SlideShare a Scribd company logo
Product Overview
TheAtHoc Suite
MakingTheWorld Safer
Networked Crisis Communication
When emergencies strike, AtHoc provides a seamless and trusted exchange of critical information between
organizations, their people, devices, and any external entity. That’s essential, as no event occurs in isolation.
We call that networked crisis communication, a field AtHoc pioneered and is recognized as a leader.
Crisis communication that utilizes only a phone tree, speakers, sirens, email and text aren’t enough to deal
with modern crisis realities. AtHoc’s comprehensive suite of applications unifies crisis communications
between organizations, people, devices, and external entities. The result: Leaders like you can make informed
decisions to effectively protect the people they care about. These modules include alerting your people
across all systems and devices, collecting information from your people for increased situational awareness,
accounting for your people in times of danger, and connecting with trusted partners in your community. With
our comprehensive networked solution, you can achieve the most immediate and effective response to events
within your walls or in your community.
PRODUCT OVERVIEW
AtHoc protects millions of people
in thousands of organizations
from leading corporations to
healthcare institutions and
universities – including the
vast majority of US Military and
Homeland Security personnel.
Alert Collect
Account Connect
NetworkedCrisisCommunicationSuite
Secure FlexibleMobileUnified
Product Overview
Notify anyone, anywhere, on any device
AtHoc AlertTM
is a comprehensive end-to-end emergency notification system that unifies all communication modalities
to alert everyone you care about with a single click. Using a single web-based console or smartphone/tablet, emergency
managers can provide two-way communication across the entire enterprise or community to virtually any device with
real-time speed and assured reach.
Gather critical information from your people to achieve
situational awareness
AtHoc CollectTM
empowers you to gain greater awareness and make better decisions by enabling your field personnel to be
the eyes and ears of the operations center. Give personnel in the field the ability to report events with rich geo-tagged media
reports, plus a one-click “duress” button to report emergent situations for rapid response. The operation center can see
what is happening at any incident scene, enabling rapid mobilization for a more effective response.
•	 Utilize market-leading tools that streamline your communication from pre-configured
templates and custom fields, to geolocation targeting, teleconferencing and many more
•	 Integrate your entire crisis communications from access controls and
social media to fire panels, sirens, mobile app, desktop, two-way radios
and even wearable devices
•	 Implement secure public cloud or our patented hybrid deployment to maximize security
and privacy while gaining scale and flexibility
•	 Leverage enterprise capabilities to delegate system management to local points of contacts (PoCs) while maintaining control and simplify
contact management with LDAP integration and self-service portal
Alert
Collect
•	 Report events or observations from the field with rich media that speaks a
thousand words
•	 Initiate user-identified, geo-sensed “duress” and attach rich media
•	 Gather and apply business rules of incoming events and route to the
appropriate teams
•	 Activate location tracking and share with the user’s team or operation center
Product Overview
Gain real-time visibility into your personnel status and location
AtHoc AccountTM
enables real-time visibility into personnel location and status for effective crisis handling and
response. An operations center or the organizational leadership uses Account to request status from select groups or
the entire populace. For example, account for people post emergencies, recall personnel and conduct daily mustering.
Emergency management is provided an accurate summary view or detailed delivery report of each alert recipient
across the enterprise. Users can also provide unsolicited reports of their current status and location.
Communicate and collaborate with other organizations
Emergencies, even small ones, do not happen in isolation. AtHoc ConnectTM
bridges the communication gap between
organizations during these events. It allows organizations to share authoritative information with external targeted
organizations, agencies and the public in real-time during crises. This empowers the connected community to
collectively assess situations and provide a coordinated response to protect lives and property.
•	 Detailed enterprise-wide and multi-level personnel reports for compliance
•	 Activate real-time tracking on smartphone to give operations your location as
you move
•	 Utilize online self-service portal to gain visibility at the individual level of local
needs and requirements
Connect
•	 Seamlessly connect with organizations in your community before or during an
event
•	 Be confident your communications have reached connected organizations within
a single workflow, without picking up a phone or radio
•	 Eliminate need to manage contacts of external organizations
•	 Receive relevant information from other organizations as well as external content
feeds
Account
Product Overview
Secure and Certified
AtHoc has the most secure solution in the market today, certified for use by the
Department of Defense (DoD), Department of Homeland Security (DHS), and National
Institute of Standards and Technology (NIST).
Enterprise-Class Integration with Devices, Networks and Cloud
AtHoc integrates our cutting-edge technology with all your legacy systems, preserving
existing investment and, most importantly, ensuring seamless crisis response from all
hardware devices, national communication networks, sensors and wearable devices.
That’s a claim few others can make.
Anytime Anywhere Mobility
Emergencies don’t happen only when your people are near their desks. Personnel can
utilize our mobile capabilities to manage, activate, and report incidents from the field with
geo-tagged alerts and rich media.
Flexible Deployment – Public / Hybrid / Private Cloud
Through its patented hybrid deployment, AtHoc balances the economic benefits of cloud-
based computing without the risk of exposing sensitive information outside a firewalled
security zone.
•	 Awarded the Support Anti-Terrorism by Fostering Effective Technology (SAFETY) Act Designation by
DHS
•	 Recognized as a Qualified Anti-Terrorism Technology (QATT) – only supplier of crisis communication
technology to receive the SAFETY Act Designation
•	 Complies with Federal Information Assurance regulations, including NIST SP 800-37/53 Rev3 and
DoD DIACAP
•	 Hosted in highly reliable, SSAE-16 SOC I Type II and LEED Certified Data Centers
What our customers say
about us:
“We have a very, very good system.
We’re very proud of our Code Maroon
system. It is a very robust system and
we are adding methods as we go.”
— Charley Clark, Risk and Compliance
Vice President, Texas A&M University
“…we used AtHoc to alert the
general population of increased force
protection levels and potential danger.“
— Jim Spofford, Regional Exercise
Planner, Naval District Washington
(NDW)
“We deployed AtHoc in a centralized
fashion across the command in order
to benefit from faster emergency
responses, improved consistency
across the numerous locations and
increased visibility for commanders
on force status. This enterprise-class,
command-wide approach was far more
cost-effective than independent, base-
by-base deployments and it reduced
our costs per base by more than 50%,
including additional cost savings
in training, maintenance and other
operations.”
— Robert Tharp, AFRC EMS program
manager, Air Force Reserve Command
(AFRC)
Secure
Unified
•	 Personal Identifiable Information (PII) and other sensitive data can remain secure behind their firewall
•	 Cost efficiencies and scalability are retained with high availability and flexibility of communication cloud
Mobile
•	 Receive real-time, trusted notifications while you’re on the go
•	 Manage and activate alerts anytime anywhere with complete system control
•	 Send something to emergency operations if you see something
•	 Personal and physical devices and sensors: outdoor sirens (giant voice), indoor public announcement (PA),
wearable devices, fire panels, video surveillance, strobes, digital displays, smoke and gas sensors, etc.
•	 Enterprise networks: desktops, Microsoft Lync, Exchange and LDAP, Cisco UCM, Motorola radios, etc.
•	 National and social networks: FEMA IPAWS, Facebook, Twitter, etc.
Flexible
About AtHoc
AtHoc, a division of BlackBerry Limited, is the pioneer and recognized leader in networked crisis communication, protecting millions of people
and thousands of organizations around the world. AtHoc provides a seamless and reliable exchange of critical information among organizations,
their people, devices and external entities. A trusted partner to the world’s most demanding customers, AtHoc is the leading provider to the U.S.
Departments of Defense and Homeland Security, and safeguards numerous other government agencies and leading commercial enterprises.
Headquartered in Silicon Valley, the company operates around the globe. For more information about AtHoc, please visit www.AtHoc.com.
Your organization deserves the leader in networked crisis communication.
Go to AtHoc.com or call 650-685-3000
©2015 AtHoc, Inc. All rights reserved.
AtHoc, Inc. 2988 Campus Drive Suite 100 San Mateo CA 94403
Tel: +1.650.685.3000 | Fax: +1.650.685.3010

More Related Content

What's hot

Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
Greg Cranley
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
NTT Innovation Institute Inc.
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
emmaelice
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
Global Business Events
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
Annie-Marie Page
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Vodafone Global Enterprise - The Importance of a MultiLayered Security Solution
Vodafone Global Enterprise - The Importance of a MultiLayered Security SolutionVodafone Global Enterprise - The Importance of a MultiLayered Security Solution
Vodafone Global Enterprise - The Importance of a MultiLayered Security Solution
Joe Di Clemente
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Minh Le
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
DataExchangeAgency
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
Courtland Smith
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
Mark John Lado, MIT
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
Ronny Stavem
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
APNIC
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
jonneiditz
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
Sharmin Ahammad
 

What's hot (20)

Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Vodafone Global Enterprise - The Importance of a MultiLayered Security Solution
Vodafone Global Enterprise - The Importance of a MultiLayered Security SolutionVodafone Global Enterprise - The Importance of a MultiLayered Security Solution
Vodafone Global Enterprise - The Importance of a MultiLayered Security Solution
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
 

Viewers also liked

Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
AtHoc
 
Athoc Brief
Athoc BriefAthoc Brief
Athoc Brief
glmcgrath70
 
iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...
iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...
iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...
Health IT Conference – iHT2
 
Emergency Notification and Networked Crisis Communications for Transportation
Emergency Notification and Networked Crisis Communications for TransportationEmergency Notification and Networked Crisis Communications for Transportation
Emergency Notification and Networked Crisis Communications for Transportation
BlackBerry
 
Crisis Management
Crisis Management Crisis Management
Crisis Management
Brett Atwood
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Mshari Alabdulkarim
 
Incident Management
Incident ManagementIncident Management
Incident Management
Abhishek Agnihotry
 
Crisis management - Types and Examples
Crisis management - Types and ExamplesCrisis management - Types and Examples
Crisis management - Types and Examples
Nupur Bhardwaj
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Social Media Crisis Management: Three Case Studies
Social Media Crisis Management: Three Case StudiesSocial Media Crisis Management: Three Case Studies
Social Media Crisis Management: Three Case Studies
Elisha Tan
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 

Viewers also liked (13)

Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Athoc Brief
Athoc BriefAthoc Brief
Athoc Brief
 
iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...
iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...
iHT2 Health IT Summit Boston 2013 – Chris Petteruti, Director of Technology D...
 
Emergency Notification and Networked Crisis Communications for Transportation
Emergency Notification and Networked Crisis Communications for TransportationEmergency Notification and Networked Crisis Communications for Transportation
Emergency Notification and Networked Crisis Communications for Transportation
 
Crisis Management
Crisis Management Crisis Management
Crisis Management
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Crisis management - Types and Examples
Crisis management - Types and ExamplesCrisis management - Types and Examples
Crisis management - Types and Examples
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Social Media Crisis Management: Three Case Studies
Social Media Crisis Management: Three Case StudiesSocial Media Crisis Management: Three Case Studies
Social Media Crisis Management: Three Case Studies
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to AtHocProductBrochure_V2

Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
Future Position X
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
Chris Keane
 
VM_energy_utility3
VM_energy_utility3VM_energy_utility3
VM_energy_utility3
Shawn Lemley
 
Business Critical Communications
Business Critical CommunicationsBusiness Critical Communications
Business Critical Communications
UnifyCo
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
Stephen Bates
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Unisys Corporation
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
Jonathan Reyes
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
JAN HICKEY
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
fmitchell
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
AtHoc
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Citrix
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
Jack Brown
 
2011-09-19-01-coordcom-futurecom
2011-09-19-01-coordcom-futurecom2011-09-19-01-coordcom-futurecom
2011-09-19-01-coordcom-futurecom
Maria Lindström
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
Riaan Bellingan
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
Ray Treurniet
 

Similar to AtHocProductBrochure_V2 (20)

Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
 
VM_energy_utility3
VM_energy_utility3VM_energy_utility3
VM_energy_utility3
 
Business Critical Communications
Business Critical CommunicationsBusiness Critical Communications
Business Critical Communications
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
DSMS - Community
DSMS - CommunityDSMS - Community
DSMS - Community
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
2011-09-19-01-coordcom-futurecom
2011-09-19-01-coordcom-futurecom2011-09-19-01-coordcom-futurecom
2011-09-19-01-coordcom-futurecom
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
 

AtHocProductBrochure_V2

  • 1. Product Overview TheAtHoc Suite MakingTheWorld Safer Networked Crisis Communication When emergencies strike, AtHoc provides a seamless and trusted exchange of critical information between organizations, their people, devices, and any external entity. That’s essential, as no event occurs in isolation. We call that networked crisis communication, a field AtHoc pioneered and is recognized as a leader. Crisis communication that utilizes only a phone tree, speakers, sirens, email and text aren’t enough to deal with modern crisis realities. AtHoc’s comprehensive suite of applications unifies crisis communications between organizations, people, devices, and external entities. The result: Leaders like you can make informed decisions to effectively protect the people they care about. These modules include alerting your people across all systems and devices, collecting information from your people for increased situational awareness, accounting for your people in times of danger, and connecting with trusted partners in your community. With our comprehensive networked solution, you can achieve the most immediate and effective response to events within your walls or in your community. PRODUCT OVERVIEW AtHoc protects millions of people in thousands of organizations from leading corporations to healthcare institutions and universities – including the vast majority of US Military and Homeland Security personnel. Alert Collect Account Connect NetworkedCrisisCommunicationSuite Secure FlexibleMobileUnified
  • 2. Product Overview Notify anyone, anywhere, on any device AtHoc AlertTM is a comprehensive end-to-end emergency notification system that unifies all communication modalities to alert everyone you care about with a single click. Using a single web-based console or smartphone/tablet, emergency managers can provide two-way communication across the entire enterprise or community to virtually any device with real-time speed and assured reach. Gather critical information from your people to achieve situational awareness AtHoc CollectTM empowers you to gain greater awareness and make better decisions by enabling your field personnel to be the eyes and ears of the operations center. Give personnel in the field the ability to report events with rich geo-tagged media reports, plus a one-click “duress” button to report emergent situations for rapid response. The operation center can see what is happening at any incident scene, enabling rapid mobilization for a more effective response. • Utilize market-leading tools that streamline your communication from pre-configured templates and custom fields, to geolocation targeting, teleconferencing and many more • Integrate your entire crisis communications from access controls and social media to fire panels, sirens, mobile app, desktop, two-way radios and even wearable devices • Implement secure public cloud or our patented hybrid deployment to maximize security and privacy while gaining scale and flexibility • Leverage enterprise capabilities to delegate system management to local points of contacts (PoCs) while maintaining control and simplify contact management with LDAP integration and self-service portal Alert Collect • Report events or observations from the field with rich media that speaks a thousand words • Initiate user-identified, geo-sensed “duress” and attach rich media • Gather and apply business rules of incoming events and route to the appropriate teams • Activate location tracking and share with the user’s team or operation center
  • 3. Product Overview Gain real-time visibility into your personnel status and location AtHoc AccountTM enables real-time visibility into personnel location and status for effective crisis handling and response. An operations center or the organizational leadership uses Account to request status from select groups or the entire populace. For example, account for people post emergencies, recall personnel and conduct daily mustering. Emergency management is provided an accurate summary view or detailed delivery report of each alert recipient across the enterprise. Users can also provide unsolicited reports of their current status and location. Communicate and collaborate with other organizations Emergencies, even small ones, do not happen in isolation. AtHoc ConnectTM bridges the communication gap between organizations during these events. It allows organizations to share authoritative information with external targeted organizations, agencies and the public in real-time during crises. This empowers the connected community to collectively assess situations and provide a coordinated response to protect lives and property. • Detailed enterprise-wide and multi-level personnel reports for compliance • Activate real-time tracking on smartphone to give operations your location as you move • Utilize online self-service portal to gain visibility at the individual level of local needs and requirements Connect • Seamlessly connect with organizations in your community before or during an event • Be confident your communications have reached connected organizations within a single workflow, without picking up a phone or radio • Eliminate need to manage contacts of external organizations • Receive relevant information from other organizations as well as external content feeds Account
  • 4. Product Overview Secure and Certified AtHoc has the most secure solution in the market today, certified for use by the Department of Defense (DoD), Department of Homeland Security (DHS), and National Institute of Standards and Technology (NIST). Enterprise-Class Integration with Devices, Networks and Cloud AtHoc integrates our cutting-edge technology with all your legacy systems, preserving existing investment and, most importantly, ensuring seamless crisis response from all hardware devices, national communication networks, sensors and wearable devices. That’s a claim few others can make. Anytime Anywhere Mobility Emergencies don’t happen only when your people are near their desks. Personnel can utilize our mobile capabilities to manage, activate, and report incidents from the field with geo-tagged alerts and rich media. Flexible Deployment – Public / Hybrid / Private Cloud Through its patented hybrid deployment, AtHoc balances the economic benefits of cloud- based computing without the risk of exposing sensitive information outside a firewalled security zone. • Awarded the Support Anti-Terrorism by Fostering Effective Technology (SAFETY) Act Designation by DHS • Recognized as a Qualified Anti-Terrorism Technology (QATT) – only supplier of crisis communication technology to receive the SAFETY Act Designation • Complies with Federal Information Assurance regulations, including NIST SP 800-37/53 Rev3 and DoD DIACAP • Hosted in highly reliable, SSAE-16 SOC I Type II and LEED Certified Data Centers What our customers say about us: “We have a very, very good system. We’re very proud of our Code Maroon system. It is a very robust system and we are adding methods as we go.” — Charley Clark, Risk and Compliance Vice President, Texas A&M University “…we used AtHoc to alert the general population of increased force protection levels and potential danger.“ — Jim Spofford, Regional Exercise Planner, Naval District Washington (NDW) “We deployed AtHoc in a centralized fashion across the command in order to benefit from faster emergency responses, improved consistency across the numerous locations and increased visibility for commanders on force status. This enterprise-class, command-wide approach was far more cost-effective than independent, base- by-base deployments and it reduced our costs per base by more than 50%, including additional cost savings in training, maintenance and other operations.” — Robert Tharp, AFRC EMS program manager, Air Force Reserve Command (AFRC) Secure Unified • Personal Identifiable Information (PII) and other sensitive data can remain secure behind their firewall • Cost efficiencies and scalability are retained with high availability and flexibility of communication cloud Mobile • Receive real-time, trusted notifications while you’re on the go • Manage and activate alerts anytime anywhere with complete system control • Send something to emergency operations if you see something • Personal and physical devices and sensors: outdoor sirens (giant voice), indoor public announcement (PA), wearable devices, fire panels, video surveillance, strobes, digital displays, smoke and gas sensors, etc. • Enterprise networks: desktops, Microsoft Lync, Exchange and LDAP, Cisco UCM, Motorola radios, etc. • National and social networks: FEMA IPAWS, Facebook, Twitter, etc. Flexible About AtHoc AtHoc, a division of BlackBerry Limited, is the pioneer and recognized leader in networked crisis communication, protecting millions of people and thousands of organizations around the world. AtHoc provides a seamless and reliable exchange of critical information among organizations, their people, devices and external entities. A trusted partner to the world’s most demanding customers, AtHoc is the leading provider to the U.S. Departments of Defense and Homeland Security, and safeguards numerous other government agencies and leading commercial enterprises. Headquartered in Silicon Valley, the company operates around the globe. For more information about AtHoc, please visit www.AtHoc.com. Your organization deserves the leader in networked crisis communication. Go to AtHoc.com or call 650-685-3000 ©2015 AtHoc, Inc. All rights reserved. AtHoc, Inc. 2988 Campus Drive Suite 100 San Mateo CA 94403 Tel: +1.650.685.3000 | Fax: +1.650.685.3010