leveraging the e-business suite: oracle crm applications visitor isecurity cyber seminar november...
TRANSCRIPT
Leveraging the e-Business Suite: Oracle CRM Applications
Visitor iSecurity Cyber Seminar
November 21, 2003
Jerry [email protected]
Dante Riccidante.ricci @oracle.com
Accelerating continuous improvement for transforming organization
Agenda
PART I: Visitor iSecurity Solution Overview
Problem Resolution Visitor iSecurity Definition Solution Footprint
PART II: Solution Demo
Problem Resolution – Why do customers need it?
Governing with Accountability
Control Access Post 9-11
Heightened security required for all federal facilities Hundreds of military installations 525,000 Federally owned/leased buildings DOE Labs Intelligence facilities
Allows organizations to track and maintain information on visitors
Personal information, visitation history and visitation purpose
National Security Advisor - Dr. Condoleezza Rice
“Security is a concern of everyone in this county.....”
Visitor iSecurity Solution Definition
Visitor iSecurity:
Base Registration And Visitors Online
A comprehensive, integrated web-based self-service registration and authentication system
Originally designed as a COTS-based access/security solution for military and secure installations
Integrated Registration & Access Business Flow
Facility/Security
All Customer Data & Interactions
stored inVisitor iSecurity
Database
VisitorSubmits
NecessaryForms
SecurityRoutes through
ApprovalProcess
SecuritySets up for ID process
Visitor viewsRegulations,Completes
Forms
Visitor pulls Information off Web
Visitor pulls Information off Web
Security views Information
Security Interacts withCustomer
Visitor engagesWeb Site
Visitor
Visitor iSecurity Solution Strengths
Collects data on ALL visitors
Streamlines the registration process
Different “views” for individuals/separate organizations
Adapts easily for THREATCON Alert Status changes
Enables analysis for trends /patterns
Permits information sharing with other facilities/agencies
Visitor iSecurity Solution Benefits
Increased security at gates/buildings Ease of use (enables self service – eliminates paper-based
credential verification) Permanent electronic records Reduced security costs through standardized processes and
improved issue-resolution process in the field Increased visibility of all visitors & contractors from a local
and/or regional perspective Ability to coordinate with Homeland Defense efforts locally
and nationally Standardization of check in/check out procedures Reduced bottleneck at entry points Increased visitor satisfaction and intelligence gathering through
self-service capabilities
Key questions: How do you currently control access to your installation or facility?
What types of problems do you encounter when authenticating visitors to your installation or building?
Are you able to maintain accurate records on visitor entries and exits?
Do you need to share information with other organizations related to your visitors and their activities at your installation or building?
Customer organizations that are: Responsible for individual or multi-levels of security control
Using paper-based access control systems
With high turnover in security personnel
Customer Organizations Interested in Visitor iSecurity
• Security Departments• Facilities Mgmt./Planning Depts.• GSA – Public Building Services • Chief of Naval Installations/CNI• Army Installations Mgmt Agency• Air Force Major Commands
Customer organizations most interested in the solution:
• Provost Marshals• Physical Security Officers• Military/Federal Civilian Police Officers• Planning & Administrative Officers• CIOs/CFOs
Who to engage?
Who would utilize a Visitor iSecurity Solution?
Whoever is responsible for managing the guard booths and visitation desks
iSupportField &MobileService
TeleService
Oracle Portal, Application Server & Database
BackgroundChecks
BackgroundChecks
MultipleVisitor Types
MultipleVisitor Types
AgencyPoints ofContacts
AgencyPoints ofContacts
On-LinePicturesOn-LinePictures
VisitorDemographics
VisitorDemographics
Historical Views
Historical Views
3rd P
arty Wireless
Biom
etric Devices
Visitor iSecurity Solution Footprint
Department of Energy NASA GSA Ft. Sam Houston Ft. Belvoir Ft. Drum Ft. Leavenworth IMA Southwest USAF Electronic Systems Center Walter Reed Army Medical Center
Customer Examples
Visitor iSecurity Summary
Value Proposition
Solution provides more advanced security for access control to installations and buildings required post 911 through an easy to use web-based COTS application that is secure, scalable and configurable to meet individual and organizational needs.
How to build an ROI:
Total Cost Analysis (TCA) * Automation (Offsets manpower reductions, increases productivity)
* Expanded capabilities for issuance of IDs, badges, decals, etc.
Visitor iSecurity Demo Presentation
DEMO Flow: BarCode ID Process
Option:Scan bar code
upon exit offacility
Visitor completes registration,submits for
approval via web
Information is uploaded to Provost Marshal’s
console
Note: Mobile MP’s may perform
random scans
Request is routed andapproved by facility
Visitor gets notice of approval,prints vehicle pass
w/barcode
Sentry @ gate authenticateswith portable scanner –Cross
Checks w/State/Federal ID
DEMO Flow: BioMetric ID ProcessVisitor completes registration,
submits forapproval via web
Information is uploaded to Provost Marshal’s
console
Request is routed andapproved by facility
Visitor gets notice of approval,prints vehicle pass
w/barcode
Reception Center authenticateswith fingerprint scanner –Cross
Checks w/State/Federal ID- creates biometric record
Option: Scan fingerprint upon exit of facility
November 21, 2003
AQ&Q U E S T I O N SA N S W E R S
Visitor iSecurity Author: Jerry Green