SlideShare a Scribd company logo
1 of 13
Date: 10 June 2016
Presenter: David King
Web: www.cruatech.com
Phone: +35317007579
Product Overview
1 – Minder Overview
Lone
Worker
Personal
Safety
Tracking
MINDER connects remote employees to the security operations of
a business to offer Personal Safety, Lone Worker Management
and In obtrusive tracking.
MINDER ensures alarm delivery by utilizing multiple protocol
delivery service. Wi-Fi, GSM Data and SMS.
MINDER is built on Windows Azure cloud and integrated with
Android and IOS devices. Can be deployed in SaaS model which
remove any initial outlay on hardware.
MINDER monitors health of devices, connectivity and
accelerometer variables to ensure that users are safe and
connected.
2 – Evolving Workplace
 Working from home – 3 in 5 (60%) in UK and Ireland work
from home all or part of the working month
 Risk Assessment - Employees working alone should at all
times be at no greater risk than other employees. It is an
employer’s duty to assess risks to employees and take
steps to avoid or control the risks.
 Corporate Manslaughter – In the USA the Corporate
Manslaughter and Corporate Homicide Act 2007 clarifies
the criminal liabilities of companies, including large
organization's where serious failures in the management of
health and safety result in a fatality.
 Proactive rather than Reactive - A Proactive Approach is
required to identify and manage risk and improve the safety
of employees and protect an organisations most important
assets.
Employer Responsibilities
Corporate Headquarters
A
C
C
E
S
S
C
O
N
T
R
O
L
 PROTECTED
Remote Place of Work (Outside HQ)
3 – Safety Outside HQ
Known Risk
Areas / Hostile
Territories
Known Risk
Personal
Safety at Risk
Ransom’s and
Kidnappings
Man down &
Fall detection
4 – MINDER Architecture
6
Management Platform
• Provides Location of
Remote Workers and
Exec’s.
• Allows Communication
between HQ and
Remote offsite
Employees.
• Configure Operating
Zones for Remote
workers and set rules
based on GPRS
Activity.
• Integrate GPS and
RFID devices.
• Review past journeys
• Forward Events to
supervisors.
5 – Platform Overview
7
Mobile Application for Android and IOS
• Allows Instantaneous communications with
HQ and Control Room.
• Update and pulse of Current Location
• Reports Events for Panic, Man down, Custom
Alarms
• Unique application of alarm activations
including Shaking the device for Panic alarms
and power button Press
• Snapshot and Frame Capture
• Video Events
• Audio events
• No additional spend on hardware while
improving Operational Security and field event
reporting.
6 – App Overview
8
Personal Panel for PC
• Bank Tellers and cashiers can send alarms
via their desktops and pc’s.
• I/O’s can be connected and opened and
closed allowing door management
capabilities.
• Users can connect to local video streams
to ensure safety at entrance and reception
areas.
7 – Personal Panel Overview
What are the Key User Actions & Reports?
User Actions
User Driven Alarms– Desktop application and mobile applications can send Panic, Audio,
Custom & Video Alarms.
User Controls – Personal Panel users can also open door’s or barriers in close proximity to their
workstation as well as view cameras for their location.
Central Security Controls– Security Managers can develop location based Rules in order to
manage remote personnel. Inside Risk Zone, Outside WorkZone, Communication Off/On,
Reporting Features
•Macro Information– Real Life Security and Safety data from RSS feeds utilised in the application
in order make users aware of Risks in their work areas constituting a Risk Zone.
•Red Risk Zones– Indicators displayed on the GIS that have Risk events associated with specific
geographic locations.
•Risk Reporting and Communication methods – Risk Overview, Dashboard, Email and Text
messaging communication capabilities.
8 - Key User Actions & Reports
1 – Key Product Info
Key Info Minder details
Value
Proposition
Minder Provides ability monitor employees who work globally and facilitate two way
communications to ensure personal safety and while carrying out their work activities.
Key Features Cloud based Tracking for Personal safety and Lone Workers Two way communication
from devices to centralised application.
Integrated GIS, Android app, Desktop Panel for PC,
Location based Rules Engine to manage critical responses.
Who are the
customers?
All companies whose staff do not work at a desk.
Corporate Security in Medical / Finance / IT
Where are the
markets?
Global – This cloud offering can be installed and accessed anywhere in the world.
What is unique
about it?
Our unique identifier is our intention to turn all of the sensors available on a smart phone
into Security and Safety Reporting tools used for features like:
Shake Activation / Power button Panic activation / Step Counter and movement analysis
through the Accelerometer.
11
What are the Key User Interfaces?
Web Browser Management Platform– To manage the processes with remote staff through location based rules..
Personal Panel – Desktop tray application for pc’s for reporting alarms from your pc into the security control room
through to the web browser or to the supervisors phone.
Minder App – App for mobile phone to track users and allow two way communication with Corporate Security
What are the Key Use Cases?
Hostile Territories – Engineers, Sales or Security personnel based Remotely or Deployed in known Hostile
Territories carrying out specific operations on behalf of their organisation.
Worker Management – Supporting and monitoring the safety of an organisation’s important personnel in order to
facilitate business continuity and protect trade secrets.
Finance and Commercial staff in Public Areas – The Personal Panel application covertly connects Bank Tellers
and Sales assistants to the security control room.
Door to Door / On the Road Personnel - Provide protection for staff members who interact with the public in their
day to day work.
9 – Recap
10 – How to get Minder RTP?
Getting Minder is very simple. Here are some of your questions
answered:
How can I order Minder?
If you are interested in purchasing minder please email sales@cruatech.com or call
+35317007579 with your specific safety needs.
Where do I get my License?
Once we have received your order our application will automate the creation of a license for
your organisation. This license will be processed and sent via mail with details on how to
login.
How do I enable Minder App?
Minder app is sent to the specified users and can also be downloaded from the Google Play
Store.
Do I need any hardware?
No additional hardware is needed! The platform runs entirely in the cloud and the
applications and alarm triggers are installed on pre-existing hardware so no additional
hardware spend.
How do I set up my system and site?
Our team will do initial configuration for you and if you have any specific questions around
rules or need to add more users we will help.
Thank you for listening for more info go to www.cruatech.com or
Phone: +35317007579

More Related Content

What's hot

Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Ivanti Momentum | What's New in User Workspace Manager 2020.2
Ivanti Momentum | What's New in User Workspace Manager 2020.2Ivanti Momentum | What's New in User Workspace Manager 2020.2
Ivanti Momentum | What's New in User Workspace Manager 2020.2Ivanti
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityAdlan Hussain
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Digital Global Systems Inc.
Digital Global Systems Inc. Digital Global Systems Inc.
Digital Global Systems Inc. Scott Frayser
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 

What's hot (20)

Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Ivanti Momentum | What's New in User Workspace Manager 2020.2
Ivanti Momentum | What's New in User Workspace Manager 2020.2Ivanti Momentum | What's New in User Workspace Manager 2020.2
Ivanti Momentum | What's New in User Workspace Manager 2020.2
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
Digital Global Systems Inc.
Digital Global Systems Inc. Digital Global Systems Inc.
Digital Global Systems Inc.
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 

Similar to Minder RTP Product Overview

Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMPerson Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMNiv Calderon
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Cepoke Product eng
Cepoke Product engCepoke Product eng
Cepoke Product engincubusen
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 

Similar to Minder RTP Product Overview (20)

Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Custom Mobile Services
Custom Mobile ServicesCustom Mobile Services
Custom Mobile Services
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMPerson Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Cepoke Product eng
Cepoke Product engCepoke Product eng
Cepoke Product eng
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Topic 7
Topic 7Topic 7
Topic 7
 

Recently uploaded

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Recently uploaded (20)

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Minder RTP Product Overview

  • 1. Date: 10 June 2016 Presenter: David King Web: www.cruatech.com Phone: +35317007579 Product Overview
  • 2. 1 – Minder Overview Lone Worker Personal Safety Tracking MINDER connects remote employees to the security operations of a business to offer Personal Safety, Lone Worker Management and In obtrusive tracking. MINDER ensures alarm delivery by utilizing multiple protocol delivery service. Wi-Fi, GSM Data and SMS. MINDER is built on Windows Azure cloud and integrated with Android and IOS devices. Can be deployed in SaaS model which remove any initial outlay on hardware. MINDER monitors health of devices, connectivity and accelerometer variables to ensure that users are safe and connected.
  • 3. 2 – Evolving Workplace  Working from home – 3 in 5 (60%) in UK and Ireland work from home all or part of the working month  Risk Assessment - Employees working alone should at all times be at no greater risk than other employees. It is an employer’s duty to assess risks to employees and take steps to avoid or control the risks.  Corporate Manslaughter – In the USA the Corporate Manslaughter and Corporate Homicide Act 2007 clarifies the criminal liabilities of companies, including large organization's where serious failures in the management of health and safety result in a fatality.  Proactive rather than Reactive - A Proactive Approach is required to identify and manage risk and improve the safety of employees and protect an organisations most important assets. Employer Responsibilities
  • 4. Corporate Headquarters A C C E S S C O N T R O L  PROTECTED Remote Place of Work (Outside HQ) 3 – Safety Outside HQ Known Risk Areas / Hostile Territories Known Risk Personal Safety at Risk Ransom’s and Kidnappings Man down & Fall detection
  • 5. 4 – MINDER Architecture
  • 6. 6 Management Platform • Provides Location of Remote Workers and Exec’s. • Allows Communication between HQ and Remote offsite Employees. • Configure Operating Zones for Remote workers and set rules based on GPRS Activity. • Integrate GPS and RFID devices. • Review past journeys • Forward Events to supervisors. 5 – Platform Overview
  • 7. 7 Mobile Application for Android and IOS • Allows Instantaneous communications with HQ and Control Room. • Update and pulse of Current Location • Reports Events for Panic, Man down, Custom Alarms • Unique application of alarm activations including Shaking the device for Panic alarms and power button Press • Snapshot and Frame Capture • Video Events • Audio events • No additional spend on hardware while improving Operational Security and field event reporting. 6 – App Overview
  • 8. 8 Personal Panel for PC • Bank Tellers and cashiers can send alarms via their desktops and pc’s. • I/O’s can be connected and opened and closed allowing door management capabilities. • Users can connect to local video streams to ensure safety at entrance and reception areas. 7 – Personal Panel Overview
  • 9. What are the Key User Actions & Reports? User Actions User Driven Alarms– Desktop application and mobile applications can send Panic, Audio, Custom & Video Alarms. User Controls – Personal Panel users can also open door’s or barriers in close proximity to their workstation as well as view cameras for their location. Central Security Controls– Security Managers can develop location based Rules in order to manage remote personnel. Inside Risk Zone, Outside WorkZone, Communication Off/On, Reporting Features •Macro Information– Real Life Security and Safety data from RSS feeds utilised in the application in order make users aware of Risks in their work areas constituting a Risk Zone. •Red Risk Zones– Indicators displayed on the GIS that have Risk events associated with specific geographic locations. •Risk Reporting and Communication methods – Risk Overview, Dashboard, Email and Text messaging communication capabilities. 8 - Key User Actions & Reports
  • 10. 1 – Key Product Info Key Info Minder details Value Proposition Minder Provides ability monitor employees who work globally and facilitate two way communications to ensure personal safety and while carrying out their work activities. Key Features Cloud based Tracking for Personal safety and Lone Workers Two way communication from devices to centralised application. Integrated GIS, Android app, Desktop Panel for PC, Location based Rules Engine to manage critical responses. Who are the customers? All companies whose staff do not work at a desk. Corporate Security in Medical / Finance / IT Where are the markets? Global – This cloud offering can be installed and accessed anywhere in the world. What is unique about it? Our unique identifier is our intention to turn all of the sensors available on a smart phone into Security and Safety Reporting tools used for features like: Shake Activation / Power button Panic activation / Step Counter and movement analysis through the Accelerometer.
  • 11. 11 What are the Key User Interfaces? Web Browser Management Platform– To manage the processes with remote staff through location based rules.. Personal Panel – Desktop tray application for pc’s for reporting alarms from your pc into the security control room through to the web browser or to the supervisors phone. Minder App – App for mobile phone to track users and allow two way communication with Corporate Security What are the Key Use Cases? Hostile Territories – Engineers, Sales or Security personnel based Remotely or Deployed in known Hostile Territories carrying out specific operations on behalf of their organisation. Worker Management – Supporting and monitoring the safety of an organisation’s important personnel in order to facilitate business continuity and protect trade secrets. Finance and Commercial staff in Public Areas – The Personal Panel application covertly connects Bank Tellers and Sales assistants to the security control room. Door to Door / On the Road Personnel - Provide protection for staff members who interact with the public in their day to day work. 9 – Recap
  • 12. 10 – How to get Minder RTP? Getting Minder is very simple. Here are some of your questions answered: How can I order Minder? If you are interested in purchasing minder please email sales@cruatech.com or call +35317007579 with your specific safety needs. Where do I get my License? Once we have received your order our application will automate the creation of a license for your organisation. This license will be processed and sent via mail with details on how to login. How do I enable Minder App? Minder app is sent to the specified users and can also be downloaded from the Google Play Store. Do I need any hardware? No additional hardware is needed! The platform runs entirely in the cloud and the applications and alarm triggers are installed on pre-existing hardware so no additional hardware spend. How do I set up my system and site? Our team will do initial configuration for you and if you have any specific questions around rules or need to add more users we will help.
  • 13. Thank you for listening for more info go to www.cruatech.com or Phone: +35317007579

Editor's Notes

  1. Minder is designed as a reaction to the evolving workplace: 3/5 60% in uk and Ireland work from home all or part of the working month Risk Assessment - Employees working alone should at all times be at no greater risk than other employees. It is an employer’s duty to assess risks to employees and take steps to avoid or control the risks. Corporate Manslaughter – Copmanies are now being found guilty in a court of law for employee deaths while at work. A Proactive Approach is required to identify and manage risk.