leveraging the e-business suite: oracle crm applications visitor isecurity cyber seminar november...

16
Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green [email protected] Dante Ricci dante .ricci @oracle.com Accelerating continuous improvement for transforming organization

Upload: corey-lang

Post on 13-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Leveraging the e-Business Suite: Oracle CRM Applications

Visitor iSecurity Cyber Seminar

November 21, 2003

Jerry [email protected]

Dante Riccidante.ricci @oracle.com

Accelerating continuous improvement for transforming organization

Page 2: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Agenda

PART I: Visitor iSecurity Solution Overview

Problem Resolution Visitor iSecurity Definition Solution Footprint

PART II: Solution Demo

Page 3: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Problem Resolution – Why do customers need it?

Governing with Accountability

Control Access Post 9-11

Heightened security required for all federal facilities Hundreds of military installations 525,000 Federally owned/leased buildings DOE Labs Intelligence facilities

Allows organizations to track and maintain information on visitors

Personal information, visitation history and visitation purpose

National Security Advisor - Dr. Condoleezza Rice

“Security is a concern of everyone in this county.....”

Page 4: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Visitor iSecurity Solution Definition

Visitor iSecurity:

Base Registration And Visitors Online

A comprehensive, integrated web-based self-service registration and authentication system

Originally designed as a COTS-based access/security solution for military and secure installations

Page 5: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Integrated Registration & Access Business Flow

Facility/Security

All Customer Data & Interactions

stored inVisitor iSecurity

Database

VisitorSubmits

NecessaryForms

SecurityRoutes through

ApprovalProcess

SecuritySets up for ID process

Visitor viewsRegulations,Completes

Forms

Visitor pulls Information off Web

Visitor pulls Information off Web

Security views Information

Security Interacts withCustomer

Visitor engagesWeb Site

Visitor

Page 6: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Visitor iSecurity Solution Strengths

Collects data on ALL visitors

Streamlines the registration process

Different “views” for individuals/separate organizations

Adapts easily for THREATCON Alert Status changes

Enables analysis for trends /patterns

Permits information sharing with other facilities/agencies

Page 7: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Visitor iSecurity Solution Benefits

Increased security at gates/buildings Ease of use (enables self service – eliminates paper-based

credential verification) Permanent electronic records Reduced security costs through standardized processes and

improved issue-resolution process in the field Increased visibility of all visitors & contractors from a local

and/or regional perspective Ability to coordinate with Homeland Defense efforts locally

and nationally Standardization of check in/check out procedures Reduced bottleneck at entry points Increased visitor satisfaction and intelligence gathering through

self-service capabilities

Page 8: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Key questions: How do you currently control access to your installation or facility?

What types of problems do you encounter when authenticating visitors to your installation or building?

Are you able to maintain accurate records on visitor entries and exits?

Do you need to share information with other organizations related to your visitors and their activities at your installation or building?

Customer organizations that are: Responsible for individual or multi-levels of security control

Using paper-based access control systems

With high turnover in security personnel

Customer Organizations Interested in Visitor iSecurity

Page 9: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

• Security Departments• Facilities Mgmt./Planning Depts.• GSA – Public Building Services • Chief of Naval Installations/CNI• Army Installations Mgmt Agency• Air Force Major Commands

Customer organizations most interested in the solution:

• Provost Marshals• Physical Security Officers• Military/Federal Civilian Police Officers• Planning & Administrative Officers• CIOs/CFOs

Who to engage?

Who would utilize a Visitor iSecurity Solution?

Whoever is responsible for managing the guard booths and visitation desks

Page 10: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

iSupportField &MobileService

TeleService

Oracle Portal, Application Server & Database

BackgroundChecks

BackgroundChecks

MultipleVisitor Types

MultipleVisitor Types

AgencyPoints ofContacts

AgencyPoints ofContacts

On-LinePicturesOn-LinePictures

VisitorDemographics

VisitorDemographics

Historical Views

Historical Views

3rd P

arty Wireless

Biom

etric Devices

Visitor iSecurity Solution Footprint

Page 11: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Department of Energy NASA GSA Ft. Sam Houston Ft. Belvoir Ft. Drum Ft. Leavenworth IMA Southwest USAF Electronic Systems Center Walter Reed Army Medical Center

Customer Examples

Page 12: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Visitor iSecurity Summary

Value Proposition

Solution provides more advanced security for access control to installations and buildings required post 911 through an easy to use web-based COTS application that is secure, scalable and configurable to meet individual and organizational needs.

How to build an ROI:

Total Cost Analysis (TCA) * Automation (Offsets manpower reductions, increases productivity)

* Expanded capabilities for issuance of IDs, badges, decals, etc.

Page 13: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

Visitor iSecurity Demo Presentation

Page 14: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

DEMO Flow: BarCode ID Process

Option:Scan bar code

upon exit offacility

Visitor completes registration,submits for

approval via web

Information is uploaded to Provost Marshal’s

console

Note: Mobile MP’s may perform

random scans

Request is routed andapproved by facility

Visitor gets notice of approval,prints vehicle pass

w/barcode

Sentry @ gate authenticateswith portable scanner –Cross

Checks w/State/Federal ID

Page 15: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

DEMO Flow: BioMetric ID ProcessVisitor completes registration,

submits forapproval via web

Information is uploaded to Provost Marshal’s

console

Request is routed andapproved by facility

Visitor gets notice of approval,prints vehicle pass

w/barcode

Reception Center authenticateswith fingerprint scanner –Cross

Checks w/State/Federal ID- creates biometric record

Option: Scan fingerprint upon exit of facility

Page 16: Leveraging the e-Business Suite: Oracle CRM Applications Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci

November 21, 2003

AQ&Q U E S T I O N SA N S W E R S

Visitor iSecurity Author: Jerry Green