SlideShare a Scribd company logo
Security concerns everyone in an organization
How can we get everybody to build security togther?
Small observations can prevent bigger risks
How do we collect these observations easily?
We wanted to solve these problems
4
Jouni Jääskeläinen
Sales Director, Combitech Oy
jouni.jaaskelainen@combitech.fi
Lassie
is a low barrier security and safety incident reporting and
analysis system, that enables the staff to report incidents
easily and immediately at location via a mobile device.
It is for organisations that need an easy way to collect and
handle security and safety related incidents.
Unlike the traditional way of filing the
report afterwards…
Lassie is
always with you and always ready to work
and it enables the organisation to analyze
and take actions before the real problems
emerge.
Lassie
How it works
2. System stores the incident
reports and enables different
analyses and reports
3. Web-based
application is used by
the Handler for
incident management
1. Incident Reporting is done
via a mobile device by the
Informant
4. The Handler and the Informant can
exchange messages through the system
6. Data is available through
API for other systems
5. The Handler can
inform other users
about incidents
Mobile application
for The Informant
Easy way to report the incident
Classification, description, urgency
Automatic time, date and location
Photo attachments
Sharing the report with other users
Follow-up incident processing
Communication with the Handler
Possibility to fulfil and edit the report
afterwards
Communication functionalities
Bulletins
Chat with handlers
Web application
for The Handler
Incident processing
Managing responsibilities
Actions and follow-up
Classification
Communications
About incident
Bulletins
Chat
Reporting
Summary report about the incidents
Export information from the system
Incident history
Changes in incident information
Actions performed
Related conversations
Reporting with mobile device
Browse your earlier
reports
Review and modify
reports
Discussion about
the incident
Report new
incident
Handle the incident report with browser
* E.g. Broken shin bone, typical healing time > 12 weeks. Specialist at sick leave, normal rate for one day 1000e
** Research sponsored by IBM ”Cost of Data Breach Study” – Ponemon Institute LLC 2014
*** ~14% of work time is spent with interruptions - EK, STTK, YTN research 2013
Personnel: 1000
Reports/person/year: 12
Time spent now: 20
Time spent with Lassie: 2
Hourly cost: 40
Spendings/year: 144 000 €
Measurable benefits
Avoid one major accident
Broken leg* >60 000€
Data breach** >1 000 000€
Better knowledge about interruptions
10% less interruptions***  3days/person/year
Easy and fast reporting saves time
Report immediately or during idle time
All incidents can be reported with one
solution
Observable benefits
All incident related data in one place
You can find all the data, and you can do it fast
Incident processing is not tied down to one person
Easy post-analysis, if needed
When reports are shared, everybody does not need to worry about the same
problems
Avoid multiple reports from the same incident.
Get informed about reported problems immediately.
Better knowledge about safety and security situation
Threats and accidents can be predicted and thus prevented
Enables organizational learning and process optimization
How to get Lassie?
Subscribe to Lassie from us as a cloud service*
Different packages available
Handlers access web UI easily with
web browser
Informants download mobile application
directly from app store
*Also customizations for your organization and versions for your own servers are available
Try Lassie for 15 days in your organisation (max 50 users) All
features are available!
Incident type definition and initial education for efficient use
Support is also available
Contact our sales for more information!
MyLassie is a completely customized version of Lassie tailored just
for your organisation!
Contact our sales for more information!
Size of organisation <100 <300 <700 >700
Lassie Basic
Basic features for incident creation and
handling
????e
per month
????e
per month
????e
per month
Contact us!
Lassie Plus (available soon)
Extended features for security related
communication
????e
per month
????e
per month
????e
per month
Contact us!
Lassie as 24/7 cloud service
Start up
Service start up
Integration to your user management
Instructions for set up and use
Support is available
Backups and latest updates automatically
Jouni Jääskeläinen
Myyntijohtaja, Combitech Oy
jouni.jaaskelainen@combitech.fi

More Related Content

What's hot

It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
RishalHalid1
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
Kristin Helgeson
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
Bjørn Sloth
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
TIKAJ
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
CommLab India – Rapid eLearning Solutions
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
Atlantic Security Conference
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
Siemplify
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
Siemplify
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
Mark Gibson
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
Khawar Nehal khawar.nehal@atrc.net.pk
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Symantec
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
IBM Security
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
Heimdal Security
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 

What's hot (20)

It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011Winston morton - intrusion prevention - atlseccon2011
Winston morton - intrusion prevention - atlseccon2011
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
information security technology
information security technologyinformation security technology
information security technology
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 

Viewers also liked

B.sc ii unit 5 eating skills
B.sc ii unit 5 eating skillsB.sc ii unit 5 eating skills
B.sc ii unit 5 eating skills
Rai University
 
Clearwater beach jet ski rentals
Clearwater beach jet ski rentalsClearwater beach jet ski rentals
Clearwater beach jet ski rentals
Andre Adams
 
Cell reselection-parameter-optimizationin-umts
Cell reselection-parameter-optimizationin-umtsCell reselection-parameter-optimizationin-umts
Cell reselection-parameter-optimizationin-umts
atbarawi
 
Ambiente web aula 07
Ambiente web   aula 07Ambiente web   aula 07
Ambiente web aula 07
Fernando Vieira
 
Charly Turismo
Charly TurismoCharly Turismo
Charly Turismo
sergrado112009
 
Presentación1
Presentación1Presentación1
Presentación1
Claudyfue
 
Media work
Media workMedia work
Media work
LaylaMed
 
Seleção de atores boca a boca - folha web 280611
Seleção de atores   boca a boca - folha web 280611Seleção de atores   boca a boca - folha web 280611
Seleção de atores boca a boca - folha web 280611
nadiaval
 
Feedback Loops
Feedback LoopsFeedback Loops
Feedback Loops
atopal
 
La meseta
La mesetaLa meseta
Calendario Fisb 2010
Calendario Fisb 2010Calendario Fisb 2010
Calendario Fisb 2010Bcsalerno
 
Movimiento uniforme y uniformemente acelerado
Movimiento uniforme y uniformemente aceleradoMovimiento uniforme y uniformemente acelerado
Movimiento uniforme y uniformemente acelerado
juansabogal1
 
Matriz
MatrizMatriz
Establishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryEstablishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing Industry
IOSR Journals
 
88 revela-nos senhor
88   revela-nos senhor88   revela-nos senhor
88 revela-nos senhor
Mylena Vasconcelos
 
CUANDO
CUANDOCUANDO
Corrección parcial
Corrección parcialCorrección parcial
Corrección parcial
Cristian Alexander
 
Semana de la mujer de Coslada 2013 #Lafuerzadelamujer
Semana de la mujer de Coslada 2013 #LafuerzadelamujerSemana de la mujer de Coslada 2013 #Lafuerzadelamujer
Semana de la mujer de Coslada 2013 #Lafuerzadelamujer
Ayuntamiento de Coslada
 

Viewers also liked (20)

B.sc ii unit 5 eating skills
B.sc ii unit 5 eating skillsB.sc ii unit 5 eating skills
B.sc ii unit 5 eating skills
 
Stajyeri.com
Stajyeri.comStajyeri.com
Stajyeri.com
 
Clearwater beach jet ski rentals
Clearwater beach jet ski rentalsClearwater beach jet ski rentals
Clearwater beach jet ski rentals
 
Cell reselection-parameter-optimizationin-umts
Cell reselection-parameter-optimizationin-umtsCell reselection-parameter-optimizationin-umts
Cell reselection-parameter-optimizationin-umts
 
Ambiente web aula 07
Ambiente web   aula 07Ambiente web   aula 07
Ambiente web aula 07
 
990
990990
990
 
Charly Turismo
Charly TurismoCharly Turismo
Charly Turismo
 
Presentación1
Presentación1Presentación1
Presentación1
 
Media work
Media workMedia work
Media work
 
Seleção de atores boca a boca - folha web 280611
Seleção de atores   boca a boca - folha web 280611Seleção de atores   boca a boca - folha web 280611
Seleção de atores boca a boca - folha web 280611
 
Feedback Loops
Feedback LoopsFeedback Loops
Feedback Loops
 
La meseta
La mesetaLa meseta
La meseta
 
Calendario Fisb 2010
Calendario Fisb 2010Calendario Fisb 2010
Calendario Fisb 2010
 
Movimiento uniforme y uniformemente acelerado
Movimiento uniforme y uniformemente aceleradoMovimiento uniforme y uniformemente acelerado
Movimiento uniforme y uniformemente acelerado
 
Matriz
MatrizMatriz
Matriz
 
Establishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing IndustryEstablishment of A Small Scale Non-Woven Tissue Processing Industry
Establishment of A Small Scale Non-Woven Tissue Processing Industry
 
88 revela-nos senhor
88   revela-nos senhor88   revela-nos senhor
88 revela-nos senhor
 
CUANDO
CUANDOCUANDO
CUANDO
 
Corrección parcial
Corrección parcialCorrección parcial
Corrección parcial
 
Semana de la mujer de Coslada 2013 #Lafuerzadelamujer
Semana de la mujer de Coslada 2013 #LafuerzadelamujerSemana de la mujer de Coslada 2013 #Lafuerzadelamujer
Semana de la mujer de Coslada 2013 #Lafuerzadelamujer
 

Similar to Combitech Lassie presentation (eng)

4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy
24/7 Software
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
 
10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems
24/7 Software
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
Muhammad Zubair
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
Dharmendra Rama
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
OZONESOFT Solutions
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Dana Gardner
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
Policypros.co.uk
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
Policypros.co.uk
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
developeronrents
 
Incident reporting software.pptx
Incident reporting software.pptxIncident reporting software.pptx
Incident reporting software.pptx
BIS Safety
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
ADGP, Public Grivences, Bangalore
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
ChristoanSmit
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security services
Phreedom Technologies
 
Brochure Safety Changer 2014
Brochure Safety Changer 2014Brochure Safety Changer 2014
Brochure Safety Changer 2014
Capptions
 

Similar to Combitech Lassie presentation (eng) (20)

4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy4 Quick Tips for Event Managers on Leaving a Legacy
4 Quick Tips for Event Managers on Leaving a Legacy
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
Incident reporting software.pptx
Incident reporting software.pptxIncident reporting software.pptx
Incident reporting software.pptx
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security services
 
Brochure Safety Changer 2014
Brochure Safety Changer 2014Brochure Safety Changer 2014
Brochure Safety Changer 2014
 

Recently uploaded

Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024
growthgrids
 
x ray baggage scanner manufacturers in India
x ray baggage scanner manufacturers in Indiax ray baggage scanner manufacturers in India
x ray baggage scanner manufacturers in India
Gujar Industries India Pvt. Ltd
 
Greeting powerpoint slide for kids( 4-6 years old)
Greeting powerpoint slide for kids( 4-6 years old)Greeting powerpoint slide for kids( 4-6 years old)
Greeting powerpoint slide for kids( 4-6 years old)
lenguyenthaotrang663
 
METS Lab SASO Certificate Services in Dubai.pdf
METS Lab SASO Certificate Services in Dubai.pdfMETS Lab SASO Certificate Services in Dubai.pdf
METS Lab SASO Certificate Services in Dubai.pdf
sandeepmetsuae
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Emmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A PhilanthropistEmmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A Philanthropist
Marina Costa
 
Electrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdfElectrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdf
sandeepmetsuae
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
ECOSTAN Biofuel Pvt Ltd
 
3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada
Lakshay Gandhi
 
Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.
Local Gardeners
 
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in RwandaBridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Kasuku Translation Ltd
 
Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
AstroForYou
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
gaurisiddhivinayakte
 
Copy Trading Forex Brokers 2024 ptx
Copy Trading Forex Brokers 2024      ptxCopy Trading Forex Brokers 2024      ptx
Copy Trading Forex Brokers 2024 ptx
Brokerreviewfx
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
janhaviconaxweb
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Merchantech - Payment Processing Services
 
eBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company ProfileeBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company Profile
ChimaOrjiOkpi
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
SAGA Studies
 
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Summerland Environmental
 
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Barrownz.in
 

Recently uploaded (20)

Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024
 
x ray baggage scanner manufacturers in India
x ray baggage scanner manufacturers in Indiax ray baggage scanner manufacturers in India
x ray baggage scanner manufacturers in India
 
Greeting powerpoint slide for kids( 4-6 years old)
Greeting powerpoint slide for kids( 4-6 years old)Greeting powerpoint slide for kids( 4-6 years old)
Greeting powerpoint slide for kids( 4-6 years old)
 
METS Lab SASO Certificate Services in Dubai.pdf
METS Lab SASO Certificate Services in Dubai.pdfMETS Lab SASO Certificate Services in Dubai.pdf
METS Lab SASO Certificate Services in Dubai.pdf
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
 
Emmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A PhilanthropistEmmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A Philanthropist
 
Electrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdfElectrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdf
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
 
3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada3 Examples of new capital gains taxes in Canada
3 Examples of new capital gains taxes in Canada
 
Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.Expert Tips for Pruning Your Plants.pdf.
Expert Tips for Pruning Your Plants.pdf.
 
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in RwandaBridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
 
Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
 
Copy Trading Forex Brokers 2024 ptx
Copy Trading Forex Brokers 2024      ptxCopy Trading Forex Brokers 2024      ptx
Copy Trading Forex Brokers 2024 ptx
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
 
eBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company ProfileeBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company Profile
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
 
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
 
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
 

Combitech Lassie presentation (eng)

  • 1. Security concerns everyone in an organization How can we get everybody to build security togther?
  • 2. Small observations can prevent bigger risks How do we collect these observations easily?
  • 3. We wanted to solve these problems
  • 4. 4 Jouni Jääskeläinen Sales Director, Combitech Oy jouni.jaaskelainen@combitech.fi
  • 5. Lassie is a low barrier security and safety incident reporting and analysis system, that enables the staff to report incidents easily and immediately at location via a mobile device. It is for organisations that need an easy way to collect and handle security and safety related incidents.
  • 6. Unlike the traditional way of filing the report afterwards… Lassie is always with you and always ready to work and it enables the organisation to analyze and take actions before the real problems emerge.
  • 7. Lassie How it works 2. System stores the incident reports and enables different analyses and reports 3. Web-based application is used by the Handler for incident management 1. Incident Reporting is done via a mobile device by the Informant 4. The Handler and the Informant can exchange messages through the system 6. Data is available through API for other systems 5. The Handler can inform other users about incidents
  • 8. Mobile application for The Informant Easy way to report the incident Classification, description, urgency Automatic time, date and location Photo attachments Sharing the report with other users Follow-up incident processing Communication with the Handler Possibility to fulfil and edit the report afterwards Communication functionalities Bulletins Chat with handlers
  • 9. Web application for The Handler Incident processing Managing responsibilities Actions and follow-up Classification Communications About incident Bulletins Chat Reporting Summary report about the incidents Export information from the system Incident history Changes in incident information Actions performed Related conversations
  • 10. Reporting with mobile device Browse your earlier reports Review and modify reports Discussion about the incident Report new incident
  • 11. Handle the incident report with browser
  • 12. * E.g. Broken shin bone, typical healing time > 12 weeks. Specialist at sick leave, normal rate for one day 1000e ** Research sponsored by IBM ”Cost of Data Breach Study” – Ponemon Institute LLC 2014 *** ~14% of work time is spent with interruptions - EK, STTK, YTN research 2013 Personnel: 1000 Reports/person/year: 12 Time spent now: 20 Time spent with Lassie: 2 Hourly cost: 40 Spendings/year: 144 000 € Measurable benefits Avoid one major accident Broken leg* >60 000€ Data breach** >1 000 000€ Better knowledge about interruptions 10% less interruptions***  3days/person/year Easy and fast reporting saves time Report immediately or during idle time All incidents can be reported with one solution
  • 13. Observable benefits All incident related data in one place You can find all the data, and you can do it fast Incident processing is not tied down to one person Easy post-analysis, if needed When reports are shared, everybody does not need to worry about the same problems Avoid multiple reports from the same incident. Get informed about reported problems immediately. Better knowledge about safety and security situation Threats and accidents can be predicted and thus prevented Enables organizational learning and process optimization
  • 14. How to get Lassie? Subscribe to Lassie from us as a cloud service* Different packages available Handlers access web UI easily with web browser Informants download mobile application directly from app store *Also customizations for your organization and versions for your own servers are available
  • 15. Try Lassie for 15 days in your organisation (max 50 users) All features are available! Incident type definition and initial education for efficient use Support is also available Contact our sales for more information! MyLassie is a completely customized version of Lassie tailored just for your organisation! Contact our sales for more information!
  • 16. Size of organisation <100 <300 <700 >700 Lassie Basic Basic features for incident creation and handling ????e per month ????e per month ????e per month Contact us! Lassie Plus (available soon) Extended features for security related communication ????e per month ????e per month ????e per month Contact us! Lassie as 24/7 cloud service Start up Service start up Integration to your user management Instructions for set up and use Support is available Backups and latest updates automatically
  • 17. Jouni Jääskeläinen Myyntijohtaja, Combitech Oy jouni.jaaskelainen@combitech.fi

Editor's Notes

  1. Versio 1.4 – 16.1.2015 Huom! Toimita asiakkaalle aina esitys PDF-muodossa, löytyy myynnin ja markkinoinnin Sharepointista (http://saabwss.saabgroup.com/Saab2/Organizations/Saab_Systems_Oy/myyntimark/Markkinointimateriaali/Forms/AllItems.aspx)
  2. Versio 1.4 – 16.1.2015 Huom! Toimita asiakkaalle aina esitys PDF-muodossa, löytyy myynnin ja markkinoinnin Sharepointista (http://saabwss.saabgroup.com/Saab2/Organizations/Saab_Systems_Oy/myyntimark/Markkinointimateriaali/Forms/AllItems.aspx)
  3. Säästä turhaan kuluvassa työajassa Fyysinen liikkuminen päätelaitteelle  Lassie aina mukana, ilmoita kun luppoaikaa Kävele päätelaitteelle konttorilla, odota kun kone käynnistyy, etsi linkki, täytä vaikeaselkoinen lomake, siirrä kuvatiedosto kännykästä sähköpostilla työpöydälle, … Kännykkä esiin, ota kuva, luokittele, lisää halutessasi kuvaus ja lähetä Ilmoita kun ilmoituspäätteen vieressä  Ilmoita heti : Ei tarvitse muistella, kaivaa maileja, etsiä kuvaa, ymv. Varaa omaa aikaa ilmoittamiseen  Ilmoita kun löytyy sopiva tauko, kun odotat junaa, palaverissa aihe joka ei koske itseä… Mieti kenelle pitäisi ilmoittaa  Aina oikea kanava Pitääkö vanhentuneesta palosammuttimesta tehdä ilmoitus sähköisesti? Riittääkö maili, kenelle? Paperinen lomake, kenelle annan? Miten tiedän ottiko joku käsittelyyn? Häiritse kollegoita kysymällä. Aina Lassiella Excel taulukko laskee vuoden säästön annetulla tuntihinnalla, kun ilmoituksia tehdään keskimäärin annettu lukumäärä per henkilö per vuosi. Vältä onnettomuus Jokaista suurta onnettomuutta vastaa 100 läheltäpiti tilannetta ja 10000 virhettä/vikatilannetta Gains from Getting Near Misses Reported 2012, http://www.piii.com/_downloads/Gains_from_Getting_Near_Misses_Reported_website.pdf Saamalla tietoa hyvissä ajoin voidaan varautua ja ennakoida Esim. - Paloportaiden edessä on säännöllisesti esteitä - Kassakaappi jää usein vahingossa auki - Laboratoriossa on usein liukas lattia - … Epätietoisuus häiriötilanteissa vähenee Korkea kynnys lähettää massaviesti tulevasta häiriöstä  Matala kynnys ilmoittaa rajatulle ryhmälle häiriöistä Yleisen verkon nettikatkos aamupäivän ajan pääkonttorilla: Jos ilmoitan vain tietylle konttorille, vierailevat eivät saa tietoa. Lähetänkö kaikille, jolloin ihmiset alkavat skipata ilmoituksia (paljon itseä koskemattomia).  Lähetä ilmoitus tietylle alueelle. Kun ulkopaikkakuntalainen saapuu pääkonttorille, saa hän ilmoituksen häiriöstä. Vähentää häiriön ihmettelyyn kulunutta aikaa 20-30% työajasta menee keskeytyksiin/häiriöihin Lähde: http://www.sttk.fi/2013/05/14/tutkimus-keskeytykset-vievat-20-30-prosenttia-toimihenkilon-tyopaivasta/ 14% Häiriöihin Jo pieni muutos häiriöihin vaikuttaa rahallisesti paljon (kuvittele 1% nousu työntekijöiden tuottavan työn määrässä, kun häiriöön menevä aika vähenee 1%)
  4. Kaikki tapahtuman tiedot yhdessä paikassa Näkemällä muiden ilmoitukset ei murehdita samasta ongelmasta Jos joku on jo ilmoittanut rikkinäisestä kaiteesta.. Ilmoituksen julkisuuden valita, ominaisuuden saa myös halutessa pois päältä. Parempi tietoisuus turvallisuustilanteesta Saamalla tietoa hyvissä ajoin voidaan varautua ja ennakoida Esim. - Paloportaiden edessä on säännöllisesti esteitä - Kassakaappi jää usein vahingossa auki - Laboratoriossa on usein liukas lattia - … Kuitenkin jotta ilmoituksia voi saada pienistäkin asioita, tulee ilmoittamisen olla - Helppoa: Ei kulu turhaa aikaa / vaivaa: Lassie mobiili - Hyödyllistä: Tunne että ilmoittamisesta on hyötyä ts. siihen reagoidaan: Lassie web - Syyllistämätöntä: Virheistä ilmoittamista ei saa rangaista: Organisaation oma asia - Ilmapiirin tulee suosia ilmoittamista (ei machomeininkiä): Toimiala/organisaatiosta riippuva  Voidaan kehittää prosesseja ja oppia jo _ennen_ kuin mitään vakavaa sattuu
  5. Kuvassa tuotantoversion ulkonäkö