hosted by: june 23-26, 2003 new york city copyright 2003 1 managing multiple access & entry...

13
1 Hosted by: June 23-26, 2003 • New York City Copyright 2003 Managing Multiple Access & Entry Points

Upload: lewis-horton

Post on 02-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

1

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Managing Multiple Access

& Entry Points

Page 2: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

2

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

“There are RISKS and COSTS to a program of ACTION.

But they are FAR LESS than the long range risks and the

costs of comfortable INACTION.” - JFK

Page 3: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

3

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

A Current Corporate ScenarioEnterprise Security Platform

Track AssetsTrack Assets

PhysicalAccess Control

PhysicalAccess Control

Locate Employees & Visitors

Locate Employees & Visitors

And OtherApplicationsAs Needed

And OtherApplicationsAs Needed

VoiceInterface

VoiceInterfaceAuthenticate

VehiclesAuthenticate

Vehicles

PC & Network LogonPC & Network Logon

Interactive

Management

Platform

Page 4: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

4

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Some Challenges in an Integrated Environment

Concerns About

SAFETYUncontrolled

Access to Records/Loss

Of Information

Loss Of Corporate Assets like

Test Equipment, Computers, A/Vs, etc.

Zero In - Zero Out

Missing Staff/ Violence

against Staff

Page 5: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

5

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Integrated Security Solution Integrating disparate

technologies and complex security processes providing visibility across your extended environment through Exception Based Event Management.

Accelerating absolute authentication & real time locating by functioning locally or globally.

Delivering more hard dollar value than other security investments, through scalable and interoperable Solutions.

Page 6: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

6

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

The “Solution” ~ Integrated Management

People Places

TimeAssets

LocateLocate MonitorMonitor

AuthenticateAuthenticate

ManageManage

= Safety

Today, organizations are seeking effective method to Identify, Authenticate and Monitor, both People and Assets to ensure High Level

Safety thus enhancing Security.

Page 7: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

7

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Solutions

Improve SAFETY

Authenticate & Control Access To

Information

Real Time Asset

Location

Global Termination Management

Restrict Access, Locate Staff & Emit

Alarms in Crisis

Page 8: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

8

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

The Solution• Provide the View, Who with

What, When and Where

• Integration with CCTV & other Technologies

• Hands free solution – (when desired)

• Provide a security solution to protect assets from loss or theft

• Provide a Safety Network for protecting employees

• Paperless property pass capability

• Improve enrollment task

Page 9: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Overview Of A

Methodology

Page 10: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

10

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

[email protected]

[email protected]

Phone : +1 (770) 319-1930

ThankYou

Page 11: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

11

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Evolution of Tracking Technology

IRFID technologyReal-Time IR/RF wireless

communicationExact location

Long Range 50-75 feet

Bar Code

Contact

Tags

Smart Tags

ActiveTrackin

g

Contact Smart CardRequires contact

RFID technologyRead-Only or Read/Write

Contact-lessShort Range 3-5 inches

Back

Page 12: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

12

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Evolution of Biometrics Technology

Back

Finger-Printin

g

Uni-modal

Biometrics

Multi-modal

Biometrics

Fingerprinting,Hand Geometry

Facial/IRIS/Retina RecognitionVoice Pattern Recognition

Integrated BiometricsMobile Environment Wireless Networks

Range Unlimited

Page 13: Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points

13

Hosted by:June 23-26, 2003 • New

York CityCopyright 2003

Evolution of Voice Technology

Voice Mappin

g

IVRs

ASR & Voice

Verification

IMRs

Interactive Voice Response

Advanced Speech RecognitionVoice Verification

Interactive Media Reponse

Back