SlideShare uma empresa Scribd logo
1 de 27
1
Overview
May 2016
Transpeye
Activity Management Solution
“Reveal the Risk”
2Confidential – Provided Under NDA
Agenda
• Principals
• Problem space
• Architecture
• Demo
• Loss prevention made simple
• Deployment options – Till data
• Deployment options – Cameras
• Product offering
• What makes SilverStar Analytics unique
• Platform advantages
• Route to markets
3Confidential – Provided Under NDA
User activity management
Cloud platform
Business
Intelligence
Policy Violations Fraud / Theft
Advanced
Analytics
Irrefutable Visual
Evidence
4Confidential – Provided Under NDA
The insider problem
5Confidential – Provided Under NDA
UK Retail Fraud
Survey
National Retail
Security Survey
U.S. Retail Fraud
Survey 2013
52% of total UK retail sector - 43,000 physical stores and a combined turnover
of £148 Billion - 2014
Shrinkage increased by over 22.2% in 2014, rising from 0.9% of sales last year
to 1.1% Theft or fraud by employees closely follows this with 33%, which has
also seen an increase by 6% since last year
Industry reports
U.S. retailers lose an average of 1.3% of sales, $54 billion per year
Employee theft is the largest area accounting for 37% of total shrink
A high of 1.8% of sales for small-format retailers, down to 0.9% for large-
format specialty, hospitality and leisure retailers.
US retailers lost more than $34 billion to theft in 2011
Theft as a percentage of revenue was 1.41% Employee theft still constitutes
the largest majority of losses at 43.9%
Retail Fraud Survey
2014
One out of every 39.5 employees was apprehended for theft
Survey participants apprehended 78,085 dishonest employees in 2013, up
6.5% from 2012
On a per case average, dishonest employees steal 5.4 times the amount stolen
by shoplifters
6Confidential – Provided Under NDA
Retailers of all sizes face similar insider threats
Large Retailers
• Large corporate function
• Sophisticated systems
• Strong processes
• Dedicated loss prevention
staff but adhoc system
> 300
Stores
< 300 Stores
< 10 Stores
Medium Retailers
• Limited corporate function
• Basic systems
• Weak processes
• Little loss prevention focus
Small Retailers
• No corporate function
• Adhoc systems
• Adhoc processes
• No loss prevention focus
• Exactly the same threats
as large retailers
• Challenged by cost and
complexity
• Limited by resources
• Need simple loss
prevention
7Confidential – Provided Under NDA
Cash register manipulation
Cash Register Manipulation
Employee
Refund
Loyalty
Cards
Discount
Manual Price
Adjustment
Line Item
Void
Low ValueZero Value Cash Theft
Long
Duration
Earlier of the day sale
Fake refund details
Repeat of genuine
To cash or card
Cancel/voided sales
Manager override
No sale
Employee discount
Excessive discount
Price overrides
Customer collusion
Repeated use
Stealing points
Customer collusion
Multiple voids
Last item void
Most expensive item
Excessive low value
Customer collusion
Replaces high value
items
Modified after customer
interaction
Cash draw left open
With draw of cash
before/after transaction
manipulation
Cash draw opened
High reductions
Excessive reductions
Same item
High value
8Confidential – Provided Under NDA
Surveillance at the point of sale
Make smarter operations decisions
Visual evidence of operations
Staff and customer behaviour
Monitor and optimize
Remote access
Real time and historical data
Remotely monitor
Access from anywhere using any device
Real time alerts for policy violations
Access to irrefutable visual evidence
Detect cashier-related shrinkage
Tracks suspect patterns and
behaviour
Unauthorized discounts, manually
entered values, no sales or voids
POS exception reporting with video
Discover how often and to what
extent your business rules
are violated, by whom, and the
impact on your bottom line
Staff productivity and training
9Confidential – Provided Under NDA
Number of point of sale devices - 2009
> 200
Stores
Global Total
25.8M
6.7M
EU
5.9M
NA
2.3M
1.7M
1.3M
1.1M
1.1M
1.0M
25 Million
7 Million
6 Million
2 Million
1 Million
Source: World Bank
Note: Excludes China
10Confidential – Provided Under NDA
Transpeye solution
3 key pillars to the solution
Advanced
Data
Analytics
Modern Cloud
Platform
Irrefutable
Visual
Evidence from
CCTV
integration
11Confidential – Provided Under NDA
Passive to active surveillance
Data Analytics
Takes events from a wide range of systems
e.g. epos, access control, cash counting
Determines policy violations and ‘outliers’ to normal
Raises weighted alerts for investigation
Irrefutable Visual Evidence
Uses stored video at the ‘edge’
Retrieves clips of video from appropriate cameras
Uses storage and network resources efficiently
Finds the 0.5% of valuable CCTV footage
User Activity Management
Baselines behaviour patterns
Identifies and scores anomalies
Outliers to normal employee activity
Real time alerts, reports, drill downs
Advanced policy engine
Integrates with epos and other devices
Frictionless deployment via cloud
Access anywhere – web application
12Confidential – Provided Under NDA
Architecture
EPOS
CCTV management device
Manage the interaction of the CCTV
cameras and the Cloud
Transpeye Analytics
Cloud Service
CCTV
Live streaming of EPOS transactions
Retail Store
13Confidential – Provided Under NDA
Policy based
exception
Data analytics
Integrated visual
evidence
Simple yet powerful policy capability
Build policies around indicative behaviour
57 built in policy templates covering a wide range of indicators
Real-time alerts delivered to smartphones
Key features
Intelligent CCTV integration focused on the 0.1% to 0.5% of valuable footage
Makes valuable CCTV footage available and stored independently
Flexible mapping of cameras to epos (many-to-many)
Automatic by policy retrieval of visual evidence. Manual override
Dynamic dashboard providing real-time status on key parameters
Interactive drill down reports allowing rapid focus on worst performers
High quality pdf reports with built in scheduling
Simple to use forensics supporting granular investigations
Frictionless
deployment
Cloud platform – zero servers or software to deploy or maintain
Small collector agents to retrieve epos data, device and CCTV footage
Works on the most basic networks. Minimal bandwidth requirements
Application accessible from any web browser including tablets, smartphones
14Confidential – Provided Under NDA
Product screenshot - dashboard
Features
1. Alert over time graph
2. Regular data refresh
3. Alert number and score tracking
4. Last five policy violations
5. Policy violation reason
6. Policy violation score
7. Top 5 policy violating stores
8. Top 5 policy violating staff
9. Top 5 policy violating new staff
1
2
3
4
5 6
7
8 9
15Confidential – Provided Under NDA
Product screenshot – visual evidence
Features
1. Transaction summary data
2. Policy violation
3. Transaction details
4. Raw receipt
5. Manual video retrieval
6. Multiple CCTV views
7. Till screenshot
8. Till desktop video
9. Video playback controls
10. HD/side-by-side viewer
10
1
2
3
4
5
67 8
9
16Confidential – Provided Under NDA
Product screenshot – drilldown reports
Features
1. Location filter
2. Date filter
3. Activity selector
4. Top worst stores
5. Top worst stores by number
6. Top worst stores by value
7. Top worse staff
8. Top worst staff by number
9. Top worst staff by value
1 2
3
4
5 6
7
8 9
17Confidential – Provided Under NDA
Product screenshot – data forensics
Features
1. Selection filters
2. Tabular display
3. Links to transactions
4. Multiple pages
1
2 3
4
5
6
18Confidential – Provided Under NDA
Demo
19Confidential – Provided Under NDA
Frictionless Delivery
Finds and solves
the problem
Made Simple
Supports existing tills and cameras
Uses existing network
Zero additional infrastructure investment
Tiny agent within retailers environment
Loss Prevention Made Simple
Built for modern world on web based technologies
Cloud based delivery
Designed for the novice user
Intuitive user experience
Monthly usage based bill at commodity prices
Analytics to find hot spots
Built in intelligence to guide the user
Alerts, email notification and reports to aid
understanding
Active remediation using visual evidence
20© Transpeye Ltd. All rights reserved.
21Confidential – Provided Under NDA
Cloud to device
Cloud to back office
Cloud to cloud
Tills hosts agent and communicates directly with cloud
Cameras/DVR’s can be accessed directly by cloud
Virtual DVR can be deployed to make use of the most basic
cameras
Flexible Deployment Options
Cloud to cloud synchronization to retrieve till data
Cloud to cloud synchronization to retrieve video data
Single deployment to get data from back offices systems
Single deployment to get data from cameras and DVR’s
22Confidential – Provided Under NDA
Option 1: Cloud to SSA Cloud
Deployment options – Till data
Option 2: Corporate back office to SSA Cloud
Option 3: Store back office to SSA Cloud
Option 4: Till to SSA Cloud
DataTill
• Zero deployment requirement
• Add till cloud credentials to SSA cloud (mins)
• Next generation epos vendors provide open API’s
• Support POSLavu today, Vend by 1st December
• Others by demand (Shopkeep, Lightspeed, Kounta, Revel)
Data
• Single point deployment requirement
• SSA till agent on dedicated hardware (1 small server)
• High performance agent > 100,000 transaction per hour
• All data compressed and encrypted before being pushed to
SSA cloud
• Minimal additional network load
HQ back
office
Data
• Multi point deployment requirement
• SSA till agent on shared hardware (server or desktop)
• High performance agent > 10,000 transaction per hour
• All data compressed and encrypted before being pushed to
SSA cloud
• Minimal additional network load
• Good for when data collection needs to be on same LAN
Data
• Per till deployment requirement
• SSA till agent on till – screenshots and desktop video
• Minimal memory and CPU utilization
• All data compressed and encrypted before being pushed to
SSA cloud
• Minimal additional network load
• When data collection needs to be directly from the till
Store
back
office
23Confidential – Provided Under NDA
Small data
Network friendly
Scheduling
All video stored locally – close to camera
Typically transfer 0.1% to 0.5% of video that has value
No need for ‘big pipes’ or high grade network
Store and forward architecture
Making best use of available networks
Video upload can be controlled and scheduled
Black out periods e.g. over lunchtime
Use dead periods for video transfer e.g. over night
Advanced ‘traffic shaping’ built in
Understands the capacity of the end-to-end link
By default uses a maximum of 50% of available bandwidth
Allows your high priority traffic to always flow unhindered
24Confidential – Provided Under NDA
Option 1: SSA Cloud to DVR Cloud
Deployment options – Cameras
Option 2: SSA Cloud to DVR/Camera
VideoDVR
• Zero deployment requirement
• Add cloud DVR cloud credentials to SSA cloud (mins)
• Automatically discovers and registers new cameras
Video
• Zero deployment required
• Firewall configuration required to allow remote access
• Manual addition of cameras to configuration
Option 3: Cameras or NVR’s with storage and
programmable access
Option 4: Cameras with no storage or NVR’s with no
programmable access
Video
Video
Video
Video
OR
HQ level
Store level
• Single or multiple camera manager agents
• Low spec server or PC – minimal storage
• Acts as gateway between the SSA cloud and the cameras
• Behind the corporate firewall
• Reverses direction of traffic between cloud <-> camera/NVR
• Single or multiple agents dependent on network topology
Video
Video
Video Store level
• Camera manager agent on same LAN as camera
• Low spec server, PC or till – some storage requirements
• Camera management agents acts as a mini-DVR
• Storage estimates (720p@1fps) of around 2Gb for 7 days
• The most basic of deployments
Request
Video
Request
25Confidential – Provided Under NDA
Security
• Servers hosted in Europe (Ireland)
• No credit card data recorded, transmitted or retained
• PCI-DSS expressly allow the usage of cloud based services – see link
• PCI-DSS compliant cloud infrastructure – see link
• All data is encrypted using the same technology as the UK financial industry
• All customer data is ‘zoned’ to be logically compartmentalized
• Service built to the highest security standards
26Confidential – Provided Under NDA
Transpeye Solution
Virtual security perimeter around
your cash and operations
Intelligent monitoring and
advanced surveillance
Data Analytics
Process all electronic events - Correlate
Advanced policy engine – out of policy events
Real time alerts – reports – interactive drill downs
Irrefutable Visual Evidence
Intelligent integrates with CCTV
Automatic collection via policy - Manual override available
Easy Deployment
Cloud based platform – accessible
Network bandwidth friendly – small data sizes
Small agents to interface to devices
27Confidential – Provided Under NDA
CCTV availability
Vast bulk of CCTV data stays local
All video stored ‘close’ to camera
Either DVR/NVR or on modern ‘edge’ cameras
Video associated with policy violations retrieved
Typically 0.1% to 0.5% of video is valuable
Efficient network utilization
Systems automatically retrieves small video clips
Typically 30secs to 1min (i.e. small in size)
Copies over the network in background
Can schedule transfer. Avoids network impact
Makes HD quality video accessible
Modern UI
Web application in the cloud
Accessible from any device including tablets
Correlates policy violations and CCTV
Requests
Video clips

Mais conteúdo relacionado

Mais procurados

HP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM SolutionHP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM Solutionrickkaun
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent VisionMatrix Comsec
 
The Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceThe Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceMichael Miller
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...AlgoSec
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drivesmuthamizh adhithan
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center SolutionBilal Husain
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Flexera
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Inductive Automation
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial OrganizationInductive Automation
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security CameraMatrix ComSec
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix ComSec
 
Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast ThousandEyes
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP MarketSolarwinds N-able
 

Mais procurados (20)

HP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM SolutionHP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM Solution
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 Matrix Video Surveillance Solution: SATATYA - The Persistent Vision Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
 
The Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceThe Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and Compliance
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Cybernetyx introduction
Cybernetyx introductionCybernetyx introduction
Cybernetyx introduction
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 

Destaque

VMukti Catalogue - V 2.1 - 2016 (1)
VMukti Catalogue  - V 2.1 - 2016 (1)VMukti Catalogue  - V 2.1 - 2016 (1)
VMukti Catalogue - V 2.1 - 2016 (1)Hardik Sanghvi
 
State Monitoring System by Kipod
State Monitoring System by KipodState Monitoring System by Kipod
State Monitoring System by KipodOleg Romanovich
 
VMukti - Executive Briefing-1
VMukti  - Executive Briefing-1VMukti  - Executive Briefing-1
VMukti - Executive Briefing-1Hardik Sanghvi
 
Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service Oleg Romanovich
 
Monitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saasMonitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saasBizTalk360
 
5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working Successfully5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working SuccessfullyTom Blondies
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introductiontoryharis
 
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud MonitoringCloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud MonitoringCopperEgg
 

Destaque (13)

VMukti Catalogue - V 2.1 - 2016 (1)
VMukti Catalogue  - V 2.1 - 2016 (1)VMukti Catalogue  - V 2.1 - 2016 (1)
VMukti Catalogue - V 2.1 - 2016 (1)
 
State Monitoring System by Kipod
State Monitoring System by KipodState Monitoring System by Kipod
State Monitoring System by Kipod
 
desired report
desired reportdesired report
desired report
 
Club segmentation
Club segmentationClub segmentation
Club segmentation
 
Kipod eng 14-06-2016
Kipod eng 14-06-2016Kipod eng 14-06-2016
Kipod eng 14-06-2016
 
VMukti - Executive Briefing-1
VMukti  - Executive Briefing-1VMukti  - Executive Briefing-1
VMukti - Executive Briefing-1
 
Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service
 
Monitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saasMonitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saas
 
Remote Working
Remote WorkingRemote Working
Remote Working
 
5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working Successfully5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working Successfully
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
Eagle Eye Surveillance Analysis Solution
Eagle Eye Surveillance Analysis SolutionEagle Eye Surveillance Analysis Solution
Eagle Eye Surveillance Analysis Solution
 
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud MonitoringCloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
 

Semelhante a Transpeye Overview V1 (1)

More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksMarcoTechnologies
 
The Business Justification for APM
The Business Justification for APMThe Business Justification for APM
The Business Justification for APMJonah Kowall
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?Mark Stokes
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...David Castro
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...ExtraHop Networks
 
Nastel AutoPilot Proactive Application Analytics
Nastel AutoPilot Proactive Application AnalyticsNastel AutoPilot Proactive Application Analytics
Nastel AutoPilot Proactive Application AnalyticsjKool
 
Splunk at Airbus
Splunk at AirbusSplunk at Airbus
Splunk at AirbusSplunk
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherMartin Thompson
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
Data analytics and analysis trends in 2015 - Webinar
Data analytics and analysis trends in 2015 - WebinarData analytics and analysis trends in 2015 - Webinar
Data analytics and analysis trends in 2015 - WebinarAli Zeeshan
 
De Overall Presentation3
De Overall Presentation3De Overall Presentation3
De Overall Presentation3patriciamarro
 
Callidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand MigrationCallidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand MigrationCallidus Software
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsSolarwinds N-able
 
Unified Monitoring Webinar with Dustin Whittle
Unified Monitoring Webinar with Dustin WhittleUnified Monitoring Webinar with Dustin Whittle
Unified Monitoring Webinar with Dustin WhittleAppDynamics
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?ManageEngine
 

Semelhante a Transpeye Overview V1 (1) (20)

More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
 
The Business Justification for APM
The Business Justification for APMThe Business Justification for APM
The Business Justification for APM
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
 
Nastel AutoPilot Proactive Application Analytics
Nastel AutoPilot Proactive Application AnalyticsNastel AutoPilot Proactive Application Analytics
Nastel AutoPilot Proactive Application Analytics
 
Flopsar-UK (3)
Flopsar-UK (3)Flopsar-UK (3)
Flopsar-UK (3)
 
Splunk at Airbus
Splunk at AirbusSplunk at Airbus
Splunk at Airbus
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
slatrack
slatrackslatrack
slatrack
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Data analytics and analysis trends in 2015 - Webinar
Data analytics and analysis trends in 2015 - WebinarData analytics and analysis trends in 2015 - Webinar
Data analytics and analysis trends in 2015 - Webinar
 
De Overall Presentation3
De Overall Presentation3De Overall Presentation3
De Overall Presentation3
 
Callidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand MigrationCallidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand Migration
 
Insight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service OfferingsInsight session -- Build Successful MSP Service Offerings
Insight session -- Build Successful MSP Service Offerings
 
Unified Monitoring Webinar with Dustin Whittle
Unified Monitoring Webinar with Dustin WhittleUnified Monitoring Webinar with Dustin Whittle
Unified Monitoring Webinar with Dustin Whittle
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 

Transpeye Overview V1 (1)

  • 1. 1 Overview May 2016 Transpeye Activity Management Solution “Reveal the Risk”
  • 2. 2Confidential – Provided Under NDA Agenda • Principals • Problem space • Architecture • Demo • Loss prevention made simple • Deployment options – Till data • Deployment options – Cameras • Product offering • What makes SilverStar Analytics unique • Platform advantages • Route to markets
  • 3. 3Confidential – Provided Under NDA User activity management Cloud platform Business Intelligence Policy Violations Fraud / Theft Advanced Analytics Irrefutable Visual Evidence
  • 4. 4Confidential – Provided Under NDA The insider problem
  • 5. 5Confidential – Provided Under NDA UK Retail Fraud Survey National Retail Security Survey U.S. Retail Fraud Survey 2013 52% of total UK retail sector - 43,000 physical stores and a combined turnover of £148 Billion - 2014 Shrinkage increased by over 22.2% in 2014, rising from 0.9% of sales last year to 1.1% Theft or fraud by employees closely follows this with 33%, which has also seen an increase by 6% since last year Industry reports U.S. retailers lose an average of 1.3% of sales, $54 billion per year Employee theft is the largest area accounting for 37% of total shrink A high of 1.8% of sales for small-format retailers, down to 0.9% for large- format specialty, hospitality and leisure retailers. US retailers lost more than $34 billion to theft in 2011 Theft as a percentage of revenue was 1.41% Employee theft still constitutes the largest majority of losses at 43.9% Retail Fraud Survey 2014 One out of every 39.5 employees was apprehended for theft Survey participants apprehended 78,085 dishonest employees in 2013, up 6.5% from 2012 On a per case average, dishonest employees steal 5.4 times the amount stolen by shoplifters
  • 6. 6Confidential – Provided Under NDA Retailers of all sizes face similar insider threats Large Retailers • Large corporate function • Sophisticated systems • Strong processes • Dedicated loss prevention staff but adhoc system > 300 Stores < 300 Stores < 10 Stores Medium Retailers • Limited corporate function • Basic systems • Weak processes • Little loss prevention focus Small Retailers • No corporate function • Adhoc systems • Adhoc processes • No loss prevention focus • Exactly the same threats as large retailers • Challenged by cost and complexity • Limited by resources • Need simple loss prevention
  • 7. 7Confidential – Provided Under NDA Cash register manipulation Cash Register Manipulation Employee Refund Loyalty Cards Discount Manual Price Adjustment Line Item Void Low ValueZero Value Cash Theft Long Duration Earlier of the day sale Fake refund details Repeat of genuine To cash or card Cancel/voided sales Manager override No sale Employee discount Excessive discount Price overrides Customer collusion Repeated use Stealing points Customer collusion Multiple voids Last item void Most expensive item Excessive low value Customer collusion Replaces high value items Modified after customer interaction Cash draw left open With draw of cash before/after transaction manipulation Cash draw opened High reductions Excessive reductions Same item High value
  • 8. 8Confidential – Provided Under NDA Surveillance at the point of sale Make smarter operations decisions Visual evidence of operations Staff and customer behaviour Monitor and optimize Remote access Real time and historical data Remotely monitor Access from anywhere using any device Real time alerts for policy violations Access to irrefutable visual evidence Detect cashier-related shrinkage Tracks suspect patterns and behaviour Unauthorized discounts, manually entered values, no sales or voids POS exception reporting with video Discover how often and to what extent your business rules are violated, by whom, and the impact on your bottom line Staff productivity and training
  • 9. 9Confidential – Provided Under NDA Number of point of sale devices - 2009 > 200 Stores Global Total 25.8M 6.7M EU 5.9M NA 2.3M 1.7M 1.3M 1.1M 1.1M 1.0M 25 Million 7 Million 6 Million 2 Million 1 Million Source: World Bank Note: Excludes China
  • 10. 10Confidential – Provided Under NDA Transpeye solution 3 key pillars to the solution Advanced Data Analytics Modern Cloud Platform Irrefutable Visual Evidence from CCTV integration
  • 11. 11Confidential – Provided Under NDA Passive to active surveillance Data Analytics Takes events from a wide range of systems e.g. epos, access control, cash counting Determines policy violations and ‘outliers’ to normal Raises weighted alerts for investigation Irrefutable Visual Evidence Uses stored video at the ‘edge’ Retrieves clips of video from appropriate cameras Uses storage and network resources efficiently Finds the 0.5% of valuable CCTV footage User Activity Management Baselines behaviour patterns Identifies and scores anomalies Outliers to normal employee activity Real time alerts, reports, drill downs Advanced policy engine Integrates with epos and other devices Frictionless deployment via cloud Access anywhere – web application
  • 12. 12Confidential – Provided Under NDA Architecture EPOS CCTV management device Manage the interaction of the CCTV cameras and the Cloud Transpeye Analytics Cloud Service CCTV Live streaming of EPOS transactions Retail Store
  • 13. 13Confidential – Provided Under NDA Policy based exception Data analytics Integrated visual evidence Simple yet powerful policy capability Build policies around indicative behaviour 57 built in policy templates covering a wide range of indicators Real-time alerts delivered to smartphones Key features Intelligent CCTV integration focused on the 0.1% to 0.5% of valuable footage Makes valuable CCTV footage available and stored independently Flexible mapping of cameras to epos (many-to-many) Automatic by policy retrieval of visual evidence. Manual override Dynamic dashboard providing real-time status on key parameters Interactive drill down reports allowing rapid focus on worst performers High quality pdf reports with built in scheduling Simple to use forensics supporting granular investigations Frictionless deployment Cloud platform – zero servers or software to deploy or maintain Small collector agents to retrieve epos data, device and CCTV footage Works on the most basic networks. Minimal bandwidth requirements Application accessible from any web browser including tablets, smartphones
  • 14. 14Confidential – Provided Under NDA Product screenshot - dashboard Features 1. Alert over time graph 2. Regular data refresh 3. Alert number and score tracking 4. Last five policy violations 5. Policy violation reason 6. Policy violation score 7. Top 5 policy violating stores 8. Top 5 policy violating staff 9. Top 5 policy violating new staff 1 2 3 4 5 6 7 8 9
  • 15. 15Confidential – Provided Under NDA Product screenshot – visual evidence Features 1. Transaction summary data 2. Policy violation 3. Transaction details 4. Raw receipt 5. Manual video retrieval 6. Multiple CCTV views 7. Till screenshot 8. Till desktop video 9. Video playback controls 10. HD/side-by-side viewer 10 1 2 3 4 5 67 8 9
  • 16. 16Confidential – Provided Under NDA Product screenshot – drilldown reports Features 1. Location filter 2. Date filter 3. Activity selector 4. Top worst stores 5. Top worst stores by number 6. Top worst stores by value 7. Top worse staff 8. Top worst staff by number 9. Top worst staff by value 1 2 3 4 5 6 7 8 9
  • 17. 17Confidential – Provided Under NDA Product screenshot – data forensics Features 1. Selection filters 2. Tabular display 3. Links to transactions 4. Multiple pages 1 2 3 4 5 6
  • 18. 18Confidential – Provided Under NDA Demo
  • 19. 19Confidential – Provided Under NDA Frictionless Delivery Finds and solves the problem Made Simple Supports existing tills and cameras Uses existing network Zero additional infrastructure investment Tiny agent within retailers environment Loss Prevention Made Simple Built for modern world on web based technologies Cloud based delivery Designed for the novice user Intuitive user experience Monthly usage based bill at commodity prices Analytics to find hot spots Built in intelligence to guide the user Alerts, email notification and reports to aid understanding Active remediation using visual evidence
  • 20. 20© Transpeye Ltd. All rights reserved.
  • 21. 21Confidential – Provided Under NDA Cloud to device Cloud to back office Cloud to cloud Tills hosts agent and communicates directly with cloud Cameras/DVR’s can be accessed directly by cloud Virtual DVR can be deployed to make use of the most basic cameras Flexible Deployment Options Cloud to cloud synchronization to retrieve till data Cloud to cloud synchronization to retrieve video data Single deployment to get data from back offices systems Single deployment to get data from cameras and DVR’s
  • 22. 22Confidential – Provided Under NDA Option 1: Cloud to SSA Cloud Deployment options – Till data Option 2: Corporate back office to SSA Cloud Option 3: Store back office to SSA Cloud Option 4: Till to SSA Cloud DataTill • Zero deployment requirement • Add till cloud credentials to SSA cloud (mins) • Next generation epos vendors provide open API’s • Support POSLavu today, Vend by 1st December • Others by demand (Shopkeep, Lightspeed, Kounta, Revel) Data • Single point deployment requirement • SSA till agent on dedicated hardware (1 small server) • High performance agent > 100,000 transaction per hour • All data compressed and encrypted before being pushed to SSA cloud • Minimal additional network load HQ back office Data • Multi point deployment requirement • SSA till agent on shared hardware (server or desktop) • High performance agent > 10,000 transaction per hour • All data compressed and encrypted before being pushed to SSA cloud • Minimal additional network load • Good for when data collection needs to be on same LAN Data • Per till deployment requirement • SSA till agent on till – screenshots and desktop video • Minimal memory and CPU utilization • All data compressed and encrypted before being pushed to SSA cloud • Minimal additional network load • When data collection needs to be directly from the till Store back office
  • 23. 23Confidential – Provided Under NDA Small data Network friendly Scheduling All video stored locally – close to camera Typically transfer 0.1% to 0.5% of video that has value No need for ‘big pipes’ or high grade network Store and forward architecture Making best use of available networks Video upload can be controlled and scheduled Black out periods e.g. over lunchtime Use dead periods for video transfer e.g. over night Advanced ‘traffic shaping’ built in Understands the capacity of the end-to-end link By default uses a maximum of 50% of available bandwidth Allows your high priority traffic to always flow unhindered
  • 24. 24Confidential – Provided Under NDA Option 1: SSA Cloud to DVR Cloud Deployment options – Cameras Option 2: SSA Cloud to DVR/Camera VideoDVR • Zero deployment requirement • Add cloud DVR cloud credentials to SSA cloud (mins) • Automatically discovers and registers new cameras Video • Zero deployment required • Firewall configuration required to allow remote access • Manual addition of cameras to configuration Option 3: Cameras or NVR’s with storage and programmable access Option 4: Cameras with no storage or NVR’s with no programmable access Video Video Video Video OR HQ level Store level • Single or multiple camera manager agents • Low spec server or PC – minimal storage • Acts as gateway between the SSA cloud and the cameras • Behind the corporate firewall • Reverses direction of traffic between cloud <-> camera/NVR • Single or multiple agents dependent on network topology Video Video Video Store level • Camera manager agent on same LAN as camera • Low spec server, PC or till – some storage requirements • Camera management agents acts as a mini-DVR • Storage estimates (720p@1fps) of around 2Gb for 7 days • The most basic of deployments Request Video Request
  • 25. 25Confidential – Provided Under NDA Security • Servers hosted in Europe (Ireland) • No credit card data recorded, transmitted or retained • PCI-DSS expressly allow the usage of cloud based services – see link • PCI-DSS compliant cloud infrastructure – see link • All data is encrypted using the same technology as the UK financial industry • All customer data is ‘zoned’ to be logically compartmentalized • Service built to the highest security standards
  • 26. 26Confidential – Provided Under NDA Transpeye Solution Virtual security perimeter around your cash and operations Intelligent monitoring and advanced surveillance Data Analytics Process all electronic events - Correlate Advanced policy engine – out of policy events Real time alerts – reports – interactive drill downs Irrefutable Visual Evidence Intelligent integrates with CCTV Automatic collection via policy - Manual override available Easy Deployment Cloud based platform – accessible Network bandwidth friendly – small data sizes Small agents to interface to devices
  • 27. 27Confidential – Provided Under NDA CCTV availability Vast bulk of CCTV data stays local All video stored ‘close’ to camera Either DVR/NVR or on modern ‘edge’ cameras Video associated with policy violations retrieved Typically 0.1% to 0.5% of video is valuable Efficient network utilization Systems automatically retrieves small video clips Typically 30secs to 1min (i.e. small in size) Copies over the network in background Can schedule transfer. Avoids network impact Makes HD quality video accessible Modern UI Web application in the cloud Accessible from any device including tablets Correlates policy violations and CCTV Requests Video clips