Traka Access control systems & kits(23)
Traka, a division of ASSA ABLOY presents the Traka Touch L Series intelligent touch screen key management system. Traka Touch is a standalone key management solution that operates independently of a company’s IT system via an embedded Windows software and SQL Server database. No server is required to maintain its database. The system is managed via the full colour 7-inch multi-language touch screen on the front panel, from the initial administrative setup of users and keys to the management of day-to-day user access. As with conventional Traka systems the Touch gives the administrator control over the access levels for each particular user. To gain access to keys, users must identify themselves using a PIN code, swipe card or biometric recognition. LEDs indicate which keys a user can and can’t take when they access the cabinet. The Traka Touch provides a real time audit of all key transactions and the unit’s solid state memory can store up to 250,000 events. Administrators can view a report of all key usage and search for a key that is “out of system” via the touch screen. “The new Traka Touch is a secure, cost-effective means of ensuring that only authorised individuals have access to keys, while making them readily available to authorised users 24/7. It is not always feasible for organisations to allow access to IT infrastructures and networks and Traka Touch addresses this” said Robert Smith, Managing Director, Traka plc.Add to Compare
Managing assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case. At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability; wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment. Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist toolsAdd to Compare
Traka Touch is the newest addition to our range of integrated Key Management solutions, and it’s probably the most exciting development we’ve made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today. Put simply, when it comes to key management Traka Touch makes your life easier. It gives you an intelligent ‘out of the box’ Key Management solution which operates entirely independently of your IT systems. Everything is managed via the touch screen on the front panel, from the initial administrative set up of users and keys, right through to the day to day user access. What is Traka Touch? Traka Touch is a sophisticated Key Management system which has the intelligence built in. And because it’s a standalone solution, there’s no need for a connection to your IT network and no server requirement to manage the database. Everything you need is embedded in the unit, so all you have to do is plug it in. Full audit capability of all key transactions is retained within the system using internal solid state memory and memory card. Customer comment: “With Traka Touch we have been able to quickly and easily improve our Key Management at store level. We are planning to install a system at every one of our stores throughout the UK. It’s a brilliantly simple but effective solution which makes efficient key management incredibly straightforward for both staff and managers. What’s more, because it’s stand alone, it is easy to deploy locally without having to involve staff from the corporate IT team or head office” Traka Touch at a glance Traka Touch makes keys readily available, but to authorised users only. Gives you control over who can use your keys, with access levels designated for each particular user. Each user must identify themselves at the cabinet using either a PIN code or a magnetic swipe card, or by using biometric fingerprint recognition. To remove any ambiguity, LEDs indicate which keys a user can and can’t take when they access the cabinet. Searching for an ‘out of system’ key is easy and Traka will also indicate who took it and when. Reporting functions enable transaction reports to be displayed on the screen – for example so that you can quickly see who took a key and when it was returned. Great if you need to know who accessed the store room out of hours last Friday, or who was driving the white Transit two weeks ago! For printed reports, simply plug a USB memory stick into the unit and reports can be automatically exported ready for use on a PC. With its touch screen technology and embedded processing, Traka Touch gives you all the Key Management capability that you require, but without the need for any complex integration with your IT systems. Traka Touch is the newest addition to its range of integrated Key Management solutions, and it’s probably the most exciting development Traka made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today.Add to Compare
Traka21 is a sophisticated stand-alone key management system which combines innovative RFID technology and robust design to provide small and medium sized businesses with the advanced management of 21 keys or keysets in an affordable plug and play unit. The difference between key issue & key management Traka21 authorises, secures and monitors all of your keys, automatically controlling and recording when a key is used and by whom – information which is made available either through the cabinet’s display or by export on a USB pen drive. Operation Stand-alone Plug & Play solution with advanced RFID technology Touchscreen interface PIN access to designated keys or keysets which are individually locked in place Keys are securely attached using special security seals Simple to configure through setup wizard No requirement for network connection or PC Concealed robust fixing points allow secure wall fixing Mains operated with optional battery backup Traka21 key features User, key and access rights administration Multilingual functionality Screen based audit trail and reporting capability or export via USB port 21 robust, long-life iFobs with security seals 21 locking receptors with LEDs Robust and compact aluminium & ABS housing with no exposed hinges or obvious access points Manual override and door release functions in case of emergency Audible alarmsAdd to Compare
Browse Access control systems & kits
Access control system products updated recently
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What is ethical consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favouredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoured, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labour issues and manufacturing practices that take these factors into account. Increase in ethical consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centres around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact on physical security products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating tech-specific threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behaviour, respect for stakeholder interests, respect for rule of law, respect for international norms of behaviour and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not buying products vulnerable to cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behaviour.
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
Traka is the key management solution of choice for leading multi-sector business protection management company, Guarding UK, ensuring compliant key holding services and integrated audit control capability. Guarding UK manages nearly 1,500 sites across the UK, protecting in the region of £40bn worth of assets at commercial, corporate and residential sites across industry sectors including central London premier sites, retailers, property owners and management agents, together with airports and airlines. Employing around 800 staff, Guarding UK installed bespoke-in-design Traka systems to uphold a pledge to customers for compliant and secure key holding, with remote accountability enabled to ensure keys are managed and available instantly by authorised personnel. Says Mick Spring, Guarding UK, Head of Mobile Services: “Guarding UK prides itself on being recognised as amongst the best leading security company in the country.” Dedicated audit control Guarding UK has installed key cabinets which are designed for organisations with a high key turnover “We are constantly monitoring our resources and systems to not only ensure compliance, but also create a culture that supports our teams to provide a superior service. Traka is a testament to this ambition, providing a unique way for customers to trust us to manage their keys effectively. Having an ability to work with us right from the initial design of a system was what really appealed, allowing us to incorporate different tracking attributes, with full visibility of key whereabouts at any given time." "Should a key holder need to attend a site, we can provide all details of the call out with dedicated audit control, including specific time, which can all be instantly emailed for business reporting.” On-site, Guarding UK has currently installed Traka’s L-Touch key cabinets, which are specifically designed for larger organisations with a high key turnover. High-quality protection management Working with specialist TrakaWEB Software, allowed for dedicated audit control capability, including notifications when keys are not returned, presenting instant traceability and reporting. Lee Payne, Market Development Manager for Traka UK: “Guarding UK is at the forefront of high-quality protection management and has managed to maintain this leading industry position through a commitment to compliance and continuous improvement across its sector offerings and service excellence.” “Within Guarding UK obligation to key holding, the adaptability of Traka technology allows us to create a solution that could not only enhance key management but also improve communications, operations and workflow, enabling staff to present a seamless team approach. The audit trail capability presents a system that can be relied on 24 / 7 / 365 for the ongoing benefit and peace of mind security of all Guarding UK customers.”
A global UK department store, with a commitment to offering quality products and outstanding service, has ensured the protection of its customer service mobile equipment with Traka’s intelligent locker solutions. Traka’s specialist locker systems The high street favourite has integrated Traka’s specialist locker systems throughout its branch network and top ranking online operations, to store, charge and manage dedicated mobile devices, enabling instant availability for customer service teams across the UK. The high street favourite has integrated Traka’s specialist locker systems throughout its branch network The move was part of a key store investment strategy, which introduced the mobile devices to enable authorised users to take web orders and respond to customer enquiries and stock checks, instantly and efficiently. Digital key management Speaking about the use of digital key management and its impact on the department store processes, a representative for the store said, “We are devoted to working on every aspect of our operations, to continue our pledge of delivering quality products and outstanding service. We believe this, put together with our continued commitment to price matching is what is resonating with our customers.” “We want to streamline our stores and online services to be equally enjoyable places to shop. We are aware we need to respond to personalised customer queries quickly and efficiently, with the right information on any product or service. Intelligent tracking technology “To achieve this, we need our customer-facing teams to be equipped with fast working intelligent technology. Here, Traka excelled at providing a branch solution that allows us to not only store dedicated devices securely, but also integrates into our daily operational systems. We can track where each device is and provide staff with peace of mind that every device is fully charged and up to date with our latest exclusive offers.” Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software. This offered in-locker charging facilities, full audit control capability, dedicated fault reporting on any issues with a piece of equipment, and capability to exchange an item with minimal time or resource disruption. Intelligent locker systems Steve Bumphrey, Traka UK Sales Director added, “Any department store’s success is dependent on providing a high level of service, deep knowledge of what it is they’re selling, and a willingness to ensure customers receive the right item. Being able to do so quickly and efficiently, is where the introduction of mobile devices have proven invaluable.” Steve adds, “Traka’s involvement was to understand the unique requirements of the customer services teams and create and network our intelligent locker systems, to make a significant operational difference. Staff no longer need to hunt for working devices to respond to customer enquiries, safe in the knowledge they are ready to use with very latest cross brand and department product and service information and pricing.”
Understanding the trade-off between image resolution and field of viewDownload
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
Matrix Time-Attendance solution adopted by TCIEXPRESS for quick salary processing and enhanced productivity
- Fermax DUOX 2 wires solution for Evelina London Children's Hospital in UK
- Matrix Time-Attendance solution adopted by TCIEXPRESS for quick salary processing and enhanced productivity
- Interflex security system streamlines access control, security of staff at Casino Baden-Baden
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide