SlideShare a Scribd company logo
Security TECHNOLOGY / INTELLIGENCE
What’s New and Using What You Already Have
Presented by Northland Controls
NORTHLAND CONTROLS
GLOBAL SECURITY
OPERATIONS CENTER
Changing Requirements for Security
• Customer Service Centric
• Add Value to the Business Units
• Expanding past campus boundaries
• Global
• Use technology instead of people
• Fit within company culture
NORTHLAND CONTROLS
MOBILE ENABLED
READERS
It Does-
• Eliminate the need to wear a badge
• More convenient user experience
through tap or gesture-based
technologies
• Multi-layered authentication
• On-the-spot credential management
• Allows readers to be placed inside a
building or behind a locked door to
reduce vandalism
• Have a wow factor because of its
newness
NORTHLAND CONTROLS
AUTONOMOUS
MACHINES
A better Security Guard -
• Patrols autonomously outside with a
geo-fenced perimeter
• License plate recognition, compared
to white and black lists, flags targets
• Chemical sensor
• Streams live video to SOC
• Emergency button that feeds into
SOC
• Available for indoor and outdoor use
BUSINESS ANALYTICS can answer questions like
why is this happening, what if these trends
continue, what will happen next (predict), what is
the best/worst that can happen.
NORTHLAND CONTROLS PRESENTATION TITLE 6
BUT, HOW?
By leveraging the big data collected by your security
systems and using that information in a way that can
help decision making. Managers can make educated
decisions regarding various operational and resource
allocation aspects at their facility.
Access Control
Devices
Card Read
Transactions
Live and
Recorded Video
Visitor
Management
Event Logs
NORTHLAND CONTROLS
WHO BENEFITS
Security
HR
IT
Everyone
Facilities
NORTHLAND CONTROLS
ACCESS CONTROL
DEVICES
Occupancy Counts (amount of traffic)
Facility Use – Gym Access (unique reads per day)
Company Store – Usage by time of day, employee
type, location, department, etc.
Cafeteria Utilization
Beams | Turnstiles | Card Reads
NORTHLAND CONTROLS
ACCESS CONTROL
DEVICES
Occupancy – Rooms Used
Occupancy Duration – Coupled with a Card Read
Automated lighting, heating, cooling
Motion Detectors
NORTHLAND CONTROLS
DATA MINING
Communication Loss
• Determining outage patterns
• Device Uptime
• Automated Service Calls
Access Records
• Attendance patterns
• Traffic patterns
• Mischievous usage- Accessing forbidden areas
• Suspicious usage- Foreign country
o When coupled with IT system, can
deactivate domain account
18.2%
14.22%
16.1%
17.62%
2013 2014 2015 2016
VIDEO LOITERING | TRAFFIC PATTERNS
Using video analytics with heat maps to determine hot spots within a scene.
Will let you know areas that people congregate to. Useful in lobby’s and
cafeterias.
NORTHLAND CONTROLS
VIDEO PARKING LOT
USE
Know which spots are vacant
Count vehicles entering and exiting
Ensure loading docks aren’t blocked
Detect vehicles in visitor spots for long periods
Watch speeding vehicles in driveways
Search for vehicles of a specific color
Post event detections – search through object
tracks quickly for new events without need for re-
processing
OPEN DISCUSSION
• How do you get all of this information?
• What information would help you make business
decisions?
• What are doing that we haven’t talked about?
NORTHLAND CONTROLS PRESENTATION TITLE 14
MANAGING YOUR SECURITY INVESTMENT
Our managed services optimize your investment and ensures a safer workplace
► Maintenance & replacement
► Security device audit
► Local and global technicians
► Accountable Work Order tracking
system
DEVICE SERVICES
► Access control administration
► Cardholder verification and
changes
► New user management
► Usage and Activity Reports
USER MANAGEMENT
► 7/24 Live person
► Door unlock/lock
► Employee escort
► Badge activation/deactivation
EMPLOYEE 411
► Alarm & event verification
► Guard Dispatch
► Video verification
► Policies & procedures
ALARM MANAGEMENT
INTELLIGENCE SERVICES
► Travel Services
► Regional Intelligence Reports
► Social Media Monitoring
NORTHLAND CONTROLS PRESENTATION TITLE 15
NORTHLAND CONTROLS WORLDWIDE
We are a global company managing security programs in more than 60 countries for our clients around the world
Our offices
44150 S Grimmer Blvd Fremont, CA
94538
+1 510.403.7645
gmorgante@northlandcontrols.coml
Contact us:
facebook.com/NorthlandControlSyste
ms
@northlandctrls
linkedin.com/company/northland-controls
Follow us on:
linkedin.com/company/northland-controls

More Related Content

What's hot

Sym 2015 product overview apr2015
Sym 2015 product overview apr2015Sym 2015 product overview apr2015
Sym 2015 product overview apr2015
Todd Masters
 
VINBeam Social Media Deck
VINBeam Social Media DeckVINBeam Social Media Deck
VINBeam Social Media DeckJustin Cloutier
 
RFID based asset management
RFID based asset managementRFID based asset management
RFID based asset management
AOPL
 
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Olexiy Lyzun
 
Migrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data CenterMigrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data Center
AlgoSec
 
Access control system
Access control systemAccess control system
Access control system
Matrix COSEC
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Comsec
 
Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...
digitallibrary
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation ProductAndréa Berry
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
Inductive Automation
 
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management systemShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz
 
Managing 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single consoleManaging 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single console
ManageEngine, Zoho Corporation
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
Fanky Christian
 
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market ResearchersSensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Mike Courtney
 
Infra canada 2014 presentation
Infra canada 2014 presentationInfra canada 2014 presentation
Infra canada 2014 presentation
Wael Badawy
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
Thomas P. Johnson
 
Fixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces FrustrationFixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces Frustration
Inductive Automation
 
Safety Inspection Software
Safety Inspection SoftwareSafety Inspection Software
Safety Inspection Software
IMEC Technologies
 

What's hot (18)

Sym 2015 product overview apr2015
Sym 2015 product overview apr2015Sym 2015 product overview apr2015
Sym 2015 product overview apr2015
 
VINBeam Social Media Deck
VINBeam Social Media DeckVINBeam Social Media Deck
VINBeam Social Media Deck
 
RFID based asset management
RFID based asset managementRFID based asset management
RFID based asset management
 
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
Clobbi CEO Dmitry Shapovalov Keynote @CRU 2019 Brussels "Practical case-studi...
 
Migrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data CenterMigrating and Managing Security Policies in a Segmented Data Center
Migrating and Managing Security Policies in a Segmented Data Center
 
Access control system
Access control systemAccess control system
Access control system
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 
Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...Intelligent Switching: Bringing user and application knowledge and control to...
Intelligent Switching: Bringing user and application knowledge and control to...
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
 
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management systemShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management system
 
Managing 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single consoleManaging 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single console
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
 
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market ResearchersSensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
Sensors, Wearables, Wi-Fi, Video and other Technologies for Market Researchers
 
Infra canada 2014 presentation
Infra canada 2014 presentationInfra canada 2014 presentation
Infra canada 2014 presentation
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
 
Fixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces FrustrationFixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces Frustration
 
Safety Inspection Software
Safety Inspection SoftwareSafety Inspection Software
Safety Inspection Software
 

Similar to Advanced Security Technologies and Trends

Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
Inductive Automation
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01Walter Sinchak,
 
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Erdal YILDIZ
 
slatrack
slatrackslatrack
slatrack
indusaviation
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
InSource Solutions
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era
Inductive Automation
 
Emerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industryEmerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industry
Zahed Hussain
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
PCM
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
Inductive Automation
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
ars756
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
SafetyChain Software
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
Matteo Masi
 
Digital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPLDigital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPL
UpasnaBagrodia
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
MusicGramOfficial
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptx
PawachMetharattanara
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
Bilal Husain
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
Matrix ComSec
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
Matrix ComSec
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
PowertechGM
 

Similar to Advanced Security Technologies and Trends (20)

Securely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From AnywhereSecurely Monitor Critical Systems From Anywhere
Securely Monitor Critical Systems From Anywhere
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
Astana new terminal_special_lc_systems_presentation_rev00_ey_15.11.2015
 
slatrack
slatrackslatrack
slatrack
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era
 
Emerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industryEmerging technology in retail and hospitality industry
Emerging technology in retail and hospitality industry
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
 
CCTV in the CLOUD
CCTV in the CLOUDCCTV in the CLOUD
CCTV in the CLOUD
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 
Digital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPLDigital Mining Solutions Simplified With VTPL
Digital Mining Solutions Simplified With VTPL
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
 
FS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptxFS Presentation CCTV solution rev1.pptx
FS Presentation CCTV solution rev1.pptx
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Advanced Security Technologies and Trends

  • 1. Security TECHNOLOGY / INTELLIGENCE What’s New and Using What You Already Have Presented by Northland Controls
  • 2. NORTHLAND CONTROLS GLOBAL SECURITY OPERATIONS CENTER Changing Requirements for Security • Customer Service Centric • Add Value to the Business Units • Expanding past campus boundaries • Global • Use technology instead of people • Fit within company culture
  • 3. NORTHLAND CONTROLS MOBILE ENABLED READERS It Does- • Eliminate the need to wear a badge • More convenient user experience through tap or gesture-based technologies • Multi-layered authentication • On-the-spot credential management • Allows readers to be placed inside a building or behind a locked door to reduce vandalism • Have a wow factor because of its newness
  • 4. NORTHLAND CONTROLS AUTONOMOUS MACHINES A better Security Guard - • Patrols autonomously outside with a geo-fenced perimeter • License plate recognition, compared to white and black lists, flags targets • Chemical sensor • Streams live video to SOC • Emergency button that feeds into SOC • Available for indoor and outdoor use
  • 5. BUSINESS ANALYTICS can answer questions like why is this happening, what if these trends continue, what will happen next (predict), what is the best/worst that can happen.
  • 6. NORTHLAND CONTROLS PRESENTATION TITLE 6 BUT, HOW? By leveraging the big data collected by your security systems and using that information in a way that can help decision making. Managers can make educated decisions regarding various operational and resource allocation aspects at their facility. Access Control Devices Card Read Transactions Live and Recorded Video Visitor Management Event Logs
  • 8. NORTHLAND CONTROLS ACCESS CONTROL DEVICES Occupancy Counts (amount of traffic) Facility Use – Gym Access (unique reads per day) Company Store – Usage by time of day, employee type, location, department, etc. Cafeteria Utilization Beams | Turnstiles | Card Reads
  • 9. NORTHLAND CONTROLS ACCESS CONTROL DEVICES Occupancy – Rooms Used Occupancy Duration – Coupled with a Card Read Automated lighting, heating, cooling Motion Detectors
  • 10. NORTHLAND CONTROLS DATA MINING Communication Loss • Determining outage patterns • Device Uptime • Automated Service Calls Access Records • Attendance patterns • Traffic patterns • Mischievous usage- Accessing forbidden areas • Suspicious usage- Foreign country o When coupled with IT system, can deactivate domain account 18.2% 14.22% 16.1% 17.62% 2013 2014 2015 2016
  • 11. VIDEO LOITERING | TRAFFIC PATTERNS Using video analytics with heat maps to determine hot spots within a scene. Will let you know areas that people congregate to. Useful in lobby’s and cafeterias.
  • 12. NORTHLAND CONTROLS VIDEO PARKING LOT USE Know which spots are vacant Count vehicles entering and exiting Ensure loading docks aren’t blocked Detect vehicles in visitor spots for long periods Watch speeding vehicles in driveways Search for vehicles of a specific color Post event detections – search through object tracks quickly for new events without need for re- processing
  • 13. OPEN DISCUSSION • How do you get all of this information? • What information would help you make business decisions? • What are doing that we haven’t talked about?
  • 14. NORTHLAND CONTROLS PRESENTATION TITLE 14 MANAGING YOUR SECURITY INVESTMENT Our managed services optimize your investment and ensures a safer workplace ► Maintenance & replacement ► Security device audit ► Local and global technicians ► Accountable Work Order tracking system DEVICE SERVICES ► Access control administration ► Cardholder verification and changes ► New user management ► Usage and Activity Reports USER MANAGEMENT ► 7/24 Live person ► Door unlock/lock ► Employee escort ► Badge activation/deactivation EMPLOYEE 411 ► Alarm & event verification ► Guard Dispatch ► Video verification ► Policies & procedures ALARM MANAGEMENT INTELLIGENCE SERVICES ► Travel Services ► Regional Intelligence Reports ► Social Media Monitoring
  • 15. NORTHLAND CONTROLS PRESENTATION TITLE 15 NORTHLAND CONTROLS WORLDWIDE We are a global company managing security programs in more than 60 countries for our clients around the world Our offices 44150 S Grimmer Blvd Fremont, CA 94538 +1 510.403.7645 gmorgante@northlandcontrols.coml Contact us: facebook.com/NorthlandControlSyste ms @northlandctrls linkedin.com/company/northland-controls Follow us on: linkedin.com/company/northland-controls