Public Private Partnership In Security China Presentation

354 views

Published on

public private partnership in security

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
354
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Public Private Partnership In Security China Presentation

  1. 1. Firoze Zia Hussain CEO Totem International Ltd [email_address] 00919618621234
  2. 2. India Corporate Security Scenario <ul><li>Mumbai blasts - Wake up call for the Indian industry …Leaders have rethink on corporate security policies . </li></ul><ul><li>Industry decides to work with government on security and governance issues rather than dealing with it as another man’s subject. </li></ul><ul><li>Indian industry hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as country lacking in good corporate governance policies apart from IP issues . </li></ul><ul><li>New leadership strategies to overcome and move forward. </li></ul><ul><li>Foremost concern being safety and security. </li></ul>10/20/09
  3. 3. India's commercial security woes <ul><li>More to do with the DNA of the security professionals rather than the prevailing threats at presents. </li></ul><ul><li>Commercial security is the gap filler between the state, servicing the general public and the corporate requirements to protect, preserve and maximize their vested assets. </li></ul><ul><li>Mindset transformation required </li></ul>10/20/09
  4. 4. Opportunity-security providers <ul><li>India has a greater divide between the capacity of the government and corporate demands </li></ul><ul><li>The problem with the current approach is that it is still very ex-military or ex-police driven. </li></ul><ul><li>The overall global view of India's security remains below par, and this affects everything from investment to trust and relationships. </li></ul><ul><li>Corporations want business enablers with sound competent business managers first and security managers second, not professional inhibitors or someone living in the ancient past from their days in the military/police. </li></ul>10/20/09
  5. 5. Security to be cost effective or mitigation solution based <ul><li>Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to ensure they meet the corporate needs and technical requirements </li></ul><ul><li>In developed countries the escalation of cost for security begins with policy, then technical measures and manpower last. </li></ul><ul><li>In developed countries, policy, manpower and then technical solutions are the prescribed route for a number of reasons but largely due to the reality that manpower is cheaper than technical measures and therefore dominates the solution options. </li></ul>10/20/09
  6. 6. 10/20/09
  7. 7. VALUE ADD and corporate security debate <ul><li>Any investment needs to be validated by VALUE ADD it brings in </li></ul><ul><li>Security is viewed as necessary expense. </li></ul><ul><li>Companies today making a business case </li></ul><ul><li>From utilizing security devices and systems to protect life and property (assets), </li></ul><ul><li>To helping improve productivity, assist with training, and decrease losses </li></ul>10/20/09
  8. 8. ROI With Security Technology <ul><li>Is the new line of merchandise displayed prominently in the front of the store? Do I need more lunch staff on Thursdays and Fridays? Are my employees being honest about their hours worked? </li></ul><ul><li>A security director can view and download footage of an incident online in one city without having to make the roundtrip to pull the incident from the DVR. </li></ul><ul><li>Remote access can potentially save a business in fleet expenses, travel expenditures, and time and resource management. </li></ul><ul><li>Be in multiple places at one time. A win-win for all parties anytime, anywhere access </li></ul><ul><li>Funding is now coming from the customer’s IT, sales and marketing . </li></ul><ul><li>Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution. </li></ul>10/20/09
  9. 9. 10/20/09
  10. 10. <ul><li>Criminals and Terrorists are increasingly </li></ul><ul><li>Tech-Savvy. </li></ul><ul><li>Are We Ready? </li></ul>10/20/09
  11. 11. SMART ORGANISATIONS <ul><li>Make onsite security personnel more efficient. </li></ul><ul><li>Having a security guard stare at a bank of monitors for an extended period of time is an ineffective way to detect crime or suspicious activity. The result is “surveillance information overload.” </li></ul><ul><li>Cannot humanly process that much information fast enough to prevent or even be effective at minimizing theft or vandalism. </li></ul><ul><li>Smart organizations are making their security personnel more efficient by integrating video with security control so that video is pushed directly to security guard’s monitor, PDA or cell phone. </li></ul>10/20/09
  12. 12. INTEGRATED SECURITY APPROACH STAFF TRAINING Technology INTEGRATION RECRUITMENT METHODOLOGY ON SITE OFF SITE TRAINING HARDWARE & SOFTWARE SHARING OF CRIME DATA MULTI DISCIPLINARY/ DIVERSITY APTITUDE TEST CONTINUOUS GLOBAL APPROACH DIGITAL EVIDENSE COLLECTION High Tech Crimes Task Force LEGISLATION/ ENFORCEMENT PROSECUTION/ FUNCTIONAL CONSULTANTS FOR INTEGRATION SECURITY COMPETENCY MATRIX
  13. 13. TRAINING SECURITY investigation GLOBAL INTEGRATION LEGISLATION CASE Management PUBLIC PRIVATE PARTNERSHIPS Strategy & Planning PROSECUTION
  14. 14. A Balanced Approach to Security <ul><li>New exciting technologies and service offerings aside, security providers should never lose sight of primary objective of asset safety. </li></ul><ul><li>Technology gains have created new opportunities </li></ul><ul><li>Security needs to continue to grow to become a viable and competent technical skill such as medicine, law, engineering and the like. </li></ul>10/20/09
  15. 15. PUBLIC AWARENESS IN SECURITY INTEGRATION ACTIVITY THE – VITAL LINK
  16. 16. <ul><li>THANK YOU </li></ul><ul><li>Totem Intl is large distributor of security products and is looking forward to have tie up in all sector s for selling the products whether gloves or electronic security or other products </li></ul><ul><li>[email_address] </li></ul><ul><li>00919618621234 </li></ul>10/20/09
  17. 17. Urgent requirements <ul><li>Explosive Detector (ED) </li></ul><ul><li>Non Linear Junctions Detector (NLJD) </li></ul><ul><li>Minesweeper (Deep Search Metal Detector) </li></ul><ul><li>Buster (Density Meter) </li></ul><ul><li>Mini Remotely Operated Vehicle (MROV) </li></ul><ul><li>Portable Fibro Scope System (with Hand Held Video Monitor) </li></ul><ul><li>Bomb Blanket & Safety Ring </li></ul><ul><li>X-Ray Baggage Inspection System (Tunnel size 1x1 mtrs.) </li></ul>
  18. 18. Urgent requirements <ul><li>Long Handle HHMD </li></ul><ul><li>Bullet Proof Helmets </li></ul><ul><li>Collapsible DFMD </li></ul><ul><li>Telescopic/Extension mirror </li></ul><ul><li>Prodder Rod/Sled </li></ul><ul><li>DFMD (Single Zone) </li></ul><ul><li>Bomb suit </li></ul><ul><li>Cameras ptz </li></ul>

×