Upload
votram
View
214
Download
0
Embed Size (px)
Citation preview
TechnologiesSigNet
Disclosure of Proprietary Data NoticeSigNet Technologies, Inc. (herein “SigNet”) material, which follows,contains information and data which are privileged, confidential, and/orproprietary. This information and data is commercially sensitive and/orfinancial in nature, is not made available for public review, and is providedto the Potential Customer (herein called “Customer”) on a confidentialbasis for business purposes as it relates to potential services to beperformed by SigNet to support business opportunities. The informationcontained herein is protected, among there things, by the Trade SecretsAct, as codified, and is subject to the disclosure restrictions of 18 U.S.C.Sec. 1905 and international agreements, and any improper use,distribution, or reproduction is specifically prohibited. No license or right ofany kind whatsoever is granted to any third party to use the informationcontained herein unless a written agreement exists between SigNet andthe third party who desires access to the information. The informationcontained herein is provided for purposes of review and collaborativedialogue. No other use of the information and data contained herein ispermitted without the express written permission of SigNet. Under nocondition should information contained herein be provided in any mannerwhatsoever to any third party without written permission of SigNet.”
Business OfferingsIntegrated Security& Secure Network Consulting
– What is the requirement, how do you define it?• Threat Development, Vulnerability Analysis/Assessment, Requirements
Definition, Risk Management and Accreditation
• Integrated Systems Design and Planning– Invest here, save time and money in the future!
• Mitigation Strategies, Concepts of Operations, Master Plans– Design for quality instead of having to test for it!• Unbiased design not geared towards specific products
• Systems Integration and Implementation– Quality Program Management = Within Budget, On Time Delivery
• Implementation, Installation, Testing and Final Acceptance– Training and Exercises, Quality Assurance
What do we do?
Security System Integration Electronic Security Systems
Vulnerability/Risk Assessments Multi-System Integrated Planning System and Software Integration System Design and Installation Project/ Program Management System Engineering/ AutoCAD
Drafting Information Technology Program Management and
Development Infrastructure Protection Systems
Quality Assurance Testing, Accreditation and Certification
Physical Cyber Security Service, Maintenance and Sustainment UL 2050 Certification 24/7 Alarm and Video Monitoring Offsite Hosted Access Control Quality Control Planning and
Inspections Needs Analysis and Planning Scalable System Planning Affordable Kit Packages Cloud Hosted Systems
Why Us? What do we offer that’s better? Our value proposition
• Experience– All program leaders have years of proven experience. All employees
are accredited professionals with most continuing higher certification– Engineering, security, IT and administrative certifications include US
top tier industry standards, special trade skill licenses, as well as, those for ISO and EU standards
• Cost– Size and overhead structure enable innovative offerings, flexibility to
accommodate unique relationships and to sustain long-term presence– Vendor neutral technology applications drive best value
• Responsiveness – We’re agile and able to be most anywhere on short notice, stay on the
job and remain without burdensome bureaucracy
• Reputation – Clients like us. We also have excellent relationships with Fortune 200
companies across various market segments. They rely upon us for task performance and recommend our services based on quality, ethics and dependable delivery. We are on time and on budget.
Principles
• Customer Focus– Our intent is completely based upon the customer
needs instead of product capabilities• Unity
– SigNet plays well with everyone in the sand box• No Surprises
– Open, transparent processes, collaborative approach• Efficiency and Integrity
– Lean, Flexible, Responsive
Other Differentiators Organizational Commitment to Excellence
Strive to be recognized nationally as a quality professional management services firm that provides tangible value and solutions to its clients
Maintain a culture that attracts and retains professionals who are dedicated to exceeding our clients’ expectations.
Competitive Rates for Top Notch Performance Small Business UL 2050 Certification Continual Process Improvement
ISO 9001:2008 process utilization Best Industry Practices
Staff Education: BA, BS, Masters and/or PHD Staff Certifications: CPP, PSP, PMP, CISCO, Microsoft, Lenel,
Software House, AMAG, Net+, A+ and ITIL Extensive knowledge of established/evolving regulations,
directives and standards including NIST, UFGS, NEC, NFPA, ADA, ANSI and NISPOM.
IntegratedPortal
Systems
Mobile Systems
Fixed Systems
Rail Systems
Command Center Systems
IntelligentCommerceSystems
IntelligentTrafficControlSystems (Gates & Barriers)
SigNet can make it all fit together and work seamlessly
Technology is Fundamental
Digital Video
Cameras & Imagers
IntegratedIntrusion &
Access ControlSystems
Analytics
SigNet maintains the right relationships and the highest certifications
Value Added Reseller (VAR)
Below is a sample of some of the VAR and/or Dealer relationships that SigNet has
• Recognize the unique nature of a client’s business assets and seek to provide value.
• Allow clients to simultaneously observe complex activities & anomalies across the entire enterprise architecture.
• Indentify multi-purpose capabilities that benefit from a single installation or product.
• Optimize synergies between technology enhancements, process improvement , training and business tools.
Aviation Facilities
Marine Facilities
National Sentiment
Urban Areas
Production Facilities
Business Centers
Integrated Security Systems & Infrastructure Protection for Public and Private Sectors
“We tailor appropriate and effective solutions”
Delivery of Value
“Delivering Security
Solutions that satisfy
requirements”
• Airports• Seaports• Power generation and
utilities distribution• General People’s
Committee properties• Diplomatic facilities• Hospitals and Medical
Parks
• Transport• Borders and Customs• Commercial/ Industrial• Schools and Universities• Religious centers• Public venues• Pharmaceutical facilities
Client’s Expanding Capacity“Modern Planning
Methodology requires discipline”
• Engineering– Experience in all related disciplines to
evaluate, re-design and re-align enterprise-scale port security with traditional IT, civil and systems engineering approaches
– ISO and industry certified processes
– Capabilities-based assessments and common approach to systems engineering that ensure functional business requirements and operations (both port and security) are collaborative within functional system architectures
• Safety and Security– Seasoned practioneers of AIS,
waterside and landside security applying US, ISPS and EU standards
Plausible Team Contributions
• Protection Capabilities
– Top-tier intelligent & certified security-related equipment, systems and data management tools
– Applying Innovative sensor management & control technology
– Integration of solutions with Customs to ensure integrity of secure commerce
The Physical Side of Cyber SecurityDefense-In-Depth Model
• The growing stress on authorities to make security choices that impact revenue
• Common attributes and dependencies across the entire enterprise or facility
• Use of intelligent systems that improve mission performance
• Dedicated time need to define clear requirements
Revenue versus Security and ITSolutions must be responsive
Complexity of the Environment and
Requirements
Limitations and capabilities of
available resources
The challenge is understanding and anticipating the range of potential
events, and the capabilities to respond to those events, while working through an optimum balance between levels of
manageable risk and acceptable response requirements
In determining solutions that influence security and IT it is
important to fully appreciate…
balance
Common Assessment Framework“Essential to understand Horizontal and Vertical Activities”
Develop Guidance/TOR
for Analysis
DecomposeCapabilities
Develop Activity Models
Assessment of
Capabilities
Develop Advocacy Strategy
Identify Shortfalls &
Robust Capability
Prioritize Shortfalls
Assess Potential
Courses of Action
Functional Area Analysis – “What
needs to be done?”
Functional Needs Analysis – “How
well do we perform?”
Functional Solutions
Analysis—“How best to
improve”
Qualitative and Quantitative Assessments
SigNet’s analytic tools and capabilities-based methodologies provide the framework to identify cost benefits & operational efficiencies of technology
enhancements within design-build and modernization programs
Activities
Acce
ss C
ontro
l
Asse
t Pro
tect
ion
Vide
o Su
rvei
llanc
e
Secu
rity
& In
cide
ntM
anag
emen
t
Com
man
d C
ontro
l
Life
Saf
ety
Inte
grat
ed S
yste
ms
Traf
fic F
low
& C
ontro
l
Intru
sion
Det
ectio
n
Guards & System Operators
Operations & Facilities
Tenants and Businesses
Organization & Structure
Business Actions & Budgets
Community and Visitation
Critical Infrastructure
Shipping & Freight Receiving
Focal Point on Efforts
“Many variables affect the integrity of Integrated Security and Information Technology efforts. There really isn’t a single, one-size-fits-all fully integrated solution. It requires a thoughtful, mobile and
innovative approach. SigNet is the remedy. We are very innovative, diverse and agile which allows us to grow with the programs in which
we perform on.” • At SigNet we know business and we know physical, electronic and IT
security operations as well as the implications of decisions that must be considered in making choices
• At SigNet we focus on real requirements using proven guidelines and unified scope
• At SigNet we collaborate with industry partners to build client confidence and develop reliability that drives increased performance.
SigNet
Contact Information
Phone: (240) 264-3295 | Fax: (240) 264-3296 | Website: www.signetinc.com