Te presentamos
Tu nuevo asistente de presentaciones.
Perfecciona, mejora y adapta tus contenidos, busca imágenes relevantes y edita elementos visuales más rápido que nunca.
Búsquedas populares
Intelligent Management Platform
Better Decisions, Faster
The ReconaSense unified platform was built under the leadership of Jeff Brown, John Carter, and Mitch Crowsey. It is the sister-company of Smarter Security, #1 Optical Turnstile in North America. Voted New Product of the Year by Security Today. Patented methodology for Anomalous Event Detection (AED) across diverse sensor arrays (Patent #8779921)
Who are we?
The ReconaSense unified platform was built under the leadership of Jeff Brown, John Carter, and Mitch Crowsey
Leadership
Jeff Brown
Co-Founder, Chairman of the Board
John Carter
Co-Founder, President, CTO
Mitchell Crowsey
Senior Software Design
Steve Lindsey, CPP, is a security and loss prevention industry expert. He developed his expertise serving in several Security and Loss Prevention roles during his 35-year career at Wal-Mart Stores, Inc. Steve started his career by leading multiple regions within the Wal-Mart Stores Division. He continued his career leading the Sam’s Club Loss Prevention Division, Wal-Mart Homeland Security, Wal-Mart Security Technology an Global Security Services, a division of Wal-Mart with over 300 team members. Lindsey graduated from Missouri Southern State University with a B.S. in Criminal Justice Administration and holds ASIS International’s Certified Protection Professional Certification.
PROBLEM
Problem
Many siloed applications trap actionable data that should be used to automate reactions to events in other systems.
Solution
ReconaSense” A.I. Based Platform Can Take The Data As Inputs From Most Of Your Current Security Infrastructure And Do Much More Than Just A Unified User Interface
Problem
Pre A.I. based systems are static and, thus, more easily defeated as bad actors test for vulnerabilities to exploit and learn your defenses
Solution
Systems that learn and evolve continuously improve your ability to prevent events and increase your speed to react
Smart cities, smart campuses, and smart enterprises are beginning to roll out internet connected sensors and devices across their environments. This trend will accelerate with the rollout of 5G, enabling the emergence of the Internet Of Things (IOT), where smart devices transmit data and produce actions across the ecosystem.
Problem
Solution
ReconaSense Is happy to help in your transition to the future of physical security.
SOLUTION
All your security events, analyzed and accessible, in real-time.
Intelligent management and awareness surrounding personnel movement and activity
Trigger Variables, Rules, Situation Manager & Procedures automate physical compliance across your organization
1
6
Auto-Comply
Insider
Threat
Secure dynamic, digital and physical distributed environments
Centralized log management allows for reduced investigation times
7
2
Accelerated
Forensics
Multi-Vector
Attack
Neural Scoring allows automated risk-assessment based on custom thresholds or activity levels of an organization
3
8
Real-Time
Threat
Assessment
Asset
Protection
Identify trends, abnormalities and correlations across your security operation
Web Services & ETL tools allow disparate sensors, analog or digital, to be managed with a common layer of logic
4
9
Integration &
Analysis Platform
Discover
Relationships
Trigger Variables & Rules allow security departments to detect early warnings, enabling
5
10
Auto-Detect
Virtual
Expertise
The Threat from Inside
Insider Threat Current tools cannot defend against internal & reactive adversaries
Problem
Description
Force Multiplier
Description
Force Multiplier
Problem
Guards can be part of insider threats, with 41% of insider theft from non-nuclear guarded facilities attributed to guard staff.
Guards
Force
Multiplier
Policy
Ineffectiveness
Organizations normally have competing goals, with security not being the top one, so rules get broken in order to: increase productivity, meet a deadline or avoid inconvenience. Plus, every time someone is rude because a policy says so, they are less likely to get their next promotion.
Increased
Transparency
Never have too much faith in one element of a security system. Defense-in-Depth is only way to make it difficult for insider to overcome all the layers, especially if they are dynamic.
Employees don't always have bad intent, but can find themselves in positions to be leveraged by external threats.
Employees
Coerced
Behavior
Analysis
Integration
Platform
Defense
in-Depth
Most departments worry about natural disasters and accidents, not internal and reactive adversaries, who will observe the security system and adjust plans accordingly.
Behavior
Analysis
Behavior
Analysis
Reactive
Adversary
The insider threat from careless or complacent employees and contractors exceeds the threat from malicious insiders. This is largely because careless insiders often unintentionally help nefarious outsiders
Employees
Careless
Complacency is the principal enemy of Insider Threats. Do not make any assumptions and always be assessing.
Real-Time
Threat
Assessment
Compliance
oriented
Security
Employees don’t always begin employment as a threat
Behavior
Analysis
Employees
Radicalized
Problem
Solution