SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Date: 20 Nov 2015
Presenter: David King
Web: www.cruatech.com
Phone: +35317007579
MINDERResource Tracking Platform
Product Demonstration
1 – Minder Overview
Product Name Minder RTP – Resource Tracking Platform
Value
Proposition
Provides ability to track mobile users globally and
facilitate two way communications to ensure personal
safety while working in hostile or difficult areas.
Key Features Cloud based Tracking for Personal safety and Remote
workers.
Two way communication from devices to centralised
application.
Integrated GIS, Android app, Personal Panel for PC,
Location based Rules Engine to manage critical
responses.
Who are the
customers?
All companies whose staff work on the road or in the
field.
All companies whose staff do not work at a desk.
Corporate Security in Medical / Finance / IT
Where are the
markets?
Global – This cloud offering can be installed and
accessed anywhere in the world.
What is unique
about it?
Our unique identifier is our intention to turn all of the
sensors available on a smart phone into Security and
Safety Reporting tools used for features like:
Shake Activation / Power button Panic activation.
2 – Remote Worker Problem
 Working from home – 3 in 5 (60%) in UK and Ireland work from home all or part of the working
month
 Risk Assessment - Employees working alone should at all times be at no greater risk than other
employees. It is an employer’s duty to assess risks to employees and take steps to avoid or
control the risks.
 Corporate Manslaughter – In the USA the Corporate Manslaughter and Corporate Homicide Act
2007 clarifies the criminal liabilities of companies, including large organization's where serious
failures in the management of health and safety result in a fatality.
 Proactive rather than Reactive - A Proactive Approach is required to identify and manage risk
and improve the safety of employees and protect an organisations most important assets.
Corporate Headquarters
A
C
C
E
S
S
C
O
N
T
R
O
L
 PROTECTED
• Known Risk
Areas / Hostile
Territories
• Personal
Safety at Risk
• Corporate
Responsibility
• Ransom’s and
tiger
Kidnappings
• Operational
Inefficiency
Remote Place of Work (Outside HQ)
3 – Safety Outside HQ
Security
Control
Rooms
CCTV
Access
Control
Intrusion
RiskRemote
Locations
Personal
Safety Data
Controls
Trade
Secrets
• Current Security systems are “building centric” with CCTV and Access Control systems providing
protection to staff and buildings.
• Remote worker safety is a blind spot for Corporate security operations manager.
• By creating a service for connecting Remote Workers into the Security Operations Minder can
help businesses protect their most important assets.
4 – Connecting Workers
6
Management Platform
• Provides Location of
Remote Workers and
Exec’s.
• Allows Communication
between HQ and Remote
offsite Employees.
• Configure Operating Zones
for Remote workers and
set rules based on GPRS
Activity.
• Integrate GPS and RFID
devices.
• Review past journeys
• Forward Events to
supervisors.
5 – Platform Overview
7
Mobile Application for Android and IOS
• Allows Instantaneous communications with HQ and
Control Room.
• Update and pulse of Current Location
• Reports Events for Panic, Possible Man down,
Custom Alarms
• Unique application of alarm activations including
Shaking the device for Panic alarms and power
button Press
• Snapshot and Frame Capture
• Video Events
• Audio events
• No additional spend on hardware while improving
Operational Security and field event reporting.
6 – App Overview
8
Personal Panel for PC
• Bank Tellers and cashiers can send alarms
via their desktops and pc’s.
• I/O’s can be connected and opened and
closed allowing door management
capabilities.
• Users can connect to local video streams
to ensure safety at entrance and reception
areas.
7 – Personal Panel Overview
What are the Key User Actions & Reports?
User Actions
 User Driven Alarms– Desktop application and mobile applications can send Panic, Audio, Custom &
Video Alarms.
 User Controls – Personal Panel users can also open door’s or barriers in close proximity to their
workstation as well as view cameras for their location.
 Central Security Controls– Security Managers can develop location based Rules in order to manage
remote personnel. Inside Risk Zone, Outside WorkZone, Communication Off/On,
Reporting Features
• Macro Information– Real Life Security and Safety data from RSS feeds utilised in the application in
order make users aware of Risks in their work areas constituting a Risk Zone.
• Red Risk Zones– Indicators displayed on the GIS that have Risk events associated with specific
geographic locations.
• Risk Reporting and Communication methods – Risk Overview, Dashboard, Email and Text
messaging communication capabilities.
8 - Key User Actions & Reports
10
What are the Key User Interfaces?
Web Browser Management Platform– To manage the processes with remote staff through location based rules..
Personal Panel – Desktop tray application for pc’s for reporting alarms from your pc into the security control room
through to the web browser or to the supervisors phone.
Minder App – App for mobile phone to track users and allow two way communication with Corporate Security
What are the Key Use Cases?
Hostile Territories – Engineers, Sales or Security personnel based Remotely or Deployed in known Hostile
Territories carrying out specific operations on behalf of their organisation.
Worker Management – Supporting and monitoring the safety of an organisation’s important personnel in order to
facilitate business continuity and protect trade secrets.
Finance and Commercial staff in Public Areas – The Personal Panel application covertly connects Bank Tellers
and Sales assistants to the security control room.
Door to Door / On the Road Personnel - Provide protection for staff members who interact with the public in their
day to day work.
9 – Recap
10 – How to get Minder RTP?
Getting Minder is very simple. Here are some of your questions
answered:
How can I order Minder?
If you are interested in purchasing minder please email sales@cruatech.com or call
+35317007579 with your specific safety needs.
Where do I get my License?
Once we have received your order our application will automate the creation of a license for
your organisation. This license will be processed and sent via mail with details on how to
login.
How do I enable Minder App?
Minder app is sent to the specified users and can also be downloaded from the Google Play
Store.
Do I need any hardware?
No additional hardware is needed! The platform runs entirely in the cloud and the
applications and alarm triggers are installed on pre-existing hardware so no additional
hardware spend.
How do I set up my system and site?
Our team will do initial configuration for you and if you have any specific questions around
rules or need to add more users we will help.
Thank you for listening for more info go to www.cruatech.com or Phone:
+35317007579

Weitere ähnliche Inhalte

Was ist angesagt?

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTechWell
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsIvanti
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Keith Harris
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaDigital Bond
 
MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MISAjoy Dasgupta
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Digital Bond
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App SecurityObserveIT
 
Excellent Time Attendance Systemn
Excellent Time Attendance SystemnExcellent Time Attendance Systemn
Excellent Time Attendance Systemndthreebahrain
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti
 

Was ist angesagt? (20)

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
MARS User LoginLogout MIS
MARS User LoginLogout MISMARS User LoginLogout MIS
MARS User LoginLogout MIS
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App Security
 
Excellent Time Attendance Systemn
Excellent Time Attendance SystemnExcellent Time Attendance Systemn
Excellent Time Attendance Systemn
 
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
 
Security of information asset
Security of information assetSecurity of information asset
Security of information asset
 
Computer Resume
Computer ResumeComputer Resume
Computer Resume
 

Andere mochten auch

keyboard and mouse events
keyboard and mouse eventskeyboard and mouse events
keyboard and mouse eventskhalidarif1997
 
Blogs & Wikis in the Classroom
Blogs & Wikis in the ClassroomBlogs & Wikis in the Classroom
Blogs & Wikis in the ClassroomOHIO ITSCO
 
B O L E T I N 64 G O L P E D E E S T A D O
B O L E T I N 64  G O L P E  D E  E S T A D OB O L E T I N 64  G O L P E  D E  E S T A D O
B O L E T I N 64 G O L P E D E E S T A D Otony2706
 
Top 5 important soccer skills you need to know
Top 5 important soccer skills you need to knowTop 5 important soccer skills you need to know
Top 5 important soccer skills you need to knowKevin Cross
 
World Class Photos
World Class PhotosWorld Class Photos
World Class PhotosJoke Channel
 
Sec 1 NA - River & People
Sec 1 NA - River & PeopleSec 1 NA - River & People
Sec 1 NA - River & Peoplechua.geog
 
Math unit38 vectors
Math unit38 vectorsMath unit38 vectors
Math unit38 vectorseLearningJa
 
Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)Tony Brita
 

Andere mochten auch (14)

Lips
LipsLips
Lips
 
Nk5.
Nk5.Nk5.
Nk5.
 
keyboard and mouse events
keyboard and mouse eventskeyboard and mouse events
keyboard and mouse events
 
Los toros
Los torosLos toros
Los toros
 
Blogs & Wikis in the Classroom
Blogs & Wikis in the ClassroomBlogs & Wikis in the Classroom
Blogs & Wikis in the Classroom
 
La música
La músicaLa música
La música
 
B O L E T I N 64 G O L P E D E E S T A D O
B O L E T I N 64  G O L P E  D E  E S T A D OB O L E T I N 64  G O L P E  D E  E S T A D O
B O L E T I N 64 G O L P E D E E S T A D O
 
Top 5 important soccer skills you need to know
Top 5 important soccer skills you need to knowTop 5 important soccer skills you need to know
Top 5 important soccer skills you need to know
 
World Class Photos
World Class PhotosWorld Class Photos
World Class Photos
 
Tenis clase final
Tenis clase finalTenis clase final
Tenis clase final
 
Sec 1 NA - River & People
Sec 1 NA - River & PeopleSec 1 NA - River & People
Sec 1 NA - River & People
 
Math unit38 vectors
Math unit38 vectorsMath unit38 vectors
Math unit38 vectors
 
Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)Playing the 4 2-3-1 (Updated 9-29-15)
Playing the 4 2-3-1 (Updated 9-29-15)
 
SCE 1
SCE 1SCE 1
SCE 1
 

Ähnlich wie Minder RTP cloud platform demo

Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidIRJET Journal
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMPerson Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMNiv Calderon
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Virtual Audit Solutions
Virtual Audit SolutionsVirtual Audit Solutions
Virtual Audit SolutionsDirectorLovi
 

Ähnlich wie Minder RTP cloud platform demo (20)

Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBMPerson Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
Person Centeric IoT / Wearable Valley Meetup Asaf Adi @IBM
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Virtual Audit Solutions
Virtual Audit SolutionsVirtual Audit Solutions
Virtual Audit Solutions
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Minder RTP cloud platform demo

  • 1. Date: 20 Nov 2015 Presenter: David King Web: www.cruatech.com Phone: +35317007579 MINDERResource Tracking Platform Product Demonstration
  • 2. 1 – Minder Overview Product Name Minder RTP – Resource Tracking Platform Value Proposition Provides ability to track mobile users globally and facilitate two way communications to ensure personal safety while working in hostile or difficult areas. Key Features Cloud based Tracking for Personal safety and Remote workers. Two way communication from devices to centralised application. Integrated GIS, Android app, Personal Panel for PC, Location based Rules Engine to manage critical responses. Who are the customers? All companies whose staff work on the road or in the field. All companies whose staff do not work at a desk. Corporate Security in Medical / Finance / IT Where are the markets? Global – This cloud offering can be installed and accessed anywhere in the world. What is unique about it? Our unique identifier is our intention to turn all of the sensors available on a smart phone into Security and Safety Reporting tools used for features like: Shake Activation / Power button Panic activation.
  • 3. 2 – Remote Worker Problem  Working from home – 3 in 5 (60%) in UK and Ireland work from home all or part of the working month  Risk Assessment - Employees working alone should at all times be at no greater risk than other employees. It is an employer’s duty to assess risks to employees and take steps to avoid or control the risks.  Corporate Manslaughter – In the USA the Corporate Manslaughter and Corporate Homicide Act 2007 clarifies the criminal liabilities of companies, including large organization's where serious failures in the management of health and safety result in a fatality.  Proactive rather than Reactive - A Proactive Approach is required to identify and manage risk and improve the safety of employees and protect an organisations most important assets.
  • 4. Corporate Headquarters A C C E S S C O N T R O L  PROTECTED • Known Risk Areas / Hostile Territories • Personal Safety at Risk • Corporate Responsibility • Ransom’s and tiger Kidnappings • Operational Inefficiency Remote Place of Work (Outside HQ) 3 – Safety Outside HQ
  • 5. Security Control Rooms CCTV Access Control Intrusion RiskRemote Locations Personal Safety Data Controls Trade Secrets • Current Security systems are “building centric” with CCTV and Access Control systems providing protection to staff and buildings. • Remote worker safety is a blind spot for Corporate security operations manager. • By creating a service for connecting Remote Workers into the Security Operations Minder can help businesses protect their most important assets. 4 – Connecting Workers
  • 6. 6 Management Platform • Provides Location of Remote Workers and Exec’s. • Allows Communication between HQ and Remote offsite Employees. • Configure Operating Zones for Remote workers and set rules based on GPRS Activity. • Integrate GPS and RFID devices. • Review past journeys • Forward Events to supervisors. 5 – Platform Overview
  • 7. 7 Mobile Application for Android and IOS • Allows Instantaneous communications with HQ and Control Room. • Update and pulse of Current Location • Reports Events for Panic, Possible Man down, Custom Alarms • Unique application of alarm activations including Shaking the device for Panic alarms and power button Press • Snapshot and Frame Capture • Video Events • Audio events • No additional spend on hardware while improving Operational Security and field event reporting. 6 – App Overview
  • 8. 8 Personal Panel for PC • Bank Tellers and cashiers can send alarms via their desktops and pc’s. • I/O’s can be connected and opened and closed allowing door management capabilities. • Users can connect to local video streams to ensure safety at entrance and reception areas. 7 – Personal Panel Overview
  • 9. What are the Key User Actions & Reports? User Actions  User Driven Alarms– Desktop application and mobile applications can send Panic, Audio, Custom & Video Alarms.  User Controls – Personal Panel users can also open door’s or barriers in close proximity to their workstation as well as view cameras for their location.  Central Security Controls– Security Managers can develop location based Rules in order to manage remote personnel. Inside Risk Zone, Outside WorkZone, Communication Off/On, Reporting Features • Macro Information– Real Life Security and Safety data from RSS feeds utilised in the application in order make users aware of Risks in their work areas constituting a Risk Zone. • Red Risk Zones– Indicators displayed on the GIS that have Risk events associated with specific geographic locations. • Risk Reporting and Communication methods – Risk Overview, Dashboard, Email and Text messaging communication capabilities. 8 - Key User Actions & Reports
  • 10. 10 What are the Key User Interfaces? Web Browser Management Platform– To manage the processes with remote staff through location based rules.. Personal Panel – Desktop tray application for pc’s for reporting alarms from your pc into the security control room through to the web browser or to the supervisors phone. Minder App – App for mobile phone to track users and allow two way communication with Corporate Security What are the Key Use Cases? Hostile Territories – Engineers, Sales or Security personnel based Remotely or Deployed in known Hostile Territories carrying out specific operations on behalf of their organisation. Worker Management – Supporting and monitoring the safety of an organisation’s important personnel in order to facilitate business continuity and protect trade secrets. Finance and Commercial staff in Public Areas – The Personal Panel application covertly connects Bank Tellers and Sales assistants to the security control room. Door to Door / On the Road Personnel - Provide protection for staff members who interact with the public in their day to day work. 9 – Recap
  • 11. 10 – How to get Minder RTP? Getting Minder is very simple. Here are some of your questions answered: How can I order Minder? If you are interested in purchasing minder please email sales@cruatech.com or call +35317007579 with your specific safety needs. Where do I get my License? Once we have received your order our application will automate the creation of a license for your organisation. This license will be processed and sent via mail with details on how to login. How do I enable Minder App? Minder app is sent to the specified users and can also be downloaded from the Google Play Store. Do I need any hardware? No additional hardware is needed! The platform runs entirely in the cloud and the applications and alarm triggers are installed on pre-existing hardware so no additional hardware spend. How do I set up my system and site? Our team will do initial configuration for you and if you have any specific questions around rules or need to add more users we will help.
  • 12. Thank you for listening for more info go to www.cruatech.com or Phone: +35317007579