delivering outcomes
play

DELIVERING OUTCOMES RICK PINA Chief Technology Advisor, Public - PowerPoint PPT Presentation

DELIVERING OUTCOMES RICK PINA Chief Technology Advisor, Public Sector Commanders Risk Reduction Dashboard (CRRD) Soldier Safety Helping Leaders Identify Individual Soldiers Risk For Suicide Similar Use Case Study: Student Safety


  1. DELIVERING OUTCOMES RICK PINA Chief Technology Advisor, Public Sector

  2. Commander’s Risk Reduction Dashboard (CRRD) – Soldier Safety Helping Leaders Identify Individual Soldiers’ Risk For Suicide

  3. Similar Use Case Study: Student Safety Indicators of At-Risk Students: • Drastic changes in behavior • Missing classes/assignments • Missing meals • Data can be captured, analyzed, presented and actioned Student Safety Goes Beyond Physical Security MENTAL HEALTH Is Critical

  4. Mobile Field Kit (MFK) and Similar Use Case Study: Campus Security Sensor Integration: • Realtime SA of multiple sensors • Integrating sensor data • Processing and analyzing large data sets • Campus Safety Dashboard can be powered by Splunk • Part of the overall solution have to be integrated with Splunk

  5. Defending The Nation • Our young men/women are ready TODAY • They can deploy anywhere in the world… • At a moments notice… • Into austere environments… • May need to fight upon arrival… We Owe Them a Global, Always-On, Secure Network with Reliable Data

  6. ENDPOINT SECURITY ARCHITECTURE OUR APPROACH OPERATORS DECISION MAKERS CONTINUOUS ENDPOINT COMPLIANCE PROTECTION PRESENTATION FORCE MANAGEMENT MULTIPLIER Endpoint protection must DATA CORRELATION PLATFORM & ANALYTICS be integrated into the AUTOMATION & rest of an organization’s ORCHESTRATION security platform for maximum effectiveness. WWT’s approach to architecture development is comprised of five pillars When properly combined, these pillars act as force multipliers, resulting in an integrated endpoint security architecture that embodies a full end-to-end security platform, rather than stove-piped or point solutions.

  7. SECURITY ARCHITECTURE EXPANDED SCOPE Endpoint Protection Threat Intelligence Deception Automation Systems Management Network Infrastructure Cloud Security Data Analytics Network Segmentation Mobile Device Management

  8. Solider Safety Physical Security Amazing Use Cases for the Best Customers in the World! Student Safety Network Security

Recommend


More recommend