Presentation is loading. Please wait.

Presentation is loading. Please wait.

SAFE Suite of Applications

Similar presentations


Presentation on theme: "SAFE Suite of Applications"— Presentation transcript:

1 SAFE Suite of Applications

2 The Quantum Secure Solution: The SAFE Suite
Physical Identity & Access Management Compliance & Risk Management Security Intelligence Identity & Event Correlation

3 SAFE Policy Server Provides the ability to centrally define security policy rules and workflows Patented graphical tool allows easy flowcharting of a security policy rule Orchestrates execution of complex rules/workflows across multiple systems Policy Automation in SAFE Microsoft Visio based interface Drag-and-drop and link “live objects” to create schematic representation of a policy System automatically converts the drawing into rule set for the underlying systems Includes out-of-the-box rules based on proven best practices Vik SAFE Policy Editor – Easy visual way to define and manage policies/workflows

4 SAFE Integration Framework
Provides the foundation for bi-directional data exchange with integrated systems Out-of-the-box agents for more than 50 PACS and other systems like HR, IDM, ERP, LDAP, Background Check, Training, Mass Notification, Biometrics etc. About SAFE Agent Built-in publish/subscribe functionality Real-time and event-based processing Guaranteed message delivery Conflict and acknowledgment processes Message translator and normalizer Schema and Security Configuration Download Manager Pre-built system specific data model, i.e. PACS, IDM Agent Configuration Utility – one place to manage all connectors

5 SAFE Physical Identity & Access Management
Centrally manage all types of identities in the interest of physical security Includes pre-defined rules and workflows for on-/off-boarding of physical identities, access provisioning and access change management Assign access levels to an identity across disjointed PACS Complete audit trail into all transactions executed within the system and between SAFE and external systems

6 Key Capabilities: Physical Identity and Access Manager
One place to manage all types of identities across all employers Manages access areas, their owners and creates virtual zones Provides a central location to search and assign access across disparate PACS Relationship Management Employee/Employer Contractor/Sub-Contractor Role-based, Workflow based access assignment SAFE PIAM Centrally manages physical identities, their access details, results of security check, and access history Automates on-/off-boarding, rule-based access provisioning and allows creation of virtual access zones and access profiles The screenshot shows how an identity’s access across disparate PACS can be managed within one interface. For more details, refer SAFE PIAM product presentation One place to assign access to an identity across disparate PACS

7 Key Capabilities: Web Badging
Centrally manage badges for all types of identities across all facilities Ensures policy-based production and issuance of badges Captures all necessary data such as photo, signature, biometrics within one console by integrating with all types of peripherals Automates workflow and notification based on change of certain badge or identity attributes Badge Design Data Capture 1 2 Badge Production Badge Management 3 4 SAFE Web Badging Automates badge management independent of locations or PACS. Provides rule-based badge production, assignment of one or more badges to a cardholder. Enables printing and encoding into different card types as a single process Provides a graphical drawing board environment to design multiple badge templates. Includes stencil items which can be dragged, dropped and placed to create a templates The screenshot shows the interface for assigning badges to a cardholder and the ability to print/encode the badge using a badge template defined within the system. For more details, refer SAFE Badging presentation

8 Key Capabilities: Web Badging (cont.)
Centrally manage badges for all types of identities across all facilities

9 Key Capabilities: Self Service
Web-based interface that automates end user-initiated requisition and approval workflows for physical access request, badge request etc. Allows users to make request on behalf of other personnel Easily incorporates multiple levels of approval Sends automated notifications to users at various stages of the request fulfillment workflow End-user requisition Policy-based validation, task creation, and notification Review of request by approver (s) Processing of actions (e.g. provisioning access) Generation of reports/audit trails Self-service requisition and approval workflow within SAFE

10 Key Capabilities: Self Service (cont.)
One end user interface for making all types of physical security requests

11 Key Capabilities: Asset Management (metal key, etc.)
Centrally manages the issuance and tracking of physical security assets, like metal keys, parking permits, tokens Provides history of past assignments, audit and reporting Provides self-service interface to automate asset requisition and approval workflow Provides data for compliance reporting SAFE Asset Manager Provides central management, issuance, and audit of one or multiple physical security assets; ex.(Metal Key, Fobs, Tokens, Vehicle, Cell Phone, etc) provisioned to identities managed within SAFE PIAM. The screenshot shows details of an asset including the asset category, total count and status. For more details, refer SAFE Asset Manager product presentation Assign and track assets (metal keys) issued to identities

12 Key Capabilities: Visitor Identity Management
Allows web-based visitor pre- registration by hosts Manages list of visitors and provide the flexibility to share them across the organization Pre-defined policies for visitor and physical access approval, signed NDA verification, notifications, reminders and escalations Automates visitor provisioning into your PACS infrastructure Manages event visitors or large groups of visitors Pre-Registration Manage Registration Check-out Check-in Visitor Badge Issuance Usage Provisioning Automates the entire visitor identity management process

13 Key Capabilities: Visitor Identity Management (cont.)
Vik SAFE PIAM Centrally manages physical identities, their access details, results of security check, and access history Automates on-/off-boarding, rule-based access provisioning and allows creation of virtual access zones and access profiles The screenshot shows how an identity’s access across disparate PACS can be managed within one interface. For more details, refer SAFE PIAM product presentation Centrally manage access privileges for a visitor across disparate PACS

14 Key Capabilities: Contractor Registration
Provides self-service interface for sponsors/ authorized signers to submit new company and contract information Supports re-activation of deactivated companies *Contractor Registration Process – Initiated directly by contracting company

15 Key Capabilities: Contractor Registration (cont.)
Current Companies Submit contract approval document or LOV Company record updated with “pending contract Approved by authorized personnel Authorized signer notified of new contract Contracting Company Previous Companies SAFE Self-Service Contractor Registration Panel Submit contract approval document or LOV Company record updated with “pending contract Approved by authorized personnel Authorized signer notified of re-activation First Time Companies Signer provides Company info Submit contract approval document or LOV Data saved As .xml file SAFE agent Loads data as “pending” Approved by Authorized personnel Authorized signer notified of credentials

16 Key Capabilities: Data Match And Reconciliation
Automates various steps involved in physical identity data cleaning, matching and reconciliation Includes detailed algorithms to identify definite and potential duplicates Reconcile identity records across several sources at a time and at a high throughput rate Ensures policy-based action on reconciled physical identity data Results of duplicate records and iterate with matching settings

17 SAFE Compliance and Risk Management
Centrally managing all regulations and associated controls Automating assessment, remediation and reporting as per defined review cycle Automatically triggering compliance-based actions based on physical access events Enabling physical security change management based on regulatory policies Detailed reporting and risk analysis

18 Key Capabilities: Compliance Regulator
Allow security practitioners to enforce governance across diverse and disjointed physical access control systems Provides pre-built controls for the following regulations and verticals - NERC CIP, Sarbanes Oxley, FDA/DEA, CFATS, TSA Security Directives etc. Automates periodic reviews/audits of identities SAFE Compliance Regulator Automates compliance initiatives (for NERC, CFATS, SOX etc.) by allowing users to define and monitor controls. Automates assessment, remediation and reporting of controls’ compliance. Includes automated access audit/review functionality for area owners. The screenshot shows how all controls for a particular external regulation (NERC in this example) can be defined within one place in SAFE. SAFE comes with out-of-the-box control definitions for key regulations. For more details, refer SAFE Compliance Regulator product presentation Define and monitor all controls for external regulations/ internal standards

19 Key Capabilities: Document Manager
Provides ability to scan, store and verify paper/breeder documents (from flat-bed scanners or other input devices) associated with each individual Identity Provides policy-based approach to document collection, update and retrieval Allows Web-based access to documents Sends automated notification when documents need updates SAFE Document Management Integrates with scanner to collect identity documents. Automates scanning, file capture, indexing , storing & managing, retrieving, printing, auditing and compliance management for all documents. The screenshot shows how all documents associated with an identity (like I-9, application form) can be scanned and uploaded from within one integrated interface Scan, upload and manage documents related to an identity

20 Key Capabilities: Infraction Manager
Completely automates the entire process of managing infractions: Citation Issuance Penalty Determination (using infraction rules database) Correspondence and Hearings Badge Suspension on recurring violation or severe offense SAFE Infraction Manager Provides capability for organization to log any type of security policy infractions and associated penalties against PIAM managed identities for use in triggering notifications or automating access privilege changes The screenshot shows how a security officer can issue a citation using SAFE. The corresponding penalties/infractions are then automatically computed by the system. For more details, refer SAFE Infraction Manager product presentation Citation issued to an employee for safety violation

21 Key Capabilities: Watchlist Manager
Manages internal list of physical identities that are potential threats to an organization along with their risk profile and historical details Includes complex search algorithm to match identities including visitors on watch list Natively integrates with other SAFE apps (like PIAM, Visitor ID Mgmt) that can trigger search against the watch list database SAFE Watch List Manager Manages internal list of physical identities that are potential threats to an organization along with their risk profile and historical details. Includes complex search algorithm to match identities including visitors on watch list. The screenshot shows the historical details of contacts made by a person of interest. For more details, refer SAFE Watch List Manager product presentation Maintain the history of contacts made by a person in the internal watch list

22 Key Capabilities: Attestation Audit
Automates periodic reviews/audits of identities and their access by the area owners Provides users the capability to define and configure audits Automatically creates access audit tasks for area owners' review, based on the defined schedule Area owner view of reviewing and completing audit of personnel with access

23 SAFE Security Intelligence
Collects data from multiple external systems to generate cross application reports Provides interactive, point-and- click views of key physical security, facility and compliance related metrics Provides pattern/trend of the metrics over a time period Includes threshold analysis of alarm data to classify sites as high, medium and low risk sites

24 SAFE Security Intelligence (cont.)
Provides the ability to aggregate data from unprecedented number of physical and logical security systems Delivers a unique and flexible platform for easily creating complex analytical views Includes library of metrics based on best practices from across security departments

25 Key Capabilities: Security Reporter
Provides out-of-the-box and custom tabular and graphical reports. Includes a native report creation wizard with options for sorting, grouping and filtering of data Allows to schedule report delivery via automated or file upload Sample canned report available within SAFE

26 Key Capabilities: Identity Analytics (cont.)
Provides interactive dashboard views of metrics related to badge and facility usage by identities Pre-built metrics across sites, buildings and business units for: Facility utilization or occupancy for assigned and non-assigned badges Allocation of badges Badge usage Badge non-usage

27 Key Capabilities: Identity Analytics
Summary level dashboard view of unused badges

28 Key Capabilities: Alarm Analytics
Provides interactive, point-and-click dashboard views of alarm metrics like top alarms by sites, top devices by sites and provides pattern/trend of KPIs over a time period. Pre-built metrics across sites for All sites by device and alarm type Top sites by number of alarms Top alarm types by their count Top devices by the number of alarms

29 Key Capabilities: Alarm Analytics (cont.)
Summary level dashboard view of all sites and their alarm threshold levels

30 SAFE Identity & Event Correlation
Unified management of events and associated identities within one integrated console Data exchange interface for sharing identity status and usage related to physical security alarms Policy management to configure responses and actions to identity and alarm events Integrated reporting and analytics across identities and events

31 SAFE Event Correlation Engine
Unified User Management Single sign-on for user, ability to move back and forth between the two interface as if it were part of one application Bi-directional Data Exchange Real-time sharing of identity and event data between the two systems Quantum Secure partners with the best providers to optimize “response efficiency” by correlating identity data with events and automating business operation policies. Unified Policy Management Using SAFE to manage common policies and provisioning in Event Mgmt rules engine for alarm/event specific responses Unified Reporting and Analytics SAFE for unified reporting across identities and events and analytics dashboard for key metrics

32 SAFE Across Different Verticals
Business Drivers Deployments SAFE Solution Managing and processing employee identity credentials for facility access Compliance regulations such as DEA, FDA and HIPAA Integrating with hospital/HR systems to simplify processing for vetting new applicants Texas Children's Hospital Visitor Identity Management, Web badging, integration with patient management system Compliance regulations such as regulations such as BASEL II, GLBA, SAS 70, SOX Different types of access areas (branch ops, cash vaults, network access, printing rooms, etc.) Inside threats and fraud prevention World’s leading insurance provider PIAM, Single point of control over multiple standalone Access Control, Self-Service, standardization of processes, Real-time reporting Credentialing for a complex network of facilities, roles and related access Biometric database integration Centralized document management High cost of operations and manual processes Compliance Regulations - TSA, SIDA AAAE San Francisco International Airport (SFO), Toronto Pearson (GTAA), Aspen PIAM, Tenant Management, Document Management, Web Badging, Self-Service, TSA Security Directives, Infraction Management & Reporting Enrolling and managing PIV cardholder Interoperability between PACS systems and logical authoritative identity systems PIV card lifecycle management in PACS Web-based visitor enrollment and management for PIV and non-PIV cardholders The Port Authority of New York & New Jersey - World Trade Center, Leading federal health agency PIAM, Implement HSPD-12 Directives, administer PIV & PIV-I credentials to comply with the OMB M memo. Adhere to FICAM initiative for PACS modernization, PIV-PACS interoperability. Healthcare Financial Services Ports (Air, Sea) Government

33 SAFE Across Different Verticals (cont.)
Business Drivers Deployments SAFE Solution Enforcement and monitoring of compliance to NERC CIP requirements Processes, tools and procedures to monitor physical access to the perimeter(s) Visitor control program for visitors Pre-defined reports and interactive dashboard views into key process Top utility companies in US PIAM, Badge Manager, Compliance Regulator, Audit Attestation, Document Manager Security breaches due to partners, contractors and former employees Manual process to achieve compliance to regulations, conduct audits Manual attestation process BT (British Telecom) Asset Management, PIAM, VIM, Compliance Regulator, end-user self service Streamlined enrolment and badge issuance processes for visitors Elimination in manual interventions needed across multiple PACS Tying multiple cards and card formats to one identity and physical access privileges globally Symantec, Oracle PIAM, VIM, Security intelligence, reporting, compliance management, asset management Effective execution of badging and metal key management processes Integration with different systems like student information systems, access control systems, event management and dispatch systems Roger William University (RWU) Role-based assignment of access across the entire campus, reporting of compliance rqmt. such as FERPA and HIPAA, connectivity to campus registrar database Energy Telecom High-Tech Universities

34 Delivering Tangible Value
Operational Improvement Resulting Implication Retain existing PACS and integrating them with SAFE Saved ~$8 million towards acquisition costs Defined policy rules for managing cardholders centrally within SAFE Reduced time to provision access for identities within PACS by 88% Automated badging and access mgmt while complying with TSA directives Streamlined operations, improved customer service and compliance Deployed SAFE to automate processes and integrate with PACS Reported $10 return for every $1 investment in SAFE

35 Delivering Tangible Value
Operational Improvement Resulting Implication Automated badging and access mgmt while retaining existing PACS Reduced on-boarding time by 96% for new identities Automated key physical security processes Eliminated 95% of errors occurring from manual process Deployed SAFE to automate processes and integrate disparate PACS $1.2M YoY savings via operational cost reductions Automated visitor identity management efforts Reduced operational cost by $200,000 the first year


Download ppt "SAFE Suite of Applications"

Similar presentations


Ads by Google