SlideShare a Scribd company logo
1 of 22
Download to read offline
ONE SIZE DOES NOT FIT ALL
V2.0
A Universal Services of America Company
Agenda
• The Evolution of Video
Management
• Video Management Market
• Solution Overview
• Monitoring and Response
Center
• Customized Value
Video analytics
overcome
human error
“After 12 minutes of continuous
video monitoring, an operator will
often miss up to 45% of onsite
activity. After 22 minutes of viewing,
up to 95% is overlooked.”
– Buyer Beware, Oct/Nov 2002
“The ability of the technology to
analyze large volumes of data
(video) and distinguish the
valuable bits of information yields
significant cost savings in terms
of limiting monitoring personnel.”
– Archana Rao, Sr. Research Analyst,
Frost & Sullivan, Newswire Today,
Nov 2009
Video analytics
radically
change
the value
of video surveillance
“Without intelligence, video
surveillance is a passive tool.”
– TI, IMS VCA Conference 2007
Video analytics enable
video surveillance to
work
smarter
Evolution of Video Management
Value Demonstration
Video motion vs. video analytics.
True Video Management should be an
END-TO-END SECURITY SOLUTION
• Edge based cameras to 24/7 monitoring center
• Best-in-class video analytics
• Event-based and proactive monitoring and response
• Industry leading recruiting, training and
certification of our Security Intervention
Specialists and monitoring center service
Additional Details
• Ability to use existing
hardware
• Emergency Management
• Alarm Monitoring and
Dispatch
• Leverage boots on the
ground with enhanced
capabilities
The Thrive Difference
Solution Overview
How does a TRUE end-to-end solution work?
1: Cameras with edge-based video analytics are installed.
Solution Overview
How does a TRUE end-to-end solution work?
2: Protocols events and alarms are defined, allowing every installation
to be tailored to the customer’s needs and provide true
integration from the field to the monitoring center.
Solution Overview
How does a TRUE end-to-end solution work?
3: Events are immediately reviewed 24/7, eliminating the occurrence of false
alarms and ensuring immediate analysis and response.
Solution Overview
How does a TRUE end-to-end solution work?
4: Live footage can be streamed, allowing first responders
or customers to see events as they occur.
Solution Overview
How does a TRUE end-to-end solution work?
5: Audit Trails history and events are available for review.
Value Demonstration
Effective virtual
boundaries enable
perimeter protection of
your Critical Infrastructure
Value Demonstration
Separate events from non-
events and filter out non-
human subjects.
Customized virtual lines
can trigger immediate
event review & response.
Value Demonstration
Take control of your
inventory protection and
fixed asset security.
Value Demonstration
Intuitive Operator Interface
• Regardless of the security devices monitored,
THRIVE ties together “islands of technology”
into a simple and intuitive operator interface for
event management.
• Operators only need to learn one platform,
eliminating the need for expertise in multiple
technologies.
• The THRIVE Intelligence interface guides the
operator from alarm to event resolution by
intelligently automating the process.
Risk Mitigation Monitoring and Response Center
Dallas, Texas
• 24/7 monitoring and response center
providing field operations and customer
support
• 24,000 square foot facility with state-of-the-
art monitoring technology infrastructure
• Underwriters Laboratory (UL) Certified
• Central Stations Alarm (CSAA) Five Diamond
Certified
• Monitored by certified security intervention
specialists with customized
recruiting/selection, training and certification
processes
• Full disaster recovery with diesel powered
generation and redundant UPS
Case Study
Take control of your
inventory protection and
fixed asset security.
Case Study
Case Study
Current Guard Hours Per Week 336
Number of Cameras being
Monitored By THRIVE
16
Hourly Rate 15.00$
Monthly Monitoring Cost Per
Camera
60.00$
Monthly Guard Costs 20,160.00$ Revised Guard Hours 168
Annual Guard Costs 262,080.00$ Hourly Rate 18.00$
Monthly Costs 13,056.00$
Annual Costs 156,672.00$
Initial Hardware Investment 35,000.00$
Guard Costs year 1 262,080.00$ Savings Year 1 70,408.00$
Guard Costs year 2 262,080.00$ Savings Year 2 105,408.00$
Guard Costs year 3 262,080.00$ Savings Year 3 105,408.00$
Guard Costs year 4 262,080.00$ Savings Year 4 105,408.00$
Guard Costs year 5 262,080.00$ Savings Year 5 105,408.00$
Total 5 Year Guard Cost 1,310,400.00$ Total Five Year Savings 492,040.00$
Total 5 Year THRIVE Cost 818,360.00$ Cost Reduction 37.55%
Customized Solutions
• GPS Tracking
• Fire/Smoke/Burglary Alarm
Verification
• Personal Emergency Response
• Appear/Disappear Detection
• Color Detection
• Access Control
• Business Intelligence
• Customer Traffic Analysis
• Restricted Area/Zone Management
• Employee Behavior Monitoring
Customized Value
 Ease of deployment
 Capability to leverage existing investment
 Integrator partners throughout the US; or can
partner with existing relationship
 THRIVE equipment 30% more cost effective on
average
 Direct from manufacturer
 Custom designed systems by our engineers
for your need
 “Force multiplication”
 Make on-site personnel more effective and
aware
 Proactive Solution
 Analytics combined with state of the art
MaRC provides proactive intelligence and
response
• True analytics add significant
value to the end user
• Adequate setup is required
• Education is crucial to
determining value proposition
• The industry is shifting rapidly
• One size does
NOT fit all
Summary

More Related Content

What's hot

More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4Lisa Niles
 
Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controlsEnclaveSecurity
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controlsEnclaveSecurity
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureInfosec
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopalCharles Symons
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseEnclaveSecurity
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaJohn Gilligan
 
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Brian Andrzejewski
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyEnclaveSecurity
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsDominique Dessy
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseEnclaveSecurity
 

What's hot (20)

More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
Soc
SocSoc
Soc
 
Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controls
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopal
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity Dilemma
 
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Computrace grc
Computrace grcComputrace grc
Computrace grc
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
 

Viewers also liked

Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013
Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013
Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013Mark Lombard
 
Cctv camera dealer in chandigarh
Cctv camera dealer in chandigarhCctv camera dealer in chandigarh
Cctv camera dealer in chandigarhPrasham Kapil
 
Presentation1
Presentation1Presentation1
Presentation1Kp Gupta
 
Biotechnology in the Philippines
Biotechnology in the PhilippinesBiotechnology in the Philippines
Biotechnology in the PhilippinesAnnica Min
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera PresentationBasith JM
 

Viewers also liked (8)

Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013
Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013
Mark Lombard Sao Paulo Brazil EniFarMed Aug 2013
 
Cctv camera dealer in chandigarh
Cctv camera dealer in chandigarhCctv camera dealer in chandigarh
Cctv camera dealer in chandigarh
 
Presentation1
Presentation1Presentation1
Presentation1
 
Surveon Video Analysis Camera Series
Surveon Video Analysis Camera SeriesSurveon Video Analysis Camera Series
Surveon Video Analysis Camera Series
 
Surveon Camera Introduction
Surveon Camera IntroductionSurveon Camera Introduction
Surveon Camera Introduction
 
Biotechnology in the Philippines
Biotechnology in the PhilippinesBiotechnology in the Philippines
Biotechnology in the Philippines
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 

Similar to Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure

Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record itVideoIQ
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Retail Security solution
Retail Security solutionRetail Security solution
Retail Security solutionSsgstubbs
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation Adlan Hussain
 
Aberdeen Group Presents: Video Intelligence to Secure and Grow
Aberdeen  Group Presents: Video Intelligence to Secure and GrowAberdeen  Group Presents: Video Intelligence to Secure and Grow
Aberdeen Group Presents: Video Intelligence to Secure and Grow3VR Inc.
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksMarcoTechnologies
 
Cloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillanceCloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillancenitishjambo
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
Enhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring ServicesEnhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring Serviceskodiperez7568
 
Servexo client presentation
Servexo client presentation Servexo client presentation
Servexo client presentation NickChaires
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
Predictive Maintenance: The Role of Your Pressure Gauges
Predictive Maintenance: The Role of Your Pressure GaugesPredictive Maintenance: The Role of Your Pressure Gauges
Predictive Maintenance: The Role of Your Pressure GaugesWIKA Instrument, LP
 
Mathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoftMathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoftAshley Zupkus
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Aggregage
 
The Anti-Transformation transformation @DevOps Summit Amsterdam
The Anti-Transformation transformation @DevOps Summit AmsterdamThe Anti-Transformation transformation @DevOps Summit Amsterdam
The Anti-Transformation transformation @DevOps Summit AmsterdamMirco Hering
 
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017sandhibhide
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingMaitrikpaida
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingCygnet Infotech
 

Similar to Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure (20)

Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record it
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Retail Security solution
Retail Security solutionRetail Security solution
Retail Security solution
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
 
Aberdeen Group Presents: Video Intelligence to Secure and Grow
Aberdeen  Group Presents: Video Intelligence to Secure and GrowAberdeen  Group Presents: Video Intelligence to Secure and Grow
Aberdeen Group Presents: Video Intelligence to Secure and Grow
 
Transpeye Overview V1 (1)
Transpeye Overview V1 (1)Transpeye Overview V1 (1)
Transpeye Overview V1 (1)
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
 
Cloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillanceCloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillance
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
Enhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring ServicesEnhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring Services
 
Servexo client presentation
Servexo client presentation Servexo client presentation
Servexo client presentation
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Predictive Maintenance: The Role of Your Pressure Gauges
Predictive Maintenance: The Role of Your Pressure GaugesPredictive Maintenance: The Role of Your Pressure Gauges
Predictive Maintenance: The Role of Your Pressure Gauges
 
Mathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoftMathematically Guaranteeing Code Correctness with TrustInSoft
Mathematically Guaranteeing Code Correctness with TrustInSoft
 
Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?Demystifying Control Towers: What Drives Effectiveness?
Demystifying Control Towers: What Drives Effectiveness?
 
The Anti-Transformation transformation @DevOps Summit Amsterdam
The Anti-Transformation transformation @DevOps Summit AmsterdamThe Anti-Transformation transformation @DevOps Summit Amsterdam
The Anti-Transformation transformation @DevOps Summit Amsterdam
 
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
Optimizing connected system performance md&m-anaheim-sandhi bhide 02-07-2017
 
The quality assurance checklist for progressive testing
The quality assurance checklist for progressive testingThe quality assurance checklist for progressive testing
The quality assurance checklist for progressive testing
 
The Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive TestingThe Quality Assurance Checklist for Progressive Testing
The Quality Assurance Checklist for Progressive Testing
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 

More from EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...EnergySec
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesEnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityEnergySec
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationEnergySec
 

More from EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure

  • 1. ONE SIZE DOES NOT FIT ALL V2.0 A Universal Services of America Company
  • 2. Agenda • The Evolution of Video Management • Video Management Market • Solution Overview • Monitoring and Response Center • Customized Value
  • 3. Video analytics overcome human error “After 12 minutes of continuous video monitoring, an operator will often miss up to 45% of onsite activity. After 22 minutes of viewing, up to 95% is overlooked.” – Buyer Beware, Oct/Nov 2002 “The ability of the technology to analyze large volumes of data (video) and distinguish the valuable bits of information yields significant cost savings in terms of limiting monitoring personnel.” – Archana Rao, Sr. Research Analyst, Frost & Sullivan, Newswire Today, Nov 2009 Video analytics radically change the value of video surveillance “Without intelligence, video surveillance is a passive tool.” – TI, IMS VCA Conference 2007 Video analytics enable video surveillance to work smarter Evolution of Video Management
  • 4. Value Demonstration Video motion vs. video analytics.
  • 5. True Video Management should be an END-TO-END SECURITY SOLUTION • Edge based cameras to 24/7 monitoring center • Best-in-class video analytics • Event-based and proactive monitoring and response • Industry leading recruiting, training and certification of our Security Intervention Specialists and monitoring center service Additional Details • Ability to use existing hardware • Emergency Management • Alarm Monitoring and Dispatch • Leverage boots on the ground with enhanced capabilities The Thrive Difference
  • 6. Solution Overview How does a TRUE end-to-end solution work? 1: Cameras with edge-based video analytics are installed.
  • 7. Solution Overview How does a TRUE end-to-end solution work? 2: Protocols events and alarms are defined, allowing every installation to be tailored to the customer’s needs and provide true integration from the field to the monitoring center.
  • 8. Solution Overview How does a TRUE end-to-end solution work? 3: Events are immediately reviewed 24/7, eliminating the occurrence of false alarms and ensuring immediate analysis and response.
  • 9. Solution Overview How does a TRUE end-to-end solution work? 4: Live footage can be streamed, allowing first responders or customers to see events as they occur.
  • 10. Solution Overview How does a TRUE end-to-end solution work? 5: Audit Trails history and events are available for review.
  • 11. Value Demonstration Effective virtual boundaries enable perimeter protection of your Critical Infrastructure
  • 12. Value Demonstration Separate events from non- events and filter out non- human subjects. Customized virtual lines can trigger immediate event review & response.
  • 13. Value Demonstration Take control of your inventory protection and fixed asset security.
  • 15. Intuitive Operator Interface • Regardless of the security devices monitored, THRIVE ties together “islands of technology” into a simple and intuitive operator interface for event management. • Operators only need to learn one platform, eliminating the need for expertise in multiple technologies. • The THRIVE Intelligence interface guides the operator from alarm to event resolution by intelligently automating the process.
  • 16. Risk Mitigation Monitoring and Response Center Dallas, Texas • 24/7 monitoring and response center providing field operations and customer support • 24,000 square foot facility with state-of-the- art monitoring technology infrastructure • Underwriters Laboratory (UL) Certified • Central Stations Alarm (CSAA) Five Diamond Certified • Monitored by certified security intervention specialists with customized recruiting/selection, training and certification processes • Full disaster recovery with diesel powered generation and redundant UPS
  • 17. Case Study Take control of your inventory protection and fixed asset security.
  • 20. Current Guard Hours Per Week 336 Number of Cameras being Monitored By THRIVE 16 Hourly Rate 15.00$ Monthly Monitoring Cost Per Camera 60.00$ Monthly Guard Costs 20,160.00$ Revised Guard Hours 168 Annual Guard Costs 262,080.00$ Hourly Rate 18.00$ Monthly Costs 13,056.00$ Annual Costs 156,672.00$ Initial Hardware Investment 35,000.00$ Guard Costs year 1 262,080.00$ Savings Year 1 70,408.00$ Guard Costs year 2 262,080.00$ Savings Year 2 105,408.00$ Guard Costs year 3 262,080.00$ Savings Year 3 105,408.00$ Guard Costs year 4 262,080.00$ Savings Year 4 105,408.00$ Guard Costs year 5 262,080.00$ Savings Year 5 105,408.00$ Total 5 Year Guard Cost 1,310,400.00$ Total Five Year Savings 492,040.00$ Total 5 Year THRIVE Cost 818,360.00$ Cost Reduction 37.55%
  • 21. Customized Solutions • GPS Tracking • Fire/Smoke/Burglary Alarm Verification • Personal Emergency Response • Appear/Disappear Detection • Color Detection • Access Control • Business Intelligence • Customer Traffic Analysis • Restricted Area/Zone Management • Employee Behavior Monitoring Customized Value  Ease of deployment  Capability to leverage existing investment  Integrator partners throughout the US; or can partner with existing relationship  THRIVE equipment 30% more cost effective on average  Direct from manufacturer  Custom designed systems by our engineers for your need  “Force multiplication”  Make on-site personnel more effective and aware  Proactive Solution  Analytics combined with state of the art MaRC provides proactive intelligence and response
  • 22. • True analytics add significant value to the end user • Adequate setup is required • Education is crucial to determining value proposition • The industry is shifting rapidly • One size does NOT fit all Summary