SlideShare ist ein Scribd-Unternehmen logo
1 von 15
© COPYRIGHT  PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
[object Object],[object Object],[object Object]
Over a span of 3 minutes, incident happened and rest all is reactive assessment. 5 mins Truck appears at Murrah Building 8:57AM Truck Parks Explosion Occurs 9:02AM Oklahoma City Bombing Cyclist appears on the camera 3:39:42AM Abandons Package Explosion Occurs 3:40:44 1:02 mins Time Square Bombing
Over a period of 20 days, culprit was killing people one-by-one and surveillance cameras were giving reactive videos for forensic investigation. If there was some real-time assessment it could have saved lives.
4273 Terror Attacks  till Date 6 Rank in the world in terms of terrorist incidents  360 Fatalities per year on an average Source: Global Terrorism Database(www.start.umd.edu/gtd/)
Surveillance was always a need of an hour to fight with crime as a one of the stronger  controls that complements police force on ground. With recent attacks and attack sophistication definition of surveillance need to be changed. Multiple cameras are not the answer !!
Analog Feature Digital Low, degrades over time Image Quality High Long search via serial review of tape Search/Retrieval Search by time, event or transaction Transaction data added to VHS video Integration Searchable database based on transactions VHS tapes in cabinets, closets, etc. Storage/Archival Hard drive, optical/tape backup and archive Realtime recording requires a VCR/Camera Recording Multiple cameras to one DVR/Server Limited to physical space and storage Scalability Highly scalable based on storage requirements Separate coax infrastructure Cabling/Infrastructure Existing IT infrastructure Local  only Access to video Remote access
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],1 2 3 4
[object Object],[object Object],Risk / Threat Assessment based on factors like Geo’s, Assets Value, Guest , Past Experiences, Occurrence Probability etc. Based on Risk/Threat Assessment, Technology Selection, Surveillance Control Design SOPs will come in place followed by enforcement of controls/SOPs System Maintenance, Operations & Review
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Perimeter  – Most vulnerable area. Weak perimeter controls and its weaker integration with incident and response systems push a good facility into a vulnerable situation Weaker integration of Controls running at other vulnerable areas with Incident response system poses a serious threat to the hotel premises Main Entrance Food Unloading Areas Fire Exits Car Parking Areas Other Entry Points Other Perimeter Vulnerable Points
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Plan Design Implement Manage  Site, SOP & Control Assessment  Solution Design & Recommendation  Installation, Customization & Integration  Optimization, Risk Assessment & Certification
Submitted By :  Ms. Shobha Shandilya Managing Director PLN9 Security Services Pvt. Ltd.

Weitere ähnliche Inhalte

Was ist angesagt?

Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
Rishu Mehra
 

Was ist angesagt? (19)

CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
Quadrant MSSP Doc
Quadrant MSSP DocQuadrant MSSP Doc
Quadrant MSSP Doc
 
Computrace grc
Computrace grcComputrace grc
Computrace grc
 
Remote management and data access of solar pv systems
Remote management and data access of solar pv systemsRemote management and data access of solar pv systems
Remote management and data access of solar pv systems
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosher
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
 
Network Audit
Network AuditNetwork Audit
Network Audit
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 

Andere mochten auch

Andere mochten auch (12)

Pinnacle Business Review
Pinnacle Business ReviewPinnacle Business Review
Pinnacle Business Review
 
Grandstream Surveillance Presentation 06/2014
Grandstream Surveillance Presentation 06/2014Grandstream Surveillance Presentation 06/2014
Grandstream Surveillance Presentation 06/2014
 
Pelco IP Solutions
Pelco IP SolutionsPelco IP Solutions
Pelco IP Solutions
 
Intelligent Video Surveillance - Synesis integrated hardware and software sol...
Intelligent Video Surveillance - Synesis integrated hardware and software sol...Intelligent Video Surveillance - Synesis integrated hardware and software sol...
Intelligent Video Surveillance - Synesis integrated hardware and software sol...
 
2. SIMPLYCITY: Lonix BMX
2. SIMPLYCITY: Lonix BMX2. SIMPLYCITY: Lonix BMX
2. SIMPLYCITY: Lonix BMX
 
KEDACOM - Recognitive IP video solutions
KEDACOM - Recognitive IP video solutionsKEDACOM - Recognitive IP video solutions
KEDACOM - Recognitive IP video solutions
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillance
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Highly customizable video surveillance platform for manufactures and system ...
Highly customizable  video surveillance platform for manufactures and system ...Highly customizable  video surveillance platform for manufactures and system ...
Highly customizable video surveillance platform for manufactures and system ...
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart Cities
 
Best Paper winning PPT
Best Paper winning PPTBest Paper winning PPT
Best Paper winning PPT
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 

Ähnlich wie PLN9 Surveillance

Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
Tom Kopko
 

Ähnlich wie PLN9 Surveillance (20)

Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Absolute grc-
Absolute grc-Absolute grc-
Absolute grc-
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTECase Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
 
MONITORING PPT.pdf
MONITORING PPT.pdfMONITORING PPT.pdf
MONITORING PPT.pdf
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
SECHEIM_TRADING
SECHEIM_TRADINGSECHEIM_TRADING
SECHEIM_TRADING
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence application
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 

Mehr von PLN9 Security Services Pvt. Ltd.

Mehr von PLN9 Security Services Pvt. Ltd. (20)

Port security
Port securityPort security
Port security
 
Patrolling
PatrollingPatrolling
Patrolling
 
Types of Security Services
Types of Security ServicesTypes of Security Services
Types of Security Services
 
Smms corporate presentation ppt
Smms corporate presentation pptSmms corporate presentation ppt
Smms corporate presentation ppt
 
Corporate Presentation (solar plants)
Corporate Presentation (solar plants)Corporate Presentation (solar plants)
Corporate Presentation (solar plants)
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Negotiation Skill
Negotiation SkillNegotiation Skill
Negotiation Skill
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Motivational Skills
Motivational SkillsMotivational Skills
Motivational Skills
 
Types of Soft Skills
Types of Soft Skills Types of Soft Skills
Types of Soft Skills
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
How to Teach Soft Skills
How to Teach Soft SkillsHow to Teach Soft Skills
How to Teach Soft Skills
 
Campus Security
Campus SecurityCampus Security
Campus Security
 
Managing Conflicts @ Workplace
Managing Conflicts @ WorkplaceManaging Conflicts @ Workplace
Managing Conflicts @ Workplace
 
ATM Security Tips
ATM Security TipsATM Security Tips
ATM Security Tips
 
Powerful Presentation Skills
Powerful Presentation SkillsPowerful Presentation Skills
Powerful Presentation Skills
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
'Leadership & Executive Coaching'
'Leadership & Executive Coaching''Leadership & Executive Coaching'
'Leadership & Executive Coaching'
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

PLN9 Surveillance

  • 1. © COPYRIGHT PLN9 SECURITY SERVICES PVT. LTD. ALL RIGHTS RESERVED
  • 2.
  • 3. Over a span of 3 minutes, incident happened and rest all is reactive assessment. 5 mins Truck appears at Murrah Building 8:57AM Truck Parks Explosion Occurs 9:02AM Oklahoma City Bombing Cyclist appears on the camera 3:39:42AM Abandons Package Explosion Occurs 3:40:44 1:02 mins Time Square Bombing
  • 4. Over a period of 20 days, culprit was killing people one-by-one and surveillance cameras were giving reactive videos for forensic investigation. If there was some real-time assessment it could have saved lives.
  • 5. 4273 Terror Attacks till Date 6 Rank in the world in terms of terrorist incidents 360 Fatalities per year on an average Source: Global Terrorism Database(www.start.umd.edu/gtd/)
  • 6. Surveillance was always a need of an hour to fight with crime as a one of the stronger controls that complements police force on ground. With recent attacks and attack sophistication definition of surveillance need to be changed. Multiple cameras are not the answer !!
  • 7. Analog Feature Digital Low, degrades over time Image Quality High Long search via serial review of tape Search/Retrieval Search by time, event or transaction Transaction data added to VHS video Integration Searchable database based on transactions VHS tapes in cabinets, closets, etc. Storage/Archival Hard drive, optical/tape backup and archive Realtime recording requires a VCR/Camera Recording Multiple cameras to one DVR/Server Limited to physical space and storage Scalability Highly scalable based on storage requirements Separate coax infrastructure Cabling/Infrastructure Existing IT infrastructure Local only Access to video Remote access
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Perimeter – Most vulnerable area. Weak perimeter controls and its weaker integration with incident and response systems push a good facility into a vulnerable situation Weaker integration of Controls running at other vulnerable areas with Incident response system poses a serious threat to the hotel premises Main Entrance Food Unloading Areas Fire Exits Car Parking Areas Other Entry Points Other Perimeter Vulnerable Points
  • 13.
  • 14.
  • 15. Submitted By : Ms. Shobha Shandilya Managing Director PLN9 Security Services Pvt. Ltd.