Microsoft word - reach whitepaper - property 4_14_10.doc

Increased Security, Lower Costs and New Revenue Sources for Property Managers The current economic environment has seen many businesses closing their doors, while many more are drastically cutting expenses wherever they can. As a result, property owners are seeing their lease revenue diminish due to a high inventory of available properties. This is why many property owners are looking for new tenant services to increase their revenue from existing clients and to attract new tenants. Security is critical for business owners and not something they will compromise on. As a property owner, you have the opportunity to provide increase security for your tenants with an Access Control System that will differentiate your property, resulting in higher lease value. In addition, you can reduce your operating costs by installing an electronic access control system for tenants that eliminates your key management and re-keying costs while increasing your control over who has access to your properties. Do you have many vacant spaces? Are your tenants Healthcare Professionals or Legal Professionals? Do you have high turnover costs? Are you able to provide reliable and secure access to shared tenant spaces? Do you have monitoring capabilities and control over after-hours access to your properties? Do you own multiple properties over a wide geographical area? If your current physical security measures are not able to help you deal with all of these situations then it is time to consider a physical Access Control solution, for increased security, safety and potential new sources of revenue. Control and management of a large number of changing tenants across multiple sites demands a centrally managed system to meet your security needs while controlling costs. Current practices rely on centrally administered key management, which is cumbersome, costly, and provides weak physical security. At the same time, many of your tenants need and want that same level of security at an affordable cost. To achieve the highest level of physical security for your properties and for your tenants’ individual leaseholds an Access Control System (ACS) is required. The ideal physical access control solution would have the following features: Eliminate the need for keys, key management and lock re-keying costs Plug-and-play with existing IT infrastructure to minimize IT support costs Provide secure network communications with the central management authority Deployable as a tenant service with ultimate control in the hands of the property owner 1330 Broadway, Suite 1201, Oakland CA 94612 But in general individual locations do not have very robust IT infrastructure. They usually have Internet connectivity to support various business functions, but nothing that would require support or maintenance from a system or network engineer. The cost would simply be too high. Furthermore, it is very rare that there is any staff on site that is qualified to operate and maintain a security system. Today’s incumbent Security System Manufacturers are not meeting these unique challenges with their current product offerings. Incumbent Security System Manufacturers and their Business Models The dominant manufacturers offering integrated security systems established their businesses by successfully targeting large companies with vast IT staff and infrastructure, relying heavily on the client’s IT resources to deliver enterprise Access Control functions. Their systems were designed around client-server architectures with components connected together using serial communication networks, which meant that the remote sites or other geographically dispersed assets could not be protected in an integrated security environment without a large additional infrastructure investment. This dynamic has resulted in the entrenchment of outdated technologies in the security industry. While modern technologies might bring the benefits of integrated security systems to a broader range of customers, there is very little incentive for the incumbent system manufacturers to invest in these technologies. Designing new products and marketing those products to smaller corporate clients or large corporations with dispersed locations would drive down corporate ROI in the short term, driving down stock prices and shareholder value, which management is loath to do. As a result, these incumbents have not made significant efforts to introduce systems that are based on modern information technology. The solutions that they currently offer to smaller corporate clients or remote corporate sites are simply lite versions of the products that they sell to their large customers. While some of these legacy systems have been adapted to use modern IP networks, their client-server architecture continues to limit their ability to be easily extended to remote locations. While these assets can be easily connected over the Internet, their architecture still requires that the corporate network and firewall be extended to these locations in order to maintain network security. The IT infrastructure required to achieve that security still costs thousands of dollars per location plus ongoing maintenance costs. Introducing Reach Systems From Reach’s perspective, small to mid-size companies and corporate remote facilities represent a large and profitable business opportunity. The Reach Access Control System (“Reach ACS”) uses IP networks and other modern information technologies to deliver an enterprise class security system to small-scale users and remote sites at a considerably reduced cost. By designing and building an access control system from scratch to exploit ubiquitous IP connectivity without compromising corporate network security, Reach can offer companies with small widely distributed assets the means to centrally manage and secure all of their assets using existing IT infrastructure and no added capital costs – something that is literally impossible with legacy access control systems. 1330 Broadway, Suite 1201, Oakland CA 94612 The Reach ACS has been built to modern software design standards, minimizing support costs, reducing training costs and supporting standard IT identity management conventions, reducing ongoing training and support costs and thus the total cost of ownership. ReachNet is the system management application through which users manage Reach ACS. It is comprised of a database and a web application that provides a browser interface to the ReachNet system. All user interaction with ReachNet takes place through a standard web browser, so authorized users may login to the system over the Internet from anywhere, anytime. ReachNet is built on an enterprise class Oracle database and utilizes open source software and operating systems wherever possible. ReachNet is designed to be highly scalable and because there is no on-site software to install, it can be deployed cost effectively for a single door access system or for an enterprise-wide system that spans the globe. Reach enterprise ACS features include: Remote termination of access permissions Automated Notifications based on specified events Automated Reporting based on specified events Real-time monitoring of all remote sites Reach Secured System Architecture In addition to leveraging the latest technology, Reach has developed a unique architecture enabling secured data communication over the Internet regardless of the structure of the security domain in which it is deployed. Reach has applied for a patent (application # 20070130294) for this architecture. Unlike the traditional client-server ACS applications or other so called IP based solutions, Reach does not require the opening of the network firewall for communication between the Reach server and onsite AC devices. Opening in-bound communication channels within the firewall can pose serious vulnerabilities and typically will not be approved by the IT department. In addition to this, Reach will not require the extension of the client’s LAN via Virtual Private Network (VPN) which is expensive to deploy and maintain, and potentially can increase the ACS project cost by 5x. Using the latest IP technology and Reach proprietary technology, Reach is able to deliver a tailor-made solution to meet the unique requirements of Property Managers. Flexible Delivery Model to Meet Your Business Needs For the small to mid-size Property Managers that don’t have IT staff to support an Access Control System, Reach offers a web-hosted platform. Rather than purchasing Reach software and having to maintain the software, you simply pay a monthly fee to access ReachNet. ReachNet as a hosted service resides in a secure colocation facility 1330 Broadway, Suite 1201, Oakland CA 94612 and communicates with access control devices at doors over the Internet. All interaction with the Reach ACS is done through a standard web browser on any computer. This eliminates the cost of buying any software, computer hardware or data storage devices. It also eliminates all of the personnel costs associated with maintaining the software and hardware and with backing up your valuable data. You can rest assured that all of that is taken care of by Reach in its highly secure colocation facility with backup generators, internet connections and 24 by 7 staffing. 1330 Broadway, Suite 1201, Oakland CA 94612



Stephanie Rice bubbling for world title tilt | The Australian The Australian Stephanie Rice bubbling for world title tilt • Nicole Jeffery • From: The Australian • July 14, 2011 10:27PM STEPHANIE Rice is lean and mean again as she goes into the world championships in Shanghai next week. Rice announced on Twitter that her skinfold (body fat) level was back down to her



© 2008-2018 Medical News