DELIVERING OUTCOMES RICK PINA Chief Technology Advisor, Public - - PowerPoint PPT Presentation

delivering outcomes
SMART_READER_LITE
LIVE PREVIEW

DELIVERING OUTCOMES RICK PINA Chief Technology Advisor, Public - - PowerPoint PPT Presentation

DELIVERING OUTCOMES RICK PINA Chief Technology Advisor, Public Sector Commanders Risk Reduction Dashboard (CRRD) Soldier Safety Helping Leaders Identify Individual Soldiers Risk For Suicide Similar Use Case Study: Student Safety


slide-1
SLIDE 1

DELIVERING OUTCOMES

RICK PINA Chief Technology Advisor, Public Sector

slide-2
SLIDE 2

Commander’s Risk Reduction Dashboard (CRRD) – Soldier Safety

Helping Leaders Identify Individual Soldiers’ Risk For Suicide

slide-3
SLIDE 3

Similar Use Case Study: Student Safety

Student Safety Goes Beyond Physical Security MENTAL HEALTH Is Critical

Indicators of At-Risk Students:

  • Drastic changes in behavior
  • Missing classes/assignments
  • Missing meals
  • Data can be captured, analyzed, presented

and actioned

slide-4
SLIDE 4

Mobile Field Kit (MFK) and Similar Use Case Study: Campus Security

Sensor Integration:

  • Realtime SA of multiple sensors
  • Integrating sensor data
  • Processing and analyzing large data sets
  • Campus Safety Dashboard can be powered

by Splunk

  • Part of the overall solution have to be

integrated with Splunk

slide-5
SLIDE 5

Defending The Nation

We Owe Them a Global, Always-On, Secure Network with Reliable Data

  • Our young men/women are ready

TODAY

  • They can deploy anywhere in the world…
  • At a moments notice…
  • Into austere environments…
  • May need to fight upon arrival…
slide-6
SLIDE 6

ENDPOINT SECURITY ARCHITECTURE

OUR APPROACH

CONTINUOUS COMPLIANCE

Endpoint protection must be integrated into the rest of an organization’s security platform for maximum effectiveness.

OPERATORS DECISION MAKERS

ENDPOINT PROTECTION DATA CORRELATION & ANALYTICS

MANAGEMENT PLATFORM

AUTOMATION & ORCHESTRATION FORCE MULTIPLIER PRESENTATION

WWT’s approach to architecture development is comprised of five pillars

When properly combined, these pillars act as force multipliers, resulting in an integrated endpoint security architecture that embodies a full end-to-end security platform, rather than stove-piped or point solutions.

slide-7
SLIDE 7

Network Infrastructure Data Analytics Systems Management Endpoint Protection Mobile Device Management Threat Intelligence Deception Cloud Security Network Segmentation

SECURITY ARCHITECTURE

EXPANDED SCOPE

Automation

slide-8
SLIDE 8

Amazing Use Cases for the Best Customers in the World!

Network Security Physical Security Student Safety Solider Safety

slide-9
SLIDE 9