SlideShare a Scribd company logo
1 of 15
Download to read offline
IP Video Surveillance Solutions, which deliver the
image resolution needed for subject identification and
decision making while integrating easily and cost-
effectively with your existing IT infrastructure
Dario L. Santana
President
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
dario@layer3securityservices.com
The disruptive power of ‘IP Convergence’ has swept across
many industries:
– Written communications: e-mail, SMS
– Telephony: VoIP
– Entertainment: digital audio and video
– Advertising: digital media
– Business services: SaaS
IP Convergence has now arrived in the Physical Security space;
particularly, in Video Surveillance, offering a quantum leap in
value and capabilities
‘IP Convergence’ = GREATER Customer Value
6/20/2010 2Confidential
The Convergence Opportunity
• Layer3’s IP solutions Deliver ROI
• Three Disciplines, One Goal – Your Security
• All IP Video Surveillance needs in One Provider
• Security through On-Going Education
• Best of Breed system components means lower total cost of
ownership (TCO)
• Significant Ecosystem protects your investment
• Intelligent systems can reduce operating costs
• Past Successes in the security space
6/20/2010 3
Higher ROI, Ease of Support, Lower TCO
Confidential
Benefits for the Enterprise – An Outline
• Public and Private Institutions
– Industrial and Research facilities
– Business campuses
– Hospitals
– Distribution Centers
– K-12 Schools and Universities
– Government agencies
6/20/2010 4
Different Needs with Shared Goals
Assets Protection and People Safety
Solutions for the Enterprise
• More likely to deter and convict – word gets around
• Megapixel cameras capture more detail
• Lower costs
– Fewer cameras needed to get the job done
– Simplicity in wiring: all Ethernet, mostly POE
– Enterprise features: open standards, familiar network protocols
• Higher reliability and availability
Return on Investment Driven through Actionable Video
56/20/2010
IP Video Surveillance Delivers ROI
• Physical Security Expertise
– Our Security DNA includes ADT, SimplexGrinnell, Sensormatic
– Hold certifications from Milestone, Axis, IQinVision and others
• IP Networks Knowhow
– Our IP networking DNA includes Motorola/GI, Aerocast
– PSNP Certification, Cisco training
• Project Execution Capabilities
– Civil Engineering Degree
– California Contractor License
Three Disciplines, One Goal – Your Security
66/20/2010
Three Disciplines
IP Networks
Physical Security
Project Execution
While President of Tyco Fire and Security Latin America, Dario
Santana, now President of Layer3 Security Services, oversaw
security projects for multinational corporations and major
industrial and institutional clients. These include:
6/20/2010 Confidential 7
Chile’s National Copper Corporation
World renowned Teatro Colon,
(Colon Theatre) Buenos Aires, Argentina
Past Security Projects
• Layer3 Security Services provides a full range of IP Video
Surveillance (IPVS) services
• Site Survey and System Design
• Product Selection
• System Configuration
• Installation and training
• Maintenance and Support
• Layer3 is also able to provide other physical security solutions
such as intrusion detection and access control
Layer3 is the Smart Choice for ALL your
Physical Security Needs
86/20/2010
All Your Needs - One Provider
• Layer3 Security Services believes that your security
also hinges on information and education
• Monthly IPVS newsletter
• Quarterly educational seminars
• White papers
• Case studies
• Ongoing dialogue
• Optimal solutions require robust needs assessments
Security Through Knowledge
96/20/2010
Security Starts with Education
• System Elements Leverage IP Standards
• Video Management Software
• Network Video Recorders
• IP Cameras
• Network Attached Storage
• Networking equipment (layer 2)
• Various clients: smart, remote, Web, PDA
Reliability, Availability
106/20/2010
Best of Breed Solutions
• Standards-based ecosystem protects your investment
• System grows as your needs grow
• No dead-ends or obsolete platforms
• Significant partner integration:
• Security
• Operations
• Includes analytics and intelligence
Upgradeability and Extensibility
116/20/2010
Extensive Ecosystem
• Analytics includes:
– License plate recognition
– Virtual trip wire
– Vehicle size, direction and speed
determination
– Missing or abandoned item detection
– Rule-based alerts
Analytics Increases System Effectiveness and
Can Reduce Manpower Costs
126/20/2010
Intelligence Means Lower Costs
6/20/2010 Confidential 13
IPVS System Overview
Client
Management
Application
Third Party
Applications
Dario Santana is President of Layer3 Security Services (DBA for Net.Surveillance, Inc.) a California
Corporation that provides Internet Protocol (IP) Video Surveillance systems for the enterprise. Until
July of 2008, Dario Santana was CEO and President of NTN Buzztime, Inc., a multipoint social
interactive entertainment company located in Carlsbad, California and trading in the American Stock
Exchange under the symbol ‘NTN’. Before joining Buzztime, Dario was the President of Tyco Fire and
Security's Latin American Division, which offers security and fire protection solutions throughout Latin
America under the brand names ADT Home Security, Sensormatic and SimplexGrinnell, employs over
4000 people and invoices approximately $300 million US dollars per year. Prior to Tyco, Dario was
President of Aerocast Inc., a streaming media services company funded by Motorola and Liberty
Media and focused on delivering entertainment quality video to the broadband enabled home. Before
Aerocast, Dario held a number of roles at Motorola/General Instrument including General Manager of
Advanced Network Systems. Dario holds a MBA from the Harvard Business School and an
engineering degree from Purdue University
146/20/2010
Layer3 Leadership
Return on Investment Through
Actionable Video….
Dario L. Santana
President
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
dario@layer3securityservices.com

More Related Content

What's hot

Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay Dereli
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation Luca Moroni ✔✔
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...Byres Security Inc.
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSysfore Technologies
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 James Wu
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...TI Safe
 

What's hot (20)

Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
 
Police Proposal
Police ProposalPolice Proposal
Police Proposal
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Byod security
Byod security Byod security
Byod security
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...
 

Similar to IPVS Solutions from Layer3 Security Services

Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionIptech View
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfHajeJanKamps
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
Firetide Wireless Node Overview
Firetide Wireless Node OverviewFiretide Wireless Node Overview
Firetide Wireless Node OverviewPaul Richards
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deckSeiji Eto
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Amazon Web Services
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 

Similar to IPVS Solutions from Layer3 Security Services (20)

Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Firetide Wireless Node Overview
Firetide Wireless Node OverviewFiretide Wireless Node Overview
Firetide Wireless Node Overview
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
NSC presentation
NSC presentationNSC presentation
NSC presentation
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deck
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

IPVS Solutions from Layer3 Security Services

  • 1. IP Video Surveillance Solutions, which deliver the image resolution needed for subject identification and decision making while integrating easily and cost- effectively with your existing IT infrastructure Dario L. Santana President Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 dario@layer3securityservices.com
  • 2. The disruptive power of ‘IP Convergence’ has swept across many industries: – Written communications: e-mail, SMS – Telephony: VoIP – Entertainment: digital audio and video – Advertising: digital media – Business services: SaaS IP Convergence has now arrived in the Physical Security space; particularly, in Video Surveillance, offering a quantum leap in value and capabilities ‘IP Convergence’ = GREATER Customer Value 6/20/2010 2Confidential The Convergence Opportunity
  • 3. • Layer3’s IP solutions Deliver ROI • Three Disciplines, One Goal – Your Security • All IP Video Surveillance needs in One Provider • Security through On-Going Education • Best of Breed system components means lower total cost of ownership (TCO) • Significant Ecosystem protects your investment • Intelligent systems can reduce operating costs • Past Successes in the security space 6/20/2010 3 Higher ROI, Ease of Support, Lower TCO Confidential Benefits for the Enterprise – An Outline
  • 4. • Public and Private Institutions – Industrial and Research facilities – Business campuses – Hospitals – Distribution Centers – K-12 Schools and Universities – Government agencies 6/20/2010 4 Different Needs with Shared Goals Assets Protection and People Safety Solutions for the Enterprise
  • 5. • More likely to deter and convict – word gets around • Megapixel cameras capture more detail • Lower costs – Fewer cameras needed to get the job done – Simplicity in wiring: all Ethernet, mostly POE – Enterprise features: open standards, familiar network protocols • Higher reliability and availability Return on Investment Driven through Actionable Video 56/20/2010 IP Video Surveillance Delivers ROI
  • 6. • Physical Security Expertise – Our Security DNA includes ADT, SimplexGrinnell, Sensormatic – Hold certifications from Milestone, Axis, IQinVision and others • IP Networks Knowhow – Our IP networking DNA includes Motorola/GI, Aerocast – PSNP Certification, Cisco training • Project Execution Capabilities – Civil Engineering Degree – California Contractor License Three Disciplines, One Goal – Your Security 66/20/2010 Three Disciplines IP Networks Physical Security Project Execution
  • 7. While President of Tyco Fire and Security Latin America, Dario Santana, now President of Layer3 Security Services, oversaw security projects for multinational corporations and major industrial and institutional clients. These include: 6/20/2010 Confidential 7 Chile’s National Copper Corporation World renowned Teatro Colon, (Colon Theatre) Buenos Aires, Argentina Past Security Projects
  • 8. • Layer3 Security Services provides a full range of IP Video Surveillance (IPVS) services • Site Survey and System Design • Product Selection • System Configuration • Installation and training • Maintenance and Support • Layer3 is also able to provide other physical security solutions such as intrusion detection and access control Layer3 is the Smart Choice for ALL your Physical Security Needs 86/20/2010 All Your Needs - One Provider
  • 9. • Layer3 Security Services believes that your security also hinges on information and education • Monthly IPVS newsletter • Quarterly educational seminars • White papers • Case studies • Ongoing dialogue • Optimal solutions require robust needs assessments Security Through Knowledge 96/20/2010 Security Starts with Education
  • 10. • System Elements Leverage IP Standards • Video Management Software • Network Video Recorders • IP Cameras • Network Attached Storage • Networking equipment (layer 2) • Various clients: smart, remote, Web, PDA Reliability, Availability 106/20/2010 Best of Breed Solutions
  • 11. • Standards-based ecosystem protects your investment • System grows as your needs grow • No dead-ends or obsolete platforms • Significant partner integration: • Security • Operations • Includes analytics and intelligence Upgradeability and Extensibility 116/20/2010 Extensive Ecosystem
  • 12. • Analytics includes: – License plate recognition – Virtual trip wire – Vehicle size, direction and speed determination – Missing or abandoned item detection – Rule-based alerts Analytics Increases System Effectiveness and Can Reduce Manpower Costs 126/20/2010 Intelligence Means Lower Costs
  • 13. 6/20/2010 Confidential 13 IPVS System Overview Client Management Application Third Party Applications
  • 14. Dario Santana is President of Layer3 Security Services (DBA for Net.Surveillance, Inc.) a California Corporation that provides Internet Protocol (IP) Video Surveillance systems for the enterprise. Until July of 2008, Dario Santana was CEO and President of NTN Buzztime, Inc., a multipoint social interactive entertainment company located in Carlsbad, California and trading in the American Stock Exchange under the symbol ‘NTN’. Before joining Buzztime, Dario was the President of Tyco Fire and Security's Latin American Division, which offers security and fire protection solutions throughout Latin America under the brand names ADT Home Security, Sensormatic and SimplexGrinnell, employs over 4000 people and invoices approximately $300 million US dollars per year. Prior to Tyco, Dario was President of Aerocast Inc., a streaming media services company funded by Motorola and Liberty Media and focused on delivering entertainment quality video to the broadband enabled home. Before Aerocast, Dario held a number of roles at Motorola/General Instrument including General Manager of Advanced Network Systems. Dario holds a MBA from the Harvard Business School and an engineering degree from Purdue University 146/20/2010 Layer3 Leadership
  • 15. Return on Investment Through Actionable Video…. Dario L. Santana President Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 dario@layer3securityservices.com