Contact Us

Solutions

Get to know our Solutions

Search

APOLLO

Asset & Site Management System

We Enhance the Resilience of Your Unmanned Critical Infrastructure Sites.

Certain processes are so essential to society that failure can lead to serious social disruption and pose a threat to the national economy, security, and health.

What constitutes Critical Infrastructure?

Vital Infrastructure covers critical sectors with 24/7 management needs and high-consequence assets.

Examples include:
Energy, Drinking water, Telecom/ICT, Transportation, Financial systems, Public order & Safety, National Defence.

Challenges for Critical Infrastructure: Access Control

Vital Infrastructure sites face challenges such as sabotage, unauthorized access, and vulnerability due to conventional locks and easily copied keys.

VI sites also battle with:

  • Keyholder procedures that can be time consuming, inefficient and costly.
  • Carelessness, disinterest, and inaccurate Key Management.
  • Lack of control over who has access to certain locations and at what time.

What is TKH Security ASM?

Our Asset and Site Management solution addresses pain points in unmanned Vital Infrastructure sites, offering essential security features such as

Security Surveillance

Giving you peace of mind that your unmanned Vital Infrastructure is getting the attention it needs, round the clock!

Environmental Monitoring

Gives access to operators who can manage, monitor and read all functionalities of Vital Infrastructure from one centralized network operations centre.

24/7 operation

Vital Infrastructure doesn’t operate in cycles, it’s designed to be a constant, operating 24/7, which is what our system does to support your site with all the above, day-in, day-out.

Main Value

01. Building Resilience

Unmanned network locations in the public domain are vulnerable to vandalism and sabotage. Damages not only have financial consequences, but also on the availability of your services, and to the reputation of your organisation. Physical security and continuous monitoring are essential for better protection.

02. Total Cost of Ownership

Various environmental conditions can negatively influence the lifespan of your valuable assets. If these conditions take on undesirable values for a longer period of time, they will sooner lead to disruptions and breakdowns. Repair/replacement costs unnecessarily drive up the lower case total cost of ownership

03. Access Control

Is it your own Service technicians and/or Subcontractors that need to have access to the unmanned locations for connection management and maintenance? As the Network Operation Center, it is crucial to maintain control, ensuring that access is granted appropriately. It’s essential to understand who requires access, the specific locations, the timing, and the reasons for access.

04. Key Management

Adequate centralised Key Management is essential for the security of your vulnerable and costly assets. The processes of issuing, returning, and managing keys, along with concerns about loss, unauthorized duplication, and mishandling, can result in a vulnerable and expensive management system. Your priority lies in ensuring security, as well as optimizing efficiency to save both time and resources.

Main Functionalities

Temperature and Humidity monitoring

FAQ Open FAQ Close

Using TKH Security’s APOLLO solution, temperature and humidity can be monitored using a threshold limit that when exceeded alerts an operator, prompting corrective action.

Shock and Tilt scenarios

FAQ Open FAQ Close

These have the possibility to damage equipment that can become displaced and broken. Using three-dimensional motion detection, an operator alarm is raised when a tilt threshold of more than 25 degrees occurs.

Intrusion Detection

FAQ Open FAQ Close

Using a passive infrared sensor, scenarios of potential intrusion can be detected through monitored inputs that can alert operators of potential threats.

Fire Detection

FAQ Open FAQ Close

Featuring an optical smoke detector, monitored inputs deliver crucial information to oversee this risk.

Access Control

FAQ Open FAQ Close

Door readers/contacts, which utilize card or Bluetooth technology, enable seamless entry and management, reducing the risks and challenges associated with lost or poorly managed keys.

Optional Integration

FAQ Open FAQ Close

Optional integrations with video surveillance and verification functionalities allow for the possibility of audio communication to a Network Operation Center via intercom.

I/O

FAQ Open FAQ Close

Universal I/O functionalities allow for connecting third-party systems to your locations such as climate control and backup power based on your needs.

Flood Detection

FAQ Open FAQ Close

With water sensors installed, our system sends an operator alert when a limit is reached, allowing for the appropriate action to be taken to avoid equipment damage.

Do you want to know more about our
Asset & Site Management System

Contact Us Arrow right

Error: Contact form not found.

Error: Contact form not found.