1 / 16

Leveraging the e- Business Suite: Oracle CRM Applications

Leveraging the e- Business Suite: Oracle CRM Applications. Accelerating continuous improvement for transforming organization. Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci dante.ricci @oracle.com. Agenda.

zihna
Download Presentation

Leveraging the e- Business Suite: Oracle CRM Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Leveraging the e-Business Suite: Oracle CRM Applications Accelerating continuous improvement for transforming organization Visitor iSecurity Cyber Seminar November 21, 2003 Jerry Green jerry.green@oracle.com Dante Ricci dante.ricci @oracle.com

  2. Agenda • PART I: Visitor iSecurity Solution Overview • Problem Resolution • Visitor iSecurity Definition • Solution Footprint • PART II:Solution Demo

  3. Problem Resolution –Why do customers need it? Governing with Accountability Control Access • Post 9-11 • Heightened security required for all federal facilities • Hundreds of military installations • 525,000 Federally owned/leased buildings • DOE Labs • Intelligence facilities • Allows organizations to track and maintain information on visitors • Personal information, visitation history and visitation purpose “Security is a concern of everyone in this county.....” National Security Advisor - Dr. Condoleezza Rice

  4. Visitor iSecurity Solution Definition • Visitor iSecurity: Base Registration And Visitors Online • A comprehensive, integrated web-based self-service registration and authentication system • Originally designed as a COTS-based access/security solution for military and secure installations

  5. Visitor engages Web Site Visitor pulls Information off Web Visitor views Regulations, Completes Forms Security Sets up for ID process All Customer Data & Interactions stored in Visitor iSecurity Database Visitor Submits Necessary Forms Security Routes through Approval Process Security views Information Security Interacts with Customer Integrated Registration & Access Business Flow Visitor Facility/Security

  6. Visitor iSecuritySolutionStrengths • Collects data on ALL visitors • Streamlines the registration process • Different “views” for individuals/separate organizations • Adapts easily for THREATCON Alert Status changes • Enables analysis for trends /patterns • Permits information sharing with other facilities/agencies

  7. Visitor iSecurity SolutionBenefits • Increased security at gates/buildings • Ease of use (enables self service – eliminates paper-based credential verification) • Permanent electronic records • Reduced security costs through standardized processes and improved issue-resolution process in the field • Increased visibility of all visitors & contractors from a local and/or regional perspective • Ability to coordinate with Homeland Defense efforts locally and nationally • Standardization of check in/check out procedures • Reduced bottleneck at entry points • Increased visitor satisfaction and intelligence gathering through self-service capabilities

  8. Customer Organizations Interested in Visitor iSecurity • Customer organizations that are: • Responsible for individual or multi-levels of security control • Using paper-based access control systems • With high turnover in security personnel • Key questions: • How do you currently control access to your installation or facility? • What types of problems do you encounter when authenticating visitors to your installation or building? • Are you able to maintain accurate records on visitor entries and exits? • Do you need to share information with other organizations related to your visitors and their activities at your installation or building?

  9. Who would utilize a Visitor iSecurity Solution? Customer organizations most interested in the solution: Who to engage? • Security Departments • Facilities Mgmt./Planning Depts. • GSA – Public Building Services • Chief of Naval Installations/CNI • Army Installations Mgmt Agency • Air Force Major Commands • Provost Marshals • Physical Security Officers • Military/Federal Civilian Police Officers • Planning & Administrative Officers • CIOs/CFOs Whoever is responsible for managing the guard booths and visitation desks

  10. Visitor iSecurity Solution Footprint Visitor Demographics Historical Views On-Line Pictures Agency Points of Contacts 3rd Party Wireless Biometric Devices Multiple Visitor Types Background Checks Oracle Portal, Application Server & Database Field & Mobile Service TeleService iSupport

  11. Customer Examples • Department of Energy • NASA • GSA • Ft. Sam Houston • Ft. Belvoir • Ft. Drum • Ft. Leavenworth • IMA Southwest • USAF Electronic Systems Center • Walter Reed Army Medical Center

  12. Visitor iSecurity Summary Value Proposition Solution provides more advanced security for access control to installations and buildings required post 911 through an easy to use web-based COTS application that is secure, scalable and configurable to meet individual and organizational needs. How to build an ROI: • Total Cost Analysis (TCA) * Automation (Offsets manpower reductions, increases productivity) * Expanded capabilities for issuance of IDs, badges, decals, etc.

  13. Visitor iSecurity Demo Presentation

  14. Visitor completes registration, submits for approval via web Request is routed and approved by facility Information is uploaded to Provost Marshal’s console Visitor gets notice of approval, prints vehicle pass w/barcode Sentry @ gate authenticates with portable scanner –Cross Checks w/State/Federal ID DEMO Flow: BarCode ID Process Option: Scan bar code upon exit of facility Note: Mobile MP’s may perform random scans

  15. Visitor completes registration, submits for approval via web Request is routed and approved by facility Information is uploaded to Provost Marshal’s console Reception Center authenticates with fingerprint scanner –Cross Checks w/State/Federal ID - creates biometric record Visitor gets notice of approval, prints vehicle pass w/barcode Option: Scan fingerprint upon exit of facility DEMO Flow: BioMetric ID Process

  16. Q & A Q U E S T I O N S A N S W E R S Visitor iSecurity Author: Jerry Green November 21, 2003

More Related