SlideShare a Scribd company logo
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
Better safety and
security through
WhosOnLocation
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
Contents
Introduction 3
Did you know 4
Safety and security starts with knowing who is on-site 5
Features 6
Service provider (contractor) management 7
What are the add-ons? 8
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
3
Introduction
Cyber-attacks are on the rise across the globe and with this there’s
an increase in physical security breaches too. And a growing
compliance obligation on organizations to improve the safety and
security of the people they are responsible for. In recent years,
more and more organizations are embracing a risk-based approach
of identifying and protecting their people, assets, data, and
intellectual property.
Company boards are asking:
• Do we have a risk management policy that covers off both cyber and physical
threats to our people, assets and IP?
The Security Manager is assessing the need for:
• CCTV
• Security alarms
• Duress alarms
• Roaming security patrols
• Access control
• Guest control
The Facilities Manager is assessing the need for:
• Contractor identification
• Visitor management
• Fire alarms
• Building management systems
• Asset management and tracking
The Health and Safety Manager is accessing the need for:
• Hazard identification
• Guest and contractor awareness of hazards
• Employee safety on and off-site
• Incident management
• Tools to account for people in the event of an incident
The Information Security Manager is accessing the need for:
• Data protection
• Intrusion detection
• Access rights
Regardless of what hat you wear, the security and safety of your people, assets, and
IP is fundamental to your organization.
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
4
Did you know
• Insiders / contractors are the most likely perpetrators of security incidents
reported in South America1
• 72% of security incidents at financial services organizations involved a
current or former employee1
• Third parties with trusted access were responsible for 41% of the detected
security incidents at financial services organizations1
• 62% of security incidents at industrial product organizations involved a
current or former employees1
• The majority of employees perpetrated their acts while in the office right
under the noses of co-workers2
• Most crimes by trusted parties (insider and privileged users) are perpetrated
for financial or personal gain.2
• The two most common insider threat scenarios involve perpetrators taking
data to start their own competing company (30%), or to help secure
employment with a rival (65%).2
• 75% of Insider Intrusions are handled internally – without legal action or law
enforcement.3
• In US healthcare the top 3 perceived threat motivators were workers
snooping on relatives/friends (80%), financial identity theft (66%), and
identity theft (51%).4
• 57% of respondents consider employees the most likely source of an attack.
1. The Global State of Information Security Survey 2015, a worldwide study by PwC, CIO, and CSO
2. Verizon’s 2014 Data Breach Investigations Report
3. CERT’s 2014 U.S. State of Cybercrime Survey
4. 6th Annual HIMSS Security Survey
5. Get ahead of cybercrime. EY’s Global Information Security Survey 2014
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
5
Safety and security
starts with knowing
who is on-site!
Here at WhosOnLocation we believe the safety and security of
people, assets, and IP starts with people. It’s about specifically
knowing who is allowed on-site, who is due on-site, and
most importantly, who is on-site right now. We want to give
people the peace of mind that they can account for everyone.
We’re pioneers using technology to create a safer and secure
environment for organizations.
You’re in control
WhosOnLocation gives you total non-intrusive control of your premises. You get
tools to efficiently manage all people moving in and out of your premises. You’ll
have clear visibility and security over access to your premises, while teaching
and enabling best practices.
We believe in doing things better and smarter, making your work environment
safe and secure for all by putting you in full control, regardless of the situation
Tools that help
WhosOnLocation provides a powerful set of tools to help you strengthen
the security of your organization, assets, and IP. Increasing the safety of your
people. These tools center on managing the rights of people to be on-site, and
then tracking their presence into and out of your organization’s locations.
Visitor management
Traditionally managing who is allowed on-site requires a number of solutions:
• employee in and out boards, employee sign-out books, staff directories etc
• contractor management systems — contractor sign in and out systems
• visitor management systems — guest sign in and out sheets and books
• hazard broadcasting services
• photo ID card tools
• induction management.
WhosOnLocation delivers all of these tools into a single, easy to set-up and
easy to use solution in a way that is smart, intelligent, robust and secure.
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
6
Features
Pre-register your guests
WhosOnLocation allows you to pre-register your guests before they arrive, or if they visit
regularly. This gives you time to capture and validate their identity. You can also limit guests’
use of kiosks to pre-registered guests only to tighten on-site security. Your receptionist
will be able to prepare ahead of time for any special requests. For example, pre-print guest
passes, book meeting rooms, prepare beverages, or have induction ready.
Visitor policy management
WhosOnLocation allows you to manage your Visitor Policy effectively.
• Personalize questions to meet requirements of location include
plain text answer, memo, single choice, multiple choice, images,
and video question and answers.
• Create conditional question workflows.
• Capture details of guests that would need assistance to
evacuate the location.
• Share guest arrival by sending notifications using email or SMS.
• Include multiple recipients into the notifications including security teams.
• Include notifications to nominated email and/or SMS recipients when
a person is not being hosted by an employee.
Print guest passes
Print passes for your guests and contractors. They can be printed from a kiosk or by the
reception or security team. You can include a bar code to scan in and out easier and faster.
Reception and security guard management
• Your reception or security team can sign in your guests, contractors, and employees.
• They can validate a person’s permissions and rights to be on-site before granting access.
• They can look up employee and contractor photos to validate the person in front of
them.
Employee attendance
Strengthen your employee safety and security by knowing where they are on-site. And
WhosOnLocation will record sign out dates and time.
Your employee can:
• Use their own PC to tag on and off.
• Use the Employee In/Out Board for iPad or PC to sign in.
• Sign in and out at reception.
• Scan in using ID Car or other Token (barcode and RFID Supported).
• Use the WolMobile employee app for themselves on or offsite. This includes Geolocation
tracking (iOS and Android supported).
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
7
Service provider
(contractor)
management
Organization and contractor management
Manage records of your contractors to ensure the visits are legitimate.
Ensuring the safety of your people.
WhosOnLocation allows you to manage:
• profiles for each contractor organization
• contractor categories and groups
• Contractor Insurance
• access rights
• access rights to WolMobile app
• induction records.
Contractor presence management
Using WhosOnLocation your reception team can search for an approved contractor
and sign them in or out. They can also assign guest passes.
Contractors are able to:
• sign in using a guest kiosk
• scan in using ID card or token (Barcode and RFID Supported)
— requires the Identity Management Add-on
• sign in or out using their mobile phone — requires WolMobile.
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
8
What are the
add-ons?
Asset management
Asset Management allows you to manage your assets. This includes:
• Creating a register of assets.
• Assigning assets to Types, and Groups.
• Linking an asset to a geolocation on a map.
• Looking up assets by search tools or barcode or RFID scan.
• Assigning assets out to guests, employees, service providers.
• Tracking assets due back — date and time
• Reporting on asset history and movements.
Acknowledgement (hazard warning) notice management
Administrators can create and publish acknowledgement notices (hazard warnings).
They can be acknowledged at a kiosk, on WolMobile, by your Location Manager
(receptionist), or directly by an employee after logging into WhosOnLocation.
Identity management
Set-up and create tokens that can be used by employees to scan into and out of a
location using a kiosk. Report on when a token (card) was used.
Geolocation services
• Employees and contractors can ‘send’ their current GeoLocation using WolMobile,
or activate a ‘follow me’ feature which allows the user’s location to be updated as
they move.
• Report users can view a map displaying employees and contractors’ location
• Dashboards
• Create custom dashboards to display key people presence management statistics.
• Total Number of people on-site (Employees, Contractors, Guests)
• Names of people on-site
• GeoLocation of employees off-site
• GeoLocation of contractors and employees off-site.
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
9
What are the
add-ons?
(continued)
Evacuation management
To effectively manage site security and safety you need to be able to identify
who is on-site in any operation, anywhere in the country, or the world instantly.
Using WhosOnLocation allows you to do this. Features include:
• WolEvac a mobile app for managing roll-call.
• Zone clearance.
• SMS/Text Self-Verify Reporting.
• Access to guest and employee attendance reports.
• Reports by location period range.
• Custom filters and user specific favorite report management.
• Information can be exported as a .csv or PDF.
• Dashboards displaying real time presence of all people on-site across
one or many locations.
• SMS/Text messaging reporting
What features our customers use
WhosOnLocation has been used across a wide range of customer environments to
help strengthen their security. Whether it was to protect assets, intellectual property,
people, or a combination of all three. WhosOnLocation supports other security
initiatives to deliver a total security solution.
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
10
What are the
add-ons?
(continued)
What features our customers use
WhosOnLocation has been used across a wide range of customer environments to
help strengthen their security. Whether it was to protect assets, intellectual property,
people, or a combination of all three. WhosOnLocation supports other security
initiatives to deliver a total security solution.
Here’s some of the functionalities that have been used by our customers.
Prisons
• Contractor Management
• Photo ID card issuing to contractors and other service providers
• Approved items allowed onsite list
• Restricted Items not allowed on-site
• Asset Management (to manage issuing temporary access cards and keys)
• Induction records
• Document uploads of driver’s license and security clearance
• Multiple location access control points with multiple kiosks
• Barcode | RFID quick scan in and out
• Surrendered items
Construction sites
• Contractor management
• Photo ID card issuing to contractors and other service providers
• Asset Management (issuing of temporary access cards and keys)
• Induction records
• Document uploads of driver’s license and security clearance
• Multiple location access control points, multiple kiosks
• Barcode quick scan in and out, overdue alerts
Corporate and government buildings
• Contractor management
• Visitor management
• Photo ID card issuing to contractors and employees
• Asset management (issuing of temporary access cards and keys)
• Induction records
• Document uploads of driver’s license and security clearance
• Multiple location access control points
• Multiple kiosks
White Paper
whosonlocation.com © WhosOnLocation Limited, All Rights Reserved.
Victoria ArmstrongDarren Whitaker–Barnett
International contact
+64 (0)4 891 0886
+64 (0)27 4282 987
victoria@whosonlocation.com
@WhosOnLocation
+64 (0)4 891 0886
+64 (0)21 241 7169
darren@whosonlocation.com
@WhosOnLocation
Operations SenseiTrusted Advisor to Customers
1800 501 1761
0808 189 1412
800 387 7031
1300 106 541
04 891 0886
About
WhosOnLocation
WhosOnLocation is the leading provider of proven,
cloud-based people presence management software.
We service clients around the world including the government,
manufacturing, financial services, corporate, utilities, energy,
construction, health, high–security, and education sectors.

More Related Content

What's hot

Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Source Conference
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Armstrong Teasdale
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010madamseane
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 

What's hot (6)

Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 

Viewers also liked

Hidrografia europei
Hidrografia europeiHidrografia europei
Hidrografia europei
costys74
 
Behaviorism
BehaviorismBehaviorism
Behaviorism
Phillip Mitchell
 
Evacuation Management using WhosOnLocation
Evacuation Management using WhosOnLocationEvacuation Management using WhosOnLocation
Evacuation Management using WhosOnLocation
Victoria Armstrong
 

Viewers also liked (7)

Drywall
DrywallDrywall
Drywall
 
Drywall
DrywallDrywall
Drywall
 
Hidrografia europei
Hidrografia europeiHidrografia europei
Hidrografia europei
 
Presentación en ingles
Presentación en inglesPresentación en ingles
Presentación en ingles
 
Sbofor qt
Sbofor qtSbofor qt
Sbofor qt
 
Behaviorism
BehaviorismBehaviorism
Behaviorism
 
Evacuation Management using WhosOnLocation
Evacuation Management using WhosOnLocationEvacuation Management using WhosOnLocation
Evacuation Management using WhosOnLocation
 

Similar to WOL White Paper: Better Safety & Security

WhosOnLocation White Paper Visitor Management
WhosOnLocation White Paper Visitor ManagementWhosOnLocation White Paper Visitor Management
WhosOnLocation White Paper Visitor Management
Victoria Armstrong
 
WhosOnLocation Employee Attendance
WhosOnLocation Employee AttendanceWhosOnLocation Employee Attendance
WhosOnLocation Employee Attendance
Victoria Armstrong
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
Robin Patras
 
WhosOnLocation Contractor Management
WhosOnLocation Contractor ManagementWhosOnLocation Contractor Management
WhosOnLocation Contractor Management
Victoria Armstrong
 
Blackwater Protection
Blackwater ProtectionBlackwater Protection
Blackwater Protection
Asdel Vazquez
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
infosec train
 
WhosOnLocation Visitor Management
WhosOnLocation Visitor ManagementWhosOnLocation Visitor Management
WhosOnLocation Visitor Management
Victoria Armstrong
 
WhosOnLocation People Presence Management
WhosOnLocation People Presence ManagementWhosOnLocation People Presence Management
WhosOnLocation People Presence Management
Victoria Armstrong
 
Welcome Gate Corporate Brochure
Welcome Gate Corporate BrochureWelcome Gate Corporate Brochure
Welcome Gate Corporate Brochure
Matt Robson
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
Mohsin Abbas
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
elijahj01012
 
Identity Management Controls.pdf
Identity Management Controls.pdfIdentity Management Controls.pdf
Identity Management Controls.pdf
LearningwithRayYT
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesBusiness Controls, Inc.
 
What is Visitor Management System
What is Visitor Management SystemWhat is Visitor Management System
What is Visitor Management System
WerkDone
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
Samsung Business USA
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Shawn Tuma
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Us
carelanda
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 

Similar to WOL White Paper: Better Safety & Security (20)

WhosOnLocation White Paper Visitor Management
WhosOnLocation White Paper Visitor ManagementWhosOnLocation White Paper Visitor Management
WhosOnLocation White Paper Visitor Management
 
WhosOnLocation Employee Attendance
WhosOnLocation Employee AttendanceWhosOnLocation Employee Attendance
WhosOnLocation Employee Attendance
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
WhosOnLocation Contractor Management
WhosOnLocation Contractor ManagementWhosOnLocation Contractor Management
WhosOnLocation Contractor Management
 
Blackwater Protection
Blackwater ProtectionBlackwater Protection
Blackwater Protection
 
What is Identity Security.pptx
What is Identity Security.pptxWhat is Identity Security.pptx
What is Identity Security.pptx
 
WhosOnLocation Visitor Management
WhosOnLocation Visitor ManagementWhosOnLocation Visitor Management
WhosOnLocation Visitor Management
 
WhosOnLocation People Presence Management
WhosOnLocation People Presence ManagementWhosOnLocation People Presence Management
WhosOnLocation People Presence Management
 
Welcome Gate Corporate Brochure
Welcome Gate Corporate BrochureWelcome Gate Corporate Brochure
Welcome Gate Corporate Brochure
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Identity Management Controls.pdf
Identity Management Controls.pdfIdentity Management Controls.pdf
Identity Management Controls.pdf
 
OSP Company Profile
OSP Company ProfileOSP Company Profile
OSP Company Profile
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace Issues
 
What is Visitor Management System
What is Visitor Management SystemWhat is Visitor Management System
What is Visitor Management System
 
The Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business EnablerThe Mobile Aware CISO: Security as a Business Enabler
The Mobile Aware CISO: Security as a Business Enabler
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Us
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 

Recently uploaded

Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
abdulrafaychaudhry
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
ShamsuddeenMuhammadA
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 

Recently uploaded (20)

Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptxText-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
Text-Summarization-of-Breaking-News-Using-Fine-tuning-BART-Model.pptx
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 

WOL White Paper: Better Safety & Security

  • 1. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. Better safety and security through WhosOnLocation
  • 2. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. Contents Introduction 3 Did you know 4 Safety and security starts with knowing who is on-site 5 Features 6 Service provider (contractor) management 7 What are the add-ons? 8
  • 3. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 3 Introduction Cyber-attacks are on the rise across the globe and with this there’s an increase in physical security breaches too. And a growing compliance obligation on organizations to improve the safety and security of the people they are responsible for. In recent years, more and more organizations are embracing a risk-based approach of identifying and protecting their people, assets, data, and intellectual property. Company boards are asking: • Do we have a risk management policy that covers off both cyber and physical threats to our people, assets and IP? The Security Manager is assessing the need for: • CCTV • Security alarms • Duress alarms • Roaming security patrols • Access control • Guest control The Facilities Manager is assessing the need for: • Contractor identification • Visitor management • Fire alarms • Building management systems • Asset management and tracking The Health and Safety Manager is accessing the need for: • Hazard identification • Guest and contractor awareness of hazards • Employee safety on and off-site • Incident management • Tools to account for people in the event of an incident The Information Security Manager is accessing the need for: • Data protection • Intrusion detection • Access rights Regardless of what hat you wear, the security and safety of your people, assets, and IP is fundamental to your organization.
  • 4. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 4 Did you know • Insiders / contractors are the most likely perpetrators of security incidents reported in South America1 • 72% of security incidents at financial services organizations involved a current or former employee1 • Third parties with trusted access were responsible for 41% of the detected security incidents at financial services organizations1 • 62% of security incidents at industrial product organizations involved a current or former employees1 • The majority of employees perpetrated their acts while in the office right under the noses of co-workers2 • Most crimes by trusted parties (insider and privileged users) are perpetrated for financial or personal gain.2 • The two most common insider threat scenarios involve perpetrators taking data to start their own competing company (30%), or to help secure employment with a rival (65%).2 • 75% of Insider Intrusions are handled internally – without legal action or law enforcement.3 • In US healthcare the top 3 perceived threat motivators were workers snooping on relatives/friends (80%), financial identity theft (66%), and identity theft (51%).4 • 57% of respondents consider employees the most likely source of an attack. 1. The Global State of Information Security Survey 2015, a worldwide study by PwC, CIO, and CSO 2. Verizon’s 2014 Data Breach Investigations Report 3. CERT’s 2014 U.S. State of Cybercrime Survey 4. 6th Annual HIMSS Security Survey 5. Get ahead of cybercrime. EY’s Global Information Security Survey 2014
  • 5. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 5 Safety and security starts with knowing who is on-site! Here at WhosOnLocation we believe the safety and security of people, assets, and IP starts with people. It’s about specifically knowing who is allowed on-site, who is due on-site, and most importantly, who is on-site right now. We want to give people the peace of mind that they can account for everyone. We’re pioneers using technology to create a safer and secure environment for organizations. You’re in control WhosOnLocation gives you total non-intrusive control of your premises. You get tools to efficiently manage all people moving in and out of your premises. You’ll have clear visibility and security over access to your premises, while teaching and enabling best practices. We believe in doing things better and smarter, making your work environment safe and secure for all by putting you in full control, regardless of the situation Tools that help WhosOnLocation provides a powerful set of tools to help you strengthen the security of your organization, assets, and IP. Increasing the safety of your people. These tools center on managing the rights of people to be on-site, and then tracking their presence into and out of your organization’s locations. Visitor management Traditionally managing who is allowed on-site requires a number of solutions: • employee in and out boards, employee sign-out books, staff directories etc • contractor management systems — contractor sign in and out systems • visitor management systems — guest sign in and out sheets and books • hazard broadcasting services • photo ID card tools • induction management. WhosOnLocation delivers all of these tools into a single, easy to set-up and easy to use solution in a way that is smart, intelligent, robust and secure.
  • 6. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 6 Features Pre-register your guests WhosOnLocation allows you to pre-register your guests before they arrive, or if they visit regularly. This gives you time to capture and validate their identity. You can also limit guests’ use of kiosks to pre-registered guests only to tighten on-site security. Your receptionist will be able to prepare ahead of time for any special requests. For example, pre-print guest passes, book meeting rooms, prepare beverages, or have induction ready. Visitor policy management WhosOnLocation allows you to manage your Visitor Policy effectively. • Personalize questions to meet requirements of location include plain text answer, memo, single choice, multiple choice, images, and video question and answers. • Create conditional question workflows. • Capture details of guests that would need assistance to evacuate the location. • Share guest arrival by sending notifications using email or SMS. • Include multiple recipients into the notifications including security teams. • Include notifications to nominated email and/or SMS recipients when a person is not being hosted by an employee. Print guest passes Print passes for your guests and contractors. They can be printed from a kiosk or by the reception or security team. You can include a bar code to scan in and out easier and faster. Reception and security guard management • Your reception or security team can sign in your guests, contractors, and employees. • They can validate a person’s permissions and rights to be on-site before granting access. • They can look up employee and contractor photos to validate the person in front of them. Employee attendance Strengthen your employee safety and security by knowing where they are on-site. And WhosOnLocation will record sign out dates and time. Your employee can: • Use their own PC to tag on and off. • Use the Employee In/Out Board for iPad or PC to sign in. • Sign in and out at reception. • Scan in using ID Car or other Token (barcode and RFID Supported). • Use the WolMobile employee app for themselves on or offsite. This includes Geolocation tracking (iOS and Android supported).
  • 7. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 7 Service provider (contractor) management Organization and contractor management Manage records of your contractors to ensure the visits are legitimate. Ensuring the safety of your people. WhosOnLocation allows you to manage: • profiles for each contractor organization • contractor categories and groups • Contractor Insurance • access rights • access rights to WolMobile app • induction records. Contractor presence management Using WhosOnLocation your reception team can search for an approved contractor and sign them in or out. They can also assign guest passes. Contractors are able to: • sign in using a guest kiosk • scan in using ID card or token (Barcode and RFID Supported) — requires the Identity Management Add-on • sign in or out using their mobile phone — requires WolMobile.
  • 8. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 8 What are the add-ons? Asset management Asset Management allows you to manage your assets. This includes: • Creating a register of assets. • Assigning assets to Types, and Groups. • Linking an asset to a geolocation on a map. • Looking up assets by search tools or barcode or RFID scan. • Assigning assets out to guests, employees, service providers. • Tracking assets due back — date and time • Reporting on asset history and movements. Acknowledgement (hazard warning) notice management Administrators can create and publish acknowledgement notices (hazard warnings). They can be acknowledged at a kiosk, on WolMobile, by your Location Manager (receptionist), or directly by an employee after logging into WhosOnLocation. Identity management Set-up and create tokens that can be used by employees to scan into and out of a location using a kiosk. Report on when a token (card) was used. Geolocation services • Employees and contractors can ‘send’ their current GeoLocation using WolMobile, or activate a ‘follow me’ feature which allows the user’s location to be updated as they move. • Report users can view a map displaying employees and contractors’ location • Dashboards • Create custom dashboards to display key people presence management statistics. • Total Number of people on-site (Employees, Contractors, Guests) • Names of people on-site • GeoLocation of employees off-site • GeoLocation of contractors and employees off-site.
  • 9. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 9 What are the add-ons? (continued) Evacuation management To effectively manage site security and safety you need to be able to identify who is on-site in any operation, anywhere in the country, or the world instantly. Using WhosOnLocation allows you to do this. Features include: • WolEvac a mobile app for managing roll-call. • Zone clearance. • SMS/Text Self-Verify Reporting. • Access to guest and employee attendance reports. • Reports by location period range. • Custom filters and user specific favorite report management. • Information can be exported as a .csv or PDF. • Dashboards displaying real time presence of all people on-site across one or many locations. • SMS/Text messaging reporting What features our customers use WhosOnLocation has been used across a wide range of customer environments to help strengthen their security. Whether it was to protect assets, intellectual property, people, or a combination of all three. WhosOnLocation supports other security initiatives to deliver a total security solution.
  • 10. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. 10 What are the add-ons? (continued) What features our customers use WhosOnLocation has been used across a wide range of customer environments to help strengthen their security. Whether it was to protect assets, intellectual property, people, or a combination of all three. WhosOnLocation supports other security initiatives to deliver a total security solution. Here’s some of the functionalities that have been used by our customers. Prisons • Contractor Management • Photo ID card issuing to contractors and other service providers • Approved items allowed onsite list • Restricted Items not allowed on-site • Asset Management (to manage issuing temporary access cards and keys) • Induction records • Document uploads of driver’s license and security clearance • Multiple location access control points with multiple kiosks • Barcode | RFID quick scan in and out • Surrendered items Construction sites • Contractor management • Photo ID card issuing to contractors and other service providers • Asset Management (issuing of temporary access cards and keys) • Induction records • Document uploads of driver’s license and security clearance • Multiple location access control points, multiple kiosks • Barcode quick scan in and out, overdue alerts Corporate and government buildings • Contractor management • Visitor management • Photo ID card issuing to contractors and employees • Asset management (issuing of temporary access cards and keys) • Induction records • Document uploads of driver’s license and security clearance • Multiple location access control points • Multiple kiosks
  • 11. White Paper whosonlocation.com © WhosOnLocation Limited, All Rights Reserved. Victoria ArmstrongDarren Whitaker–Barnett International contact +64 (0)4 891 0886 +64 (0)27 4282 987 victoria@whosonlocation.com @WhosOnLocation +64 (0)4 891 0886 +64 (0)21 241 7169 darren@whosonlocation.com @WhosOnLocation Operations SenseiTrusted Advisor to Customers 1800 501 1761 0808 189 1412 800 387 7031 1300 106 541 04 891 0886 About WhosOnLocation WhosOnLocation is the leading provider of proven, cloud-based people presence management software. We service clients around the world including the government, manufacturing, financial services, corporate, utilities, energy, construction, health, high–security, and education sectors.