Friday, September 30, 2016

Complete data backup, recovery and business continuity in one platform

Data Protection is a Legal Responsibility!
What kind of data does your business hold and how do you store it?
What happens in the case of a natural disaster? What happened when one of your company’s computers get a virus?
Your data is lost and/or corrupt.
You now have all your employees’ and clients’ personal data out in the hand of a hacker. The business lost all its financial information. Disasters are costly. They are time consuming.
Studies show that by the year 2021, Data Loss and Downtime will NOT be tolerated.
Protect your legal responsibility now.

•25% of production machines will have a failure this year
•24% of companies say they have experienced a full data disaster
•70% of small businesses that experience a major data loss go out of business within a year
•The older your equipment, the higher the risk
Data Protection is a Legal Responsibility
•Compliance regulations like HIPAA require backup, recovery, and continuity plans be in place
•PCI Compliance and financial data responsibilities are becoming stricter
•Data loss will not be tolerated in future years
Data Loss Protection is not Always Downtime Protection
•Business is done in applications not data
•Your file recovery is a component to business restoration
•Think about uptime and failover
•Employee time is expensive and needs to be in the conversation
•When it comes to protection, file format matters!
Complete data backup, recovery and business continuity in one platform
Our solution can be deployed on a purpose-built appliance, in a virtualized environment, or imaged for use on existing hardware. Business data can be backed up to a local device in real time and synchronized with the Cloud, which provides geo-redundancy, data integrity and location-specific sovereignty.
It comes complete with Instant Virtualization technology that enables whole infrastructures to be spun up in a matter of seconds, either on a local device or in the cloud.
Our business continuity solution significantly reduces RPO (Recovery Point Objective) and RTO (Recovery Time Objective) for small and mid-sized businesses.

For more information, contact us at
security@jks-systems.com / 860-436-4664

Thursday, September 29, 2016

hyper-converged virtualized infrastructure solution with 1000 VMware Horizon View 6.2 with Cisco HyperFlex System

The Cisco HyperFlex arrangement concentrates on straightforwardness of sending and operation. It conveys a hyper-converged stage that has the benefit of permitting you to begin little and develop in little augmentations without the requirement for costly stockpiling gadgets associated with registering assets by either SAN or system appended capacity (NAS) techniques. A fundamental group requires three hyper-converged hubs oversaw by Cisco UCS Manager. Past this, a Cisco HyperFlex bunch can expand figuring and capacity assets for adaptable scaling as per workload needs. Adaptability is presented by making a group with a blend of Cisco UCS B200 M4 Blade Servers as figuring just hubs associated with an arrangement of Cisco HyperFlex HX240c M4 Nodes working as hyper-converged hubs. In this situation, the hyper-converged hub gives stockpiling to the Cisco UCS B200 M4 registering just hubs. This element permits either capacity or figuring ability to be added autonomously to accomplish ideal levels of bunch assets.
The Cisco HyperFlex arrangement additionally conveys capacity productivity components, for example, slim provisioning, information deduplication, and pressure for more prominent limit and execution changes. Extra operational productivity is encouraged through elements, for example, cloning and depictions.

This arrangement utilizes Cisco HyperFlex HX220c M4 Nodes, Cisco UCS fabric interconnects, Cisco UCS Manager, Cisco Nexus® 9372 stage switches, Cisco HyperFlex HX Data Platform (SDS) programming, and VMware Horizon 6.2 and the ESXi 6.0 Update 1 (U1) hypervisor. The HX220c M4 Nodes give registering, reserve, and capacity assets and are midway overseen by Cisco UCS Manager. The HX Data Platform programming serves processing and systems administration assets and a mutual pool of capacity assets from discrete Cisco HyperFlex HX-Series hubs for utilization by a blend of workloads. This SDS stage is overseen by a module in the VMware vCenter web customer.

This solution provides the following benefits:
·         Simplicity: The arrangement is intended to be conveyed and oversaw effectively and rapidly through well-known devices and techniques. No different administration console is required for the Cisco HyperFlex arrangement.
·         Centralized equipment administration: The bunch equipment is overseen in a predictable way by administration profiles in Cisco UCS Manager. Cisco UCS Manager additionally gives single-point console and firmware administration capacities. Cisco HyperFlex HX Data Platform (SDS) bunches are overseen through a module to VMware vCenter.
·         High accessibility: Component repetition is implicit to most levels at the hub. Bunch level resilience to hub, system, and fabric interconnect disappointments is executed also.
·         Efficiency: Complementing the other administration efficiencies are components, for example, slender provisioning, information deduplication, pressure, cloning, and previews to deliver concerns identified with overprovisioning of capacity.
·         Flexibility: "pay as you grow": Buy the definite measure of processing and capacity required and expand one node at a time up to the supported cluster node limit.

For more information, contact us at

Sunday, September 25, 2016

JKS Access Control Solutions Week – KABA LA GARD Smart Series

Programmable Multi-User, Multi-Compartment Safe Locks
The Smart Series products offer advanced features for controlling safe access. SmartLinc, SmartLinc II and SmartPoint® together make up the LA GARD Smart Series. Retail, banking and commercial environments require safe locking systems that provide the highest form of security and access control; the system must be durable and accurate, offer efficiencies to enhance employee productivity, yet ensure accountability. These features are the foundation of the LA GARD Smart Series.

The Smart Series offers a range of features:
  • multiple master codes
  • 8-98 users
  • user role assignment
  • ability to manage up to five locks from a single logic module
Accountability is more than a deterrent; it's the strongest weapon available to prevent internal theft. The Smart Series provides accountability through indisputable audit information. The advanced features of SmartLinc II and SmartPoint offer up to 4000 audit events in each lock and 1000 system events at the logic module.
Ensuring your employees' safety and security is paramount. Features like the Silent Signal Duress Alarm, Time Lock scheduling and Time Delay allow for time controlled access and warnings to be sent in the event of a robbery.

For more information, contact us at:
860-436-4664 / security@jks-systems.com
www.jks-systems.com

Saturday, September 24, 2016

JKS Access Control Solutions Week – KABA Keyscan K-PROX3 125 kHz proximity reader

The Keyscan K-PROX3 is a robust and affordable reader with a sleek, modern finish. The K-PROX3 features stellar technology, multiple mounting options and anti-tamper capability for truly unrivalled performance and dependability. K-PROX3 boasts dedicated features designed for exclusive use with Keyscan’s Present3 and facility lockdown function. When enabled, the reader will indicate status with new auxiliary LED indicators. These features are enabled with firmware and a programming card (sold separately). However, it will function on all Keyscan systems with or without these features enabled.

The K-PROX3 is the ideal choice for Keyscan access control systems with 125 kHz proximity reader requirements.
                       The K-PROX3 has:
  • An innovative ‘heartbeat’ technology. If this heartbeat is interrupted due to wiring fault, damage an alarm condition is triggered by the Keyscan control panel
  • New dedicated LED indicators Keyscan Present3 and facility lock down features (firmware and programming card required)
  • On board beeper to generate audible tones or sound a local "door-held-open" alert
  • Versatile mounting options with 2-in-one, mullion or single gang, electrical box mounting applications
  • Epoxy encased electronics and well-suited for both interior or exterior use
  • Impressive read range
  • Durable, weather-resistant construction for reliable operation and long usage even in harsh environments
  • Limited lifetime warranty


For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Friday, September 23, 2016

JKS Access Control Solutions Week – KABA ILCO RezShield Software & 79 Lock Series

RezShield software, combined with Kaba 79 Series Locks, provides optimum safety and security for residents while enhancing operational efficiency and improving the bottom line. Using the latest in contactless RFID read-write technology, Kaba 79 Series Locks offer a high level of security for management and operating convenience for residents. The ergonomic design of the lock requires users to simply present the credential in front of the lock reader to engage the lock. This feature is especially useful for residents in senior living communities with limited mobility and dexterity.
The 79 Lock features an all-in-one style that is ideal for both new construction and retrofit properties. Its robust, tamper-resistant design features a sealed reader and covers holes in doors left from previous deadbolt cutouts.


Software Features
  • User-friendly, intuitive solution protects client investment and simplifies integration with other building systems
  • Reduces material and labor costs associated with rekeying
  • Standard connectivity (Ethernet LAN -TCP/IP) makes it easy to network with existing compatible systems programming functions
  • Resident and employee credentials can be cancelled on an individual basis
  • Time-based access control system includes user-selectable keycard expiration
  • High security key encryption, proprietary and unique to each installation
  • Eight (8) authority levels to enable access controls.
  • Extensive reporting capabilities with a complete system audit trail
  • Eleven (11) lock-access levels for greater key control


Lock Features
  • All-metal, heavy duty locksets
  • One-inch solid metal deadbolt for added protection and privacy (optional automatic deadbolt)
  • Infrared communications link for programming and auditing
  • Mortise, cylindrical, exit device, and remote access controller available
  • Standard mechanical key override
  • Drainage system designed to prevent internal build-up of condensation


For more information, contact us at:
860-436-4664 / security@jks-systems.com
www.jks-systems.com

Thursday, September 22, 2016

JKS Access Control Solutions Week – HID Lumidigm® V-Series V4xx Fingerprint Sensors and Modules


The Lumidigm V4xx Fingerprint Sensors and Modules combine convenient and reliable biometric authentication with variety of security features including strong liveness detection, data encryption and tamper resistance to provide an exceptional user experience while eliminating fraud and protecting identities.
Ideal for banking applications, the V4xx offers individual bank customers easy and worry-free access to their accounts. And, because institutions need to know who is actually present for the transaction rather than simply who has the card or knows account details, the V4xx provides a cryptographically secure channel that is protected by tamper detection for true end-to-end security.


Key Benefits
  • Eliminates fraud — Knowing who is transacting is critical. Biometric authentication binds a credential to an individual, ensuring that the person transacting is who they claim to be.
  • Establishes trust — Data communications between the V4xx and the institution's systems are secure, ensuring the integrity of the transaction.
  • Simplifies access — Quick and easy to use, the V4xx allows individuals to access their accounts with a single touch of a finger.


The V4xx supports multiple deployment scenarios to meet the specific system requirements of each business. Simplify financial transactions for users while eliminating fraud for financial institutions with the Lumidigm V4xx Fingerprint Sensors and Modules.

Key features of the Lumidigm V-Series V4xx Sensors and Modules are as follows:
  • Cryptographic toolkit
  • Physical tamper resistance, detection and response
  • Mutual authentication between the host and the sensor
  • Encrypted and authenticated firmware updates
  • Lumidigm multispectral fingerprint technology with liveness detection


The customizable V4xx may be deployed unlocked in anticipation of future enablement of cryptographic features; off-the-shelf with one of five provided cryptography transaction models; or as a fully customized solution with a proprietary, customer-specific cryptography transaction model.
For maximum flexibility, the unlocked V4xx is backwards compatible to SDK v2.50 and can be deployed alongside previously deployed Lumidigm V3xx sensors.

For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Wednesday, September 21, 2016

JKS Access Control Solutions Week – HID EntryProx™



HID's EntryProx™ stand-alone reader truly stands alone in what it delivers. Compatible with all HID proximity cards and key tags, EntryProx™ provides single-door proximity access control and is ideal for unique applications. The reader, designed to be both weather and vandal-resistant, can be mounted indoors or outdoors up to 10 feet away from the control unit using the detachable antenna module. The versatile, attractive unit is easily modified to become an on-line reader by switching to Wiegand output mode, allowing it to connect to any OEM controller and provide card and PIN output.
The ADA-compliant 12-position keypad features large white-on-black numbers, enabling PIN entry or programming, with optional audio feedback and a raised dot on the 5 key. For extra security, EntryProx's keypad incorporates the "invalid PIN" lockout feature, preventing unauthorized trial-and-error PIN code entry.
The reader also features faster programming, enabling end-users to batch load up to 2,000 HID cards or key tags, in any format up to 37 bits, by entering a single keypad command sequence. A Block Delete feature allows for efficient badge administration by deleting a sequential range of cards / key tags from the EntryProx by user location.


Key Features
  • Ideal for Unique Applications - Proximity access control for small installations or remote locations.
  • Trouble-Free Keypad Input - Extra secure keypad enables PIN entry or programming.
  • Remote Monitoring - Configurable to be used in conjunction with an on-line system.
  • Faster Programming - Batch load up to 2,000 HID cards or keytags with a single keypad command sequence.
  • Efficient Badge Administration - Block Delete allows deletion of cards/keytags by user location.
  • LEDs - Bi-Color (Red/Green), Amber, Infrared (use with optional palmtop printer)
  • Sounder - 4000Hz, defeatable


For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Tuesday, September 20, 2016

JKS Access Control Solutions Week – HID CP1000 iCLASS SE Encoder

The iCLASS SE® Encoder provides an ideal solution for encoding and managing credentials and configuring readers. The encoder makes it possible for end-users to add an additional layer of security to card credentials, independent of card technology.Adding Secure Identity Objects (SIOs) to card credentials enhances overall system security by enabling cards and readers to establish that they are part of a trusted access control population. Both reader and device establish trust through mutual recognition of the SIO prior to permitting access. The system will deny access to any device that does not contain the SIO, such as cloned or other unauthorized credentials.The iCLASS SE Encoder provides a flexible solution to easily facilitate migration from one card technology to another. The encoder accomplishes this by allowing users to simply extract the existing access control data from a credential and write the data to a new credential. Alternatively, users can first “wrap” the existing access control data in an SIO for higher security and then write the data back to the existing credential.


Key Features
  • Supports a wide variety of credential technologies including; iCLASS Seos®, iCLASS SE, iCLASS, MIFARE DESFire™ EV1, HID Prox and other technologies
  • Enables upgrade from standard HID access control credentials to credentials secured with more secure HID Elite or user defined custom keys
  • Programs Genuine HID or third-party credentials by downloading appropriate Encoder Credential Credits
  • Manages custom data on contactless cards such as iCLASS Seos to enable third party applications (i.e. time and attendance)
  • Available as either a desktop encoder or as an embedded solution within a FARGO® card printer


Host Interface
  • Host Interface: USB 2.0 CCID (also compliant with USB 1.1)
  • Transmission speed: 12 Mbps (USB 2.0 full speed)


For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Monday, September 19, 2016

Welcome to JKS Access Control Solutions Week – HID SmartID & SmartTrans

The SmartID® ISO 14443 reader and The SmartTRANS® ISO 14443 and 125 kHz reader are flexible, highly secure and stylish contactless smart card readers that are ideal for customers that require a customizable reader for new or existing installations and customers migrating from the most popular 125 kHz readers to 13.56 MHz ISO 14443 smart cards. Designed for a wide variety of applications from entry level access control to secure ID management, the reader family is completely configurable for every access control application challenge.
Both of these readers offer the ultimate choice in interoperability and programmability. Its unique capabilities, such as reading any MIFARE® sector and/or DESFire® application data file, meet all installation requirements.


SmartID
This line includes single-technology 13.56 MHz, multi-technology 13.56 MHz and 125 kHz (HID Prox) and single-technology 13.56MHz with biometric authentication. Augmenting the iCLASS® product line, SmartID launches HID into mature MIFARE/DESFire 13.56 MHz markets, with the ability to provide card and reader solutions no matter what the smart card technology.
SmartID readers provide one of the broadest ranges of card compatibility in the industry and can be configured as a specific solution for each project. The SmartID reader is available with or without keypad, adding an extra layer of protection for higher security installations.
Key Features:
  • Custom Configurations - Completely configurable for every access control application challenge.
  • Open Architecture Design - ISO 14443A MIFARE®/DESFire® Contactless smart card, compatible for broad card interoperability.
  • HID MIFARE - Supports secure MIFARE applications including HID Corporate 1000 card formats
  • Field Upgradeable - Use cards or a serial connection to upgrade reader firmware and/or field configuration


SmartTrans
SmartTRANS readers offer one of the broadest ranges of card compatibility in the industry and can be configured as a specific solution for each. The SmartTRANS reader is available with or without keypad, adding an extra layer of protection for higher security installations.
Key Features:
  • HID Prox Compatibility - Fully compatible with all HID Prox 125 kHz card formats.
  • Custom Configuration - Completely configurable for every 13.56 MHz access control application challenge.
  • Open Architecture Design - ISO 14443A MIFARE®/DESFire® Contactless smart card, compatible for broad card interoperability.
  • HID MIFARE - Supports secure MIFARE applications including HID Corporate 1000 card formats
  • Field Upgradeable - Use cards or a serial connection to upgrade reader firmware and/or field configuration


For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Saturday, September 17, 2016

JKS Professional IT Services – IT Support


Routine maintenance can identify any hardware or equipment that may need to be replaced or upgraded before it affects productivity. We manage the maintenance on all your systems including: desktop computers, network infrastructure, servers, routers, switches, cabling, etc. Our highly trained technicians perform regular IT health checks. This proactive approach reduces the number of issues your employees face by identifying and correcting any problems that may arise before they happen.
Failure to perform routine IT maintenance can result in slower systems and shortage of available disk space. These problems may seem minor at first, however, they can quickly grow into severe issues with your computer systems, even causing them to crash completely.

In addition to the aforementioned maintenance, companies should perform security-related maintenance tasks such as regular virus and spyware scans, frequent data backup, and regularly changing passwords to prevent any breaches in your network or computers. Web browsers are the central reason for cyber-crimes and other vulnerabilities that can easily be exploited when users visit malicious websites.

It can greatly benefit your company to outsource mission critical IT tasks, since they frequently require dedicated resources. Our maintenance services help you reduce support costs and ensure effective performance. Because regular maintenance ensures your company can remain up and running, we can handle the tasks for you and allow you to focus entirely on your central business.

Contact us now to learn more about JKS IT Maintenance!
msp@jks-systems.com / 860-436-4664

Thursday, September 15, 2016

JKS Professional IT Services - The Rewards of Outsourcing IT


  • Access to the latest and greatest in technology. You may have noticed how rapidly software and hardware becomes obsolete in this industry. Outsourcing gives you the benefit of having more than just one IT professional. And since it's the core competency of the company, they can give you sound advice to make the most out of your IT dollars.
  • Cost savings. Outsourcing your IT services provides financial benefits such as leaner overhead, bulk purchasing and leasing options for hardware and software, and software licenses, as well as potential compliance with government regulations.
  • High quality of staff. JKS looks to hire staff with specific qualifications and certifications. You may not know what to look for if you're hiring someone to be on staff full-time, so you may hire the wrong person for the job.
  • Flexibility. JKS employees have multiple resources available to them, while internal staff may have limited resources and capabilities.
  • Job security and burnout reduction for regular employees. Using JKS for our IT needs removes the burden from your staff who has taken on more than he or she was hired for because "someone needs to do the job."



Contact us now to learn more about Outsourcing your IT needs with JKS!
msp@jks-systems.com / 860-436-4664

Wednesday, September 14, 2016

JKS Professional IT Services – IT Support

JKS Professional IT Services – IT Support

  • Cost Savings: Having a dedicated IT department requires multiple professional IT staff and can be costly. Associated costs include: facility space to house an IT department, salaries for staff, benefits, and additional management for the department. Our services provide these IT services at a much lower cost to you.
  • 24/7/365 Support: Our IT Support services are available to your company 24 hours a day, 7 days a week, all year long for a much lower cost than keeping staff on hand to provide this level of support.
  • Advanced Technology: Our staff is certified and well versed on new technology and continuously improves that knowledge through training and education programs. We can assist you in maintaining the newest technology to give you a competitive edge in the market, while allowing you to remain focused on your business.
  • Proactive support & maintenance: We can prevent downtime before it happens by providing support and continued maintenance to your employees and IT systems.
  • Remote monitoring: We can remotely monitor your systems to ensure they are always running at their peak. We are also able to view your screen to provide assistance with any questions or troubleshooting you have.
  • IT Asset Management & inventory control: We identify, audit, and maintain workstations, printers, routers, and servers as well as maintain detailed information regarding all your hardware and software.
  • Automatic software, patch, hot fix, & update deployment: We can install new software or push out any required patches or updates to your systems without interruption to you.
  • Storage, backup, & disaster recovery: We provide cloud storage, backup, and disaster recovery to ensure the security of your data and systems.
  • Tighter IT security & compliance: We can ensure your networking and computer systems are highly secure by implementing firewalls and other security protocols. Many businesses now conduct transactions through the internet, increasing the need to keep customer and company data secure. We will consult with you to determine your security needs and assist you in choosing the best options for your company.


JKS will consult with you to determine the exact needs for your company.

Contact us now to learn more about JKS IT Support!
msp@jks-systems.com / 860-436-4664




Monday, September 12, 2016

Welcome to JKS Professional Services Week!

JKS Professional IT Services
The Reasons of Outsourcing IT


  • Reduce and control operating costs. When you outsource, you eliminate the costs associated with hiring an employee, such as management oversight, training, health insurance, employment taxes, retirement plans etc.
  • Improve company focus. Outsourcing lets you focus on your core competencies while another company focuses on theirs
  • Gain access to exceptional capabilities. Instead of just the knowledge of one person, you benefit from the collective experience of a team of IT professionals. JKS staff has multiple certifications and training in areas to suit your business.
  • Free internal resources for other purposes. Outsourcing allows you to retain employees for their highest and best use, rather than wasting their time on things that may take them longer than someone who is trained in these specific areas.
  • Maximize restructuring benefits. When you are restructuring your company to improve costs, quality, service, or speed, your non-core business functions may get pushed aside. They still need to be handled, however, and outsourcing is an optimal way to do this. Don't sabotage your restructuring efforts by failing to keep up with non-core needs.
  • Make capital funds available. By outsourcing non-core business functions, you can spend your capital funds on items that are directly related to your product or your customers.
  • Reduce Risk. Keeping up with technology required to run your business is expensive and time consuming. Because professional outsourced IT providers work with multiple clients and need to keep up on industry best practices, they typically know what is right and what is not. This kind of knowledge and experience dramatically reduces your risk of implementing a costly wrong decision


Contact us now to learn more about Outsourcing your IT with JKS!
msp@jks-systems.com / 860-436-4664

Friday, September 9, 2016

JKS Campus Security Solutions Week Continues #4 – Benefits of Having Campus Security

  
Whether it be a college, medical, institutional, residential, or any other campus, having physical security is a must.

JKS offers CCTV, access control, and security software.

An access control system offers a number of advantages, including:
  • Automatically lock or unlock doors at pre-determined times
  • Instantly activating a campus lockdown at anytime
  • Mobile remote control through smartphones and tablets
  • Door alarms to prevent propped-open doors
  • Immediately deactivate of reported lost or stolen card keys
  • Create a new card quickly
  • Maintain an audit trail listing card reader activity


A CCTV system offers a number of advantages, including:
  • ·         Increased deterrent
  • ·         Safer working, living, and visiting environment
  • ·         Reduced theft
  • ·         Physical Protection to property  
  • ·         Increased detection
  • ·         Eliminate fraudulent insurance claims
  • ·         Remote monitoring
  • ·         Reduced fear of crime
  • ·         Receive warnings in advance
  • ·         Increased professionalism

  • A security software system offers a number of advantages, including:
  • ·         Minimizes risk
  • ·         Reduces operational costs
  • ·         Integration
  • ·         Improves situation response times
  • ·         Enables compliance




For more information on Campus Security, contact JKS at:
security@jks-systems.com / 860-436-4664


Thursday, September 8, 2016

JKS Campus Security Solutions Week #3– Axis PTZ Dome Network Camera



Axis PTZ dome network cameras provide pan, tilt and zoom functions, enabling wide area coverage and great details when zooming in.



The PTZ domes may support features such as:
  • ·         Guard tour
  • ·         Tour recording
  • ·         Audio, input/output ports for external alarm devices
  • ·         Axis' Zipstream technology
  • ·         Gatekeeper functionality
  • ·         Autotracking
  • ·         AXIS Camera Application Platform for intelligent video applications
  • ·         Weather-proofing - including Arctic Temperature Control for extremely cold conditions


A wide range of accessories is available, including joystick for easy maneuvering and mounting kits for indoor/outdoor installations.

For more information on Network Cameras, contact JKS at:
security@jks-systems.com / 860-436-4664


Wednesday, September 7, 2016

JKS Campus Security SolutionsWeek #2 – Aperio™ Assa Abloy Wireless Lock Technology

http://www.intelligentopenings.com/en/site/intelligentopenings/products/wireless-access-control/aperio/

Aperio offers the same real-time communication as traditional access control without the inconvenience of wiring the door. Aperio technology is a global wireless platform that reduces the cost and inconvenience of traditional access control – without the hassle of complex site surveys. It utilizes local wireless communication between the lock and a communications hub to connect to an online electronic access control system. This offers facilities an easy, affordable way to expand the reach of existing access control systems and secure additional openings.

Features
·         Utilizes IEEE 802.15.4 wireless communication between the lock and an Aperio hub that is connected to the electronic access control system
·         Real-time communication to the access control system for greater security and control
·         Real-time door status monitoring
·         Advanced data security with standard encryption techniques
·         AES 128-bit encryption
·         Global wireless platform that addresses a wide range of applications and security requirements
·         Supports HID® 125 kHz proximity or 13.56 MHz iCLASS® (full authentication, all formats) credentials

Contact JKS now to learn more!
security@jks-systems.com / 860-436-4664

Tuesday, September 6, 2016

JKS Campus Security Week #1 -Ameristar by Assa Abloy

Welcome to JKS Campus Security Solutions Week – Ameristar by Assa Abloy Commercial Fence Applications
Finding a fence solution that will keep residents and students safe and protect the perimeters of education, medical, and living facilities is an easy solution when using ornamental fence solutions by Ameristar.
Preferred Choice: Montage II
  • ·         Good for projects for schools and universities
  • ·         Made up of heavy rails that are welded using state-of-the-art fusion technology
  • ·         True to the old world look of wrought-iron fence


Welded Steel Option: Montage Industrial
  • ·         Budget minded school fence project
  • ·         Lighter alternative to the heavy industrial fencing
  • ·         Posts provides this ornamental fence a robust security profile.

Welded Steel Option: Montage Commercial
  • ·         Number one alternative to chain-link fence
  • ·         Standard for security fencing.


For Special Heights & Colors: Aegis II
  • ·         Consists of pickets and a unique double wall
  • ·         More flexible than typical decorative
  • ·         Easy to fabricate custom fence heights and custom rail placements

For Special Heights & Colors: Aegis Plus
  • ·         Can be customized to match rail spacing of any existing fence
  • ·         Ability to place the rail at any location on the fence panel and the fence may be manufactured to any specified height or custom color for commercial projects
  • ·         Perfect choice for a light commercial ornamental fence application that requires non-standard heights, rail spacing, and/or colors

Aluminum Option: Echelon II
  • ·         Strongest and most durable aluminum fence available on the market
  • ·         Assembled with an internal picket to rail retaining rod, making this aluminum fence a more attractive


Contact JKS now to learn more!
security@jks-systems.com / 860-436-4664

Monday, September 5, 2016

End of Cisco Solutions Week -Cisco Nexus 1100 Series Cloud Services Plat

Cisco Nexus 1100 Series Cloud Services Platforms
               
Comprehensive Platform for Cloud Services
Now it’s easier to deploy cloud network services for the virtualized data center infrastructure. The Cisco Nexus 1100 Series Cloud Services Platform (CSP) offers a dedicated hardware platform that simplifies management and compliance, and improves performance.


Features and Capabilities
The Cisco Nexus 1100 Series Cloud Services Platform (CSP) offers customers several benefits, including:

·         Simplified Management and Compliance - When placing management and control path elements, such as the Cisco Nexus 1000V Virtual Supervisor Module (VSM), on the CSP, you can manage policies separately from virtualization administrators. This makes it easier to attain compliance and audit requirements, and reduce administrative errors.
·         Better Performance - Offloading the VSM to a dedicated platform can deliver scalability and performance improvements to the virtualized data center infrastructure.


For more information, Contact JKS at;


www.jks-systems.com

Friday, September 2, 2016

JKS Cisco Solutions Week #5 -Cisco 5900 Series Embedded Services Routers

JKS Infrastructure Solutions – Routers


Keep Mobile Networks Operating in Harsh Environments
Cisco 5900 Series Embedded Services Routers (ESRs) provide highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links. They solve critical size, weight, and power challenges, and can operate reliably in harsh environments. These routers are powered by Cisco IOS Software and feature Cisco Mobile Ready Net capabilities.


Features and Capabilities
Cisco 5900 Series Embedded Services Routers can be used to establish mobile networks in vehicles. They also extend enterprise resources more securely to workers in harsh environments such as public safety, exploration, transportation, and defense. The Cisco 5900 Series portfolio offers a range of form factors to address diverse requirements.
  • ·         The Cisco 5915 Embedded Services Router (ESR) is a PCI-104-based card that provides two Fast Ethernet routed ports, and three Fast Ethernet switched ports.
  • ·         The Cisco 5940 ESR is a CompactPCI (cPCI)-based card offering four Gigabit Ethernet (GE) routed ports.
  • ·         The Cisco 5921 ESR is a software router application designed for small, low powered Linux devices.


For more information, Contact JKS at:

www.jks-systems.com

We are pleased to announce the launch of our brand new website!

 After all the hard work and dedication, we are delighted to officially launch on September 2, 2016. The new site launch is available and the URL is www.jks-systems.com

Our goal with this new website is to provide our visitors an easier way to learn about JKS services and solutions and to establish this portal as a source of information for those who visits our site.

The case studies and references will highlight the projects we have completed and outline the value created for each client as a result.

We will be constantly updating our content with helpful information, articles, blogs, newsletters, company announcements and client successes. Eventually, our website will be an IT Infrastructure and Security Systems Library!

We would also like to thank our partners who constantly share the latest product/service developments with us.

For any questions, suggestions, feedback or comments, please E-mail us at info@jks-systems.com.


Thank You!