Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Securing the Workplace<br />TED MORGAN <br />DIRECTOR OF SALES<br />AMERICAN BARCODE AND RFID<br />FEBRUARY 16, 2010<br />
Is This Your Workplace Security?<br />
The Need<br />“…round up the usual suspects…”<br />
The Need<br />Current Status:  “The Usual Suspects”<br />Proximity Cards  “Tailgating”<br />ID Badge  “Who’s Checking?”<...
The Need<br />
The Value<br />What’s In It For Me?<br />Asset protection<br />Safety assurance<br />Intrusion prevention<br />Reduced fin...
The Value<br />Taking Control<br />Control of entry<br />Control of assets<br />Control of activity<br />Control of facili...
The Solutions<br />Visitor Management<br />Contractor / Vendor Certification<br />ID Verification<br />High-occupancy Faci...
The Components<br />CONFIDENCE In Controlled Access™<br />IDVerify™ – On-demand portable 				verification<br />IDEvent™ – ...
CONFIDENCE<br /><ul><li>RFID-enabled credentials</li></ul>plus<br /><ul><li>Biometric facial recognition</li></ul>provides...
 Uninterrupted verification
 Management by exception
 Existing security system interface
  Visible / IR facial recognition
 Active / passive RFID credentialing
Upcoming SlideShare
Loading in …5
×

Securing The Workplace Presentation From American Barcode And Rfid

667 views

Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Securing The Workplace Presentation From American Barcode And Rfid

  1. 1. Securing the Workplace<br />TED MORGAN <br />DIRECTOR OF SALES<br />AMERICAN BARCODE AND RFID<br />FEBRUARY 16, 2010<br />
  2. 2. Is This Your Workplace Security?<br />
  3. 3. The Need<br />“…round up the usual suspects…”<br />
  4. 4. The Need<br />Current Status: “The Usual Suspects”<br />Proximity Cards  “Tailgating”<br />ID Badge  “Who’s Checking?”<br />Biometric Reads  “I Like Queues…”<br />Spiral Notebooks  “Frugal Fumble”<br />Hope  “Right…!”<br />
  5. 5. The Need<br />
  6. 6. The Value<br />What’s In It For Me?<br />Asset protection<br />Safety assurance<br />Intrusion prevention<br />Reduced financial exposure<br />Improved process management<br />The future<br />
  7. 7. The Value<br />Taking Control<br />Control of entry<br />Control of assets<br />Control of activity<br />Control of facility<br />Control of identity<br />Control of process<br />Control of business<br />
  8. 8. The Solutions<br />Visitor Management<br />Contractor / Vendor Certification<br />ID Verification<br />High-occupancy Facility Confirmation<br />Biometric Authentication<br />Human / Fixed Asset Accountability<br />Event Corroboration<br />
  9. 9. The Components<br />CONFIDENCE In Controlled Access™<br />IDVerify™ – On-demand portable verification<br />IDEvent™ – Fixed station oversight and confirmation<br />
  10. 10. CONFIDENCE<br /><ul><li>RFID-enabled credentials</li></ul>plus<br /><ul><li>Biometric facial recognition</li></ul>provides<br /><ul><li>Unparalleled identity verification </li></li></ul><li>CONFIDENCE<br /><ul><li>Long-range coverage
  11. 11. Uninterrupted verification
  12. 12. Management by exception
  13. 13. Existing security system interface
  14. 14. Visible / IR facial recognition
  15. 15. Active / passive RFID credentialing
  16. 16. Highly-secured operations
  17. 17. High occupancy facilities
  18. 18. Government regulated locations
  19. 19. Secure financial centers</li></li></ul><li>IDVerify<br /><ul><li>Real-time management of authorized access
  20. 20. Dynamic credential verification
  21. 21. Simplified decision tree
  22. 22. Reliable data exchange / update
  23. 23. Guard-managed facilities
  24. 24. Government regulated </li></ul> centers<br /><ul><li> Portable screening </li></ul> operations<br />
  25. 25. IDEvent<br /><ul><li>Fixed-station verification
  26. 26. Self-administered assembly confirmation
  27. 27. Real-time enrollment validation
  28. 28. Process enhancement
  29. 29. Government regulated </li></ul> facilities<br /><ul><li> Mines, construction sites
  30. 30. Schools, child-oriented </li></ul> operations <br />
  31. 31. Securing the Workplace<br />Investing in people<br />Protecting key assets<br />Enhancing business process<br />Managing facility security<br />Providing enduring value<br />
  32. 32. Questions and Comments<br />Thank You !<br />

×