We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMadeline Exley
Modified over 2 years ago
Comprehensive Video Security and Monitoring System
©ATMeye Comprehensive Video Security and Monitoring System 2 IS ATMs SECURITY A CHALLENGE? ATMs users demand feel safe!
©ATMeye Comprehensive Video Security and Monitoring System 3 Facing the skimming and fraud problem? It is essential to identify theft and fraud!
©ATMeye Typical techniques Comprehensive Video Security and Monitoring System
©ATMeye 5 Comprehensive Video Security and Monitoring System Vendor-independent video security complex that enables video journal maintenance on self-service devices. ATMeye - Comprehensive Video Security and Monitoring system
©ATMeye 6 Comprehensive Video Security and Monitoring System Advantages As a cost-effective, integrative and reliable system ATMeye allows you to: Increase the overall security of the self-service device network Reduce the risk of frauds or physical damage made to ATMs Reduce costs of overall security operation Strengthen the image of the bank
©ATMeye 7 Comprehensive Video Security and Monitoring System ATMeye consists of: ATMeye Core – basic offline ATMeye configuration that captures snapshots or video and stores them in video-archives on the ATM hard disk as JPEG or AVI format files. ATMeye Networking Client – separate service package which enables the on-line configuration of ATMeye i.e. remote downloading of created files through TCP/IP protocol or ProView monitoring system channels. ATMeye Server – provides the remote centralized management access to snapshots and video stored on ATMs.
©ATMeye 8 Comprehensive Video Security and Monitoring System How it works? Date & Time Event ATM ID CAM no. PrerecordTransaction Start Track2Data: Card no.Card takenTransaction End A total integration with ATMs Electronic Journal, no dead-time records
©ATMeye 9 Comprehensive Video Security and Monitoring System How it works? JournalSensors EVENTS Video-archives Cameracontrol Remote Access ATMeye Desktop program Records storage, exporting, review.
©ATMeye 10 Comprehensive Video Security and Monitoring System Sales all over the globe More than installations in 60 countries. In well-known banks.
©ATMeye 11 Comprehensive Video Security and Monitoring System Case study - Zenith Bank branch opening in Nigeria ATMeye evaluated by the head of Nigeria Nigerian President Mr. Olusegun Obasanjo, President of Heineken Wolrdwide Mr. Anthony Ruys, MD of Zenith Bank Mr. Jim Ovia ATMeye fixes events which you wouldnt like not to notice!
©ATMeye 12 Comprehensive Video Security and Monitoring System Case study - The vandalism in Ceskoslovenska Obchodni Banka ATMeye has proved its efficiency in CSOB We sent picture from ATMeye to Police and next day we got information that Police caught the culprit! Vitezslav Strajt, Wincor Nixdorf, Czech Republic
©ATMeye Conflict resolution in Latvia The perfect solution for conflict resolution! A cash wasnt taken Pin enteredTransaction requestCash presented ATMeye CASE STUDY
©ATMeye The fraud case in Lithuania The person has been arrested in Kaunas, LT..hm.. whats happening? My card??? …retained!... But I wont give way! Lets try another card! And the right PIN! Better try another ATM! I think he didnt get to next ATM! ATMeye CASE STUDY
©ATMeye The incident in Lithuania The perfect solution for vandalism prevention! A reaction to near-to-zero balance Transaction requestShock sensor is activated ATMeye CASE STUDY
©ATMeye 16 Comprehensive Video Security and Monitoring System ATMeye success National and global awards Customers love your system Nicolas Barakat, CNS, Dubai, UAE
©ATMeye Banks that have already trusted in our products 17 Tbiluniversal BankBank Toseach SaderatPriorbank ICICI BankYugbankLatvijas Hipoteku un zemes banka Krung Thai BankAgricultural Cooperative Bank of ArmeniaLatvijas Krajbanka Bank MelliAnelik BankLatvijas Unibanka Commercial Bank of DubaiArmimpexbankRietumu Banka SevergazbankArtshakhbank First Investment Bank Bank PersianAzerdemiryolbank Eesti Ühispank NLB MontenegrobankaBUSbankBank of Georgia RosbankInternational Bank of AzerbaijanBasisbank GlobexBankKochbankIntellectbank Kulska BankaRabita BankPeople Bank of Georgia Ceskoslovenska Obchodni BankaRespublika BankRepublic Bank Russ-BankAtabankTBC-Bank Banca Srbia i Crna GoraUniBankUnited Georgian Bank Sharjah Islamic BankBelagroprombank AIK Banka The Siam Commercial BankBelarusbank Delta Banka Union Commercial BankBelarusian bank of Development and Reconstruction BELINVESTBANK ATF bank Privredna Banca BeogradBelPromStrojBankCenterCredit Bank Arab Bank for Investment and Foreign Trade (Arbift) BelvnesheconombankEUROAZICBANK InvestCapitalBankMinskComplexBankHalyk Savings Bank of Kazakhstan
©ATMeye 18 Kazkommertsbank Afribank Nigeria IndexBank Kaspijskij Bank Standard bank Nadra, Public Corporation Commercial Bank NurBankOrion BankOschadnyj Bank TemirbankGovernmental Bank of Foreign Economic Activities of Turkmenistan Bank Petrokommerz-Ukraina TEXAKABANKBank AvalPrivatBank TURANALEM BANKBank AggioPROMINVESTBANK ABN AMRO BANKAlonge bankState Saving Bank of Ukraine Valut-Tranzit BankBROKBUSINESSBANKStarokyivskyi Bank HansabankasPublic Corporation Bank BIG EnergiyaUkrgasbank Lietuvos bankasZUKBUkrSibBank DnB NORD bankasCreditPromBankVABank PAREX bankasCredit Dnepr BankWest Ukrainian Commercial Bank Sampo bankasCredit Prom BankZevs Bank Bankas SNORASLegbankNational Bank for Foreign Economic Activity SEB Vilniaus bankasMega BankTrust Bank Corporation Ltd. National Bank of MalawiMT-Bank Banca de Economii Banco PopulaireMriyaExpress Bank EnergBankEXIMBANK - State Export-Import Bank of UkraineIMEKSBANK FinComBank Banks that have already trusted in our products
©ATMeye 19 Comprehensive Video Security and Monitoring System Thank you Please visit or For further information
ATMeye.iQ Video security monitoring and dispute management solution ATMeye.iQ.
Penkiu kontinentu bankines technologijos, UAB 1 Comprehensive ATM Video Security System ATMeye.
CashManagement.iQ Cash Management.iQ. 01/06/20142 Determine ROIMinimize expensesAutomate and optimize ATMs operationsReduce and manage business risks.
Video surveillance system for ATMs WATCHDOG 2012.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Branch Security and Automation of Cash Operations.
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
Banks Strategies for Financial Inclusion A. Rajan Country Head-Operations HDFC Bank Ltd.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
1 Database Systems: Design, Implementation, and Management CHAPTER 10 Distributed Database Management System.
Baltic WPKI Forum Overview for Baltic IT&T 2007 Andres Aarma, Certification Centre Ltd. 19 April 2007.
ATM Surveillance Solution. LIST Outline & Key Point 1 Solution 1, 2, 3 2 ATM Surveillance Program – E-MAP 33 Conclusion 44.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Strategies for a Successful Core Banking Implementation - The roll out of FLEXCUBE at Indovina Bank, Vietnam Mr. Phan Dao Vu First Deputy General Director.
1 Electronic Business (E-Business) Systems. Learning Objectives Appreciate the possible changes to organizational processes that occur when e-business.
CLOUD COMPUTING. It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform). One can use.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
11 SERVER CLUSTERING Chapter 6. Chapter 6: SERVER CLUSTERING2 OVERVIEW List the types of server clusters. Determine which type of cluster to use for.
Chapter 1 Introduction to Databases 1. Chapter 1 - Objectives Some common uses of database systems. Characteristics of file-based systems. Problems with.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Copyright © Open Text Corporation. All rights reserved. Slide 1 Automatic Routing With Captaris FaxPress and FaxPress Premier Darin McGinnes Sales Engineer.
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Banking our next Million Customers Mobile Money Summit 21 – 22 November 2008 Bank South Pacific.
Electronics-line.com My ELAS December electronics-line.com Business Propositions All customers would like to have the advantages ELAS gives A large.
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Overview Presentation MKT-DSRV-P- 001E. Product Overview Network based video transmission product with on-board digital recording Allows analogue fixed/PTZ.
AXIS Camera Station Comprehensive video management software for monitoring, recording, playback and event management.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW Describe the clustering capabilities of Microsoft Windows.
The Way To Make Your Card Business More Profitable April 18th, 2012 EURONET E-BANKING 10th International Conference & Exhibition KARACHI Jean-Louis MEYER.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
2N PRI Gateways 2N SIM Star. 2N StarGate PRI and VoIP GSM Gateway.
1 TEMENOS HOME Global Conference on Access to Finance Washington DC 30 th and 31 st May 2006 Murray Gardiner.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The spoken words remain IP and Video Telephony Recording from TC & C Anthony.
Evolve to become an MSSP with Cyberoam. © Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You The Security.
Class Actions and Proxy Processing Bank Depository User Group Scottsdale, Arizona October 25, 2005.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
National Infrastructure – Citizens Account. © Sopra Newell & Budge, 10 February 2014, Page 2 Jim Kinney Director of Operational Services Improvement Service.
Overview Presentation December 2007 MKT-NVO-P-002E.
Chapter 9 e-Commerce Systems. 2 Section 1 E-Commerce Fundamentals.
1 2 In a computer system, a file is a collection of information with a single name, such as addresses.doc, or filebackup.ppt, or ftwr.exe, or guidebook.xls.
0 QuickBooks: Point of Sale 5.0 Ring Up Sales Inventory Management Customer Tracking Credit Card Management Multiple Security Levels Extensive Reporting.
1 Residents register service under the Ministry of the Interior Nijole Martinkeniene Head of Data Quality division
Vice President, e-Business Development Dubai United Nations Conference on Trade & Development Conference on Electronic Commerce.
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
XProtect ® Professional Efficient solutions for mid-sized installations.
Financial Stability & Integrity Track: Innovations in Technology for Financial Inclusion & Managing Risks.
Chapter 3 – Electronic Business (E-Business) Systems Accounting Information Systems 8e Ulric J. Gelinas and Richard Dull © 2010 Cengage Learning. All Rights.
© 2017 SlidePlayer.com Inc. All rights reserved.