SlideShare a Scribd company logo
Security TECHNOLOGY / INTELLIGENCE
What’s New and Using What You Already Have
Presented by Northland Controls
NORTHLAND CONTROLS
GLOBAL SECURITY
OPERATIONS CENTER
Changing Requirements for Security
• Customer Service Centric
• Add Value to the Business Units
• Expanding past campus boundaries
• Global
• Use technology instead of people
• Fit within company culture
NORTHLAND CONTROLS
MOBILE ENABLED
READERS
It Does-
• Eliminate the need to wear a badge
• More convenient user experience
through tap or gesture-based
technologies
• Multi-layered authentication
• On-the-spot credential management
• Allows readers to be placed inside a
building or behind a locked door to
reduce vandalism
• Have a wow factor because of its
newness
NORTHLAND CONTROLS
AUTONOMOUS
MACHINES
A better Security Guard -
• Patrols autonomously outside with a
geo-fenced perimeter
• License plate recognition, compared
to white and black lists, flags targets
• Chemical sensor
• Streams live video to SOC
• Emergency button that feeds into
SOC
• Available for indoor and outdoor use
BUSINESS ANALYTICS can answer questions like
why is this happening, what if these trends
continue, what will happen next (predict), what is
the best/worst that can happen.
NORTHLAND CONTROLS PRESENTATION TITLE 6
BUT, HOW?
By leveraging the big data collected by your security
systems and using that information in a way that can
help decision making. Managers can make educated
decisions regarding various operational and resource
allocation aspects at their facility.
Access Control
Devices
Card Read
Transactions
Live and
Recorded Video
Visitor
Management
Event Logs
NORTHLAND CONTROLS
WHO BENEFITS
Security
HR
IT
Everyone
Facilities
NORTHLAND CONTROLS
ACCESS CONTROL
DEVICES
Occupancy Counts (amount of traffic)
Facility Use – Gym Access (unique reads per day)
Company Store – Usage by time of day, employee
type, location, department, etc.
Cafeteria Utilization
Beams | Turnstiles | Card Reads
NORTHLAND CONTROLS
ACCESS CONTROL
DEVICES
Occupancy – Rooms Used
Occupancy Duration – Coupled with a Card Read
Automated lighting, heating, cooling
Motion Detectors
NORTHLAND CONTROLS
DATA MINING
Communication Loss
• Determining outage patterns
• Device Uptime
• Automated Service Calls
Access Records
• Attendance patterns
• Traffic patterns
• Mischievous usage- Accessing forbidden areas
• Suspicious usage- Foreign country
o When coupled with IT system, can
deactivate domain account
18.2%
14.22%
16.1%
17.62%
2013 2014 2015 2016
VIDEO LOITERING | TRAFFIC PATTERNS
Using video analytics with heat maps to determine hot spots within a scene.
Will let you know areas that people congregate to. Useful in lobby’s and
cafeterias.
NORTHLAND CONTROLS
VIDEO PARKING LOT
USE
Know which spots are vacant
Count vehicles entering and exiting
Ensure loading docks aren’t blocked
Detect vehicles in visitor spots for long periods
Watch speeding vehicles in driveways
Search for vehicles of a specific color
Post event detections – search through object
tracks quickly for new events without need for re-
processing
OPEN DISCUSSION
• How do you get all of this information?
• What information would help you make business
decisions?
• What are doing that we haven’t talked about?
NORTHLAND CONTROLS PRESENTATION TITLE 14
MANAGING YOUR SECURITY INVESTMENT
Our managed services optimize your investment and ensures a safer workplace
► Maintenance & replacement
► Security device audit
► Local and global technicians
► Accountable Work Order tracking
system
DEVICE SERVICES
► Access control administration
► Cardholder verification and
changes
► New user management
► Usage and Activity Reports
USER MANAGEMENT
► 7/24 Live person
► Door unlock/lock
► Employee escort
► Badge activation/deactivation
EMPLOYEE 411
► Alarm & event verification
► Guard Dispatch
► Video verification
► Policies & procedures
ALARM MANAGEMENT
INTELLIGENCE SERVICES
► Travel Services
► Regional Intelligence Reports
► Social Media Monitoring
NORTHLAND CONTROLS PRESENTATION TITLE 15
NORTHLAND CONTROLS WORLDWIDE
We are a global company managing security programs in more than 60 countries for our clients around the world
Our offices
44150 S Grimmer Blvd Fremont, CA
94538
+1 510.403.7645
gmorgante@northlandcontrols.coml
Contact us:
facebook.com/NorthlandControlSyste
ms
@northlandctrls
linkedin.com/company/northland-controls
Follow us on:
linkedin.com/company/northland-controls

More Related Content

What's hot

Sym 2015 product overview apr2015
Sym 2015 product overview apr2015Sym 2015 product overview apr2015
Sym 2015 product overview apr2015
Todd Masters
 
VINBeam Social Media Deck
VINBeam Social Media DeckVINBeam Social Media Deck
VINBeam Social Media DeckJustin Cloutier
 
RFID based asset management
RFID based asset managementRFID based asset management
RFID based asset management
AOPL
 
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Olexiy Lyzun
 
Migrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data CenterMigrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data Center
AlgoSec
 
Access control system
Access control systemAccess control system
Access control system
Matrix COSEC
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Comsec
 
Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...
digitallibrary
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation ProductAndréa Berry
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
Inductive Automation
 
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management systemShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz
 
Managing 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single consoleManaging 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single console
ManageEngine, Zoho Corporation
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
Fanky Christian
 
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market ResearchersSensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Mike Courtney
 
Infra canada 2014 presentation
Infra canada 2014 presentationInfra canada 2014 presentation
Infra canada 2014 presentation
Wael Badawy
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
Thomas P. Johnson
 
Fixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces FrustrationFixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces Frustration
Inductive Automation
 
Safety Inspection Software
Safety Inspection SoftwareSafety Inspection Software
Safety Inspection Software
IMEC Technologies
 

What's hot (18)

Sym 2015 product overview apr2015
Sym 2015 product overview apr2015Sym 2015 product overview apr2015
Sym 2015 product overview apr2015
 
VINBeam Social Media Deck
VINBeam Social Media DeckVINBeam Social Media Deck
VINBeam Social Media Deck
 
RFID based asset management
RFID based asset managementRFID based asset management
RFID based asset management
 
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
 
Migrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data CenterMigrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data Center
 
Access control system
Access control systemAccess control system
Access control system
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 
Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
 
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management systemShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management system
 
Managing 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single consoleManaging 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single console
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
 
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market ResearchersSensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
 
Infra canada 2014 presentation
Infra canada 2014 presentationInfra canada 2014 presentation
Infra canada 2014 presentation
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
 
Fixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces FrustrationFixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces Frustration
 
Safety Inspection Software
Safety Inspection SoftwareSafety Inspection Software
Safety Inspection Software
 

Similar to Advanced Security Technologies and Trends

Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
Inductive Automation
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01Walter Sinchak,
 
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Erdal YILDIZ
 
slatrack
slatrackslatrack
slatrack
indusaviation
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
InSource Solutions
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era
Inductive Automation
 
Emerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industryEmerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industry
Zahed Hussain
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
PCM
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
Inductive Automation
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
ars756
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
SafetyChain Software
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
Matteo Masi
 
Digital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPLDigital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPL
UpasnaBagrodia
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
MusicGramOfficial
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptx
PawachMetharattanara
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
Bilal Husain
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
Matrix ComSec
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
Matrix ComSec
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
PowertechGM
 

Similar to Advanced Security Technologies and Trends (20)

Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
 
slatrack
slatrackslatrack
slatrack
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era
 
Emerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industryEmerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industry
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
 
CCTV in the CLOUD
CCTV in the CLOUDCCTV in the CLOUD
CCTV in the CLOUD
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 
Digital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPLDigital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPL
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptx
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Advanced Security Technologies and Trends

  • 1. Security TECHNOLOGY / INTELLIGENCE What’s New and Using What You Already Have Presented by Northland Controls
  • 2. NORTHLAND CONTROLS GLOBAL SECURITY OPERATIONS CENTER Changing Requirements for Security • Customer Service Centric • Add Value to the Business Units • Expanding past campus boundaries • Global • Use technology instead of people • Fit within company culture
  • 3. NORTHLAND CONTROLS MOBILE ENABLED READERS It Does- • Eliminate the need to wear a badge • More convenient user experience through tap or gesture-based technologies • Multi-layered authentication • On-the-spot credential management • Allows readers to be placed inside a building or behind a locked door to reduce vandalism • Have a wow factor because of its newness
  • 4. NORTHLAND CONTROLS AUTONOMOUS MACHINES A better Security Guard - • Patrols autonomously outside with a geo-fenced perimeter • License plate recognition, compared to white and black lists, flags targets • Chemical sensor • Streams live video to SOC • Emergency button that feeds into SOC • Available for indoor and outdoor use
  • 5. BUSINESS ANALYTICS can answer questions like why is this happening, what if these trends continue, what will happen next (predict), what is the best/worst that can happen.
  • 6. NORTHLAND CONTROLS PRESENTATION TITLE 6 BUT, HOW? By leveraging the big data collected by your security systems and using that information in a way that can help decision making. Managers can make educated decisions regarding various operational and resource allocation aspects at their facility. Access Control Devices Card Read Transactions Live and Recorded Video Visitor Management Event Logs
  • 8. NORTHLAND CONTROLS ACCESS CONTROL DEVICES Occupancy Counts (amount of traffic) Facility Use – Gym Access (unique reads per day) Company Store – Usage by time of day, employee type, location, department, etc. Cafeteria Utilization Beams | Turnstiles | Card Reads
  • 9. NORTHLAND CONTROLS ACCESS CONTROL DEVICES Occupancy – Rooms Used Occupancy Duration – Coupled with a Card Read Automated lighting, heating, cooling Motion Detectors
  • 10. NORTHLAND CONTROLS DATA MINING Communication Loss • Determining outage patterns • Device Uptime • Automated Service Calls Access Records • Attendance patterns • Traffic patterns • Mischievous usage- Accessing forbidden areas • Suspicious usage- Foreign country o When coupled with IT system, can deactivate domain account 18.2% 14.22% 16.1% 17.62% 2013 2014 2015 2016
  • 11. VIDEO LOITERING | TRAFFIC PATTERNS Using video analytics with heat maps to determine hot spots within a scene. Will let you know areas that people congregate to. Useful in lobby’s and cafeterias.
  • 12. NORTHLAND CONTROLS VIDEO PARKING LOT USE Know which spots are vacant Count vehicles entering and exiting Ensure loading docks aren’t blocked Detect vehicles in visitor spots for long periods Watch speeding vehicles in driveways Search for vehicles of a specific color Post event detections – search through object tracks quickly for new events without need for re- processing
  • 13. OPEN DISCUSSION • How do you get all of this information? • What information would help you make business decisions? • What are doing that we haven’t talked about?
  • 14. NORTHLAND CONTROLS PRESENTATION TITLE 14 MANAGING YOUR SECURITY INVESTMENT Our managed services optimize your investment and ensures a safer workplace ► Maintenance & replacement ► Security device audit ► Local and global technicians ► Accountable Work Order tracking system DEVICE SERVICES ► Access control administration ► Cardholder verification and changes ► New user management ► Usage and Activity Reports USER MANAGEMENT ► 7/24 Live person ► Door unlock/lock ► Employee escort ► Badge activation/deactivation EMPLOYEE 411 ► Alarm & event verification ► Guard Dispatch ► Video verification ► Policies & procedures ALARM MANAGEMENT INTELLIGENCE SERVICES ► Travel Services ► Regional Intelligence Reports ► Social Media Monitoring
  • 15. NORTHLAND CONTROLS PRESENTATION TITLE 15 NORTHLAND CONTROLS WORLDWIDE We are a global company managing security programs in more than 60 countries for our clients around the world Our offices 44150 S Grimmer Blvd Fremont, CA 94538 +1 510.403.7645 gmorgante@northlandcontrols.coml Contact us: facebook.com/NorthlandControlSyste ms @northlandctrls linkedin.com/company/northland-controls Follow us on: linkedin.com/company/northland-controls