Skip to main content
BluINFO

BluB0X Reveals the Mega Trends of the Future

Overview

DIY.jpg

Mega Trends Cloud.jpg Mega_Trends_Mobile.jpg

DIY

Cloud

Mobile 

  • Distributed security administration
  • Manage your access, visitors, photos, credentials, & reporting
  • One set of credentials for everywhere
  • Share data between systems
  • Self-administer tasks
  • Quicker response & no waiting for confirmation

 

 

 

 

  • Hosted and protected in Microsoft Azure
  • Browser-based applications
  • Real-time communication, control and notification
  • Cross-system, multi-site, partitioned architecture
  • Immense cloud computing processing power applied as-needed for analytics or artificial intelligence
  • Easily-configurable data displays and reports
  • Simple or complex “if this then that” rules across any or all systems, to trigger system actions and notifications
  • Simple data import & export available throughout the applications
  • VPN-based access to site physical security infrastructure
  • Integrated User Guide and Learning Management System
  • Remote diagnostics and health and status monitoring
  • Multi-layer security and data protection
  • Seamless automatic software updates keep current with advancing technology
  • Third-party data integration through an open RESTful API
  • Take your security system with you no matter where you go 
  • Quickly review and respond to any security event  
  • View live video 
  • Review events with recorded video 
  • Monitor activity across multiple sites simultaneously 
  • Unlock doors remotely 
  • Suspend or reinstate user credentials 
  • Take Photo-IDs pictures with a smartphone or tablet  
  • Remotely verify and admit users and visitors
test.jpg Mega Trends Intelligent Readers.jpg Mega Trends AI.jpg

Frictionless Security

Intelligent Readers

Artificial Intelligence

  • Your mobile device grants access through doors, turnstiles, and to floors 
  • A frictionless visitor and vendor experience
  • Reduce visitor and vendor queuing at the security desk
  • Reduce the burden on security desk staff
  • Provide a secure identification, transaction and audit trail for every visitor and vendor
  • Work independently of any reader that is installed at the access point 
  • Does not require proprietary Bluetooth or NFC credentials
  • Provide a platform for many advanced access features
  • As a multi-biometric, multi-factor intelligent reader it can identify a person based on their biometrics, name, card, Bluetooth credential, bar or QR code, PIN and Cloud Credential
  • Simple, fast and natural to use.
  • There is also no distinctive enrollment procedure.  It learns what you look like by your first arrival, and how you change over time.
  • As an intercom, it's a two-way audio/video communication device.
  • It is SIP-based and can integrate with most intercom systems.
  • It is deeply integrated with Cloud Station which enables answering from anywhere, on any device, as well as control the end devices from the same interface.
  • As a visitor entry device, it can be used as a self-check-in visitor station at a door, gate, security desk, reception area or loading dock.
  • Visitors can find their pre-registered record by name, bar or QR code. The Intelligent Reader can read and assign credentials, take photos, and check in and announce visitors.
  • It functions in both attended or unattended modes.
  • As a camera, the Intelligent Reader can associate a photo or video with every entry attempt.
  • Future versions will include video streaming to third-party video recorders and video and audio analytics.
  • All events and data from the local security system are sent in real time
  • All user database changes, configurations, and operator activities are also captured in real time. 
  • All events and data are processed by Intelligent Analytics to create a summary, statistical information, and new events. 
  • Some analytics are performed by the local security system while other analytics are performed by in the Cloud 
  • Intelligent analytics are constantly changing and adapting based on the constant flow of new data and events 
  • Intelligent Analytics are modular and extract specific information for specific applications enabling tailored system intelligence.
Analytics_Icon.png Mega Trends Situational Awareness.jpg Credentials_w_Pin.jpg

Analytics

Situational Awareness

Mobile/Biometric/
Virtual Credentials

  • Uses Big Data to create Big Analytics
  • Detects, characterizes and reports unusual events
  • Employs automated pattern recognition
  • Determines correlations and trends
  • Provides meta-data reports
  • Fuses data within and across applications
  • Displays interactive dashboards and dashlets
  • Access summary situational awareness reports

  • Observe real-time situational awareness details

  • Simple descriptive text, numbers and visualizations

  • Only shows the doors, turnstiles, and floors to which you have access
  • Location sensitive - you must be close to the door, turnstile or elevator that you want to access
  • Person and Access-based control - choose the person and the access level groups, access levels, readers and floors for which you want to enable 
  • Provide destination dispatch elevator assignment right on your mobile device
  • Enable relay elevator floor selection on an elevator by elevator basis
  • Feedback messages indicate access granted or why access is denied
  • An audit trail is created just as if a physical credential was used
Mega Trends Unified.jpg Mega Trends IoT.png Mega Trends Smartcities.png

Unified Integrated Platform

IoT

Smart Cities

  • End-to-End Security
  • One Common Database
  • Out-of-the-Box Unified 
  • One User Experience
  • Web-cloud applications
  • Infrastructure
  • Open hardware and software
  • Data consolidation and maintenance
  • Easy information views – dashboards
  • Quick, easy, at your fingertips – ADAWATAB
  • Higher efficiency and lower cost
  • Connection to onsite systems (things)
  • Real time status and control of any system
  • 24/7 Intelligence, analytics and monitoring
  • Exception based management & target-based notification
  • Real time response, collaboration and automation
  • Continuous improvement
  • Infrastructure
  • Open hardware and software
  • Data consolidation and maintenance
  • Easy information views – dashboards
  • Quick, easy, at your fingertips – ADAWATAB
  • Higher efficiency and lower cost
  • Connection to onsite systems (things)
  • Real time status and control of any system
  • 24/7 Intelligence, analytics and monitoring
  • Exception based management & target-based notification
  • Real time response, collaboration and automation
  • Continuous improvement
Mega_Trends_open.jpg Mega_Trends_Touchless.jpg  

Open

Touchless

 
  • Integrates with everything

  • Service-oriented architecture

  • Publish-Subscribe model

  • REST, SOAP, JavaScript

  • For Frictionless Visitor and Vendor Entry Into a Facility
  • Gates Zero or Limited Security Officer Interaction
  • Zero or Reduced Waiting in Line with Other Visitors
  • Visitor Pre-authorization
  • Vendor Pre-authorization
  • Approved Vendor List
  • Integrated COI Management
  • Self Check-In Kiosks
  • Health Surveys on Visitor and Vendor Invitations
  • Operating Instructions on Visitor and Vendor Invitations
  • Visitor/Vendor signing NDA on their personal device
  • Touchless Bluetooth Credentials - Tap and Twist
  • Seamless DIY Credential Management
  • Location and Usage Monitoring and Restrictions