Point

QuantumSecure

QuantumSecure
About us
Quantum Secure is the leading provider of enterprise software to manage and streamline security identities, compliance and events across disparate physical security systems. Our SAFE suite of software enables security practitioners to integrate disparate physical security systems, automate key processes and simplify control of employees, vendors and other third-party identities across a global organization. As a software solution, SAFE works with your existing security infrastructure - with no need to replace your existing hardware. By connecting physical security operations closely to their IT infrastructure, corporations can quickly lower operational costs, improve their compliance standing and lower their overall level of risk.
FOUNDED :
2004
KEY PERSON:
Ajay Jain
President and CEO
Ajay is responsible for setting the company's vision and strategy along with managing the daily operations. In 2002, Ajay's start up, Mokume Software, a real-time enterprise software company in the field ofmanufacturing and security, was acquired by Versant Corp. Prior to that he co-foundedMarketFirst Software, which was acquired by Pivotal. He has also held senior and executive management positions at Clarify, Qdecor and Netscape. Ajay holds anMBAfromSanta Clara University, anMS in Computer and Information Science from Clarkson University with advanced courses from Stanford University. He has co-authored a college-level book titled Basic Mathematical Economics.
OFFICES:
US - Silicon Valley, California, India, Europe
INVESTOR:
Privately Held
CLIENTELE:
Security Professionals in a variety of industries, key customers include the following: Oracle, Visa International, British Telecom, World Trade Center and the Port Authority of New York/New Jersey, United Health Care, ATand T, AMD, San Francisco International Air- port, Lawrence Livermore, Berkeley,Oakridge National Laboratory,Adobe Systems, Juniper, Symantec, Texas Children's Hospital
WEBSITE:
PRODUCT OFFERINGS:
Quantum Secure has created the industry's first and most comprehensive physical security management software – SAFE. SAFE connects disparate physical security, IT and operational systems and automates manual security processes in order to reduce costs and risks.

As part of the SAFE software suite, we have created a host of applications that help automate physical security system functions, such as physical identity management, role-based access, self-service administration, identity/event correlation and reporting into a single web-based interface that is easy to manage and use.

The SAFE suite applications are broken down into five main areas:
  • Physical identity and access management modules allow enterprises to manage the entire lifecycle of identities as they relate to physical access. They include a wide range of functions, including synchronized on-/ off-boarding across all systems harboring an identity record, access profile and zone management, and role-based physical access
  • Compliance and Risk Management offerings allowsecurity practitioners to enforce governance across diverse and disjointed physical access control systems (PACS), creating a transparent, traceable and repeatable real-time global compliance process
  • Security Intelligence tools provide an executive-level, graphical dashboard view of the overall state of an organization's physical security infrastructure
  • Identity and Event Correlation tools work with leading PSIM providers to create unified user management of events and associated identities
  • Interoperability andAutomation is the core of the SAFE software suite and is comprised of a powerful policy orchestration, integration and reporting engine. Leveraging an open architecture and an off-the-shelf development approach, the SAFE Platform enables the entire SAFE suite to make physical security management fast, flexible, easy, and cost- effective.
DIFFERENTIATING FACTORS:
Our robust integration platform coupled with the unique patent pending policy and workflow automation engine, manages critical business rules across the physical security access infrastructure resulting in a unified security operation with a common platform to measure key security metrics and management objectives.
REVENUE MODEL:
Licensing Model