SlideShare a Scribd company logo
1 of 17
Welcome to Your
Information!
PRESENTER: Natalie Glenn
Salamander – The Company
• First, the History . . .
• A Michigan Corp., based in Traverse City, founded in June 2001
• No. 1 supplier of personnel accountability systems for 1st
Responders
• Interoperable solution to over 15,000 agencies nationwide
• recognition in 2007
• Five issued U.S. Patents
Examples of Salamander Users
• Law Enforcement
• Richland County Sheriff’s
Department
• Michigan State University Police
Department
• Fire
• Mutual Aid Box Alarm System
(MABAS)
• And thousands of others
• Universities
• University of South Carolina
• Kansas State University
• Michigan State University
• Emergency Management
• Hundreds of installations
throughout both State and County
Emergency Management
• Federal
• Los Alamos National Laboratories
• Fort Rucker, Fort Leavenworth,
Fort Riley
• VOAD
• Team Rubicon
Salamander Solution Overview
• Evolution of Intelligent Accountability™
• Manual Accountability
• Electronic Accountability
• Intelligent Accountability™ is the combination of 3 key components
• TAG
• TRACK
• REPORT
• These 3 components provide 5 vital pieces of information
• Who is the resource
• Why is the resource there
• What is the resource doing
• Where is the resource located
• When is the resource involved
This web-based tool is the core of Intelligent Accountability™. From creating your tags to
providing situational awareness at incidents ranging from the day-to-day to the once in a
lifetime, SalamanderLive™ is at the center of it all.
• Create your accountability tags
• Manage responder qualifications
• Connect field tracking devices to create a common operating picture
• View GIS mapping information
• Run detailed incident reports
• Access the system from anywhere with a web connection
• Centralize your resource database
Over 16,000
Organizations
are Currently on
SalamanderLive!
Features
RAPID TAG & EVAC
Quickly and accurately create event
specific ID’s and track time for
volunteers, mutual aid, VIP’s, and more
• Pull data from drivers licenses to
create an accurate site ID in a matter
of seconds
• Track volunteer and personnel hours
to the second
• Track victims and evacuees and send
data to shelters and medical facilities
01 TAG APP - REMOTE CHECK-IN
Establish accountability like never before. Responders can now check-in to
the Intelligent Accountability™ system from anywhere using the power of
their IOS or Android smartphone.
• Know which responders are in-bound in real-time
• Know when responders are safely demobilized
• Receive assignment updates on your smartphone
• Check-in as either an individual responder or a company
COMING SOON: Receive a map and turn-by-turn directions to the incident.
02 TRACK APP
Enhance your accountability efforts by taking advantage of
Salamander’s NIMS Compliant ICS / Accountability software for
Android and IOS smartphones and tablets.
• Track resources in the field
• Download resources directly from SalamanderLive™
• Search for resources based on qualifications
• Scan Salamander accountability tags for tracking on-scene
• Conduct PAR
• Send field-level data back to SalamanderLive™ for off-scene
visibility
GIS INCIDENT MAPPING
Harness the power of your mobile device’s GPS function to
experience a higher level of situational awareness.
• View your incident location on a map
• Get up-to-the-minute responder location data which can
be used for responder safety
• Enhance tactical operations with satellite imagery
• View multiple incidents at once
• Access responder status from a map view
COMMAND
Maximize situational awareness and
resource accountability with this
powerful and functional PC-based ICS
application
• Confidently manage all resources and
victims with an easy to understand
ICS chart view
• Utilize drag-and-drop functionality to
quickly and efficiently
reassign resources
SALAMANDER IDENTITY VERIFICATION – SIV
Salamander’s badge verification feature for the 02 TRACK app
provides vital, targeted, and authentic information about everyone
you want to trust. It’s fast, easy, reliable and interoperable. 02 TRACK
badge verification can validate identities and qualifications, control
site access, manage resources, and associate them with assignments
throughout the incident with one application.
Each badge read into the 02 TRACK application is submitted to the
SalamanderLive™ server for validation. During validation the badge
must pass four critical security checks to be deemed valid:
• Record exists in SalamanderLive™
• Badge is not expired
• Qualifications are not expired
• In good employment standing (not terminated, laid off ect.)
SALAMANDER REPORTS
Share evacuee, resource, and personnel data from the incident to
off-scene agencies in real-time to provide a common operating
picture, Salamander has a wide variety of canned reports available
right out of the box.
COMMAND
02 Track App
01 Tag App
RAPID TAG / EVAC
Let’s See a Live Demo. . .
Solution Recap
• Intelligent Accountability™ combines 3 components
• TAG
• SalamanderLive™
• 01 Tag App - Remote Check-In
• Rapid Tag
• TRACK
• SalamanderLive™
• 02 TRACK App
• GIS Mapping
• COMMAND
• Salamander Identity Verification (SIV)
• REPORT
• SalamanderLive™
Questions? Call Natalie Glenn 785-207-5227 or email
natalie@midwestcard.com
Thank you

More Related Content

Similar to Salamander Demo Presentation Natalie

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android AapplicationsRoshan Thomas
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Arnaud Le Hors
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Alvin Integrated Services [AIS]
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxinfosec train
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxInfosectrain3
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
Leveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationLeveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationPaul Tocatlian
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield, Inc.
 
Sales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptx
Sales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptxSales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptx
Sales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptxfavoritechildband
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwideCase Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwideWynyard Group
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management ProgramTripwire
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Dream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management SystemDream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management SystemSalesforce Engineering
 

Similar to Salamander Demo Presentation Natalie (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Penetrating Android Aapplications
Penetrating Android AapplicationsPenetrating Android Aapplications
Penetrating Android Aapplications
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508
 
Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.Thinking beyond “Conventional” Crisis Communication.
Thinking beyond “Conventional” Crisis Communication.
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Leveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise TransformationLeveraging Mobile Middleware for Enterprise Transformation
Leveraging Mobile Middleware for Enterprise Transformation
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
Sales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptx
Sales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptxSales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptx
Sales-deck-pitch-Cyberpion-sales-pitch-deck- v4.pptx
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwideCase Studies: An overview of Wynyard's solutions and how they are used worldwide
Case Studies: An overview of Wynyard's solutions and how they are used worldwide
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Dream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management SystemDream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management System
 
Data Breach Risk Intelligence for Higher Education
Data Breach Risk Intelligence for Higher EducationData Breach Risk Intelligence for Higher Education
Data Breach Risk Intelligence for Higher Education
 

Salamander Demo Presentation Natalie

  • 2. Salamander – The Company • First, the History . . . • A Michigan Corp., based in Traverse City, founded in June 2001 • No. 1 supplier of personnel accountability systems for 1st Responders • Interoperable solution to over 15,000 agencies nationwide • recognition in 2007 • Five issued U.S. Patents
  • 3. Examples of Salamander Users • Law Enforcement • Richland County Sheriff’s Department • Michigan State University Police Department • Fire • Mutual Aid Box Alarm System (MABAS) • And thousands of others • Universities • University of South Carolina • Kansas State University • Michigan State University • Emergency Management • Hundreds of installations throughout both State and County Emergency Management • Federal • Los Alamos National Laboratories • Fort Rucker, Fort Leavenworth, Fort Riley • VOAD • Team Rubicon
  • 4. Salamander Solution Overview • Evolution of Intelligent Accountability™ • Manual Accountability • Electronic Accountability • Intelligent Accountability™ is the combination of 3 key components • TAG • TRACK • REPORT • These 3 components provide 5 vital pieces of information • Who is the resource • Why is the resource there • What is the resource doing • Where is the resource located • When is the resource involved
  • 5. This web-based tool is the core of Intelligent Accountability™. From creating your tags to providing situational awareness at incidents ranging from the day-to-day to the once in a lifetime, SalamanderLive™ is at the center of it all. • Create your accountability tags • Manage responder qualifications • Connect field tracking devices to create a common operating picture • View GIS mapping information • Run detailed incident reports • Access the system from anywhere with a web connection • Centralize your resource database Over 16,000 Organizations are Currently on SalamanderLive!
  • 7. RAPID TAG & EVAC Quickly and accurately create event specific ID’s and track time for volunteers, mutual aid, VIP’s, and more • Pull data from drivers licenses to create an accurate site ID in a matter of seconds • Track volunteer and personnel hours to the second • Track victims and evacuees and send data to shelters and medical facilities
  • 8. 01 TAG APP - REMOTE CHECK-IN Establish accountability like never before. Responders can now check-in to the Intelligent Accountability™ system from anywhere using the power of their IOS or Android smartphone. • Know which responders are in-bound in real-time • Know when responders are safely demobilized • Receive assignment updates on your smartphone • Check-in as either an individual responder or a company COMING SOON: Receive a map and turn-by-turn directions to the incident.
  • 9. 02 TRACK APP Enhance your accountability efforts by taking advantage of Salamander’s NIMS Compliant ICS / Accountability software for Android and IOS smartphones and tablets. • Track resources in the field • Download resources directly from SalamanderLive™ • Search for resources based on qualifications • Scan Salamander accountability tags for tracking on-scene • Conduct PAR • Send field-level data back to SalamanderLive™ for off-scene visibility
  • 10. GIS INCIDENT MAPPING Harness the power of your mobile device’s GPS function to experience a higher level of situational awareness. • View your incident location on a map • Get up-to-the-minute responder location data which can be used for responder safety • Enhance tactical operations with satellite imagery • View multiple incidents at once • Access responder status from a map view
  • 11. COMMAND Maximize situational awareness and resource accountability with this powerful and functional PC-based ICS application • Confidently manage all resources and victims with an easy to understand ICS chart view • Utilize drag-and-drop functionality to quickly and efficiently reassign resources
  • 12. SALAMANDER IDENTITY VERIFICATION – SIV Salamander’s badge verification feature for the 02 TRACK app provides vital, targeted, and authentic information about everyone you want to trust. It’s fast, easy, reliable and interoperable. 02 TRACK badge verification can validate identities and qualifications, control site access, manage resources, and associate them with assignments throughout the incident with one application. Each badge read into the 02 TRACK application is submitted to the SalamanderLive™ server for validation. During validation the badge must pass four critical security checks to be deemed valid: • Record exists in SalamanderLive™ • Badge is not expired • Qualifications are not expired • In good employment standing (not terminated, laid off ect.)
  • 13. SALAMANDER REPORTS Share evacuee, resource, and personnel data from the incident to off-scene agencies in real-time to provide a common operating picture, Salamander has a wide variety of canned reports available right out of the box.
  • 14. COMMAND 02 Track App 01 Tag App RAPID TAG / EVAC
  • 15. Let’s See a Live Demo. . .
  • 16. Solution Recap • Intelligent Accountability™ combines 3 components • TAG • SalamanderLive™ • 01 Tag App - Remote Check-In • Rapid Tag • TRACK • SalamanderLive™ • 02 TRACK App • GIS Mapping • COMMAND • Salamander Identity Verification (SIV) • REPORT • SalamanderLive™
  • 17. Questions? Call Natalie Glenn 785-207-5227 or email natalie@midwestcard.com Thank you