tyco integrated security advanced services

2
© 2013 Tyco. All rights reserved. Tyco and the product names listed above are marks and/or registered marks. Unauthorized use is strictly prohibited. Tyco Integrated Security Advanced Services World-Class Physical Security Integration Solutions Designed to Optimize Your Strategic Approach MONITORING | ACCESS CONTROL | VIDEO SURVEILLANCE | RFID | INTRUSION DETECTION | EAS | FIRE & LIFE SAFETY | ADVANCED ENTERPRISE SERVICES Safer. Smarter. Tyco. / SOLUTION SPOTLIGHT / Identity Management Automation Process (IMAP) Helps Streamline Human Resource Processes Tyco Integrated Security, Advanced Services uses a process called, Identity Management Automation Process (IMAP) to help organizations solve business challenges, improve processes, reduce risk, support ROI requirements, and bolster operational efficiencies. An in-house engineer uses the Identity Management Automation Process (IMAP) to design a solution that meets an organization’s individual needs. For example, the graphic below shows how IMAP helps integrate disparate personnel systems and information databases. The new solution requires data entry at only one point. Once entered, the data will automatically populate across multiple systems – human resources, payroll, time and attendance, contractor verification, point of sale, vending and other directory systems. IMAP maintains integrity across all systems, which can help significantly reduce the opportunity for input errors, improve satisfaction with customers and users, improve workflow, and help reduce risks associated with incorrect credentialing. To learn more about Advanced Enterprise Services, call 1.888.446.7781, or visit us at www.tycois.com. License Information: AL Alabama Electronic Security Board of Licensure, 7956 Vaughn Rd., Montgomery 36116, (334) 264-9388; AK 38381 5520 Lake Otis Pkwy., Anchorage, AK 99507; AR 0030740114 , AR E0055 - Regulated by Arkansas Bd. of Private Investigators & Private Security Agencies, #1 State Police Plaza Dr., Little Rock 72209, (501) 618-8600; AZ ROC281489; CA ACO7207, 977249; alarm company operators are licensed and regulated by the Bureau of Security & Investigative Services, Dept. of Consumer Affairs, Sacramento, CA 95814; DC ECS1327; FL EF20000890, EF20000341, EF0000478, EF0000950 GA LVA205386, -204776, -205526, LVU001160, -004635; HI CT-32427; IL 127001526; MA 45-C; MI 51032662206311, -4182 Pier North Dr. Ste. D, Flint, MI 48504; MNTS651063; NC 846-CSA - Alarm Systems Licensing Bd., 1631 Midtown Pl., Ste.104, Raleigh, 27609 (919) 875-3611; NM 375283; NV 0077542; NY 12000305846, Licensed by NYS Dept. of State; OH E16782, 50-18-1052, 50-25-1050, 50-29-0003, 50-48-1032, 50-50-1019, 50-76-0006, 53-89-1726, 53-31- 1582; OK 67; OR CLE322, 197010; PA Pennsylvania Home Improvement Contractor Registration Number: PA010083; RI 18004, 7059, AF-09170; TN ACC -1704, -1705, -1706, -1707, -1708, -1709, -1710, -1711; TX B00536-140 Heimer Rd. Ste. 100, San Antonio, TX 78232 – Texas Private Security Bureau, 5805 N. Lamar Blvd, Austin 78752; UT 8390557-6501; VA 11-7584; 11-7573; 11-7582; 11-7587; 11-7580; 11-7575; 11-7591; 11-7589; 11-7578; 2705147765A; WA EC06 TYCOllS886OO, 11824 N Creek Pkwy. #105, Bothell, WA 98011; WV 050291. MS 15005633 • Information Data Silo Updates • Activity Reports • Audit Reports • Invalid Card Records • Duplicate Records • Data Errors • Rejected Records • Issue Credentials • Update Issue Codes • Assign Access Rights Access Control Databases Access Control Compliance Diagnostics • Data Archiving • Activity Logs • E-mail Notifications • Exception Reports 1. Data Feeds 5. Updated Data to Return 2. Process Updates 4. Retrieve Updates Key Benefits Configurable Secure Workflow Processing Increase Data Integrity Decrease Manual Data Entry Real-Time Data Exchange Decrease Paper Handling Key Benefits Compliance Risk Mitigation Auditable Operational Efficiencies Automated Identity Management Increase Productivity Without Increasing Operating Costs 3. Records Management 6. Diagnostic Deliverables Information Silos Contractor Verification Point-of-Sale/ Vending Active Directory Time & Attendance Human Resources Silo Administrators Security Administrators ADT Advanced Integration Identity Enhancement Framework The ADT Identity Management Automation Process The Tyco Integrated Security Identity Management Automation Process Tyco Integrated Security Identity Enhancement Framework LT1115-00

Upload: others

Post on 14-Nov-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tyco Integrated Security Advanced Services

© 2013 Tyco. All rights reserved. Tyco and the product names listed above are marks and/or registered marks. Unauthorized use is strictly prohibited.

Tyco Integrated Security

Advanced Services

World-Class Physical Security Integration Solutions Designed to Optimize Your Strategic Approach

MONITORING | ACCESS CONTROL | VIDEO SURVEILLANCE | RFID | INTRUSION DETECTION | EAS | FIRE & LIFE SAFETY | ADVANCED ENTERPRISE SERVICES

Safer. Smarter. Tyco.™

/ SOLUTION SPOTLIGHT /

Identity Management Automation Process (IMAP) Helps Streamline Human Resource Processes

Tyco Integrated Security, Advanced Services uses a process called, Identity Management Automation Process (IMAP) to help organizations solve business challenges, improve processes, reduce risk, support ROI requirements, and bolster operational efficiencies.

An in-house engineer uses the Identity Management Automation Process (IMAP) to design a solution that meets an organization’s individual needs.

For example, the graphic below shows how IMAP helps integrate disparate personnel systems and information databases. The new solution requires data entry at only one point. Once entered, the data will automatically populate across multiple systems – human resources, payroll, time and attendance, contractor verification, point of sale, vending and other directory systems.

IMAP maintains integrity across all systems, which can help significantly reduce the opportunity for input errors, improve satisfaction with customers and users, improve workflow, and help reduce risks associated with incorrect credentialing.

To learn more about Advanced Enterprise Services, call 1.888.446.7781, or visit us at www.tycois.com.

License Information: AL Alabama Electronic Security Board of Licensure, 7956 Vaughn Rd., Montgomery 36116, (334)

264-9388; AK 38381 5520 Lake Otis Pkwy., Anchorage, AK 99507; AR 0030740114 , AR E0055 - Regulated by Arkansas

Bd. of Private Investigators & Private Security Agencies, #1 State Police Plaza Dr., Little Rock 72209, (501) 618-8600; AZ

ROC281489; CA ACO7207, 977249; alarm company operators are licensed and regulated by the Bureau of Security &

Investigative Services, Dept. of Consumer Affairs, Sacramento, CA 95814; DC ECS1327; FL EF20000890, EF20000341,

EF0000478, EF0000950 GA LVA205386, -204776, -205526, LVU001160, -004635; HI CT-32427; IL 127001526; MA 45-C; MI

51032662206311, -4182 Pier North Dr. Ste. D, Flint, MI 48504; MN TS651063; NC 846-CSA - Alarm Systems Licensing Bd.,

1631 Midtown Pl., Ste.104, Raleigh, 27609 (919) 875-3611; NM 375283; NV 0077542; NY 12000305846, Licensed by NYS

Dept. of State; OH E16782, 50-18-1052, 50-25-1050, 50-29-0003, 50-48-1032, 50-50-1019, 50-76-0006, 53-89-1726, 53-31-

1582; OK 67; OR CLE322, 197010; PA Pennsylvania Home Improvement Contractor Registration Number: PA010083; RI

18004, 7059, AF-09170; TN ACC -1704, -1705, -1706, -1707, -1708, -1709, -1710, -1711; TX B00536-140 Heimer Rd. Ste. 100,

San Antonio, TX 78232 – Texas Private Security Bureau, 5805 N. Lamar Blvd, Austin 78752; UT 8390557-6501; VA 11-7584;

11-7573; 11-7582; 11-7587; 11-7580; 11-7575; 11-7591; 11-7589; 11-7578; 2705147765A; WA EC06 TYCOllS886OO, 11824 N

Creek Pkwy. #105, Bothell, WA 98011; WV 050291.

MS 15005633

• Information Data Silo Updates• Activity Reports• Audit Reports• Invalid Card Records• Duplicate Records• Data Errors• Rejected Records

• Issue Credentials• Update Issue Codes• Assign Access Rights

AccessControl

Databases

Access Control Compliance Diagnostics• Data Archiving• Activity Logs• E-mail Notifications• Exception Reports

1. Data Feeds

5. Updated Data to Return

2. Process Updates

4. Retrieve Updates

Key Benefits• Configurable• Secure• Workflow Processing• Increase Data Integrity• Decrease Manual Data Entry• Real-Time Data Exchange• Decrease Paper Handling

Key Benefits• Compliance• Risk Mitigation• Auditable• Operational Efficiencies• Automated Identity Management• Increase Productivity Without Increasing Operating Costs

3. Records Management

6. Diagnostic Deliverables

InformationSilos

ContractorVerification

Point-of-Sale/Vending

Active Directory

Time & Attendance

Human Resources

Silo Administrators Security Administrators

ADT Advanced Integration

Identity Enhancement

Framework

The ADT Identity Management Automation ProcessThe Tyco Integrated Security Identity Management Automation Process

Tyco Integrated Security Identity

Enhancement Framework

LT1115-00

Page 2: Tyco Integrated Security Advanced Services

// PHASE 1: DISCOVERY

In this critical first step we meet with key organizational stakeholders to gain an understanding of the strategic business objectives, and challenges, such as cost management, continuous operational improvement, and risk mitigation. In addition, we take inventory of current technologies and resources, as well as, review current policies and procedures.

// PHASE 2: ROADMAP

With a holistic approach, we provide strategic recommendations for an integrated solution - systems and technologies. We also:

• Provide suggestions to help facilitate continuous process improvement

• Update and/or automate policies and procedures• Identify systems that may feature dead-end technologies• Leverage the expertise of the industry’s most experienced team of dedicated IP Solutions professionals

/ World-Class Integration of Physical Security Solutions and Business Applications / Tyco Integrated Security, Advanced Services can help companies with a need to deploy complex, enterprise-wide, security solutions, increase ROI, optimize deployed business processes, and improve overall profitability. If our goals sound a little different for a security integrator, they definitely are.

We are at the forefront of designing, engineering and implementing security solutions that fully integrate with business applications to target strategic business outcome. By maximizing business applications through seamlessly integrating physical security solutions into the existing IT infrastructure, we help companies achieve a higher level of Security-Centric Business Process Optimization (BPO).

We have the knowledge and expertise to design enterprise security solutions that help you protect the bottom line while you grow the top line. Our solutions are currently helping more than 5,000 corporations increase business intelligence, improve information management processes, increase profitability, and maximize return on investment.

/ Strategic Approach: Enterprise Process Development Coupled with Enterprise Technology /Advanced Services’ highly trained staff of sales professionals, project managers, application engineers, network engineers, CAD designers, fabrication personnel, and installation technicians, help to make our Security-Centric process work as seamless as possible. Using thorough reviews, accurate designs, best-in-class principles, and enterprise-class security technologies, we can provide the best results for complex integration challenges.

/ Security-Centric BPO: Corporate Goals Brought to Realization /Our highly specialized process begins by understanding a company’s strategic goals. We invite key stakeholders, both technical and functional leaders, to present their perspectives, challenges, limitations, and concerns with the BPO improvement plan. Using the gathered information, our team will present cohesive recommendations for the entire solution, including infrastructure upgrades, physical security solution overlays, and suggested process modifications. The end-result is a Security-Centric BPO solution that won’t overwhelm IT infrastructures and delivers measureable results.

// PHASE 3: IMPLEMENTATION

Key components of this phase include, maintaining project plan timelines, risk mitigation, setting priorities, and training.

Our Dedicated IP Solutions Group of certified engineers and technicians, work closely with in-house IT professionals to design a unique and flexible framework capable of adapting to business, industry, and operational changes. Typically our engineers provide a 1-3-5 year phased implementation plan to help organizations have more fluid deployments. The end result is a solution that can drive operational efficiencies through integration with critical back office systems, offer competitive differentiation, generate long term revenue, and provide the lowest possible long term total cost of ownership.

• Human Resources• Time & Attendance• Database • Information and services • Reporting• Compliance• Auditing• Reduced Liability

• Access Control management platforms• PSIM, integration, and identity platforms • High-Availability, disaster recovery and virtual deployments• Managed and Hosted Services• IP video and storage technologies

Security-Centric BPO

Physical Security

• System migration planning and deployment• Networking infrastructure: - Design, optimization, monitoring and deployment• Network optimization and Monitoring Services: - Traffic engineering (QoS) - Health checks and performance monitoring • Diagnostic Services - Remote & On-Site • Baseline measurements and troubleshooting • Business Continuity/ Resiliency Planning

Information Technology

Business Applications

Our key capabilities and assets include:

• Eight global Centers of Excellence (6-US, 1-Canada, 1-global)

• More than 300 design and support associates• Highly trained sales team

» In-house project management, engineering, CAD design, and fabrication

» Dedicated IP Solutions Group » Breath & depth of capabilities » Unparalleled proven experience

» In-house training personnel and facilities » Factory certified technicians

• Industry Certifications: » 70+ team members certified by

Microsoft® » 40+ certified by Cisco with 3 CCIEs » 20+ NICET certified at Levels III & IV

• Direct relationships with OEM development teams

• Extensive inventory• Online software support, maintenance and

service (available 24/7) • World class monitoring centers, equipped with

state-of-the-art CRM systems (available 24/7)• Department of Homeland Security Safety Act

Certified

Security-CentricBPO

Physical Security

InformationTechnology

BusinessApplications

Infrastructure

System Solution Optimization

Improve Processes

Future State

Stakeholders

Strategy / Process Analysis

Design / Delivery

ActionableProjects

Implem

entation

Imple

men

tatio

n

Project Plan

Implement

Execution/Delivery

Vision

Information Technology

Physical Security

Lines of Business

Current State

// PHASE 1: DISCOVERY // PHASE 2: ROADMAP // PHASE 3: IMPLEMENTATION

{ • Timelines • Risk Mitigation • Prioritization of Service or Operations • Training

• Compliance• Business Intelligence• Situational Awareness

• Information Silos• Non-Integrated• Non-Enterprise

Feedback & ContinuousProcess Involvement1-3-5 Year Plan

Scope of Solutions