SlideShare a Scribd company logo
Selling to the IT
 Department
The Panel

• Paul Boucherle, CPP, CSC
  – Founder/Principal at Matterhorn Consulting
  – Founder/Principal at Digital By Design
  – Extensive background in engineering, IT,
    security project management, and sales
  – United States Marine Corps for 4 years
  – Nearly 35 years in the security business
The Panel

• Robert Klohr, CISSP, CPP, CISM
  – Global Security Manager, Mentor Graphics
  – Owner, Klohr Consulting, LLC
  – Over 20 years experience in IT, with a heavy
    emphasis on security.
  – Responsible for physical security management
    at over 80 sites, located in over 30 countries
  – Retired LTC of the US Army
The Panel

• Scott Lord
  – Executive Officer, All Systems Designed Solutions
  – Sales management for over 17 years
  – Assisted in design and implementation of: St.
    Luke’s Health System East Campus, Excelsior
    Springs School District & Aguila’s integrated
    security management system
  – Guest speaker for A&E industry
The Panel

• Jason Canada
  – Product Manager, 3VR
  – 12 years in IT industry
  – MBA, Strategy, Product Mangement from
    Carnegie Mellon University – Tepper School of
    Business
  – Specialty in network operations and network
    engineering
Security and IT Convergence

• Current state of the security industry
   – Typically IT & security groups are separate
   – However, resources are being shared more and more
IT Pain Points

• Bandwidth utilization
  – How do IP cameras and client applications
    affect this?
• Data security
  – Does the DVR/NVR present any potential
    threats to other systems?
  – What type of encryption (if any) does the DVR
    use?
IT Pain Points (Cont.)

• Manageability
  – Who maintains the DVR/NVRs?
  – Do they reside in a data center?
  – How are patches and software updates
    distributed and managed?
Designing a security solution with the IT
                  dept

• Involve IT early in the design
• Understand networking requirements
   – IP addresses needed
   – DNS servers
   – NTP
Designing a security solution with the IT
              dept (Cont.)

• Bandwidth requirements
   – IP cameras on the corporate network vs. stand-
     alone camera network
   – Local & remote client connections
• Remote access
   – What users will need to access the system?
   – How do they authenticate?
   – Do the client applications have bandwidth
     throttling features?
Designing a security solution with the IT
                  dept

• Security Audits
   – Working with IT to ensure they are confident
     in the data security of the DVR/NVR
Return on Investment (ROI)



• When and where do you address this?
Basic vocabulary (if time permits)

• Networking
  – Routers, switches, firewalls
  – Bandwidth
  – IP address
     • DHCP vs. static
  – Data security
  – Storage
  – Encryption
Conclusion




Questions & Answers

More Related Content

What's hot

Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based Approach
Flaskdata.io
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Herman Tembo
Herman TemboHerman Tembo
Herman Tembo
Tembo Herman
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
APNIC
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
MLG College of Learning, Inc
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
Vivek Maurya
 
Lesson 1
Lesson 1Lesson 1
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
Ravi Bandekar
 
Lesson 2
Lesson 2Lesson 2
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
Jack Kessler
 
Abdulrahman c.v
Abdulrahman c.vAbdulrahman c.v
Abdulrahman c.v
abdulrahman alshehri
 
Lesson 2
Lesson 2Lesson 2
Lesson 4
Lesson 4Lesson 4
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
MLG College of Learning, Inc
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
Charles Stevenson
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
Maxpromotion
 
2015-11-17 Time for an IT Assessment
2015-11-17 Time for an IT Assessment2015-11-17 Time for an IT Assessment
2015-11-17 Time for an IT Assessment
Raffa Learning Community
 
Urooj's Resume May16
Urooj's Resume May16Urooj's Resume May16
Urooj's Resume May16
Urooj Pasha
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
Defence and Security Accelerator
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
HelpSystems
 

What's hot (20)

Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based Approach
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Herman Tembo
Herman TemboHerman Tembo
Herman Tembo
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 
Abdulrahman c.v
Abdulrahman c.vAbdulrahman c.v
Abdulrahman c.v
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Information Technology at IMS
Information Technology at IMSInformation Technology at IMS
Information Technology at IMS
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
 
2015-11-17 Time for an IT Assessment
2015-11-17 Time for an IT Assessment2015-11-17 Time for an IT Assessment
2015-11-17 Time for an IT Assessment
 
Urooj's Resume May16
Urooj's Resume May16Urooj's Resume May16
Urooj's Resume May16
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 

Viewers also liked

Priciples of management1
Priciples  of  management1Priciples  of  management1
Priciples of management1
Girish Sawhney
 
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPTHYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
Kavin Raval
 
Principle of managment by saurav
Principle of managment by sauravPrinciple of managment by saurav
Principle of managment by saurav
Saurav Sharma
 
Pom presentation
Pom presentationPom presentation
Pom presentation
sandeep kumar
 
Functions of management
Functions of managementFunctions of management
Functions of management
Gaurav Dabhi
 
Presentation pom
Presentation pomPresentation pom
Presentation pom
Raj vardhan
 
Islamic principle in the managment of an organization
Islamic principle in the managment of an organizationIslamic principle in the managment of an organization
Islamic principle in the managment of an organization
sarmd khosa
 
POM Wonderful
POM WonderfulPOM Wonderful
POM Wonderful
mbp817
 
Evolution of management thoughts
Evolution of management thoughtsEvolution of management thoughts
Evolution of management thoughts
Ramasubramanian H (HRS)
 
principle of management(pom) slide of Scientific Management Theory ...
principle of management(pom) slide of Scientific Management Theory           ...principle of management(pom) slide of Scientific Management Theory           ...
principle of management(pom) slide of Scientific Management Theory ...
samjhana neupane
 

Viewers also liked (10)

Priciples of management1
Priciples  of  management1Priciples  of  management1
Priciples of management1
 
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPTHYDROLOGY AND WATER RESOURCE MANAGMENT PPT
HYDROLOGY AND WATER RESOURCE MANAGMENT PPT
 
Principle of managment by saurav
Principle of managment by sauravPrinciple of managment by saurav
Principle of managment by saurav
 
Pom presentation
Pom presentationPom presentation
Pom presentation
 
Functions of management
Functions of managementFunctions of management
Functions of management
 
Presentation pom
Presentation pomPresentation pom
Presentation pom
 
Islamic principle in the managment of an organization
Islamic principle in the managment of an organizationIslamic principle in the managment of an organization
Islamic principle in the managment of an organization
 
POM Wonderful
POM WonderfulPOM Wonderful
POM Wonderful
 
Evolution of management thoughts
Evolution of management thoughtsEvolution of management thoughts
Evolution of management thoughts
 
principle of management(pom) slide of Scientific Management Theory ...
principle of management(pom) slide of Scientific Management Theory           ...principle of management(pom) slide of Scientific Management Theory           ...
principle of management(pom) slide of Scientific Management Theory ...
 

Similar to Selling to The IT Department

Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's Inc
Splunk
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
Irfan Ur Rehman
 
Mash f43
Mash f43Mash f43
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
Avtec Inc.
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
Panduit
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
Prabod Abhinov Gunupudi
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
Anant Shrivastava
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
Real-Time Innovations (RTI)
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
Community IT Innovators
 
Resume
ResumeResume
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
Atlantic Security Conference
 
IT HealthCheck
IT HealthCheckIT HealthCheck
IT HealthCheck
RISC Networks
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
Storage Switzerland
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
Etienne Liebetrau
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
John Secondari
 

Similar to Selling to The IT Department (20)

Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's Inc
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
Mash f43
Mash f43Mash f43
Mash f43
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
 
Resume
ResumeResume
Resume
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
 
IT HealthCheck
IT HealthCheckIT HealthCheck
IT HealthCheck
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
 

More from 3VR Inc.

Aberdeen Group Presents: Video Intelligence to Secure and Grow
Aberdeen  Group Presents: Video Intelligence to Secure and GrowAberdeen  Group Presents: Video Intelligence to Secure and Grow
Aberdeen Group Presents: Video Intelligence to Secure and Grow
3VR Inc.
 
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMPReducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
3VR Inc.
 
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR Inc.
 
How 24 hour fitness security platform investment contributes to healthy security
How 24 hour fitness security platform investment contributes to healthy securityHow 24 hour fitness security platform investment contributes to healthy security
How 24 hour fitness security platform investment contributes to healthy security
3VR Inc.
 
Security Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller IntegrationSecurity Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller Integration
3VR Inc.
 
3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...
3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...
3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...
3VR Inc.
 

More from 3VR Inc. (6)

Aberdeen Group Presents: Video Intelligence to Secure and Grow
Aberdeen  Group Presents: Video Intelligence to Secure and GrowAberdeen  Group Presents: Video Intelligence to Secure and Grow
Aberdeen Group Presents: Video Intelligence to Secure and Grow
 
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMPReducing the Cost of False Alarms with Video Integration: 3VR and DMP
Reducing the Cost of False Alarms with Video Integration: 3VR and DMP
 
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
 
How 24 hour fitness security platform investment contributes to healthy security
How 24 hour fitness security platform investment contributes to healthy securityHow 24 hour fitness security platform investment contributes to healthy security
How 24 hour fitness security platform investment contributes to healthy security
 
Security Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller IntegrationSecurity Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller Integration
 
3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...
3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...
3 Real World Perspectives On the Role of Speed, Collaboration, and Visual Too...
 

Recently uploaded

Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 

Recently uploaded (20)

Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 

Selling to The IT Department

  • 1. Selling to the IT Department
  • 2. The Panel • Paul Boucherle, CPP, CSC – Founder/Principal at Matterhorn Consulting – Founder/Principal at Digital By Design – Extensive background in engineering, IT, security project management, and sales – United States Marine Corps for 4 years – Nearly 35 years in the security business
  • 3. The Panel • Robert Klohr, CISSP, CPP, CISM – Global Security Manager, Mentor Graphics – Owner, Klohr Consulting, LLC – Over 20 years experience in IT, with a heavy emphasis on security. – Responsible for physical security management at over 80 sites, located in over 30 countries – Retired LTC of the US Army
  • 4. The Panel • Scott Lord – Executive Officer, All Systems Designed Solutions – Sales management for over 17 years – Assisted in design and implementation of: St. Luke’s Health System East Campus, Excelsior Springs School District & Aguila’s integrated security management system – Guest speaker for A&E industry
  • 5. The Panel • Jason Canada – Product Manager, 3VR – 12 years in IT industry – MBA, Strategy, Product Mangement from Carnegie Mellon University – Tepper School of Business – Specialty in network operations and network engineering
  • 6. Security and IT Convergence • Current state of the security industry – Typically IT & security groups are separate – However, resources are being shared more and more
  • 7. IT Pain Points • Bandwidth utilization – How do IP cameras and client applications affect this? • Data security – Does the DVR/NVR present any potential threats to other systems? – What type of encryption (if any) does the DVR use?
  • 8. IT Pain Points (Cont.) • Manageability – Who maintains the DVR/NVRs? – Do they reside in a data center? – How are patches and software updates distributed and managed?
  • 9. Designing a security solution with the IT dept • Involve IT early in the design • Understand networking requirements – IP addresses needed – DNS servers – NTP
  • 10. Designing a security solution with the IT dept (Cont.) • Bandwidth requirements – IP cameras on the corporate network vs. stand- alone camera network – Local & remote client connections • Remote access – What users will need to access the system? – How do they authenticate? – Do the client applications have bandwidth throttling features?
  • 11. Designing a security solution with the IT dept • Security Audits – Working with IT to ensure they are confident in the data security of the DVR/NVR
  • 12. Return on Investment (ROI) • When and where do you address this?
  • 13. Basic vocabulary (if time permits) • Networking – Routers, switches, firewalls – Bandwidth – IP address • DHCP vs. static – Data security – Storage – Encryption