SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Products & Services
Date: 4th Feb 2015
Presenter: David King
Web: www.cruatech.com
Phone: +35317007579
Cruatech is a software Development Company that specialises in:
 Cruatech is the only organisation that offers Hardware integration design
and development using an integrated platform which is specific to the
requirements of each customer’s Project.
 Most off-the-shelf software provides features that are a Mile wide and
an inch deep. Cruatech offers customers the flexibility to define the
features and behaviours and in doing so also define and minimise the
projected spend.
 Cruatech provides the underlying architecture and Integration along with
the User interfaces, Management Features and Reporting that is required
for driving efficiencies and meet Operational and Management needs.
 Cruatech develops Platform products and integrations components for
the Physical Security, Utilities Management, IT and Manufacturing
sectors.
1. Integration Module Development and Maintenance.
2. Product Development, Test and Design for Physical Security
Energy Management and IoT.
3. Project Management for Engineering and Commercial Projects
needs.
4. Training for Integrators and Partners and internal TYCO groups.
5. Support for Global Projects in deployment and implementation
and post delivery phases.
Requirements
Design
Implementation
Testing
Evolution
Cruatech In Action…
Project Overview
Cruatech partnered with VIS
Security to deliver Proximex
SurveillInt PSIM application to
Enable Mater Hospital to
Consolidate all Security
Systems improve operational awareness on this greenfield site which was the
largest construction project in the country in 2012.
Challenges
- Installing and commissioning PSIM and software systems at a site with an
on-going phased Construction project.
-Implementing Security Policies on a 24 hour site where some areas are
locked down but other areas are open to the public.
SOLUTION
Phased Construction Issue
Cruatech and VIS overcame the phased construction challenges by prebuilding and
testing all Surveillint components and Integration modules in the Cruatech lab.
This allowed any issues to resolved prior to going to site and also allowed for an end to
end component test of the subsystems. The physical components were then transferred
to site and installed in the data centre at the Mater Hospital.
Security Policy for 24 Hour site
Cruatech implemented Intrusion Group set schedules to ensure secure areas were locked
down while other areas would not generate alarms based on scheduled monitoring rules.
Based on VIS Security’s Technical Submittal, Cameras and Access control points where
configured to provide increased guard tour monitoring of common and public areas.
The Nurse-call and BMS systems were integrated to Surveillint to implement process for
disable toilet access and Cardiac arrest incidents.
Capable Partnership
The key to success of this project is to
have capable partners.
In this instance there was VIS Security
managing the project, installing and
commissioning the physical element of
the project while Cruatech developed and
implemented the software components.
Both parties are part of the same
coherent project plan with mutual
dependencies and clearly defined
expectations.
Design
Detailed Design from the outset
ensures that the implementation and
deployment is as straight forward as
can be.
VIS produced very detailed Technical
submittals and Cruatech were able to
execute using these instructions.
The Project was delivered with
professional Service days left over!
Project Overview
Cruatech have developed
CruZControl Energy and
cloud platform for
monitoring and controlling
energy with in a business
environment.
Challenges
- Retro fitting and
commissioning Energy
Management hardware in a
University Campus.
-Driving Savings for a
multiple tenancy building.
SOLUTION
Retro fitting and commissioning Energy
Management hardware in a University Campus
Cruatech worked with Building Estates to outline a design which was acceptable to the Building Managers and
Campus Operations Managers.
Finding the Correct hardware and integrating this to CruzControl’s cloud solution while ensuring scalability and
flexibility of the system.
Drving Savings
The First step is to create awareness and increase visibility of the energy usage within an environment.
The Second step is to Implement Energy Savings policies.
The Third step is a recurring step where we analyse data and help our customers make smart decisions for
energy usage and manage their environment more efficiently.
For a Monitoring only approach users are the most important factor - “Devices won’t save you money, People
will!”
126.206.171.x Network
Floor 1
Ground Floor Basement
Floor 2
Floor 3
DCU – CruZControl Hardware Deployment Layout
EM
Transmitter
CruZControl Server
EM
Transmitter
EM
Transmitter
EM
Transmitter
Ethernet
Ethernet
Project Overview
Cruatech worked with Proximex
and LYSYS to develop a
middleware integration which
connected an Access System
with a Video analytics system in
order to improve Airport
Security for Staff members
suppliers and contractors.
Challenges
- Introducing a phased
approach o access where
vehicle is scanned and access
data is verified before
admittance.
-Dealing with Multiple lanes,
visitor types and logical
outcomes.
SOLUTION
Phased Approach to
Airport Access
Cruatech worked with
LYSYS to design an
approach that correlated
data from Facility
Commander Access
system, Gatekeeper Video
Analytics and CCTV
systems to record badged
user details, Under Vehicle
scans, ANPR. Front and
back images and Driver.
SOLUTION
Dealing with Multiple Lanes
The application allowed for
configuration of multiple
lanes with 3 access points all
required system data for a
successful or unsuccessful
admittance to the next stage.
Multiple vehicles could be
processed in one Surveillint
alert.
Project Overview
Cruatech worked with Herta
Security Biometrics to Integrate
an Access Control System with
their Video Analytics to provide
Advanced access control
through facial Recognition
without the need for a Security
Badge.
Challenges
- Developing a solution that
could open the correct access
kiosk for the correct user in a
busy lobby in a large Media
Facility.
Herta BioSurveillance
And Access Controller
P2000 Client
P2000 Contoller
Momentary Door Open
Herta BioSurveillance Access Point with Herta
Access Controller and P2000 Access System
Identification and Detection
Identification and Detection
Identification and Detection
XML-RPC Request – Momentary Door Open
Momentary Door
Open
IdentificationandDetection
IdentificationandDetection
IdentificationandDetection
SOLUTION
Video Analytics for Access
Herta integration provided
the client with the
automatic ability to admit
valid badge users while
creating security events
for black listed users or
people known to the
organisation
Project Overview
Cruatech worked with Glanta,
makers of Advanced Hygiene
system Surewash to deliver a
reporting service which
produces analytical data from
the Surewash Device to a
centralised system.
Challenges
- Develop a reporting service to
deliver analytical data from the
Surewash Devices in different
geographical locations to a
centralised server to gather and
present useful compliance data,
reduce hospital outbreaks and
offer additional value and safety
to patrons and staff.
SOLUTION
Unique Reporting Service
A Serviced based
reporting application was
created to check for data
updates on each device
and return the most
recent device activity. This
was achieved using 3GS
network to connect
devices to the world wide
web on beyond to the
Surewash server.
Cost
We have no Management Overhead for our clients.
Our Products and components can be delivered as a managed service
through the cloud or as custom standalone solution.
Our rates are competitive, we can work on a Time and Materials basis
or to a pre-agreed Rate Arrangement.
We can offer economies of scale based on throughput, Recurrence
and Project size.
We can resource up and down depending on how much capacity is
needed per Project.
Experience
IM Development - We have designed and developed integrations for
Access, Video, Intrusion, Intercom, GPS, Dispatch, Video Wall, Video
Analytics, Network Management, Fire, BMS, Nursecall & Radar systems.
Product Development - We develop our own platforms like
CruZControl but also engage in design and development for
companies like Proximex Corp. and Tyco.
Skillsets – As well as Quality Software Development Engineers we have
Electronic Engineering and even Electricians in our group which is a
good fit for Physical Security and Energy Management.
On site & Customer Friendly – We have always delivered high quality
solutions for our partners and customers while achieving rapport and
building good relationships.
Programming &Technologies
API’s, Integration and Enablement
Experience with 80+ Physical Security API’s and SDK Integrations
with Proximex Surveillint. And:
Integrations with:
Reliability & Delivery
Finbar Rogers, VIS Security – “The Mater control room project
would have been a whole different beast without Cruatech”.
Mike Rickard (PM, Johnson Controls, BBC Project) – “Thanks to
David and his team for their responsive and conscientious
approach throughout the Project”.
Ken Cheng (CTO, Proximex) – “When we are in a difficult period,
you and your team always helps us out. You and your team are
like an extended family to us”.
Thank you for listening for more info go to www.cruatech.com or
Phone: +35317007579

Weitere ähnliche Inhalte

Was ist angesagt?

Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)SPEC INDIA
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudSymantec
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityAdlan Hussain
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
IPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_ServicesIPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_ServicesIby Boztepe
 

Was ist angesagt? (20)

Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the Cloud
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
IPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_ServicesIPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_Services
 

Ähnlich wie Cruatech Services Intro

IQ Inc Web Presentation
IQ Inc Web PresentationIQ Inc Web Presentation
IQ Inc Web PresentationIQInc
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture Italia
 
Perennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial Systems
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd.
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd.
 
Secure Desktop Computing In the Cloud
Secure Desktop Computing In the CloudSecure Desktop Computing In the Cloud
Secure Desktop Computing In the CloudIRJET Journal
 
Mindteck Smart/IoT Capabilities
Mindteck Smart/IoT CapabilitiesMindteck Smart/IoT Capabilities
Mindteck Smart/IoT Capabilitiestom toerner
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Solution BluePrint v. Smart Parking
Solution BluePrint v. Smart ParkingSolution BluePrint v. Smart Parking
Solution BluePrint v. Smart ParkingJisc
 
Design and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control SystemDesign and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control SystemSerhan
 
An end to-end solution for creating smarter products
An end to-end solution for creating smarter productsAn end to-end solution for creating smarter products
An end to-end solution for creating smarter productsIBM Rational software
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resumeGreg Yee
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_ResumeChuck Roden
 

Ähnlich wie Cruatech Services Intro (20)

IQ Inc Web Presentation
IQ Inc Web PresentationIQ Inc Web Presentation
IQ Inc Web Presentation
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
Perennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial systems corporate overview presentation
Perennial systems corporate overview presentation
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial Software
 
Applied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial SoftwareApplied Systems Ltd. Industrial Software
Applied Systems Ltd. Industrial Software
 
Secure Desktop Computing In the Cloud
Secure Desktop Computing In the CloudSecure Desktop Computing In the Cloud
Secure Desktop Computing In the Cloud
 
Mindteck Smart/IoT Capabilities
Mindteck Smart/IoT CapabilitiesMindteck Smart/IoT Capabilities
Mindteck Smart/IoT Capabilities
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Solution BluePrint v. Smart Parking
Solution BluePrint v. Smart ParkingSolution BluePrint v. Smart Parking
Solution BluePrint v. Smart Parking
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
Design and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control SystemDesign and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control System
 
An end to-end solution for creating smarter products
An end to-end solution for creating smarter productsAn end to-end solution for creating smarter products
An end to-end solution for creating smarter products
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 
Chuck_Roden_Resume
Chuck_Roden_ResumeChuck_Roden_Resume
Chuck_Roden_Resume
 

Kürzlich hochgeladen

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Kürzlich hochgeladen (20)

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Cruatech Services Intro

  • 1. Products & Services Date: 4th Feb 2015 Presenter: David King Web: www.cruatech.com Phone: +35317007579
  • 2. Cruatech is a software Development Company that specialises in:
  • 3.  Cruatech is the only organisation that offers Hardware integration design and development using an integrated platform which is specific to the requirements of each customer’s Project.  Most off-the-shelf software provides features that are a Mile wide and an inch deep. Cruatech offers customers the flexibility to define the features and behaviours and in doing so also define and minimise the projected spend.  Cruatech provides the underlying architecture and Integration along with the User interfaces, Management Features and Reporting that is required for driving efficiencies and meet Operational and Management needs.  Cruatech develops Platform products and integrations components for the Physical Security, Utilities Management, IT and Manufacturing sectors.
  • 4. 1. Integration Module Development and Maintenance. 2. Product Development, Test and Design for Physical Security Energy Management and IoT. 3. Project Management for Engineering and Commercial Projects needs. 4. Training for Integrators and Partners and internal TYCO groups. 5. Support for Global Projects in deployment and implementation and post delivery phases.
  • 7. Project Overview Cruatech partnered with VIS Security to deliver Proximex SurveillInt PSIM application to Enable Mater Hospital to Consolidate all Security Systems improve operational awareness on this greenfield site which was the largest construction project in the country in 2012. Challenges - Installing and commissioning PSIM and software systems at a site with an on-going phased Construction project. -Implementing Security Policies on a 24 hour site where some areas are locked down but other areas are open to the public.
  • 8. SOLUTION Phased Construction Issue Cruatech and VIS overcame the phased construction challenges by prebuilding and testing all Surveillint components and Integration modules in the Cruatech lab. This allowed any issues to resolved prior to going to site and also allowed for an end to end component test of the subsystems. The physical components were then transferred to site and installed in the data centre at the Mater Hospital. Security Policy for 24 Hour site Cruatech implemented Intrusion Group set schedules to ensure secure areas were locked down while other areas would not generate alarms based on scheduled monitoring rules. Based on VIS Security’s Technical Submittal, Cameras and Access control points where configured to provide increased guard tour monitoring of common and public areas. The Nurse-call and BMS systems were integrated to Surveillint to implement process for disable toilet access and Cardiac arrest incidents.
  • 9. Capable Partnership The key to success of this project is to have capable partners. In this instance there was VIS Security managing the project, installing and commissioning the physical element of the project while Cruatech developed and implemented the software components. Both parties are part of the same coherent project plan with mutual dependencies and clearly defined expectations.
  • 10. Design Detailed Design from the outset ensures that the implementation and deployment is as straight forward as can be. VIS produced very detailed Technical submittals and Cruatech were able to execute using these instructions. The Project was delivered with professional Service days left over!
  • 11. Project Overview Cruatech have developed CruZControl Energy and cloud platform for monitoring and controlling energy with in a business environment. Challenges - Retro fitting and commissioning Energy Management hardware in a University Campus. -Driving Savings for a multiple tenancy building.
  • 12. SOLUTION Retro fitting and commissioning Energy Management hardware in a University Campus Cruatech worked with Building Estates to outline a design which was acceptable to the Building Managers and Campus Operations Managers. Finding the Correct hardware and integrating this to CruzControl’s cloud solution while ensuring scalability and flexibility of the system. Drving Savings The First step is to create awareness and increase visibility of the energy usage within an environment. The Second step is to Implement Energy Savings policies. The Third step is a recurring step where we analyse data and help our customers make smart decisions for energy usage and manage their environment more efficiently. For a Monitoring only approach users are the most important factor - “Devices won’t save you money, People will!”
  • 13. 126.206.171.x Network Floor 1 Ground Floor Basement Floor 2 Floor 3 DCU – CruZControl Hardware Deployment Layout EM Transmitter CruZControl Server EM Transmitter EM Transmitter EM Transmitter Ethernet Ethernet
  • 14. Project Overview Cruatech worked with Proximex and LYSYS to develop a middleware integration which connected an Access System with a Video analytics system in order to improve Airport Security for Staff members suppliers and contractors. Challenges - Introducing a phased approach o access where vehicle is scanned and access data is verified before admittance. -Dealing with Multiple lanes, visitor types and logical outcomes.
  • 15. SOLUTION Phased Approach to Airport Access Cruatech worked with LYSYS to design an approach that correlated data from Facility Commander Access system, Gatekeeper Video Analytics and CCTV systems to record badged user details, Under Vehicle scans, ANPR. Front and back images and Driver.
  • 16. SOLUTION Dealing with Multiple Lanes The application allowed for configuration of multiple lanes with 3 access points all required system data for a successful or unsuccessful admittance to the next stage. Multiple vehicles could be processed in one Surveillint alert.
  • 17. Project Overview Cruatech worked with Herta Security Biometrics to Integrate an Access Control System with their Video Analytics to provide Advanced access control through facial Recognition without the need for a Security Badge. Challenges - Developing a solution that could open the correct access kiosk for the correct user in a busy lobby in a large Media Facility.
  • 18. Herta BioSurveillance And Access Controller P2000 Client P2000 Contoller Momentary Door Open Herta BioSurveillance Access Point with Herta Access Controller and P2000 Access System Identification and Detection Identification and Detection Identification and Detection XML-RPC Request – Momentary Door Open Momentary Door Open IdentificationandDetection IdentificationandDetection IdentificationandDetection SOLUTION Video Analytics for Access Herta integration provided the client with the automatic ability to admit valid badge users while creating security events for black listed users or people known to the organisation
  • 19. Project Overview Cruatech worked with Glanta, makers of Advanced Hygiene system Surewash to deliver a reporting service which produces analytical data from the Surewash Device to a centralised system. Challenges - Develop a reporting service to deliver analytical data from the Surewash Devices in different geographical locations to a centralised server to gather and present useful compliance data, reduce hospital outbreaks and offer additional value and safety to patrons and staff.
  • 20. SOLUTION Unique Reporting Service A Serviced based reporting application was created to check for data updates on each device and return the most recent device activity. This was achieved using 3GS network to connect devices to the world wide web on beyond to the Surewash server.
  • 21. Cost We have no Management Overhead for our clients. Our Products and components can be delivered as a managed service through the cloud or as custom standalone solution. Our rates are competitive, we can work on a Time and Materials basis or to a pre-agreed Rate Arrangement. We can offer economies of scale based on throughput, Recurrence and Project size. We can resource up and down depending on how much capacity is needed per Project.
  • 22. Experience IM Development - We have designed and developed integrations for Access, Video, Intrusion, Intercom, GPS, Dispatch, Video Wall, Video Analytics, Network Management, Fire, BMS, Nursecall & Radar systems. Product Development - We develop our own platforms like CruZControl but also engage in design and development for companies like Proximex Corp. and Tyco. Skillsets – As well as Quality Software Development Engineers we have Electronic Engineering and even Electricians in our group which is a good fit for Physical Security and Energy Management. On site & Customer Friendly – We have always delivered high quality solutions for our partners and customers while achieving rapport and building good relationships.
  • 24. API’s, Integration and Enablement Experience with 80+ Physical Security API’s and SDK Integrations with Proximex Surveillint. And: Integrations with:
  • 25. Reliability & Delivery Finbar Rogers, VIS Security – “The Mater control room project would have been a whole different beast without Cruatech”. Mike Rickard (PM, Johnson Controls, BBC Project) – “Thanks to David and his team for their responsive and conscientious approach throughout the Project”. Ken Cheng (CTO, Proximex) – “When we are in a difficult period, you and your team always helps us out. You and your team are like an extended family to us”.
  • 26. Thank you for listening for more info go to www.cruatech.com or Phone: +35317007579

Hinweis der Redaktion

  1. Phased Approach to Airport Access Cruatech worked with LYSYS to design an approach that correlated data from Facility Commander Access system and Gatekeeper Video Analytics to record badged user details, Under Vehicle scans, ANPR. Front and back images and Driver.