SlideShare a Scribd company logo
IP Video Surveillance Solutions, which deliver the
image resolution needed for subject identification and
decision making while integrating easily and cost-
effectively with your existing IT infrastructure
Dario L. Santana
President
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
dario@layer3securityservices.com
The disruptive power of ‘IP Convergence’ has swept across
many industries:
– Written communications: e-mail, SMS
– Telephony: VoIP
– Entertainment: digital audio and video
– Advertising: digital media
– Business services: SaaS
IP Convergence has now arrived in the Physical Security space;
particularly, in Video Surveillance, offering a quantum leap in
value and capabilities
‘IP Convergence’ = GREATER Customer Value
6/20/2010 2Confidential
The Convergence Opportunity
• Layer3’s IP solutions Deliver ROI
• Three Disciplines, One Goal – Your Security
• All IP Video Surveillance needs in One Provider
• Security through On-Going Education
• Best of Breed system components means lower total cost of
ownership (TCO)
• Significant Ecosystem protects your investment
• Intelligent systems can reduce operating costs
• Past Successes in the security space
6/20/2010 3
Higher ROI, Ease of Support, Lower TCO
Confidential
Benefits for the Enterprise – An Outline
• Public and Private Institutions
– Industrial and Research facilities
– Business campuses
– Hospitals
– Distribution Centers
– K-12 Schools and Universities
– Government agencies
6/20/2010 4
Different Needs with Shared Goals
Assets Protection and People Safety
Solutions for the Enterprise
• More likely to deter and convict – word gets around
• Megapixel cameras capture more detail
• Lower costs
– Fewer cameras needed to get the job done
– Simplicity in wiring: all Ethernet, mostly POE
– Enterprise features: open standards, familiar network protocols
• Higher reliability and availability
Return on Investment Driven through Actionable Video
56/20/2010
IP Video Surveillance Delivers ROI
• Physical Security Expertise
– Our Security DNA includes ADT, SimplexGrinnell, Sensormatic
– Hold certifications from Milestone, Axis, IQinVision and others
• IP Networks Knowhow
– Our IP networking DNA includes Motorola/GI, Aerocast
– PSNP Certification, Cisco training
• Project Execution Capabilities
– Civil Engineering Degree
– California Contractor License
Three Disciplines, One Goal – Your Security
66/20/2010
Three Disciplines
IP Networks
Physical Security
Project Execution
While President of Tyco Fire and Security Latin America, Dario
Santana, now President of Layer3 Security Services, oversaw
security projects for multinational corporations and major
industrial and institutional clients. These include:
6/20/2010 Confidential 7
Chile’s National Copper Corporation
World renowned Teatro Colon,
(Colon Theatre) Buenos Aires, Argentina
Past Security Projects
• Layer3 Security Services provides a full range of IP Video
Surveillance (IPVS) services
• Site Survey and System Design
• Product Selection
• System Configuration
• Installation and training
• Maintenance and Support
• Layer3 is also able to provide other physical security solutions
such as intrusion detection and access control
Layer3 is the Smart Choice for ALL your
Physical Security Needs
86/20/2010
All Your Needs - One Provider
• Layer3 Security Services believes that your security
also hinges on information and education
• Monthly IPVS newsletter
• Quarterly educational seminars
• White papers
• Case studies
• Ongoing dialogue
• Optimal solutions require robust needs assessments
Security Through Knowledge
96/20/2010
Security Starts with Education
• System Elements Leverage IP Standards
• Video Management Software
• Network Video Recorders
• IP Cameras
• Network Attached Storage
• Networking equipment (layer 2)
• Various clients: smart, remote, Web, PDA
Reliability, Availability
106/20/2010
Best of Breed Solutions
• Standards-based ecosystem protects your investment
• System grows as your needs grow
• No dead-ends or obsolete platforms
• Significant partner integration:
• Security
• Operations
• Includes analytics and intelligence
Upgradeability and Extensibility
116/20/2010
Extensive Ecosystem
• Analytics includes:
– License plate recognition
– Virtual trip wire
– Vehicle size, direction and speed
determination
– Missing or abandoned item detection
– Rule-based alerts
Analytics Increases System Effectiveness and
Can Reduce Manpower Costs
126/20/2010
Intelligence Means Lower Costs
6/20/2010 Confidential 13
IPVS System Overview
Client
Management
Application
Third Party
Applications
Dario Santana is President of Layer3 Security Services (DBA for Net.Surveillance, Inc.) a California
Corporation that provides Internet Protocol (IP) Video Surveillance systems for the enterprise. Until
July of 2008, Dario Santana was CEO and President of NTN Buzztime, Inc., a multipoint social
interactive entertainment company located in Carlsbad, California and trading in the American Stock
Exchange under the symbol ‘NTN’. Before joining Buzztime, Dario was the President of Tyco Fire and
Security's Latin American Division, which offers security and fire protection solutions throughout Latin
America under the brand names ADT Home Security, Sensormatic and SimplexGrinnell, employs over
4000 people and invoices approximately $300 million US dollars per year. Prior to Tyco, Dario was
President of Aerocast Inc., a streaming media services company funded by Motorola and Liberty
Media and focused on delivering entertainment quality video to the broadband enabled home. Before
Aerocast, Dario held a number of roles at Motorola/General Instrument including General Manager of
Advanced Network Systems. Dario holds a MBA from the Harvard Business School and an
engineering degree from Purdue University
146/20/2010
Layer3 Leadership
Return on Investment Through
Actionable Video….
Dario L. Santana
President
Layer3 Security Services
6440 Lusk Boulevard - Suite 102,
San Diego CA 92130
Ph: 858 751 7555
dario@layer3securityservices.com

More Related Content

What's hot

Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay Dereli
 
Police Proposal
Police ProposalPolice Proposal
Police Proposal
Daniel Feludu
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
Abbie Barbir
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
moldovaictsummit2016
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
Luca Moroni ✔✔
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installationOm Kumar
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Byod security
Byod security Byod security
Byod security
Denise Bailey
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
LINE Corporation
 
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
Byres Security Inc.
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Sysfore Technologies
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
Vineet Sood
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
Eurotech
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
Narinrit Prem-apiwathanokul
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
James Wu
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...
TI Safe
 

What's hot (20)

Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-Turgay dereli 283286 software eng. ass 2-
Turgay dereli 283286 software eng. ass 2-
 
Police Proposal
Police ProposalPolice Proposal
Police Proposal
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
 
Experience and perspective_of_security_installation
Experience and perspective_of_security_installationExperience and perspective_of_security_installation
Experience and perspective_of_security_installation
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Byod security
Byod security Byod security
Byod security
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
The Tofino Industrial Security Solution - 7 Steps To Securing Your Industrial...
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...
 

Similar to IPVS Solutions from Layer3 Security Services

Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Iptech View
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
HajeJanKamps
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
Firetide Wireless Node Overview
Firetide Wireless Node OverviewFiretide Wireless Node Overview
Firetide Wireless Node Overview
Paul Richards
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
cem lale
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deck
Seiji Eto
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
Mark Skilton
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Amazon Web Services
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
Heidelberg India
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
Vincent Kwon
 

Similar to IPVS Solutions from Layer3 Security Services (20)

Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted SolutionEnhance Security With IP Video Surveillance Systems | Your Trusted Solution
Enhance Security With IP Video Surveillance Systems | Your Trusted Solution
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Firetide Wireless Node Overview
Firetide Wireless Node OverviewFiretide Wireless Node Overview
Firetide Wireless Node Overview
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
NSC presentation
NSC presentationNSC presentation
NSC presentation
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deck
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

IPVS Solutions from Layer3 Security Services

  • 1. IP Video Surveillance Solutions, which deliver the image resolution needed for subject identification and decision making while integrating easily and cost- effectively with your existing IT infrastructure Dario L. Santana President Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 dario@layer3securityservices.com
  • 2. The disruptive power of ‘IP Convergence’ has swept across many industries: – Written communications: e-mail, SMS – Telephony: VoIP – Entertainment: digital audio and video – Advertising: digital media – Business services: SaaS IP Convergence has now arrived in the Physical Security space; particularly, in Video Surveillance, offering a quantum leap in value and capabilities ‘IP Convergence’ = GREATER Customer Value 6/20/2010 2Confidential The Convergence Opportunity
  • 3. • Layer3’s IP solutions Deliver ROI • Three Disciplines, One Goal – Your Security • All IP Video Surveillance needs in One Provider • Security through On-Going Education • Best of Breed system components means lower total cost of ownership (TCO) • Significant Ecosystem protects your investment • Intelligent systems can reduce operating costs • Past Successes in the security space 6/20/2010 3 Higher ROI, Ease of Support, Lower TCO Confidential Benefits for the Enterprise – An Outline
  • 4. • Public and Private Institutions – Industrial and Research facilities – Business campuses – Hospitals – Distribution Centers – K-12 Schools and Universities – Government agencies 6/20/2010 4 Different Needs with Shared Goals Assets Protection and People Safety Solutions for the Enterprise
  • 5. • More likely to deter and convict – word gets around • Megapixel cameras capture more detail • Lower costs – Fewer cameras needed to get the job done – Simplicity in wiring: all Ethernet, mostly POE – Enterprise features: open standards, familiar network protocols • Higher reliability and availability Return on Investment Driven through Actionable Video 56/20/2010 IP Video Surveillance Delivers ROI
  • 6. • Physical Security Expertise – Our Security DNA includes ADT, SimplexGrinnell, Sensormatic – Hold certifications from Milestone, Axis, IQinVision and others • IP Networks Knowhow – Our IP networking DNA includes Motorola/GI, Aerocast – PSNP Certification, Cisco training • Project Execution Capabilities – Civil Engineering Degree – California Contractor License Three Disciplines, One Goal – Your Security 66/20/2010 Three Disciplines IP Networks Physical Security Project Execution
  • 7. While President of Tyco Fire and Security Latin America, Dario Santana, now President of Layer3 Security Services, oversaw security projects for multinational corporations and major industrial and institutional clients. These include: 6/20/2010 Confidential 7 Chile’s National Copper Corporation World renowned Teatro Colon, (Colon Theatre) Buenos Aires, Argentina Past Security Projects
  • 8. • Layer3 Security Services provides a full range of IP Video Surveillance (IPVS) services • Site Survey and System Design • Product Selection • System Configuration • Installation and training • Maintenance and Support • Layer3 is also able to provide other physical security solutions such as intrusion detection and access control Layer3 is the Smart Choice for ALL your Physical Security Needs 86/20/2010 All Your Needs - One Provider
  • 9. • Layer3 Security Services believes that your security also hinges on information and education • Monthly IPVS newsletter • Quarterly educational seminars • White papers • Case studies • Ongoing dialogue • Optimal solutions require robust needs assessments Security Through Knowledge 96/20/2010 Security Starts with Education
  • 10. • System Elements Leverage IP Standards • Video Management Software • Network Video Recorders • IP Cameras • Network Attached Storage • Networking equipment (layer 2) • Various clients: smart, remote, Web, PDA Reliability, Availability 106/20/2010 Best of Breed Solutions
  • 11. • Standards-based ecosystem protects your investment • System grows as your needs grow • No dead-ends or obsolete platforms • Significant partner integration: • Security • Operations • Includes analytics and intelligence Upgradeability and Extensibility 116/20/2010 Extensive Ecosystem
  • 12. • Analytics includes: – License plate recognition – Virtual trip wire – Vehicle size, direction and speed determination – Missing or abandoned item detection – Rule-based alerts Analytics Increases System Effectiveness and Can Reduce Manpower Costs 126/20/2010 Intelligence Means Lower Costs
  • 13. 6/20/2010 Confidential 13 IPVS System Overview Client Management Application Third Party Applications
  • 14. Dario Santana is President of Layer3 Security Services (DBA for Net.Surveillance, Inc.) a California Corporation that provides Internet Protocol (IP) Video Surveillance systems for the enterprise. Until July of 2008, Dario Santana was CEO and President of NTN Buzztime, Inc., a multipoint social interactive entertainment company located in Carlsbad, California and trading in the American Stock Exchange under the symbol ‘NTN’. Before joining Buzztime, Dario was the President of Tyco Fire and Security's Latin American Division, which offers security and fire protection solutions throughout Latin America under the brand names ADT Home Security, Sensormatic and SimplexGrinnell, employs over 4000 people and invoices approximately $300 million US dollars per year. Prior to Tyco, Dario was President of Aerocast Inc., a streaming media services company funded by Motorola and Liberty Media and focused on delivering entertainment quality video to the broadband enabled home. Before Aerocast, Dario held a number of roles at Motorola/General Instrument including General Manager of Advanced Network Systems. Dario holds a MBA from the Harvard Business School and an engineering degree from Purdue University 146/20/2010 Layer3 Leadership
  • 15. Return on Investment Through Actionable Video…. Dario L. Santana President Layer3 Security Services 6440 Lusk Boulevard - Suite 102, San Diego CA 92130 Ph: 858 751 7555 dario@layer3securityservices.com