Download presentation
Presentation is loading. Please wait.
Published byLewis Horton Modified over 9 years ago
1
Hosted by: June 23-26, 2003 New York City Copyright 2003 1 Managing Multiple Access & Entry Points
2
Hosted by: June 23-26, 2003 New York City Copyright 2003 2 “ There are RISKS and COSTS to a program of ACTION. But they are FAR LESS than the long range risks and the costs of comfortable INACTION.” - JFK
3
Hosted by: June 23-26, 2003 New York City Copyright 2003 3 A Current Corporate Scenario Enterprise Security Platform Track Assets Track Assets Physical Access Control Physical Access Control Locate Employees & Visitors Locate Employees & Visitors And Other Applications As Needed And Other Applications As Needed Voice Interface Voice Interface Authenticate Vehicles Authenticate Vehicles PC & Network Logon Interactive Management Platform
4
Hosted by: June 23-26, 2003 New York City Copyright 2003 4 Some Challenges in an Integrated Environment Concerns About SAFETY Uncontrolled Access to Records/Loss Of Information Loss Of Corporate Assets like Test Equipment, Computers, A/Vs, etc. Zero In - Zero Out Missing Staff/ Violence against Staff
5
Hosted by: June 23-26, 2003 New York City Copyright 2003 5 Integrated Security Solution Integrating disparate technologies and complex security processes providing visibility across your extended environment through Exception Based Event Management. Accelerating absolute authentication & real time locating by functioning locally or globally. Delivering more hard dollar value than other security investments, through scalable and interoperable Solutions.
6
Hosted by: June 23-26, 2003 New York City Copyright 2003 6 The “Solution” ~ Integrated Management People Places TimeAssets LocateMonitor Authenticate Manage = Safety Today, organizations are seeking effective method to Identify, Authenticate and Monitor, both People and Assets to ensure High Level Safety thus enhancing Security.
7
Hosted by: June 23-26, 2003 New York City Copyright 2003 7 Solutions Improve SAFETY Authenticate & Control Access To Information Real Time Asset Location Global Termination Management Restrict Access, Locate Staff & Emit Alarms in Crisis
8
Hosted by: June 23-26, 2003 New York City Copyright 2003 8 The Solution Provide the View, Who with What, When and Where Integration with CCTV & other Technologies Hands free solution – (when desired) Provide a security solution to protect assets from loss or theft Provide a Safety Network for protecting employees Paperless property pass capability Improve enrollment task
9
Hosted by: June 23-26, 2003 New York City Copyright 2003 Overview Of A Methodology
10
Hosted by: June 23-26, 2003 New York City Copyright 2003 10 vikram@ilitec-us.com vraghupa@yahoo.com Phone : +1 (770) 319-1930 Thank You
11
Hosted by: June 23-26, 2003 New York City Copyright 2003 11 Evolution of Tracking Technology IRFID technology Real-Time IR/RF wireless communication Exact location Long Range 50-75 feet Bar Code Contact Tags Smart Tags Active Tracking Contact Smart Card Requires contact RFID technology Read-Only or Read/Write Contact-less Short Range 3-5 inches Back
12
Hosted by: June 23-26, 2003 New York City Copyright 2003 12 Evolution of Biometrics Technology Back Finger- Printing Uni-modal Biometrics Multi- modal Biometrics Fingerprinting, Hand Geometry Facial/IRIS/Retina Recognition Voice Pattern Recognition Integrated Biometrics Mobile Environment Wireless Networks Range Unlimited
13
Hosted by: June 23-26, 2003 New York City Copyright 2003 13 Evolution of Voice Technology Voice Mapping IVRs ASR & Voice Verification IMRs Interactive Voice Response Advanced Speech Recognition Voice Verification Interactive Media Reponse Back
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.