Download presentation
Presentation is loading. Please wait.
Published byCorey Lang Modified over 9 years ago
1
Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci dante.ricci @oracle.com Accelerating continuous improvement for transforming organization
2
Agenda PART I: Visitor iSecurity Solution Overview Problem Resolution Visitor iSecurity Definition Solution Footprint PART II: Solution Demo
3
Problem Resolution – Why do customers need it? Governing with Accountability Control Access Post 9-11 Heightened security required for all federal facilities Hundreds of military installations 525,000 Federally owned/leased buildings DOE Labs Intelligence facilities Allows organizations to track and maintain information on visitors Personal information, visitation history and visitation purpose National Security Advisor - Dr. Condoleezza Rice “Security is a concern of everyone in this county.....”
4
Visitor iSecurity Solution Definition Visitor iSecurity: Base Registration And Visitors Online A comprehensive, integrated web-based self- service registration and authentication system Originally designed as a COTS-based access/security solution for military and secure installations
5
Integrated Registration & Access Business Flow Facility/Security All Customer Data & Interactions stored in Visitor iSecurity Database Visitor Submits Necessary Forms Security Routes through Approval Process Security Sets up for ID process Visitor views Regulations, Completes Forms Visitor pulls Information off Web Visitor pulls Information off Web Security views Information Security Interacts with Customer Visitor engages Web Site Visitor
6
Visitor iSecurity Solution Strengths Collects data on ALL visitors Streamlines the registration process Different “views” for individuals/separate organizations Adapts easily for THREATCON Alert Status changes Enables analysis for trends /patterns Permits information sharing with other facilities/agencies
7
Visitor iSecurity Solution Benefits Increased security at gates/buildings Ease of use (enables self service – eliminates paper-based credential verification) Permanent electronic records Reduced security costs through standardized processes and improved issue-resolution process in the field Increased visibility of all visitors & contractors from a local and/or regional perspective Ability to coordinate with Homeland Defense efforts locally and nationally Standardization of check in/check out procedures Reduced bottleneck at entry points Increased visitor satisfaction and intelligence gathering through self-service capabilities
8
Key questions: How do you currently control access to your installation or facility? What types of problems do you encounter when authenticating visitors to your installation or building? Are you able to maintain accurate records on visitor entries and exits? Do you need to share information with other organizations related to your visitors and their activities at your installation or building? Customer organizations that are: Responsible for individual or multi-levels of security control Using paper-based access control systems With high turnover in security personnel Customer Organizations Interested in Visitor iSecurity
9
Security Departments Facilities Mgmt./Planning Depts. GSA – Public Building Services Chief of Naval Installations/CNI Army Installations Mgmt Agency Air Force Major Commands Customer organizations most interested in the solution: Provost Marshals Physical Security Officers Military/Federal Civilian Police Officers Planning & Administrative Officers CIOs/CFOs Who to engage? Who would utilize a Visitor iSecurity Solution? Whoever is responsible for managing the guard booths and visitation desks
10
iSupport Field & Mobile Service TeleService Oracle Portal, Application Server & Database Background Checks Background Checks Multiple Visitor Types Multiple Visitor Types Agency Points of Contacts Agency Points of Contacts On-Line Pictures On-Line Pictures Visitor Demographics Visitor Demographics Historical Views Historical Views 3 rd Party Wireless Biometric Devices Visitor iSecurity Solution Footprint
11
Department of Energy NASA GSA Ft. Sam Houston Ft. Belvoir Ft. Drum Ft. Leavenworth IMA Southwest USAF Electronic Systems Center Walter Reed Army Medical Center Customer Examples
12
Visitor iSecurity Summary Value Proposition Solution provides more advanced security for access control to installations and buildings required post 911 through an easy to use web-based COTS application that is secure, scalable and configurable to meet individual and organizational needs. How to build an ROI: Total Cost Analysis (TCA) * Automation (Offsets manpower reductions, increases productivity) * Expanded capabilities for issuance of IDs, badges, decals, etc.
13
Visitor iSecurity Demo Presentation
14
DEMO Flow: BarCode ID Process Option: Scan bar code upon exit of facility Visitor completes registration, submits for approval via web Information is uploaded to Provost Marshal’s console Note: Mobile MP’s may perform random scans Request is routed and approved by facility Visitor gets notice of approval, prints vehicle pass w/barcode Sentry @ gate authenticates with portable scanner –Cross Checks w/State/Federal ID
15
DEMO Flow: BioMetric ID Process Visitor completes registration, submits for approval via web Information is uploaded to Provost Marshal’s console Request is routed and approved by facility Visitor gets notice of approval, prints vehicle pass w/barcode Reception Center authenticates with fingerprint scanner –Cross Checks w/State/Federal ID - creates biometric record Option: Scan fingerprint upon exit of facility
16
November 21, 2003 A Q & Q U E S T I O N S A N S W E R S Visitor iSecurity Author: Jerry Green
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.