Upload
lewis-horton
View
215
Download
0
Embed Size (px)
Citation preview
1
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Managing Multiple Access
& Entry Points
2
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
“There are RISKS and COSTS to a program of ACTION.
But they are FAR LESS than the long range risks and the
costs of comfortable INACTION.” - JFK
3
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
A Current Corporate ScenarioEnterprise Security Platform
Track AssetsTrack Assets
PhysicalAccess Control
PhysicalAccess Control
Locate Employees & Visitors
Locate Employees & Visitors
And OtherApplicationsAs Needed
And OtherApplicationsAs Needed
VoiceInterface
VoiceInterfaceAuthenticate
VehiclesAuthenticate
Vehicles
PC & Network LogonPC & Network Logon
Interactive
Management
Platform
4
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Some Challenges in an Integrated Environment
Concerns About
SAFETYUncontrolled
Access to Records/Loss
Of Information
Loss Of Corporate Assets like
Test Equipment, Computers, A/Vs, etc.
Zero In - Zero Out
Missing Staff/ Violence
against Staff
5
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Integrated Security Solution Integrating disparate
technologies and complex security processes providing visibility across your extended environment through Exception Based Event Management.
Accelerating absolute authentication & real time locating by functioning locally or globally.
Delivering more hard dollar value than other security investments, through scalable and interoperable Solutions.
6
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
The “Solution” ~ Integrated Management
People Places
TimeAssets
LocateLocate MonitorMonitor
AuthenticateAuthenticate
ManageManage
= Safety
Today, organizations are seeking effective method to Identify, Authenticate and Monitor, both People and Assets to ensure High Level
Safety thus enhancing Security.
7
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Solutions
Improve SAFETY
Authenticate & Control Access To
Information
Real Time Asset
Location
Global Termination Management
Restrict Access, Locate Staff & Emit
Alarms in Crisis
8
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
The Solution• Provide the View, Who with
What, When and Where
• Integration with CCTV & other Technologies
• Hands free solution – (when desired)
• Provide a security solution to protect assets from loss or theft
• Provide a Safety Network for protecting employees
• Paperless property pass capability
• Improve enrollment task
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Overview Of A
Methodology
10
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Phone : +1 (770) 319-1930
ThankYou
11
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Evolution of Tracking Technology
IRFID technologyReal-Time IR/RF wireless
communicationExact location
Long Range 50-75 feet
Bar Code
Contact
Tags
Smart Tags
ActiveTrackin
g
Contact Smart CardRequires contact
RFID technologyRead-Only or Read/Write
Contact-lessShort Range 3-5 inches
Back
12
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Evolution of Biometrics Technology
Back
Finger-Printin
g
Uni-modal
Biometrics
Multi-modal
Biometrics
Fingerprinting,Hand Geometry
Facial/IRIS/Retina RecognitionVoice Pattern Recognition
Integrated BiometricsMobile Environment Wireless Networks
Range Unlimited
13
Hosted by:June 23-26, 2003 • New
York CityCopyright 2003
Evolution of Voice Technology
Voice Mappin
g
IVRs
ASR & Voice
Verification
IMRs
Interactive Voice Response
Advanced Speech RecognitionVoice Verification
Interactive Media Reponse
Back