Compliance, Safety, and Security

Ensures security and compliance with plans, rules, regulations, laws, and standards.
Pains

• Outmoded security methods are not keeping up with ever changing attack vectors

• Need to quickly identify physical threats such as people located in unauthorized locations

• Need to quickly identify digital threats, everything from bad password attempts to DoS attacks

• Timeliness of reaction to threats as they occur

• Complexity of highly-distributed connected systems, cloud, sensors, monitors, and facilities

• Difficult to pair the necessity of human involvement with automated systems when unusual or hard to predict situations occur

Solution

Applications can detect harmful situations using a variety of technologies and integrations. Camera feeds are used to provide visual identification in real time. Server logs are used to detect DoS attacks. Alerts, notifications, automation and integration with multiple systems combine to integrate people and systems to respond in a timely and appropriate manner to threats.

Relevant Industries

Financial Services

Government

Defense

Manufacturers

Construction

Food Services

and many others.

VANTIQ Example

A VANTIQ application takes advantage of available data streams and external micro-services to provide a number of security and compliance-related capabilities. Starting with visual identification, cameras are located in strategic locations at a facility such as the entrance, data centers, high-security clearance areas, etc. These images are sent to the VANTIQ platform which processes them using an external service that specializes in facial recognition, comparing images taken in real time at specific locations to a list of images representing authorized personnel. Security teams are alerted when unauthorized access is identified and the live feed images are sent to the security team so they can determine if the system correctly identified a security breach.

Integrated security systems can be activated in real time at a point of breach such as automated locking of doors, shut down of vital servers, or electrical shutoff to ensure the unauthorized entrant does not escape with confidential information or worse. The application can also gather data for any personnel, employee or non employee, including their approximate age, emotion, gait, and habits. This data can be compared with schedules or itinerary to assure all personnel are not only members of the facility, but are also present in good faith. The system can be trained to follow individuals and recognize patterns of behavior in real time. For example, the system can recognize an individual in a factory bending over repeatedly to steal material or an individual losing productivity by walking a route that is too far from their workstation.

In the video below, see how a security application built with the VANTIQ platform can utilize facial recognition and 3D mapping to monitor and secure a facility in real time.

VANTIQ in Plain English

Still not crystal clear on what VANTIQ is? Read our non-technical description HERE

Featured Resources
White Paper
VANTIQ - Enabling the Digital Enterprise
Read the vision of Marty Sprinzen, CEO of VANTIQ, on how VANTIQ truly enables the real-time digital enterprise.
New Gartner Report - Free!
Innovation Insight for Event Thinking
Read Gartner’s latest report on the event-driven application revolution PLUS new product tour videos, VANTIQ FAQ, and interview with VANTIQ co-founders Marty & Paul.
Demo Video
Real-Time Application Overview and VANTIQ Demo
A detailed overview of why real-time, event-driven applications are required to truly transform your business operations. Includes a demo of how to rapidly build and deploy one.

Follow Vantiq