© 2013 Tyco. All rights reserved. Tyco and the product names listed above are marks and/or registered marks. Unauthorized use is strictly prohibited.
Tyco Integrated Security
Advanced Services
World-Class Physical Security Integration Solutions Designed to Optimize Your Strategic Approach
MONITORING | ACCESS CONTROL | VIDEO SURVEILLANCE | RFID | INTRUSION DETECTION | EAS | FIRE & LIFE SAFETY | ADVANCED ENTERPRISE SERVICES
Safer. Smarter. Tyco.™
/ SOLUTION SPOTLIGHT /
Identity Management Automation Process (IMAP) Helps Streamline Human Resource Processes
Tyco Integrated Security, Advanced Services uses a process called, Identity Management Automation Process (IMAP) to help organizations solve business challenges, improve processes, reduce risk, support ROI requirements, and bolster operational efficiencies.
An in-house engineer uses the Identity Management Automation Process (IMAP) to design a solution that meets an organization’s individual needs.
For example, the graphic below shows how IMAP helps integrate disparate personnel systems and information databases. The new solution requires data entry at only one point. Once entered, the data will automatically populate across multiple systems – human resources, payroll, time and attendance, contractor verification, point of sale, vending and other directory systems.
IMAP maintains integrity across all systems, which can help significantly reduce the opportunity for input errors, improve satisfaction with customers and users, improve workflow, and help reduce risks associated with incorrect credentialing.
To learn more about Advanced Enterprise Services, call 1.888.446.7781, or visit us at www.tycois.com.
License Information: AL Alabama Electronic Security Board of Licensure, 7956 Vaughn Rd., Montgomery 36116, (334)
264-9388; AK 38381 5520 Lake Otis Pkwy., Anchorage, AK 99507; AR 0030740114 , AR E0055 - Regulated by Arkansas
Bd. of Private Investigators & Private Security Agencies, #1 State Police Plaza Dr., Little Rock 72209, (501) 618-8600; AZ
ROC281489; CA ACO7207, 977249; alarm company operators are licensed and regulated by the Bureau of Security &
Investigative Services, Dept. of Consumer Affairs, Sacramento, CA 95814; DC ECS1327; FL EF20000890, EF20000341,
EF0000478, EF0000950 GA LVA205386, -204776, -205526, LVU001160, -004635; HI CT-32427; IL 127001526; MA 45-C; MI
51032662206311, -4182 Pier North Dr. Ste. D, Flint, MI 48504; MN TS651063; NC 846-CSA - Alarm Systems Licensing Bd.,
1631 Midtown Pl., Ste.104, Raleigh, 27609 (919) 875-3611; NM 375283; NV 0077542; NY 12000305846, Licensed by NYS
Dept. of State; OH E16782, 50-18-1052, 50-25-1050, 50-29-0003, 50-48-1032, 50-50-1019, 50-76-0006, 53-89-1726, 53-31-
1582; OK 67; OR CLE322, 197010; PA Pennsylvania Home Improvement Contractor Registration Number: PA010083; RI
18004, 7059, AF-09170; TN ACC -1704, -1705, -1706, -1707, -1708, -1709, -1710, -1711; TX B00536-140 Heimer Rd. Ste. 100,
San Antonio, TX 78232 – Texas Private Security Bureau, 5805 N. Lamar Blvd, Austin 78752; UT 8390557-6501; VA 11-7584;
11-7573; 11-7582; 11-7587; 11-7580; 11-7575; 11-7591; 11-7589; 11-7578; 2705147765A; WA EC06 TYCOllS886OO, 11824 N
Creek Pkwy. #105, Bothell, WA 98011; WV 050291.
MS 15005633
• Information Data Silo Updates• Activity Reports• Audit Reports• Invalid Card Records• Duplicate Records• Data Errors• Rejected Records
• Issue Credentials• Update Issue Codes• Assign Access Rights
AccessControl
Databases
Access Control Compliance Diagnostics• Data Archiving• Activity Logs• E-mail Notifications• Exception Reports
1. Data Feeds
5. Updated Data to Return
2. Process Updates
4. Retrieve Updates
Key Benefits• Configurable• Secure• Workflow Processing• Increase Data Integrity• Decrease Manual Data Entry• Real-Time Data Exchange• Decrease Paper Handling
Key Benefits• Compliance• Risk Mitigation• Auditable• Operational Efficiencies• Automated Identity Management• Increase Productivity Without Increasing Operating Costs
3. Records Management
6. Diagnostic Deliverables
InformationSilos
ContractorVerification
Point-of-Sale/Vending
Active Directory
Time & Attendance
Human Resources
Silo Administrators Security Administrators
ADT Advanced Integration
Identity Enhancement
Framework
The ADT Identity Management Automation ProcessThe Tyco Integrated Security Identity Management Automation Process
Tyco Integrated Security Identity
Enhancement Framework
LT1115-00
// PHASE 1: DISCOVERY
In this critical first step we meet with key organizational stakeholders to gain an understanding of the strategic business objectives, and challenges, such as cost management, continuous operational improvement, and risk mitigation. In addition, we take inventory of current technologies and resources, as well as, review current policies and procedures.
// PHASE 2: ROADMAP
With a holistic approach, we provide strategic recommendations for an integrated solution - systems and technologies. We also:
• Provide suggestions to help facilitate continuous process improvement
• Update and/or automate policies and procedures• Identify systems that may feature dead-end technologies• Leverage the expertise of the industry’s most experienced team of dedicated IP Solutions professionals
/ World-Class Integration of Physical Security Solutions and Business Applications / Tyco Integrated Security, Advanced Services can help companies with a need to deploy complex, enterprise-wide, security solutions, increase ROI, optimize deployed business processes, and improve overall profitability. If our goals sound a little different for a security integrator, they definitely are.
We are at the forefront of designing, engineering and implementing security solutions that fully integrate with business applications to target strategic business outcome. By maximizing business applications through seamlessly integrating physical security solutions into the existing IT infrastructure, we help companies achieve a higher level of Security-Centric Business Process Optimization (BPO).
We have the knowledge and expertise to design enterprise security solutions that help you protect the bottom line while you grow the top line. Our solutions are currently helping more than 5,000 corporations increase business intelligence, improve information management processes, increase profitability, and maximize return on investment.
/ Strategic Approach: Enterprise Process Development Coupled with Enterprise Technology /Advanced Services’ highly trained staff of sales professionals, project managers, application engineers, network engineers, CAD designers, fabrication personnel, and installation technicians, help to make our Security-Centric process work as seamless as possible. Using thorough reviews, accurate designs, best-in-class principles, and enterprise-class security technologies, we can provide the best results for complex integration challenges.
/ Security-Centric BPO: Corporate Goals Brought to Realization /Our highly specialized process begins by understanding a company’s strategic goals. We invite key stakeholders, both technical and functional leaders, to present their perspectives, challenges, limitations, and concerns with the BPO improvement plan. Using the gathered information, our team will present cohesive recommendations for the entire solution, including infrastructure upgrades, physical security solution overlays, and suggested process modifications. The end-result is a Security-Centric BPO solution that won’t overwhelm IT infrastructures and delivers measureable results.
// PHASE 3: IMPLEMENTATION
Key components of this phase include, maintaining project plan timelines, risk mitigation, setting priorities, and training.
Our Dedicated IP Solutions Group of certified engineers and technicians, work closely with in-house IT professionals to design a unique and flexible framework capable of adapting to business, industry, and operational changes. Typically our engineers provide a 1-3-5 year phased implementation plan to help organizations have more fluid deployments. The end result is a solution that can drive operational efficiencies through integration with critical back office systems, offer competitive differentiation, generate long term revenue, and provide the lowest possible long term total cost of ownership.
• Human Resources• Time & Attendance• Database • Information and services • Reporting• Compliance• Auditing• Reduced Liability
• Access Control management platforms• PSIM, integration, and identity platforms • High-Availability, disaster recovery and virtual deployments• Managed and Hosted Services• IP video and storage technologies
Security-Centric BPO
Physical Security
• System migration planning and deployment• Networking infrastructure: - Design, optimization, monitoring and deployment• Network optimization and Monitoring Services: - Traffic engineering (QoS) - Health checks and performance monitoring • Diagnostic Services - Remote & On-Site • Baseline measurements and troubleshooting • Business Continuity/ Resiliency Planning
Information Technology
Business Applications
Our key capabilities and assets include:
• Eight global Centers of Excellence (6-US, 1-Canada, 1-global)
• More than 300 design and support associates• Highly trained sales team
» In-house project management, engineering, CAD design, and fabrication
» Dedicated IP Solutions Group » Breath & depth of capabilities » Unparalleled proven experience
» In-house training personnel and facilities » Factory certified technicians
• Industry Certifications: » 70+ team members certified by
Microsoft® » 40+ certified by Cisco with 3 CCIEs » 20+ NICET certified at Levels III & IV
• Direct relationships with OEM development teams
• Extensive inventory• Online software support, maintenance and
service (available 24/7) • World class monitoring centers, equipped with
state-of-the-art CRM systems (available 24/7)• Department of Homeland Security Safety Act
Certified
Security-CentricBPO
Physical Security
InformationTechnology
BusinessApplications
Infrastructure
System Solution Optimization
Improve Processes
Future State
Stakeholders
Strategy / Process Analysis
Design / Delivery
ActionableProjects
Implem
entation
Imple
men
tatio
n
Project Plan
Implement
Execution/Delivery
Vision
Information Technology
Physical Security
Lines of Business
Current State
// PHASE 1: DISCOVERY // PHASE 2: ROADMAP // PHASE 3: IMPLEMENTATION
{ • Timelines • Risk Mitigation • Prioritization of Service or Operations • Training
• Compliance• Business Intelligence• Situational Awareness
• Information Silos• Non-Integrated• Non-Enterprise
Feedback & ContinuousProcess Involvement1-3-5 Year Plan
Scope of Solutions