© 2018 Cloud Collected. All Rights Reserved.
560 Peoples Plaza #312
Newark, DE 19702
Cloud Weapons Express is a Manual Armory Solution is designed for weapons and other high value assets that are issued by armory personnel to authorized users.
Cloud Weapons Express Manual is an armory solution designed for weapons and other high value assets that are issued to authorized personnel.
Cloud Weapons Express is multi-location and multi-site, monitoring weapons and other high value assets that use our asset specific UHF Gen 2 passive RFID tags attached to them and are and are read and written to in real time using Cloud Collected hand held, wall mounted, portal, tablet or cell phone readers.
Cloud based, the RFID enabled system manages weapon transaction data as they are scanned in real time. Administrators can view which equipment was issued to which authenticated personnel and by which personnel at any time; helping you to maintain a Chain of Custody for your high value assets.
REQUEST QUOTE Download PDF
Depending on your organization, you may choose different approaches for weapon issue to track Chain of Custody on your weapons. If you need to manually scan weapons, either for weapon issue from an armory or inventory purposes, you will need a portable reader. If you would like to have automated weapon issue where weapons are read by fixed readers on portals, inside safes, lockers or cabinets, then you can use our RTLS system. With Cloud Weapons Express, both options can be used together and your system can be expanded at any time. Our Turnkey Solutions as a Service (TSaaS) are fitted to your needs, easy to implement, and capable of expansion at any time.
Portable readers are required to manually issue a weapon to personnel or take manual inventory of your assets.
Portable readers use custom software that ties directly into your cloud system to maintin reports and asset activity in one central location.
We currently provide portable devices in 7" and 10" rugged Tablets, light and heavy duty gun style hand held reader/writers and also cell phone add on readers.
Fixed readers will need to be installed at your locations one time and will automate your weapons issue by continiously monitoring your assets. We offer door/window portals, rack antennas, weapon safe antennas that are specifically designed for metal safes and more for use with our system.
The antennas are constantly monitored by the system for any change in status such as detected movement out of or into a monitored location. Any detected movement causes the RTLS reader module to recheck that specific antenna for additional movement. If the movement continues and is deemed by the communications module to be authenticated, the system allows the removal or return of the asset and records the details of the transaction. If the movement is not authenticated then the system goes into alert mode and immediate action is taken.
Portable readers are required to manually issue a weapon to personnel or take manual inventory of your assets. Portable readers use custom software that ties directly into your cloud system to maintin reports and asset activity in one central location.
Cloud Tablets can hold UHF Gen 2 and NFC readers or UHF GEN 2 and a Fingerprint reader facilitating 3 different levels of authentication. The Cloud Tablet is used for issuing and returns of weapons, cycle and physical counts and marshalling of weapons to a Cloud Tablet for transportation to another location. This tablet is available in a 10" and 7" model.
This PDA RFID Gen 2 reader writer comes equipped with an external patch antenna for long distance reading and writing. This unit is similar to the Cloud Tablet, just in a different form factor.
This small portable reader is designed to connect to your own Android device. Simply plug the reader into the 3.5 mm earphone plug and activate the Cloud Collected software.
REQUEST QUOTE Download PDF
At the heart of the system lies a powerful cloud based software tool-set that allows users to view real-time data on weapon usage as well as historic reports on personnel and weapons they use. Accessible for authorized users from any device with an internet connection.
Provides a quick real-time, auto-updating view of each locations weapon usage.
Watch assets move in and out of a location in real time on an auto-updating screen.
|Manual Weapons Issue
Our portable readers run custom software that is directly tied to your server system to keep your data in one place.
When using a Cloud Tablet to marshal weapons for Chain of Custody, you can review the GPS tracking of the tablet as the trip took place.
Query the system for weapon issue based on Date Range, Location, Asset, or Personnel filters. Other data points include, but are not limited to:
Review inventory reports to highlight which assets are not in the right place.
Once we determine your requirements, we configure a package to fit into your location.
The package will include everything you need to get up and running - from the RFID hardware and RFID tags to all software needed.
Using our web based cloud software, you manage authorized tags and customize any settings to fit your location(s).
Depending on the tag-type, mount the tag to the assets you are monitoring.
|RFID Tags||Many weapons and asset tags available; contact us to discuss your assets.|
UHF Gen 2
Multiple readers per location allowed
We use customized Safe and Rack antennas for standard installations.
For other installations, your choice of over 50 antenna types depending on your installation needs.
Note: Additional mounting hardware may be required depending on your setup.
NFC or UHF Reader
Palm Vein Reader
Portable Reader for weapons issue, inventory scanning, marshalling of weapons and more.
NFC and UHF Reader
Fingerprint Reader optional
Temporary Location Services (GPS)
Custom User Interface Software
|Local Collection Agents|
|Mini-PC||A Mini-PC will be installed at each location to control all hardware components (RFID Readers/Antennas). Network connectivity must be provided. The Mini-PC communicates with the cloud to determine which tags are authorized and log activity.|
Local agents are kept up to date by the cloud. Each location will always have the latest authorized tag information.
If there is a network outage at the location, the software will continue to run in a cached offline mode so that your operations will continue normally.
- Grant your staff access either by each location or across the entire organization.
- View logs of user activity.
- Upload your assets via a spreadsheet and/or manage them individually.
- Grant or revoke access to a location a per-asset level.
- Add additional data to each tag such as type and owner.
|Locations||View the status of assets at locations in real time.|
|Reports||View reports showing asset in and out activity by location, date and asset. Review your Chain of Custody for each weapon for each movement it makes. Export reports to Excel or print them for further review.|
Setup SMS or Email alerts from your system for:
- Location outages such as network or power failures.
- Specific tag activity; receive an alert when a specified asset is checked out too long or there is an unauthorized attempt to checked out the asset.
Looking to synchronize your current asset database system with ours? We offer a full RESTful API that allows you to get your data in real time.
- Asset and Personnel Synchronization
- Asset Activity Data Pulls
REQUEST QUOTE Download PDF