SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Panoptes India Pvt. Ltd
 Traka – Intelligent Key Management Solution


If you’ve been searching for a way to protect your organisation’s assets
and resources, Traka’s intelligent access management systems could
prove to be that elusive silver bullet - by turning your conventional key
into a 'clever key'

Overcoming most of the difficulties associated with key management, Traka
intelligent key management provides the perfect solution. At its heart is the
Traka iFob™. These bullet-shaped devices contain a chip which provides a
unique electronic ID. Once attached to an iFob, individual keys or keysets are
effectively, electronically tagged. Individual keys or keysets are permanently
attached to an iFob with a robust security seal. Each iFob is then allocated a
specific port within a Traka key cabinet – and locked in place until released by
an authorised user.

Once the appropriate user profiles and key details have been entered into the
system, Traka ensures that only authorised employees are allowed access to
the key cabinet – and then only to designated keys. The system automatically
records when a key is used and by whom on a central database. And this
information is available via the cabinet’s data display or a central PC.

Employees request access to a key cabinet using a PIN code, swipe card or
fingerprint recognition. If a request is valid, the cabinet door will open and the
appropriate key will be released. To return the key, the holder must again
obtain admission to the cabinet, and then replace the iFob in its designated
port. If this is not done, the system will prompt the user to insert the iFob in its
correct position.


Individual keys can be set with a curfew, raising an alarm if not returned on
time, or restricted time access can be set so as to manage usage, perhaps for
cleaners or service staff.

   •   Systems configurable giving multi-user access to one or more keys,
       each with their own parameters
   •   Unique time access controls for different user groups; for shift patterns,
       curfew limits or restrictions
   •   User license or qualification expiry dates configured to prevent users
       gaining unauthorised key access
   •   Key booking options for scheduling of equipment, access to rooms or
       the servicing of vehicles
   •   Central control for managing key usage, reporting on key usage,
       mileage and utilisation statistics.
Traka enables you to control, monitor and record the use of almost any physical asset, including:
premises, facilities, secure areas, equipment, machinery and vehicles. Traka provides intelligent
key management and equipment management access control to better protect your important
assets - resulting in improved efficiency, reduced downtime, less damage, fewer losses, lower
operating costs and significantly less administration.

Traka has a range of Electronic Key Management solutions that will control who can gain access
to keys, restrict individual key usage to authorised users, provide a full audit of key activity and
generate numerous easy to use reports based on user information logged at the time of taking or
returning keys.

   •   Cabinets managing between 10 and 540 keys, in 3 modular sizes
   •   Multiple cabinets can be networked, locally or remotely, for large sites with more keys
   •   User profiles and key details configured in a centrally located database on a standard PC



Traka allows long-term records to be held and continuously
updated, the system’s Traka32 software will ensure you’re able
to monitor and record key usage, and compile a comprehensive
range of management information, enabling you, for example:

   •   To check when a key is taken and returned,
   •    and by whom
   •   To identify keys that have not been returned
   •   once an allocated period of time has elapsed
   •   To determine how often particular keys are
   •   used, and for exactly how long.
   •   To analyse usage and identify faulty equipment

Providing enhanced control and security, the times at which
keys are available to specific personnel can be defined
using Traka’s management software. Entry to particular rooms –
and the use of certain facilities – by cleaners or service staff,
for example, can be restricted to certain times of the day, to fit with shift patterns. Alternatively, a
‘key curfew’ can be applied, setting the time by which a key must be returned to its cabinet.
The Traka Solution

   •   Make Users Accountable
   •   Give them a method that is easy to use
   •   Control who has access
   •   Monitor the access
   •   Audit how often it was accessed and by whom
   •   Ensure items are only accessed by authorized staff
   •   Ensure procedures are followed as you designed them


Traka32 software
The power behind all Traka solutions lies in their Traka32 Software. Running on either a single
PC or in a networked server environment, it offers multi-language use, provides extensive real
time data capture, interfaces with most 3rd party access control
applications, and uses an SQL database to provide extensive access level controls and key
transaction history. Using Crystal Reports a comprehensive range of Management Information
reports can be generated quickly and easily. Where managed keys and assets are subject to
security classification, Traka work with SSG to provide additional protection to meet SEAP
ratings.

Contenu connexe

Tendances

Traka weapons lockers
Traka weapons lockersTraka weapons lockers
Traka weapons lockers
Tara Wally
 
Traka education brochure
Traka education brochureTraka education brochure
Traka education brochure
Tara Wally
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
Darrell Smith
 

Tendances (20)

Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
 
Traka weapons lockers
Traka weapons lockersTraka weapons lockers
Traka weapons lockers
 
Physical security-system
Physical security-systemPhysical security-system
Physical security-system
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
2016 mindthesec Format-Preserving Encryption
2016 mindthesec Format-Preserving Encryption2016 mindthesec Format-Preserving Encryption
2016 mindthesec Format-Preserving Encryption
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
Traka education brochure
Traka education brochureTraka education brochure
Traka education brochure
 
Unit08
Unit08Unit08
Unit08
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
 
P2PE - PCI DSS
P2PE - PCI DSSP2PE - PCI DSS
P2PE - PCI DSS
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & AnonymizationSecurity 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 

Similaire à Traka

Traka airport solutions flyer
Traka airport solutions flyerTraka airport solutions flyer
Traka airport solutions flyer
Tara Wally
 
Traka retail flyer
Traka retail flyerTraka retail flyer
Traka retail flyer
Tara Wally
 
Traka general flyer
Traka general flyerTraka general flyer
Traka general flyer
Tara Wally
 
Traka fleet flyer buses
Traka fleet flyer busesTraka fleet flyer buses
Traka fleet flyer buses
Tara Wally
 
Auto dealership flyer
Auto dealership flyerAuto dealership flyer
Auto dealership flyer
Tara Wally
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
jemtallon
 
How Balabit helps to comply with iso 27001 (infographics)
How Balabit helps to comply with iso 27001  (infographics)How Balabit helps to comply with iso 27001  (infographics)
How Balabit helps to comply with iso 27001 (infographics)
Sectricity
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
Mike Lee
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
vickeryr87
 

Similaire à Traka (20)

Traka airport solutions flyer
Traka airport solutions flyerTraka airport solutions flyer
Traka airport solutions flyer
 
Traka retail flyer
Traka retail flyerTraka retail flyer
Traka retail flyer
 
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_onlineAsecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
 
Traka general flyer
Traka general flyerTraka general flyer
Traka general flyer
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
TrackX AssetTrack
TrackX AssetTrackTrackX AssetTrack
TrackX AssetTrack
 
System 6000
System 6000System 6000
System 6000
 
Traka fleet flyer buses
Traka fleet flyer busesTraka fleet flyer buses
Traka fleet flyer buses
 
Auto dealership flyer
Auto dealership flyerAuto dealership flyer
Auto dealership flyer
 
Security best practices for hyperledger fabric
Security best practices for hyperledger fabric Security best practices for hyperledger fabric
Security best practices for hyperledger fabric
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
OT Solution Overview.pptx
OT Solution Overview.pptxOT Solution Overview.pptx
OT Solution Overview.pptx
 
truMe
truMe truMe
truMe
 
How Balabit helps to comply with iso 27001 (infographics)
How Balabit helps to comply with iso 27001  (infographics)How Balabit helps to comply with iso 27001  (infographics)
How Balabit helps to comply with iso 27001 (infographics)
 
Powerpoint Marketing Template
Powerpoint Marketing TemplatePowerpoint Marketing Template
Powerpoint Marketing Template
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 

Traka

  • 1. Panoptes India Pvt. Ltd Traka – Intelligent Key Management Solution If you’ve been searching for a way to protect your organisation’s assets and resources, Traka’s intelligent access management systems could prove to be that elusive silver bullet - by turning your conventional key into a 'clever key' Overcoming most of the difficulties associated with key management, Traka intelligent key management provides the perfect solution. At its heart is the Traka iFob™. These bullet-shaped devices contain a chip which provides a unique electronic ID. Once attached to an iFob, individual keys or keysets are effectively, electronically tagged. Individual keys or keysets are permanently attached to an iFob with a robust security seal. Each iFob is then allocated a specific port within a Traka key cabinet – and locked in place until released by an authorised user. Once the appropriate user profiles and key details have been entered into the system, Traka ensures that only authorised employees are allowed access to the key cabinet – and then only to designated keys. The system automatically records when a key is used and by whom on a central database. And this information is available via the cabinet’s data display or a central PC. Employees request access to a key cabinet using a PIN code, swipe card or fingerprint recognition. If a request is valid, the cabinet door will open and the appropriate key will be released. To return the key, the holder must again obtain admission to the cabinet, and then replace the iFob in its designated port. If this is not done, the system will prompt the user to insert the iFob in its correct position. Individual keys can be set with a curfew, raising an alarm if not returned on time, or restricted time access can be set so as to manage usage, perhaps for cleaners or service staff. • Systems configurable giving multi-user access to one or more keys, each with their own parameters • Unique time access controls for different user groups; for shift patterns, curfew limits or restrictions • User license or qualification expiry dates configured to prevent users gaining unauthorised key access • Key booking options for scheduling of equipment, access to rooms or the servicing of vehicles • Central control for managing key usage, reporting on key usage, mileage and utilisation statistics.
  • 2. Traka enables you to control, monitor and record the use of almost any physical asset, including: premises, facilities, secure areas, equipment, machinery and vehicles. Traka provides intelligent key management and equipment management access control to better protect your important assets - resulting in improved efficiency, reduced downtime, less damage, fewer losses, lower operating costs and significantly less administration. Traka has a range of Electronic Key Management solutions that will control who can gain access to keys, restrict individual key usage to authorised users, provide a full audit of key activity and generate numerous easy to use reports based on user information logged at the time of taking or returning keys. • Cabinets managing between 10 and 540 keys, in 3 modular sizes • Multiple cabinets can be networked, locally or remotely, for large sites with more keys • User profiles and key details configured in a centrally located database on a standard PC Traka allows long-term records to be held and continuously updated, the system’s Traka32 software will ensure you’re able to monitor and record key usage, and compile a comprehensive range of management information, enabling you, for example: • To check when a key is taken and returned, • and by whom • To identify keys that have not been returned • once an allocated period of time has elapsed • To determine how often particular keys are • used, and for exactly how long. • To analyse usage and identify faulty equipment Providing enhanced control and security, the times at which keys are available to specific personnel can be defined using Traka’s management software. Entry to particular rooms – and the use of certain facilities – by cleaners or service staff, for example, can be restricted to certain times of the day, to fit with shift patterns. Alternatively, a ‘key curfew’ can be applied, setting the time by which a key must be returned to its cabinet.
  • 3. The Traka Solution • Make Users Accountable • Give them a method that is easy to use • Control who has access • Monitor the access • Audit how often it was accessed and by whom • Ensure items are only accessed by authorized staff • Ensure procedures are followed as you designed them Traka32 software The power behind all Traka solutions lies in their Traka32 Software. Running on either a single PC or in a networked server environment, it offers multi-language use, provides extensive real time data capture, interfaces with most 3rd party access control applications, and uses an SQL database to provide extensive access level controls and key transaction history. Using Crystal Reports a comprehensive range of Management Information reports can be generated quickly and easily. Where managed keys and assets are subject to security classification, Traka work with SSG to provide additional protection to meet SEAP ratings.