View Full Size - Tyco Integrated Security

/ SOLUTION SPOTLIGHT /
Identity Management Automation Process (IMAP) Helps Streamline Human Resource
Processes
 MONITORING   |   ACCESS CONTROL   |   VIDEO SURVEILLANCE   |   RFID   |   INTRUSION DETECTION   |   EAS   |   FIRE & LIFE SAFETY   |   ADVANCED ENTERPRISE SERVICES
Tyco Integrated Security, Advanced Services uses a process called, Identity Management Automation
Process (IMAP) to help organizations solve business challenges, improve processes, reduce risk, support ROI
requirements, and bolster operational efficiencies.
An in-house engineer uses the Identity Management Automation Process (IMAP) to design a solution that meets
an organization’s individual needs.
For example, the graphic below shows how IMAP helps integrate disparate personnel systems and information
databases. The new solution requires data entry at only one point. Once entered, the data will automatically
populate across multiple systems – human resources, payroll, time and attendance, contractor verification, point
of sale, vending and other directory systems.
IMAP maintains integrity across all systems, which can help significantly reduce the opportunity for input errors,
improve satisfaction with customers and users, improve workflow, and help reduce risks associated with incorrect
credentialing.
The Tyco
Security
Identity Management
Automation
Process
TheIntegrated
ADT Identity
Management
Automation
Process
3. Records Management
• Issue Credentials
• Update Issue Codes
• Assign Access Rights
Information
Silos
1. Data Feeds
Human Resources
5. Updated Data to Return
Time & Attendance
ADT Integrated
Advanced
Tyco
Integration
Security
Identity
Identity
Enhancement
Enhancement
Framework
Framework
• Information Data Silo Updates
• Activity Reports
• Audit Reports
• Invalid Card Records
• Duplicate Records
• Data Errors
• Rejected Records
4. Retrieve Updates
Access Control
Compliance
Diagnostics
6. Diagnostic Deliverables
• Data Archiving
• Activity Logs
• E-mail Notifications
• Exception Reports
Contractor
Verification
Point-of-Sale/
Vending
Active Directory
2. Process Updates
Silo Administrators
Key Benefits
• Configurable
• Secure
• Workflow Processing
• Increase Data Integrity
• Decrease Manual Data Entry
• Real-Time Data Exchange
• Decrease Paper Handling
Access
Control
Databases
To learn more about Advanced Enterprise Services, call 1.888.446.7781, or visit us at www.tycois.com.
License Information: AL Alabama Electronic Security Board of Licensure, 7956 Vaughn Rd., Montgomery 36116, (334)
264-9388; AK 38381 5520 Lake Otis Pkwy., Anchorage, AK 99507; AR 0030740114 , AR E0055 - Regulated by Arkansas
Bd. of Private Investigators & Private Security Agencies, #1 State Police Plaza Dr., Little Rock 72209, (501) 618-8600; AZ
ROC281489; CA ACO7207, 977249; alarm company operators are licensed and regulated by the Bureau of Security &
Investigative Services, Dept. of Consumer Affairs, Sacramento, CA 95814; DC ECS1327; FL EF20000890, EF20000341,
EF0000478, EF0000950 GA LVA205386, -204776, -205526, LVU001160, -004635; HI CT-32427; IL 127001526; MA 45-C; MI
51032662206311, -4182 Pier North Dr. Ste. D, Flint, MI 48504; MN TS651063; NC 846-CSA - Alarm Systems Licensing Bd.,
1631 Midtown Pl., Ste.104, Raleigh, 27609 (919) 875-3611; NM 375283; NV 0077542; NY 12000305846, Licensed by NYS
Dept. of State; OH E16782, 50-18-1052, 50-25-1050, 50-29-0003, 50-48-1032, 50-50-1019, 50-76-0006, 53-89-1726, 53-311582; OK 67; OR CLE322, 197010; PA Pennsylvania Home Improvement Contractor Registration Number: PA010083; RI
18004, 7059, AF-09170; TN ACC -1704, -1705, -1706, -1707, -1708, -1709, -1710, -1711; TX B00536-140 Heimer Rd. Ste. 100,
San Antonio, TX 78232 – Texas Private Security Bureau, 5805 N. Lamar Blvd, Austin 78752; UT 8390557-6501; VA 11-7584;
11-7573; 11-7582; 11-7587; 11-7580; 11-7575; 11-7591; 11-7589; 11-7578; 2705147765A; WA EC06 TYCOllS886OO, 11824 N
Creek Pkwy. #105, Bothell, WA 98011; WV 050291.
Tyco Integrated Security
Advanced Services
World-Class Physical Security Integration Solutions
Designed to Optimize Your Strategic Approach
MS 15005633
Key Benefits
Compliance
• Risk Mitigation
• Auditable
• Operational Efficiencies
• Automated Identity Management
• Increase Productivity Without
Increasing Operating Costs
•
Security Administrators
© 2013 Tyco. All rights reserved. Tyco and the product names listed above are marks and/or registered marks. Unauthorized use is
strictly prohibited.
LT1115-00
Safer. Smarter. Tyco.™
Stakeholders
World-Class Integration of Physical Security Solutions and Business Applications /
Design / Delivery
/
• Information Silos
• Non-Integrated
• Non-Enterprise
Information Technology
Vision
Physical Security
System Solution Optimization
Future State
Execution/
Delivery
• Compliance
• Business Intelligence
• Situational Awareness
Improve Processes
Im
pl
e
m
Lines of Business
Strategic Approach: Enterprise Process Development Coupled with Enterprise Technology /
Advanced Services’ highly trained staff of sales professionals, project managers, application engineers, network
engineers, CAD designers, fabrication personnel, and installation technicians, help to make our Security-Centric
process work as seamless as possible. Using thorough reviews, accurate designs, best-in-class principles, and
enterprise-class security technologies, we can provide the best results for complex integration challenges.
/
Actionable
Projects
Infrastructure
n
io
at
We have the knowledge and expertise to design enterprise security solutions that help you protect the bottom line
while you grow the top line. Our solutions are currently helping more than 5,000 corporations increase business
intelligence, improve information management processes, increase profitability, and maximize return on investment.
Current State
t
en
em
pl
We are at the forefront of designing, engineering and implementing security solutions that fully integrate with
business applications to target strategic business outcome. By maximizing business applications through seamlessly
integrating physical security solutions into the existing IT infrastructure, we help companies achieve a higher level of
Security-Centric Business Process Optimization (BPO).
Im
Tyco Integrated Security, Advanced Services can help companies with a need to deploy complex, enterprise-wide,
security solutions, increase ROI, optimize deployed business processes, and improve overall profitability. If our goals
sound a little different for a security integrator, they definitely are.
Implement
en
ta
t io
n
/
Strategy / Process Analysis
Project Plan
{
• Timelines
• Risk Mitigation
• Prioritization of
Service or Operations
• Training
Feedback & Continuous
Process Involvement
1-3-5 Year Plan
Security-Centric BPO: Corporate Goals Brought to Realization /
Our highly specialized process begins by understanding a company’s strategic goals. We invite key stakeholders,
both technical and functional leaders, to present their perspectives, challenges, limitations, and concerns with the
BPO improvement plan. Using the gathered information, our team will present cohesive recommendations for
the entire solution, including infrastructure upgrades, physical security solution overlays, and suggested process
modifications. The end-result is a Security-Centric BPO solution that won’t overwhelm IT infrastructures and delivers
measureable results.
Scope of Solutions
Security-Centric
BPO
Business
Applications
Physical Security
Information
Technology
// PHASE 1: DISCOVERY
//
PHASE 2: ROADMAP
Information Technology
// PHASE 1: DISCOVERY
In this critical first step we meet
with key organizational stakeholders
to gain an understanding of the
strategic business objectives,
and challenges, such as cost
management, continuous operational
improvement, and risk mitigation.
In addition, we take inventory of
current technologies and resources,
as well as, review current policies and
procedures.
// PHASE 2: ROADMAP
Business Applications
• Human Resources
• Time & Attendance
• Database
• Information and services
• Reporting
• Compliance
• Auditing
• Reduced Liability
Security-Centric BPO
• System migration planning and
deployment
• Networking infrastructure:
- Design, optimization,
monitoring and deployment
• Network optimization and Monitoring
Services:
- Traffic engineering (QoS)
- Health checks and performance
monitoring
• Diagnostic Services - Remote &
On-Site
• Baseline measurements and
troubleshooting
• Business Continuity/
Resiliency Planning
Physical Security
• Access Control management platforms
• PSIM, integration, and identity platforms
• High-Availability, disaster recovery and
virtual deployments
• Managed and Hosted Services
• IP video and storage technologies
With a holistic approach, we provide
strategic recommendations for an
integrated solution - systems and
technologies. We also:
• Provide suggestions to help
facilitate continuous process
improvement
• Update and/or automate policies and procedures
• Identify systems that may feature dead-end technologies
• Leverage the expertise of the industry’s most experienced team of dedicated IP Solutions professionals
//
PHASE 3: IMPLEMENTATION
// PHASE 3: IMPLEMENTATION
Key components of this phase include, maintaining
project plan timelines, risk mitigation, setting
priorities, and training.
Our Dedicated IP Solutions Group of certified
engineers and technicians, work closely with inhouse IT professionals to design a unique and flexible
framework capable of adapting to business, industry,
and operational changes. Typically our engineers
provide a 1-3-5 year phased implementation plan
to help organizations have more fluid deployments.
The end result is a solution that can drive operational
efficiencies through integration with critical back
office systems, offer competitive differentiation,
generate long term revenue, and provide the lowest
possible long term total cost of ownership.
Our key capabilities and assets include:
•
•
•
•
•
•
•
•
•
Eight global Centers of Excellence (6-US,
1-Canada, 1-global)
More than 300 design and support associates
Highly trained sales team
»» In-house project management,
engineering, CAD design, and fabrication
»» Dedicated IP Solutions Group
»» Breath & depth of capabilities
»» Unparalleled proven experience
»» In-house training personnel and facilities
»» Factory certified technicians
Industry Certifications:
»» 70+ team members certified by
Microsoft®
»» 40+ certified by Cisco with 3 CCIEs
»» 20+ NICET certified at Levels III & IV
Direct relationships with OEM development
teams
Extensive inventory
Online software support, maintenance and
service (available 24/7)
World class monitoring centers, equipped with
state-of-the-art CRM systems (available 24/7)
Department of Homeland Security Safety Act
Certified