Presentation is loading. Please wait.

Presentation is loading. Please wait.

Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green Dante Ricci.

Similar presentations


Presentation on theme: "Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green Dante Ricci."— Presentation transcript:

1 Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci dante.ricci @oracle.com Accelerating continuous improvement for transforming organization

2 Agenda  PART I: Visitor iSecurity Solution Overview  Problem Resolution  Visitor iSecurity Definition  Solution Footprint  PART II: Solution Demo

3 Problem Resolution – Why do customers need it? Governing with Accountability Control Access  Post 9-11  Heightened security required for all federal facilities  Hundreds of military installations  525,000 Federally owned/leased buildings  DOE Labs  Intelligence facilities  Allows organizations to track and maintain information on visitors  Personal information, visitation history and visitation purpose National Security Advisor - Dr. Condoleezza Rice “Security is a concern of everyone in this county.....”

4 Visitor iSecurity Solution Definition  Visitor iSecurity: Base Registration And Visitors Online  A comprehensive, integrated web-based self- service registration and authentication system  Originally designed as a COTS-based access/security solution for military and secure installations

5 Integrated Registration & Access Business Flow Facility/Security All Customer Data & Interactions stored in Visitor iSecurity Database Visitor Submits Necessary Forms Security Routes through Approval Process Security Sets up for ID process Visitor views Regulations, Completes Forms Visitor pulls Information off Web Visitor pulls Information off Web Security views Information Security Interacts with Customer Visitor engages Web Site Visitor

6 Visitor iSecurity Solution Strengths  Collects data on ALL visitors  Streamlines the registration process  Different “views” for individuals/separate organizations  Adapts easily for THREATCON Alert Status changes  Enables analysis for trends /patterns  Permits information sharing with other facilities/agencies

7 Visitor iSecurity Solution Benefits  Increased security at gates/buildings  Ease of use (enables self service – eliminates paper-based credential verification)  Permanent electronic records  Reduced security costs through standardized processes and improved issue-resolution process in the field  Increased visibility of all visitors & contractors from a local and/or regional perspective  Ability to coordinate with Homeland Defense efforts locally and nationally  Standardization of check in/check out procedures  Reduced bottleneck at entry points  Increased visitor satisfaction and intelligence gathering through self-service capabilities

8  Key questions:  How do you currently control access to your installation or facility?  What types of problems do you encounter when authenticating visitors to your installation or building?  Are you able to maintain accurate records on visitor entries and exits?  Do you need to share information with other organizations related to your visitors and their activities at your installation or building?  Customer organizations that are:  Responsible for individual or multi-levels of security control  Using paper-based access control systems  With high turnover in security personnel Customer Organizations Interested in Visitor iSecurity

9 Security Departments Facilities Mgmt./Planning Depts. GSA – Public Building Services Chief of Naval Installations/CNI Army Installations Mgmt Agency Air Force Major Commands Customer organizations most interested in the solution: Provost Marshals Physical Security Officers Military/Federal Civilian Police Officers Planning & Administrative Officers CIOs/CFOs Who to engage? Who would utilize a Visitor iSecurity Solution? Whoever is responsible for managing the guard booths and visitation desks

10 iSupport Field & Mobile Service TeleService Oracle Portal, Application Server & Database Background Checks Background Checks Multiple Visitor Types Multiple Visitor Types Agency Points of Contacts Agency Points of Contacts On-Line Pictures On-Line Pictures Visitor Demographics Visitor Demographics Historical Views Historical Views 3 rd Party Wireless Biometric Devices Visitor iSecurity Solution Footprint

11  Department of Energy  NASA  GSA  Ft. Sam Houston  Ft. Belvoir  Ft. Drum  Ft. Leavenworth  IMA Southwest  USAF Electronic Systems Center  Walter Reed Army Medical Center Customer Examples

12 Visitor iSecurity Summary Value Proposition Solution provides more advanced security for access control to installations and buildings required post 911 through an easy to use web-based COTS application that is secure, scalable and configurable to meet individual and organizational needs. How to build an ROI:  Total Cost Analysis (TCA) * Automation (Offsets manpower reductions, increases productivity) * Expanded capabilities for issuance of IDs, badges, decals, etc.

13 Visitor iSecurity Demo Presentation

14 DEMO Flow: BarCode ID Process Option: Scan bar code upon exit of facility Visitor completes registration, submits for approval via web Information is uploaded to Provost Marshal’s console Note: Mobile MP’s may perform random scans Request is routed and approved by facility Visitor gets notice of approval, prints vehicle pass w/barcode Sentry @ gate authenticates with portable scanner –Cross Checks w/State/Federal ID

15 DEMO Flow: BioMetric ID Process Visitor completes registration, submits for approval via web Information is uploaded to Provost Marshal’s console Request is routed and approved by facility Visitor gets notice of approval, prints vehicle pass w/barcode Reception Center authenticates with fingerprint scanner –Cross Checks w/State/Federal ID - creates biometric record Option: Scan fingerprint upon exit of facility

16 November 21, 2003 A Q & Q U E S T I O N S A N S W E R S Visitor iSecurity Author: Jerry Green


Download ppt "Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green Dante Ricci."

Similar presentations


Ads by Google