SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Unique functions and features for
tender specifications
TM
Jan, 2015
2
ACTAtek ID Management Technology Platform
Real timeReal time communicationcommunication
BiometricBiometric AuthenticationAuthentication
EnterpriseEnterprise--widewide deploymentdeployment
33
TM
Product Awards
FROST & SULLIVAN AWARD,2010FROST & SULLIVAN AWARD,2010
4
Partnerships Provide Solutions
TM
ACTAtek works with partners to offer solutions to address the vertical markets.
5
Best API on the market for VAR apps
integration
 Agent and Sync: The Agent allows grabbing for events from the
Actatek devices, whereas Sync as its name-sake synchronize the
units
 Access Manager Suite (AMS) API
 AMS synchronize and manage all the devices and time zones across the
network, synchronize all event logs
 Report generation
 Plus many other admin/network functions
 Leaving you focusing on your app development using the SOAP API
 SOAP API
 You can develop your own AMS and more using this cross-platform tool
 Databases
 Integrated with Oracle, SAP, MySQL, MS SQL..and many others…
6
Key Network, Web UI, Google Cloud and API
Features
 AMS features
 Auto or manual sync all users, devices and time zones in a
network
 LAN level Auto In/Out
 LAN level Anti-Pass-Back (APB)
 Device Web UI Supports
 Google Cloud, Universal PnP, local built-in DDNS, AMS, SNMP
,Email and SMS services
 Emergency door open
 Agent2, SOAP and AMS API
 Allows User Messages on LCD not just grabbing events
 Mobile Apps development from the AMS database
7
Network Security (1)
Is your network Shell-Shock proof?
ShellShock is a vulnerability in a bash shell commonly found in
Unix, Linux and OS X operating systems. Network administrators
need to protect servers and networks from exploits associated
with ShellShock attacks.
Actatek devices are Shell-Shock proof!
8
Network Security (2)
Is your Biometric Devices vulnerable to OpenSSL
bugs?
 Threat : The OpenSSL Project is an Open Source toolkit
implementing the Secure Sockets Layer (SSL v2/v3) and Transport
Layer Security (TLS v1) protocols as well as a general purpose
cryptography library.
 Impact : Depending on the vulnerability being exploited, an
unauthenticated, remote attacker could conduct man-in-the-middle
attacks, run arbitrary code or cause a denial of service condition
on the targeted system.
 Actatek devices has no problem!
9
Google Cloud Support
 Access Google Cloud via your Google
account
 Develop your apps using Google Drive API
10
DDNS Feature
 Enable ACTAtek3 device's [DDNS] setting to
remotely access the device's Web UI from any
place at any time
11
Remote Clock-in
Users needing to have early meetings can clock-in using the
remote login function using any web-browser.
12
Multi-level Job Costing
This feature takes care of job costs for different projects or tasks.
13
Universal Plug and Play (UPnP)
Universal Plug and Play
(UPnP) is a set of networking
protocols, that permits
networked devices, such as
ACTAtek3, PCs ,and servers
to seamlessly discover each
other's presence on the
network and establish
functional network services for
data sharing, and
communications.
14
Simple Network Management Protocol
(SNMP)
SNMP is a standard protocol used
to communicate management
information between the network
management stations (NMS) and
the agents
(ex. ACTAtek devices) in the
network elements.
By conforming to this protocol,
equipments produced by different
manufacturers can be managed by
a single program.(ex. PRTG
Network Monitor)
SNMP protocol is widely used via
Internet protocol (IP) and operates
over UDP well known ports of 161.
The figure shows the basic
operation of SNMP to work with
ACTAtek Device.
15
AMS User Message Features
 Administrators can receive the User Message/E-
mail or SMS whenever users access the devices
16
AMS FIRE/EMERGENCY ROLL CALL
 Every users are accounted in an emergency in real-time!
17
Car Park Application
 Connecting to GP90 antenna
 Read EM card inside the car
at upto 90cm away to open
barrier
18
Meal Ticketing Application
 User Authentication by
a combination of
fingerprint, card and/or
PIN
 Then print our meal
ticket or access through
turnstile
19
20
ACTAtekACTAtek Value PropositionValue Proposition
 State-of-art web-based ID management solutions
 Automated access control
 Time attendance
 Payroll
 Support 3rd party application (ACTAtek API offers interfaces needed for integration with
existing IT & security systems)
 Scalable Enterprise Version – ACTAtek technology platform and infrastructure enables
virtualization capabilities and policy-based service management capabilities and
optimized business process such as SaaS, PSIM functionalities for recurring revenue that
promise ROI
 TCP/IP networking protocol allows diversified customer base cross regions, for
business/home users with well defined packages and usage
21
ACTAtekACTAtek EcosystemEcosystem
ACTAtek
Terminals
ACTAtekACTAtek--TATA
IP based
Smartcard
Readers
Secured I/O
Controller
ID VIDEOID VIDEO
Surveillance
Power Solutions, UPS, PoE,
Locks and Accessories
RFID ASSET TRACKING
Long range readers, RFID
tags
Enterprise
SMART TIMESMART TIME
Mobile
ACTAtek
ACCESS MANAGERACCESS MANAGER
LiteLite / Suite/ Suite SaaS /PSIM
2222
TM
Thank youThank you
Get real time and precise informationGet real time and precise information
ACTAtek ID Management

Contenu connexe

Tendances

Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Video
hypknight
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
Viper Web Solutions
 

Tendances (18)

Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element Solutions
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Video
 
Latest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient TechnologiesLatest Web based Access Management Software - Resilient Technologies
Latest Web based Access Management Software - Resilient Technologies
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
Sig Sensor New Presentation June 2008
Sig Sensor New Presentation    June 2008Sig Sensor New Presentation    June 2008
Sig Sensor New Presentation June 2008
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
The Power of Identification Management
The Power of Identification ManagementThe Power of Identification Management
The Power of Identification Management
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
New Features for Mobile Device Management (MDM) With Entgra
New Features for Mobile Device Management (MDM) With EntgraNew Features for Mobile Device Management (MDM) With Entgra
New Features for Mobile Device Management (MDM) With Entgra
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 

Similaire à ACTAtek unique features

An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre BottaroAn end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
mfrancis
 
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBMData Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
mfrancis
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOW
Cara Bereck Levy
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
Zoran Perisic
 

Similaire à ACTAtek unique features (20)

Resume_Pratik
Resume_PratikResume_Pratik
Resume_Pratik
 
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre BottaroAn end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...
 
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBMData Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
Data Capture in IBM WebSphere Premises Server - Aldo Eisma, IBM
 
Development tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-offDevelopment tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-off
 
Parimal Resume
Parimal ResumeParimal Resume
Parimal Resume
 
USA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOWUSA_32pages_cataloge-152-LOW
USA_32pages_cataloge-152-LOW
 
Boodskap overview
Boodskap overview Boodskap overview
Boodskap overview
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
OSMC 2013 | End User Experience Monitoring with Al'exa by Georg Kostner
OSMC 2013 | End User Experience Monitoring with Al'exa by Georg KostnerOSMC 2013 | End User Experience Monitoring with Al'exa by Georg Kostner
OSMC 2013 | End User Experience Monitoring with Al'exa by Georg Kostner
 
ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
 
Embrace network
Embrace networkEmbrace network
Embrace network
 
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
 
InTouch Machine Edition Advantages and Features
InTouch Machine Edition Advantages and FeaturesInTouch Machine Edition Advantages and Features
InTouch Machine Edition Advantages and Features
 
InduSoft IoTView
InduSoft IoTViewInduSoft IoTView
InduSoft IoTView
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

ACTAtek unique features

  • 1. Unique functions and features for tender specifications TM Jan, 2015
  • 2. 2 ACTAtek ID Management Technology Platform Real timeReal time communicationcommunication BiometricBiometric AuthenticationAuthentication EnterpriseEnterprise--widewide deploymentdeployment
  • 3. 33 TM Product Awards FROST & SULLIVAN AWARD,2010FROST & SULLIVAN AWARD,2010
  • 4. 4 Partnerships Provide Solutions TM ACTAtek works with partners to offer solutions to address the vertical markets.
  • 5. 5 Best API on the market for VAR apps integration  Agent and Sync: The Agent allows grabbing for events from the Actatek devices, whereas Sync as its name-sake synchronize the units  Access Manager Suite (AMS) API  AMS synchronize and manage all the devices and time zones across the network, synchronize all event logs  Report generation  Plus many other admin/network functions  Leaving you focusing on your app development using the SOAP API  SOAP API  You can develop your own AMS and more using this cross-platform tool  Databases  Integrated with Oracle, SAP, MySQL, MS SQL..and many others…
  • 6. 6 Key Network, Web UI, Google Cloud and API Features  AMS features  Auto or manual sync all users, devices and time zones in a network  LAN level Auto In/Out  LAN level Anti-Pass-Back (APB)  Device Web UI Supports  Google Cloud, Universal PnP, local built-in DDNS, AMS, SNMP ,Email and SMS services  Emergency door open  Agent2, SOAP and AMS API  Allows User Messages on LCD not just grabbing events  Mobile Apps development from the AMS database
  • 7. 7 Network Security (1) Is your network Shell-Shock proof? ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems. Network administrators need to protect servers and networks from exploits associated with ShellShock attacks. Actatek devices are Shell-Shock proof!
  • 8. 8 Network Security (2) Is your Biometric Devices vulnerable to OpenSSL bugs?  Threat : The OpenSSL Project is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a general purpose cryptography library.  Impact : Depending on the vulnerability being exploited, an unauthenticated, remote attacker could conduct man-in-the-middle attacks, run arbitrary code or cause a denial of service condition on the targeted system.  Actatek devices has no problem!
  • 9. 9 Google Cloud Support  Access Google Cloud via your Google account  Develop your apps using Google Drive API
  • 10. 10 DDNS Feature  Enable ACTAtek3 device's [DDNS] setting to remotely access the device's Web UI from any place at any time
  • 11. 11 Remote Clock-in Users needing to have early meetings can clock-in using the remote login function using any web-browser.
  • 12. 12 Multi-level Job Costing This feature takes care of job costs for different projects or tasks.
  • 13. 13 Universal Plug and Play (UPnP) Universal Plug and Play (UPnP) is a set of networking protocols, that permits networked devices, such as ACTAtek3, PCs ,and servers to seamlessly discover each other's presence on the network and establish functional network services for data sharing, and communications.
  • 14. 14 Simple Network Management Protocol (SNMP) SNMP is a standard protocol used to communicate management information between the network management stations (NMS) and the agents (ex. ACTAtek devices) in the network elements. By conforming to this protocol, equipments produced by different manufacturers can be managed by a single program.(ex. PRTG Network Monitor) SNMP protocol is widely used via Internet protocol (IP) and operates over UDP well known ports of 161. The figure shows the basic operation of SNMP to work with ACTAtek Device.
  • 15. 15 AMS User Message Features  Administrators can receive the User Message/E- mail or SMS whenever users access the devices
  • 16. 16 AMS FIRE/EMERGENCY ROLL CALL  Every users are accounted in an emergency in real-time!
  • 17. 17 Car Park Application  Connecting to GP90 antenna  Read EM card inside the car at upto 90cm away to open barrier
  • 18. 18 Meal Ticketing Application  User Authentication by a combination of fingerprint, card and/or PIN  Then print our meal ticket or access through turnstile
  • 19. 19
  • 20. 20 ACTAtekACTAtek Value PropositionValue Proposition  State-of-art web-based ID management solutions  Automated access control  Time attendance  Payroll  Support 3rd party application (ACTAtek API offers interfaces needed for integration with existing IT & security systems)  Scalable Enterprise Version – ACTAtek technology platform and infrastructure enables virtualization capabilities and policy-based service management capabilities and optimized business process such as SaaS, PSIM functionalities for recurring revenue that promise ROI  TCP/IP networking protocol allows diversified customer base cross regions, for business/home users with well defined packages and usage
  • 21. 21 ACTAtekACTAtek EcosystemEcosystem ACTAtek Terminals ACTAtekACTAtek--TATA IP based Smartcard Readers Secured I/O Controller ID VIDEOID VIDEO Surveillance Power Solutions, UPS, PoE, Locks and Accessories RFID ASSET TRACKING Long range readers, RFID tags Enterprise SMART TIMESMART TIME Mobile ACTAtek ACCESS MANAGERACCESS MANAGER LiteLite / Suite/ Suite SaaS /PSIM
  • 22. 2222 TM Thank youThank you Get real time and precise informationGet real time and precise information ACTAtek ID Management