoring and notification of suspicious activities none-conforming to pre-defined process activities in a trouble ticket
With iAMS access logs are recorded wuth the date/time and the result of the attempted access. The result identifies whether access is granted or denied and contain the reason for denial. The result combined with the toruble ticket detects and notifies zone based activities on the site.
There are no alerts and notifications due to external attacksiAMS records the access logs and consolidates with the trouble ticket and specific maintenance of assets. The frequency of the maintenance determines the failure trends of the asset and helps to plan the preventive maintenance and increase the up time of the site
WE PROTECT ASSETS EVERYWHERE
A TOWER CO. CAN SOLVE KEY ISSUES WITH INTEGRATED ACCESS MANAGEMENT SOLUTION
17
ACCESS FOR INSTALLATION NEW EQUIPMENTINDUSTRY ISSUE With iAMS You Can…Need to prevents illegal installation of equipment at the site Access points prevents the field engineer to open the shelter or to cliimbe on the antenna.
Need to secures the site and assets during site building Access points can be used and asssigned to the new location as a temporary driver.
Require a permanent lock-up once the site is built and commissioned Access points have tested application to work with Alain's lock
To monitors that the assets are installed correctly at the assigned location
The access logs in conjunction with integrable devices for physical monitoring, iAMS can determine if the assets are installed correctly by using virtual geo-fencing gain access to the asset.
ACCESS FOR SERVICINGSecure lock swapping during asset and equipment replacement Access points can be swapped during installation and replacement of equipment at the site.
All tools and equipment relevant to the maintenance are picked up from the warehouse
The Smart Access App helps to track all pre and post activities of a site access. The APP records the GPS location of where and when the equipment was piced up or returned to the warehouse.
Site services are back online within the SLA according to the contract between the site owner and the tenant
Access logs consolidated with the request logs determines the time to site and time to maintain the asset. These two data help to determine whether or not the SLA to bring the site back online is respective as a prove o their tenants.
Closest and qualified user is reaches to the site to reducing the Time-To-Site
iAMS operation optimization module allows the field engineer to login at the start of the work shift through the sartaccess app. This module tracks all the field engineers during the work shifts and assign the trouble ticket to the field engineer closest to the site with the right qualification and certifications.
WE PROTECT ASSETS EVERYWHERE
IAMS ADD-ON MODULES
18
WE PROTECT ASSETS EVERYWHERE
IAMS ENTERPRISE - API CONNECT
It provides a low cost and fast-to-market architecture for adding hardware and software connection for the following types of integration; - RMS- Sensors- CCTV- Access Control- Workforce Management
19
Connection API – Layer 3Contains the interface linking the different types of communication protocols to the Open protocols, IOT and proprietary protocols may be used.
Business API – Layer 2Contains the business logic independent from the hardware and software for managing the different types of integration.
Enterprise – Layer 1Contains iAMS Core and Modules independent from the rest of the layers.
WE PROTECT ASSETS EVERYWHERE
THANK YOU