View
10
Download
5
Category
Tags:
Preview:
DESCRIPTION
Cisco Physical Security Solutions Marco Roeffen
Citation preview
Transforming the Way Organizations and Communities Protect People, Property, and Critical Infrastructure
Marco Roeffen
Cisco Connected Physical
Security Solutions
Proprietary Costly
SiloedManual
No
information
correlation
Prone to
Error
Potentially
Hazardous
High
operational
costs
No
Common
Operating
Picture
Open standards
based
Solutions focus and
converging organizatio
ns
Automated
Centralized security
management over IP
Converged network
and physical security
Local, Data center and
Cloud storage
Moving
ToLocal
storage
Proprietary
Legacy
systems
Separate network
and physical
security
Geographically
dispersed facilities
and personnel
Manual
processes
Siloed organizations
Moving From: Moving To:
Proprietary legacy systems Network based solutions
Solutions focus and converging organizations
Manual processes: Increases TCO
Drive automation and efficiencies through
new technology
Geographically dispersed facilities
and personnel
Centralized security management via IP
Separate network and physical security
Converged network and physical security
Legacy technology: Analog, DVRs,
standard definition
IP, high definition, network video surveillance
Dedicated architecture for hardware,
applications, and storage
Virtualized architecture for security,
applications, and storage
Local storage Local, data center, and cloud storage
Embedded into business
processes
Part of enterprise IT fabric
Automating lower value work
Used by multiple functions
Safety and security only
Standalone deployment
Technology augmenting people
Used by security operations only
From To
0Proprietary
Systems Devices
Dedicated Medianet Enabled
and Virtualized
Networked
Converged
Compute
Storage
1970s 1990s 2000 Now
IT Managed
Networks
Shared
Network
Resources
Radio over IP
Digital but Not
Networked
Improved
Quality
Still Local
Only
Flexible
Resources and
Management
Medianet and
with
Virtualization
Separate
Overlay
Network
Physec
Managed
Expanded
Access
1st Gen 2nd Gen 3rd Gen 4th Gen 5th Gen
Endpoint
Network
Local Access
Tape
Degradation
Closed Radio
Systems
Recommended