Te presentamos 

Prezi AI.

Tu nuevo asistente de presentaciones.

Perfecciona, mejora y adapta tus contenidos, busca imágenes relevantes y edita elementos visuales más rápido que nunca.

Cargando…
Transcripción

Intelligent Management Platform

Better Decisions, Faster

The ReconaSense unified platform was built under the leadership of Jeff Brown, John Carter, and Mitch Crowsey. It is the sister-company of Smarter Security, #1 Optical Turnstile in North America. Voted New Product of the Year by Security Today. Patented methodology for Anomalous Event Detection (AED) across diverse sensor arrays (Patent #8779921)

Who are we?

The ReconaSense unified platform was built under the leadership of Jeff Brown, John Carter, and Mitch Crowsey

  • Sister-company of #1 Optical Turnstile in North America

  • Patented methodology for Anomalous Event Detection (AED) across diverse sensor arrays (Patent #8779921)

  • 7th generation of military-grade security technology developed by current team

Leadership

Leadership

Jeff Brown

Co-Founder, Chairman of the Board

  • Jeff also leads ReconaSense’ sister company, Smarter Security.
  • Since 2002 Jeff built Smarter Security into an industry leader, recognized for six years by Inc. magazine as one of the fastest growing privately held companies in America.
  • Jeff and his team are incredibly proud to secure many of the world’s most iconic buildings, e.g., Facebook

Leadership

John Carter

Co-Founder, President, CTO

  • Former NASA Scientist
  • SIA Executive Board member.
  • Chairs Homeland Security Advisory Group.
  • Post 9/11 participant in Federal “Go Teams” to establish new guidelines and define new technologies for federal security.
  • ReconaSense includes his 7th generation of Access Control technology.

Leadership

Mitchell Crowsey

Senior Software Design

  • Member of one of the first neural network teams within Boeing.
  • Expert at molding the power of Mercury controllers into meaningful new benefits for his customers.
  • Expert in Artificial Intelligence technology.
  • Designer of Open Options

Board of Advisors

James Treybig

  • Founded Tandem Computers, a pioneering Silicon Valley manufacturer of fault tolerant computer systems marketed to transaction processing customers and used for ATMs, banks, stock exchanges, etc.
  • Under his leadership, Tandem:
  • Delivered its first product in 1976
  • Issued public stock in 1977
  • Ranked by Inc. magazine as the fastest growing public company in America in 1980
  • When Jimmy retired in 1996, Tandem was a $2.3 billion company employing approximately 8,000 people worldwide.

Steve Lindsey

Steve Lindsey, CPP, is a security and loss prevention industry expert. He developed his expertise serving in several Security and Loss Prevention roles during his 35-year career at Wal-Mart Stores, Inc. Steve started his career by leading multiple regions within the Wal-Mart Stores Division. He continued his career leading the Sam’s Club Loss Prevention Division, Wal-Mart Homeland Security, Wal-Mart Security Technology an Global Security Services, a division of Wal-Mart with over 300 team members. Lindsey graduated from Missouri Southern State University with a B.S. in Criminal Justice Administration and holds ASIS International’s Certified Protection Professional Certification.

Lieutenant General Kenneth E. Eickmann

  • Commander, Aeronautical Systems Center, Air Force Materiel Command, Wright-Patterson Air Force Base, Ohio.
  • Leads the Air Force's center of excellence for research, development and acquisition of aircraft, aeronautical equipment and munitions.
  • Manages more than 2,800 programs ranging from basic research to design, development and support of advanced aeronautical systems.
  • Executes an annual budget of more than $11 billion and employs a work force of approximately 12,000 people located at Wright-Patterson Air Force Base and 35 locations worldwide.
  • As the installation's commander he provides operational support for approximately 22,000 people, including personnel from more than 100 operational units collocated on base.
  • General Eickmann has served as principal military adviser to the assistant secretary of the Air Force for research, development, acquisition and logistics
  • He has also served as deputy chief of staff for logistics, Pacific Air Forces; chief of staff, staff director, and, later, director of logistics, Air Force Materiel Command, and commander, Oklahoma City Air Logistics Center, the largest military and industrial complex in the Department of Defense.

PROBLEM

  • Too much data leads to missed insight
  • Many siloed applications trap actionable data preventing automated reactions to events in other systems
  • Existing solutions are post-event analytics
  • Limited attention span results in decreased life-safety and security
  • Static physical security systems are more easily defeated, as bad actors test for vulnerabilities to exploit
  • Pre-AI systems can't improve overtime or evolve as your organization changes or proactively react to prevent bad events

A.I. Based System

Leverage Data From The Entire Ecosystem of Applications

Problem

Many siloed applications trap actionable data that should be used to automate reactions to events in other systems.

  • Some Pre-A.I. Systems Can Aggregate Many Siloed Systems Onto One User Interface But Lack The Ability To Leverage The Data From All The Systems In The Ecosystem

Solution

ReconaSense” A.I. Based Platform Can Take The Data As Inputs From Most Of Your Current Security Infrastructure And Do Much More Than Just A Unified User Interface

  • Automatically Produce Actions Across The Many Systems
  • Produce Smart Alerts Based On Most Of Your Existing and Future Sensor Inputs
  • Leverage your existing infrastructure investment by enabling actions greater than the sum of the parts
  • Proactive Security That Responds To Anomalous Events Before They Unfold

System That Learns & Evolves

Problem

Pre A.I. based systems are static and, thus, more easily defeated as bad actors test for vulnerabilities to exploit and learn your defenses

Solution

Systems that learn and evolve continuously improve your ability to prevent events and increase your speed to react

  • ReconaSense' A.I. Based Platform Evaluates Anomalous Behavior Across Your Ecosystem of Applications and Sensors
  • Reacting Proactively
  • Evolving
  • Outsmarting The Bad Guys
  • Growing Smarter With More Input

Smart cities, smart campuses, and smart enterprises are beginning to roll out internet connected sensors and devices across their environments. This trend will accelerate with the rollout of 5G, enabling the emergence of the Internet Of Things (IOT), where smart devices transmit data and produce actions across the ecosystem.

Built For Now & The Future

Problem

  • Pre-A.I. systems lack the ability to learn from new data inputs.
  • Pre-A.I. based systems are unprepared for the rapidly approaching IOT world of communicating smart devices.
  • Bad actors evolve to take advantage of gaps in existing, static Pre-A.I. based systems.
  • Just as Digital/IP based systems replaced outdated analog systems due to increased requirement of interactive devices, Pre-A.I. based security systems will be replaced overtime with smart, evolving A.I. based platforms like ReconaSense.

Solution

  • ReconaSense' platform is ready for the global rollout of IOT infrastructures and smarter systems.
  • ReconaSense' is built with "AI Inside“, which will feed off all these new data inputs to grow smarter and proactively respond to insider threats
  • ReconaSense' platform will produce "Smart Alerts" that inform of anomalous behavior and enact automated responses from your current and future security systems to prevent harmful activity.

ReconaSense Is happy to help in your transition to the future of physical security.

SOLUTION

Intelligent Security Management

All your security events, analyzed and accessible, in real-time.

  • Open Architecture
  • A.I. Platform for Physical Security
  • Data Normalization
  • Command, Control & Display
  • Native Access Control

10 Industry “Firsts” By ReconaSense (Our Competitive Advantages)

Intelligent management and awareness surrounding personnel movement and activity

Trigger Variables, Rules, Situation Manager & Procedures automate physical compliance across your organization

6

Auto-Comply

Insider

Threat

  • Physical security & HR departments finally have a tool to manage data privacy, as well as corporate and regulatory compliance.
  • Centralized logs and operator audit trails can decrease the length and frequency of compliance audits.
  • With native video analytics providing facial recognition, heat maps and object-detection, an operator’s compliance record is built into the system
  • Learn positive behaviors
  • Find potential vulnerabilities with trends and pattern discovery.
  • Access control is no longer blind beyond the door
  • Integrate with most technologies a user interacts with inside a room or facility
  • Score people based on data inputs to create proactive security responses to anomalous behavior

Secure dynamic, digital and physical distributed environments

Centralized log management allows for reduced investigation times

7

2

  • Collect, index and harness machine data across your security infrastructure in real-time.
  • Think of this as the first security incident and event management (SIEM) solution for physical security.

Accelerated

Forensics

Multi-Vector

Attack

  • Access control & user-behavior analytics (offline and online behaviors) combine to eliminate physical vulnerabilities in your cyber security
  • Transparency between IT & physical security command centers for comprehensive security

Neural Scoring allows automated risk-assessment based on custom thresholds or activity levels of an organization

3

8

  • All events are not equal, so pre-configure logic and stay one step ahead of threats
  • Multiple cognitive techniques combine to allow comprehensive analysis of diverse data in real-time like never before.
  • Monitor the status and movement of assets, in conjunction with people through a single, intuitive interface.
  • Create chain-of-custody applications and audit trails for shared assets to increase accountability throughout the enterprise.

Real-Time

Threat

Assessment

Asset

Protection

Identify trends, abnormalities and correlations across your security operation

Web Services & ETL tools allow disparate sensors, analog or digital, to be managed with a common layer of logic

4

9

Integration &

Analysis Platform

  • Break down the silos and optimize investment in legacy systems across your enterprise with our massively scalable Analytics, Database Management and Integration platform.

Discover

Relationships

  • Optimize workflows and stay one step ahead of chaos.
  • For the first time, detect the quiet before the storm with analytics that monitor both suspicious silences and activities.
  • Whether acting on a hunch or beginning with a clue, now you can provide operators with the analysis tools to stay ahead of threats.

Trigger Variables & Rules allow security departments to detect early warnings, enabling

5

10 

Auto-Detect

Virtual

Expertise

  • Massively scalable, continuous and intelligent monitoring of any security system.
  • Native video analytics provide facial recognition, heat maps and object-detection
  • An operator’s situational awareness and insights on suspicious activity improves exponentially
  • Respond automatically, without required user actions

  • Regardless of operator training or knowledge, your organization can retain the experiences and insights of guards and operators over time and as the system learns you to maintain the highest awareness regardless of new operators.
  • No rookie will ever start from scratch and no security posture will be weakened in the face of personnel churn.

The Threat from Inside

Insider Threat Current tools cannot defend against internal & reactive adversaries

Problem

Description

Force Multiplier

Description

Force Multiplier

Problem

Guards can be part of insider threats, with 41% of insider theft from non-nuclear guarded facilities attributed to guard staff.

Guards

Force

Multiplier

Policy

Ineffectiveness

Organizations normally have competing goals, with security not being the top one, so rules get broken in order to: increase productivity, meet a deadline or avoid inconvenience. Plus, every time someone is rude because a policy says so, they are less likely to get their next promotion.

Increased

Transparency

Never have too much faith in one element of a security system. Defense-in-Depth is only way to make it difficult for insider to overcome all the layers, especially if they are dynamic.

Employees don't always have bad intent, but can find themselves in positions to be leveraged by external threats.

Employees

Coerced

Behavior

Analysis

Integration

Platform

Defense

in-Depth

Most departments worry about natural disasters and accidents, not internal and reactive adversaries, who will observe the security system and adjust plans accordingly.

Behavior

Analysis

Behavior

Analysis

Reactive

Adversary

The insider threat from careless or complacent employees and contractors exceeds the threat from malicious insiders. This is largely because careless insiders often unintentionally help nefarious outsiders

Employees

Careless

Complacency is the principal enemy of Insider Threats. Do not make any assumptions and always be assessing.

Real-Time

Threat

Assessment

Compliance

oriented

Security

Employees don’t always begin employment as a threat

Behavior

Analysis

Employees

Radicalized

What is reconasense?

  • Big Data Framework: Massively scalable architecture for management of diverse security-related data

  • Data Normalization engine (ETL): Collect, index and harness machine data across your security infrastructure in real-time

  • Artificial Neural Network (ANN): Multiple cognitive techniques allowing comprehensive analysis of diverse data and threat assessment across an enterprise
  • *User Behavior Analytics (UBA): Insider Threat & Advanced Multi-Vector Threat

  • Native Access Control (ACS): Insider Threat & Advanced Multi-Vector Threat

PRE AI Platform VS. AI Platform

Case Study

Problem

Solution

Descubre cómo crear presentaciones más dinámicas e interesantes con Prezi