/ SOLUTION SPOTLIGHT / Identity Management Automation Process (IMAP) Helps Streamline Human Resource Processes MONITORING | ACCESS CONTROL | VIDEO SURVEILLANCE | RFID | INTRUSION DETECTION | EAS | FIRE & LIFE SAFETY | ADVANCED ENTERPRISE SERVICES Tyco Integrated Security, Advanced Services uses a process called, Identity Management Automation Process (IMAP) to help organizations solve business challenges, improve processes, reduce risk, support ROI requirements, and bolster operational efficiencies. An in-house engineer uses the Identity Management Automation Process (IMAP) to design a solution that meets an organization’s individual needs. For example, the graphic below shows how IMAP helps integrate disparate personnel systems and information databases. The new solution requires data entry at only one point. Once entered, the data will automatically populate across multiple systems – human resources, payroll, time and attendance, contractor verification, point of sale, vending and other directory systems. IMAP maintains integrity across all systems, which can help significantly reduce the opportunity for input errors, improve satisfaction with customers and users, improve workflow, and help reduce risks associated with incorrect credentialing. The Tyco Security Identity Management Automation Process TheIntegrated ADT Identity Management Automation Process 3. Records Management • Issue Credentials • Update Issue Codes • Assign Access Rights Information Silos 1. Data Feeds Human Resources 5. Updated Data to Return Time & Attendance ADT Integrated Advanced Tyco Integration Security Identity Identity Enhancement Enhancement Framework Framework • Information Data Silo Updates • Activity Reports • Audit Reports • Invalid Card Records • Duplicate Records • Data Errors • Rejected Records 4. Retrieve Updates Access Control Compliance Diagnostics 6. Diagnostic Deliverables • Data Archiving • Activity Logs • E-mail Notifications • Exception Reports Contractor Verification Point-of-Sale/ Vending Active Directory 2. Process Updates Silo Administrators Key Benefits • Configurable • Secure • Workflow Processing • Increase Data Integrity • Decrease Manual Data Entry • Real-Time Data Exchange • Decrease Paper Handling Access Control Databases To learn more about Advanced Enterprise Services, call 1.888.446.7781, or visit us at www.tycois.com. License Information: AL Alabama Electronic Security Board of Licensure, 7956 Vaughn Rd., Montgomery 36116, (334) 264-9388; AK 38381 5520 Lake Otis Pkwy., Anchorage, AK 99507; AR 0030740114 , AR E0055 - Regulated by Arkansas Bd. of Private Investigators & Private Security Agencies, #1 State Police Plaza Dr., Little Rock 72209, (501) 618-8600; AZ ROC281489; CA ACO7207, 977249; alarm company operators are licensed and regulated by the Bureau of Security & Investigative Services, Dept. of Consumer Affairs, Sacramento, CA 95814; DC ECS1327; FL EF20000890, EF20000341, EF0000478, EF0000950 GA LVA205386, -204776, -205526, LVU001160, -004635; HI CT-32427; IL 127001526; MA 45-C; MI 51032662206311, -4182 Pier North Dr. Ste. D, Flint, MI 48504; MN TS651063; NC 846-CSA - Alarm Systems Licensing Bd., 1631 Midtown Pl., Ste.104, Raleigh, 27609 (919) 875-3611; NM 375283; NV 0077542; NY 12000305846, Licensed by NYS Dept. of State; OH E16782, 50-18-1052, 50-25-1050, 50-29-0003, 50-48-1032, 50-50-1019, 50-76-0006, 53-89-1726, 53-311582; OK 67; OR CLE322, 197010; PA Pennsylvania Home Improvement Contractor Registration Number: PA010083; RI 18004, 7059, AF-09170; TN ACC -1704, -1705, -1706, -1707, -1708, -1709, -1710, -1711; TX B00536-140 Heimer Rd. Ste. 100, San Antonio, TX 78232 – Texas Private Security Bureau, 5805 N. Lamar Blvd, Austin 78752; UT 8390557-6501; VA 11-7584; 11-7573; 11-7582; 11-7587; 11-7580; 11-7575; 11-7591; 11-7589; 11-7578; 2705147765A; WA EC06 TYCOllS886OO, 11824 N Creek Pkwy. #105, Bothell, WA 98011; WV 050291. Tyco Integrated Security Advanced Services World-Class Physical Security Integration Solutions Designed to Optimize Your Strategic Approach MS 15005633 Key Benefits Compliance • Risk Mitigation • Auditable • Operational Efficiencies • Automated Identity Management • Increase Productivity Without Increasing Operating Costs • Security Administrators © 2013 Tyco. All rights reserved. Tyco and the product names listed above are marks and/or registered marks. Unauthorized use is strictly prohibited. LT1115-00 Safer. Smarter. Tyco.™ Stakeholders World-Class Integration of Physical Security Solutions and Business Applications / Design / Delivery / • Information Silos • Non-Integrated • Non-Enterprise Information Technology Vision Physical Security System Solution Optimization Future State Execution/ Delivery • Compliance • Business Intelligence • Situational Awareness Improve Processes Im pl e m Lines of Business Strategic Approach: Enterprise Process Development Coupled with Enterprise Technology / Advanced Services’ highly trained staff of sales professionals, project managers, application engineers, network engineers, CAD designers, fabrication personnel, and installation technicians, help to make our Security-Centric process work as seamless as possible. Using thorough reviews, accurate designs, best-in-class principles, and enterprise-class security technologies, we can provide the best results for complex integration challenges. / Actionable Projects Infrastructure n io at We have the knowledge and expertise to design enterprise security solutions that help you protect the bottom line while you grow the top line. Our solutions are currently helping more than 5,000 corporations increase business intelligence, improve information management processes, increase profitability, and maximize return on investment. Current State t en em pl We are at the forefront of designing, engineering and implementing security solutions that fully integrate with business applications to target strategic business outcome. By maximizing business applications through seamlessly integrating physical security solutions into the existing IT infrastructure, we help companies achieve a higher level of Security-Centric Business Process Optimization (BPO). Im Tyco Integrated Security, Advanced Services can help companies with a need to deploy complex, enterprise-wide, security solutions, increase ROI, optimize deployed business processes, and improve overall profitability. If our goals sound a little different for a security integrator, they definitely are. Implement en ta t io n / Strategy / Process Analysis Project Plan { • Timelines • Risk Mitigation • Prioritization of Service or Operations • Training Feedback & Continuous Process Involvement 1-3-5 Year Plan Security-Centric BPO: Corporate Goals Brought to Realization / Our highly specialized process begins by understanding a company’s strategic goals. We invite key stakeholders, both technical and functional leaders, to present their perspectives, challenges, limitations, and concerns with the BPO improvement plan. Using the gathered information, our team will present cohesive recommendations for the entire solution, including infrastructure upgrades, physical security solution overlays, and suggested process modifications. The end-result is a Security-Centric BPO solution that won’t overwhelm IT infrastructures and delivers measureable results. Scope of Solutions Security-Centric BPO Business Applications Physical Security Information Technology // PHASE 1: DISCOVERY // PHASE 2: ROADMAP Information Technology // PHASE 1: DISCOVERY In this critical first step we meet with key organizational stakeholders to gain an understanding of the strategic business objectives, and challenges, such as cost management, continuous operational improvement, and risk mitigation. In addition, we take inventory of current technologies and resources, as well as, review current policies and procedures. // PHASE 2: ROADMAP Business Applications • Human Resources • Time & Attendance • Database • Information and services • Reporting • Compliance • Auditing • Reduced Liability Security-Centric BPO • System migration planning and deployment • Networking infrastructure: - Design, optimization, monitoring and deployment • Network optimization and Monitoring Services: - Traffic engineering (QoS) - Health checks and performance monitoring • Diagnostic Services - Remote & On-Site • Baseline measurements and troubleshooting • Business Continuity/ Resiliency Planning Physical Security • Access Control management platforms • PSIM, integration, and identity platforms • High-Availability, disaster recovery and virtual deployments • Managed and Hosted Services • IP video and storage technologies With a holistic approach, we provide strategic recommendations for an integrated solution - systems and technologies. We also: • Provide suggestions to help facilitate continuous process improvement • Update and/or automate policies and procedures • Identify systems that may feature dead-end technologies • Leverage the expertise of the industry’s most experienced team of dedicated IP Solutions professionals // PHASE 3: IMPLEMENTATION // PHASE 3: IMPLEMENTATION Key components of this phase include, maintaining project plan timelines, risk mitigation, setting priorities, and training. Our Dedicated IP Solutions Group of certified engineers and technicians, work closely with inhouse IT professionals to design a unique and flexible framework capable of adapting to business, industry, and operational changes. Typically our engineers provide a 1-3-5 year phased implementation plan to help organizations have more fluid deployments. The end result is a solution that can drive operational efficiencies through integration with critical back office systems, offer competitive differentiation, generate long term revenue, and provide the lowest possible long term total cost of ownership. Our key capabilities and assets include: • • • • • • • • • Eight global Centers of Excellence (6-US, 1-Canada, 1-global) More than 300 design and support associates Highly trained sales team »» In-house project management, engineering, CAD design, and fabrication »» Dedicated IP Solutions Group »» Breath & depth of capabilities »» Unparalleled proven experience »» In-house training personnel and facilities »» Factory certified technicians Industry Certifications: »» 70+ team members certified by Microsoft® »» 40+ certified by Cisco with 3 CCIEs »» 20+ NICET certified at Levels III & IV Direct relationships with OEM development teams Extensive inventory Online software support, maintenance and service (available 24/7) World class monitoring centers, equipped with state-of-the-art CRM systems (available 24/7) Department of Homeland Security Safety Act Certified