SlideShare a Scribd company logo
Date: 20 Nov 2015
Presenter: David King
Web: www.cruatech.com
Phone: +35317007579
MINDERResource Tracking Platform
Product Demonstration
1 – Minder Overview
Product Name Minder RTP – Resource Tracking Platform
Value
Proposition
Provides ability to track mobile users globally and
facilitate two way communications to ensure personal
safety while working in hostile or difficult areas.
Key Features Cloud based Tracking for Personal safety and Remote
workers.
Two way communication from devices to centralised
application.
Integrated GIS, Android app, Personal Panel for PC,
Location based Rules Engine to manage critical
responses.
Who are the
customers?
All companies whose staff work on the road or in the
field.
All companies whose staff do not work at a desk.
Corporate Security in Medical / Finance / IT
Where are the
markets?
Global – This cloud offering can be installed and
accessed anywhere in the world.
What is unique
about it?
Our unique identifier is our intention to turn all of the
sensors available on a smart phone into Security and
Safety Reporting tools used for features like:
Shake Activation / Power button Panic activation.
2 – Remote Worker Problem
 Working from home – 3 in 5 (60%) in UK and Ireland work from home all or part of the working
month
 Risk Assessment - Employees working alone should at all times be at no greater risk than other
employees. It is an employer’s duty to assess risks to employees and take steps to avoid or
control the risks.
 Corporate Manslaughter – In the USA the Corporate Manslaughter and Corporate Homicide Act
2007 clarifies the criminal liabilities of companies, including large organization's where serious
failures in the management of health and safety result in a fatality.
 Proactive rather than Reactive - A Proactive Approach is required to identify and manage risk
and improve the safety of employees and protect an organisations most important assets.
Corporate Headquarters
A
C
C
E
S
S
C
O
N
T
R
O
L
 PROTECTED
• Known Risk
Areas / Hostile
Territories
• Personal
Safety at Risk
• Corporate
Responsibility
• Ransom’s and
tiger
Kidnappings
• Operational
Inefficiency
Remote Place of Work (Outside HQ)
3 – Safety Outside HQ
Security
Control
Rooms
CCTV
Access
Control
Intrusion
RiskRemote
Locations
Personal
Safety Data
Controls
Trade
Secrets
• Current Security systems are “building centric” with CCTV and Access Control systems providing
protection to staff and buildings.
• Remote worker safety is a blind spot for Corporate security operations manager.
• By creating a service for connecting Remote Workers into the Security Operations Minder can
help businesses protect their most important assets.
4 – Connecting Workers
6
Management Platform
• Provides Location of
Remote Workers and
Exec’s.
• Allows Communication
between HQ and Remote
offsite Employees.
• Configure Operating Zones
for Remote workers and
set rules based on GPRS
Activity.
• Integrate GPS and RFID
devices.
• Review past journeys
• Forward Events to
supervisors.
5 – Platform Overview
7
Mobile Application for Android and IOS
• Allows Instantaneous communications with HQ and
Control Room.
• Update and pulse of Current Location
• Reports Events for Panic, Possible Man down,
Custom Alarms
• Unique application of alarm activations including
Shaking the device for Panic alarms and power
button Press
• Snapshot and Frame Capture
• Video Events
• Audio events
• No additional spend on hardware while improving
Operational Security and field event reporting.
6 – App Overview
8
Personal Panel for PC
• Bank Tellers and cashiers can send alarms
via their desktops and pc’s.
• I/O’s can be connected and opened and
closed allowing door management
capabilities.
• Users can connect to local video streams
to ensure safety at entrance and reception
areas.
7 – Personal Panel Overview
What are the Key User Actions & Reports?
User Actions
 User Driven Alarms– Desktop application and mobile applications can send Panic, Audio, Custom &
Video Alarms.
 User Controls – Personal Panel users can also open door’s or barriers in close proximity to their
workstation as well as view cameras for their location.
 Central Security Controls– Security Managers can develop location based Rules in order to manage
remote personnel. Inside Risk Zone, Outside WorkZone, Communication Off/On,
Reporting Features
• Macro Information– Real Life Security and Safety data from RSS feeds utilised in the application in
order make users aware of Risks in their work areas constituting a Risk Zone.
• Red Risk Zones– Indicators displayed on the GIS that have Risk events associated with specific
geographic locations.
• Risk Reporting and Communication methods – Risk Overview, Dashboard, Email and Text
messaging communication capabilities.
8 - Key User Actions & Reports
10
What are the Key User Interfaces?
Web Browser Management Platform– To manage the processes with remote staff through location based rules..
Personal Panel – Desktop tray application for pc’s for reporting alarms from your pc into the security control room
through to the web browser or to the supervisors phone.
Minder App – App for mobile phone to track users and allow two way communication with Corporate Security
What are the Key Use Cases?
Hostile Territories – Engineers, Sales or Security personnel based Remotely or Deployed in known Hostile
Territories carrying out specific operations on behalf of their organisation.
Worker Management – Supporting and monitoring the safety of an organisation’s important personnel in order to
facilitate business continuity and protect trade secrets.
Finance and Commercial staff in Public Areas – The Personal Panel application covertly connects Bank Tellers
and Sales assistants to the security control room.
Door to Door / On the Road Personnel - Provide protection for staff members who interact with the public in their
day to day work.
9 – Recap
10 – How to get Minder RTP?
Getting Minder is very simple. Here are some of your questions
answered:
How can I order Minder?
If you are interested in purchasing minder please email sales@cruatech.com or call
+35317007579 with your specific safety needs.
Where do I get my License?
Once we have received your order our application will automate the creation of a license for
your organisation. This license will be processed and sent via mail with details on how to
login.
How do I enable Minder App?
Minder app is sent to the specified users and can also be downloaded from the Google Play
Store.
Do I need any hardware?
No additional hardware is needed! The platform runs entirely in the cloud and the
applications and alarm triggers are installed on pre-existing hardware so no additional
hardware spend.
How do I set up my system and site?
Our team will do initial configuration for you and if you have any specific questions around
rules or need to add more users we will help.
Thank you for listening for more info go to www.cruatech.com or Phone:
+35317007579

More Related Content

What's hot

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Ahmed Al Enizi
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
Petr Dvorak
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
Ivanti
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
Riaan Bellingan
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...
Keith Harris
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
Hemanth M
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
Sierraware
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
Digital Bond
 
MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MISAjoy Dasgupta
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Digital Bond
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App Security
ObserveIT
 
Excellent Time Attendance Systemn
Excellent Time Attendance SystemnExcellent Time Attendance Systemn
Excellent Time Attendance Systemn
dthreebahrain
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
Ivanti
 
Security of information asset
Security of information assetSecurity of information asset
Security of information asset
University of Central Punjab
 

What's hot (20)

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MIS
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App Security
 
Excellent Time Attendance Systemn
Excellent Time Attendance SystemnExcellent Time Attendance Systemn
Excellent Time Attendance Systemn
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
 
Security of information asset
Security of information assetSecurity of information asset
Security of information asset
 
Computer Resume
Computer ResumeComputer Resume
Computer Resume
 

Viewers also liked

Lips
LipsLips
Nk5.
Nk5.Nk5.
keyboard and mouse events
keyboard and mouse eventskeyboard and mouse events
keyboard and mouse events
khalidarif1997
 
Los toros
Los torosLos toros
Los toros
ETI TUDELA
 
Blogs & Wikis in the Classroom
Blogs & Wikis in the ClassroomBlogs & Wikis in the Classroom
Blogs & Wikis in the ClassroomOHIO ITSCO
 
La música
La músicaLa música
B O L E T I N 64 G O L P E D E E S T A D O
B O L E T I N 64  G O L P E  D E  E S T A D OB O L E T I N 64  G O L P E  D E  E S T A D O
B O L E T I N 64 G O L P E D E E S T A D O
tony2706
 
Top 5 important soccer skills you need to know
Top 5 important soccer skills you need to knowTop 5 important soccer skills you need to know
Top 5 important soccer skills you need to know
Kevin Cross
 
World Class Photos
World Class PhotosWorld Class Photos
World Class Photos
Joke Channel
 
Tenis clase final
Tenis clase finalTenis clase final
Tenis clase final
Cristian Riquelme
 
Sec 1 NA - River & People
Sec 1 NA - River & PeopleSec 1 NA - River & People
Sec 1 NA - River & Peoplechua.geog
 
Math unit38 vectors
Math unit38 vectorsMath unit38 vectors
Math unit38 vectors
eLearningJa
 
Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)
Tony Brita
 

Viewers also liked (14)

Lips
LipsLips
Lips
 
Nk5.
Nk5.Nk5.
Nk5.
 
keyboard and mouse events
keyboard and mouse eventskeyboard and mouse events
keyboard and mouse events
 
Los toros
Los torosLos toros
Los toros
 
Blogs & Wikis in the Classroom
Blogs & Wikis in the ClassroomBlogs & Wikis in the Classroom
Blogs & Wikis in the Classroom
 
La música
La músicaLa música
La música
 
B O L E T I N 64 G O L P E D E E S T A D O
B O L E T I N 64  G O L P E  D E  E S T A D OB O L E T I N 64  G O L P E  D E  E S T A D O
B O L E T I N 64 G O L P E D E E S T A D O
 
Top 5 important soccer skills you need to know
Top 5 important soccer skills you need to knowTop 5 important soccer skills you need to know
Top 5 important soccer skills you need to know
 
World Class Photos
World Class PhotosWorld Class Photos
World Class Photos
 
Tenis clase final
Tenis clase finalTenis clase final
Tenis clase final
 
Sec 1 NA - River & People
Sec 1 NA - River & PeopleSec 1 NA - River & People
Sec 1 NA - River & People
 
Math unit38 vectors
Math unit38 vectorsMath unit38 vectors
Math unit38 vectors
 
Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)
 
SCE 1
SCE 1SCE 1
SCE 1
 

Similar to Minder Product Demo

Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
Cruatech
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
abe8512000
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
Sreeni Pamidala
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
Marc Vael
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
VictorOrtizMformation
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
SecPod Technologies
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
Hajer alriyami
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
IRJET Journal
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
Redspin, Inc.
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
Christopher Gerritz
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
Vivek chan
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMPerson Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Niv Calderon
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
Virtual Audit Solutions
Virtual Audit SolutionsVirtual Audit Solutions
Virtual Audit Solutions
DirectorLovi
 

Similar to Minder Product Demo (20)

Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMPerson Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Virtual Audit Solutions
Virtual Audit SolutionsVirtual Audit Solutions
Virtual Audit Solutions
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Minder Product Demo

  • 1. Date: 20 Nov 2015 Presenter: David King Web: www.cruatech.com Phone: +35317007579 MINDERResource Tracking Platform Product Demonstration
  • 2. 1 – Minder Overview Product Name Minder RTP – Resource Tracking Platform Value Proposition Provides ability to track mobile users globally and facilitate two way communications to ensure personal safety while working in hostile or difficult areas. Key Features Cloud based Tracking for Personal safety and Remote workers. Two way communication from devices to centralised application. Integrated GIS, Android app, Personal Panel for PC, Location based Rules Engine to manage critical responses. Who are the customers? All companies whose staff work on the road or in the field. All companies whose staff do not work at a desk. Corporate Security in Medical / Finance / IT Where are the markets? Global – This cloud offering can be installed and accessed anywhere in the world. What is unique about it? Our unique identifier is our intention to turn all of the sensors available on a smart phone into Security and Safety Reporting tools used for features like: Shake Activation / Power button Panic activation.
  • 3. 2 – Remote Worker Problem  Working from home – 3 in 5 (60%) in UK and Ireland work from home all or part of the working month  Risk Assessment - Employees working alone should at all times be at no greater risk than other employees. It is an employer’s duty to assess risks to employees and take steps to avoid or control the risks.  Corporate Manslaughter – In the USA the Corporate Manslaughter and Corporate Homicide Act 2007 clarifies the criminal liabilities of companies, including large organization's where serious failures in the management of health and safety result in a fatality.  Proactive rather than Reactive - A Proactive Approach is required to identify and manage risk and improve the safety of employees and protect an organisations most important assets.
  • 4. Corporate Headquarters A C C E S S C O N T R O L  PROTECTED • Known Risk Areas / Hostile Territories • Personal Safety at Risk • Corporate Responsibility • Ransom’s and tiger Kidnappings • Operational Inefficiency Remote Place of Work (Outside HQ) 3 – Safety Outside HQ
  • 5. Security Control Rooms CCTV Access Control Intrusion RiskRemote Locations Personal Safety Data Controls Trade Secrets • Current Security systems are “building centric” with CCTV and Access Control systems providing protection to staff and buildings. • Remote worker safety is a blind spot for Corporate security operations manager. • By creating a service for connecting Remote Workers into the Security Operations Minder can help businesses protect their most important assets. 4 – Connecting Workers
  • 6. 6 Management Platform • Provides Location of Remote Workers and Exec’s. • Allows Communication between HQ and Remote offsite Employees. • Configure Operating Zones for Remote workers and set rules based on GPRS Activity. • Integrate GPS and RFID devices. • Review past journeys • Forward Events to supervisors. 5 – Platform Overview
  • 7. 7 Mobile Application for Android and IOS • Allows Instantaneous communications with HQ and Control Room. • Update and pulse of Current Location • Reports Events for Panic, Possible Man down, Custom Alarms • Unique application of alarm activations including Shaking the device for Panic alarms and power button Press • Snapshot and Frame Capture • Video Events • Audio events • No additional spend on hardware while improving Operational Security and field event reporting. 6 – App Overview
  • 8. 8 Personal Panel for PC • Bank Tellers and cashiers can send alarms via their desktops and pc’s. • I/O’s can be connected and opened and closed allowing door management capabilities. • Users can connect to local video streams to ensure safety at entrance and reception areas. 7 – Personal Panel Overview
  • 9. What are the Key User Actions & Reports? User Actions  User Driven Alarms– Desktop application and mobile applications can send Panic, Audio, Custom & Video Alarms.  User Controls – Personal Panel users can also open door’s or barriers in close proximity to their workstation as well as view cameras for their location.  Central Security Controls– Security Managers can develop location based Rules in order to manage remote personnel. Inside Risk Zone, Outside WorkZone, Communication Off/On, Reporting Features • Macro Information– Real Life Security and Safety data from RSS feeds utilised in the application in order make users aware of Risks in their work areas constituting a Risk Zone. • Red Risk Zones– Indicators displayed on the GIS that have Risk events associated with specific geographic locations. • Risk Reporting and Communication methods – Risk Overview, Dashboard, Email and Text messaging communication capabilities. 8 - Key User Actions & Reports
  • 10. 10 What are the Key User Interfaces? Web Browser Management Platform– To manage the processes with remote staff through location based rules.. Personal Panel – Desktop tray application for pc’s for reporting alarms from your pc into the security control room through to the web browser or to the supervisors phone. Minder App – App for mobile phone to track users and allow two way communication with Corporate Security What are the Key Use Cases? Hostile Territories – Engineers, Sales or Security personnel based Remotely or Deployed in known Hostile Territories carrying out specific operations on behalf of their organisation. Worker Management – Supporting and monitoring the safety of an organisation’s important personnel in order to facilitate business continuity and protect trade secrets. Finance and Commercial staff in Public Areas – The Personal Panel application covertly connects Bank Tellers and Sales assistants to the security control room. Door to Door / On the Road Personnel - Provide protection for staff members who interact with the public in their day to day work. 9 – Recap
  • 11. 10 – How to get Minder RTP? Getting Minder is very simple. Here are some of your questions answered: How can I order Minder? If you are interested in purchasing minder please email sales@cruatech.com or call +35317007579 with your specific safety needs. Where do I get my License? Once we have received your order our application will automate the creation of a license for your organisation. This license will be processed and sent via mail with details on how to login. How do I enable Minder App? Minder app is sent to the specified users and can also be downloaded from the Google Play Store. Do I need any hardware? No additional hardware is needed! The platform runs entirely in the cloud and the applications and alarm triggers are installed on pre-existing hardware so no additional hardware spend. How do I set up my system and site? Our team will do initial configuration for you and if you have any specific questions around rules or need to add more users we will help.
  • 12. Thank you for listening for more info go to www.cruatech.com or Phone: +35317007579