SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Corps Security Open Day

Innovations in Access Control,
          Standards
    & Integrated Systems
         Mike Sussman
Access Control - What is happening?
                                             How is IT changing
Is access control     How can it change      the traditional
stagnant or is it     to bring benefits to   security managers
evolving?             all?                   role?


Are we playing                               What are the
catching with other                          technological
industries?                                  trends?
Credentials
                     Secure access
Use of phone as a    required – PIN or
credential - NFC     facial
                                         Facial becoming
Multi modal                              popular – non
biometrics growing                       contact
Hosted systems
Outsource model
provides better      Lower Total Cost of
control of costs     Ownership


Reduce hardware                            Integrate with
and resource costs   Improve efficiency    receiving centres
Cloud Based Solutions
What is the cloud?     Provides fault
Are we ready for it?   tolerance and DR     Provides flexibility
YES                    as standard          and scalability
                       By 2014, 65% of
                       new products to be
                       delivered in cloud
Why cloud based systems
No IT infrastructure
to purchase and        Scalability and   Available access
maintain               elasticity        24/7 from anywhere
                                         Simple licensing
No installation of                       models – try before
updates                                  buy
Why are customers using
              the cloud?

Reduced annual
costs                               Agility and mobility


                   Simple           Increased end user
Highly automated   implementation   productivity
Integrate disparate systems

                                        SDK and other
Open fire doors in                      integration tools
alarm condition                         available
                     Display intruder   Arm/Disarm
View live video on   alarms in the      intruder using
access event         access software    access credentials
Integration and PSIM
Converges physical                 Analysis and
security with                      reasoning of
automation                         computing
                     Integrates    Correlate events to
                     unconnected   proactively manage
                     systems       situations
5 key capabilities
                                           Analyse and
                     Collect data from     correlate data to
                     disparate systems     identify situation
Present in quick     Provide standard      Provide compliance
and easy format to   operating practices   reports, training
verify situation     to manage situation   and investigation
Work with Corps Security
           and Partners
                 Integration with    Remote
                 Immix for           management of
                 monitoring events   server
Webway One SPT   Remote sites
for secure       through secure      Integration of Video
connections      Webway interface    into Immix
Standards
Not as regulated as
the intruder and fire
markets                                   EN50133 outdated

                        Has some good
IEC 60839-11-1 out      points like all   … it also has
for parallel voting     standards ….      contentious points
Summary

                    Increasing use of    Convergence of
Shift to IP based   web based            physical security
systems             platforms            and IT


                    Uptake of NFC as a   Cloud based
Use of managed      credential using     solutions will
services            mobiles              increase

Weitere ähnliche Inhalte

Was ist angesagt?

Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioIvanti
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
How Centilytics CMP's security solutions benefit users
How Centilytics CMP's security solutions benefit usersHow Centilytics CMP's security solutions benefit users
How Centilytics CMP's security solutions benefit usersCentilytics
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall ServiceSecureData Europe
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESBruce Hafner
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 

Was ist angesagt? (16)

12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
How Centilytics CMP's security solutions benefit users
How Centilytics CMP's security solutions benefit usersHow Centilytics CMP's security solutions benefit users
How Centilytics CMP's security solutions benefit users
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cloud managed networking
Cloud managed networkingCloud managed networking
Cloud managed networking
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Ähnlich wie TDSi Open Day

Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple ITCisco Canada
 
The mobile workforce – A real IT challenge
The mobile workforce – A real IT challengeThe mobile workforce – A real IT challenge
The mobile workforce – A real IT challengeExponential_e
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...Amazon Web Services
 
ISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxYaser330700
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner AnuntaTech
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
F5 network presenation 2013 Q1
F5 network presenation 2013 Q1F5 network presenation 2013 Q1
F5 network presenation 2013 Q1Andrew Wong
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 

Ähnlich wie TDSi Open Day (20)

Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
The mobile workforce – A real IT challenge
The mobile workforce – A real IT challengeThe mobile workforce – A real IT challenge
The mobile workforce – A real IT challenge
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
ISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptx
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
F5 network presenation 2013 Q1
F5 network presenation 2013 Q1F5 network presenation 2013 Q1
F5 network presenation 2013 Q1
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 

TDSi Open Day

  • 1. Corps Security Open Day Innovations in Access Control, Standards & Integrated Systems Mike Sussman
  • 2. Access Control - What is happening? How is IT changing Is access control How can it change the traditional stagnant or is it to bring benefits to security managers evolving? all? role? Are we playing What are the catching with other technological industries? trends?
  • 3. Credentials Secure access Use of phone as a required – PIN or credential - NFC facial Facial becoming Multi modal popular – non biometrics growing contact
  • 4. Hosted systems Outsource model provides better Lower Total Cost of control of costs Ownership Reduce hardware Integrate with and resource costs Improve efficiency receiving centres
  • 5. Cloud Based Solutions What is the cloud? Provides fault Are we ready for it? tolerance and DR Provides flexibility YES as standard and scalability By 2014, 65% of new products to be delivered in cloud
  • 6. Why cloud based systems No IT infrastructure to purchase and Scalability and Available access maintain elasticity 24/7 from anywhere Simple licensing No installation of models – try before updates buy
  • 7. Why are customers using the cloud? Reduced annual costs Agility and mobility Simple Increased end user Highly automated implementation productivity
  • 8. Integrate disparate systems SDK and other Open fire doors in integration tools alarm condition available Display intruder Arm/Disarm View live video on alarms in the intruder using access event access software access credentials
  • 9. Integration and PSIM Converges physical Analysis and security with reasoning of automation computing Integrates Correlate events to unconnected proactively manage systems situations
  • 10. 5 key capabilities Analyse and Collect data from correlate data to disparate systems identify situation Present in quick Provide standard Provide compliance and easy format to operating practices reports, training verify situation to manage situation and investigation
  • 11. Work with Corps Security and Partners Integration with Remote Immix for management of monitoring events server Webway One SPT Remote sites for secure through secure Integration of Video connections Webway interface into Immix
  • 12.
  • 13. Standards Not as regulated as the intruder and fire markets EN50133 outdated Has some good IEC 60839-11-1 out points like all … it also has for parallel voting standards …. contentious points
  • 14. Summary Increasing use of Convergence of Shift to IP based web based physical security systems platforms and IT Uptake of NFC as a Cloud based Use of managed credential using solutions will services mobiles increase

Hinweis der Redaktion

  1. Is AC stagnant or evolving? If you look at the industry and the technology in use some areas are stagnant and have been for many years, for example the wiegand interface between readers and controllers. There has been a reluctance within the industry to change and a great deal of the equipment available is similar to what was around years ago. This trend is similar to the intruder and fire industry and it is only in the last few years that we are seeing changes happening.These changes, which are occurring in both the reader and credential arena’s along with the control panels and software can bring significant benefits to both the installer, systems integrator and end user.With the introduction of IP and it’s growing acceptance IT managers are taking more of an interest in the physical security market. In a number of industries the IT Manager is taking overall control and the security manager’s role does not exist anymore. The integration between the physical and IT / logical security systems has also increased the role of the IT department within this arena.I’d say that the Access Control industry is probably where the CCTV and telecoms industry were 5 years ago. Will the speed of change be the same? Only time will tell, but with the current political and terrorist climate security on all levels is only going to increase.There are certainly trends within the industry and these will become apparent throughout this presentation and hopefully by the end you will know what is happening within the industry. I can’t guarantee that I have covered all aspects but the main trends will be covered.
  2. Whilst there isn’t much change in the card market, the biggest move is starting to happen with the introduction of NFC into the mobile phone. The question is why do you need to carry a separate credential when you always have your mobile with you? This is fine until you realise that you need extra authentication to ensure that the phone as a security credential is secure. Whilst PIN is the obvious choice facial recognition will become standard on phones of the future as an authentication method. Whilst already available in tablets I think you will start seeing this in the next generation phones.As mentioned for readers, biometrics is growing in acceptance for authorisation. Whilst they all have their advantages and disadvantages these issues with the technology will disappear over the coming years.
  3. All using hosted providers at some point, for example skype and skydrive
  4. What is the cloudAn approach to computing that’s about internet scale and connecting to a variety of devices and endpoints (source Microsoft®)We all use the cloud now, skype, amazon, bankingDon’t require costly hardware and IT teams to maintainProvides scalability and flexibility