Upload
jacknickelson
View
409
Download
6
Embed Size (px)
DESCRIPTION
Citation preview
© 2004 EMC Corporation. All rights reserved. 111
SAMS: Surveillance Analysis & Management Solution
Physical Security & IT Convergence Leads to Emerging Best Practices
TSGPhysical Security Solutions GroupEMC Corporation
© 2005 EMC Corporation. All rights reserved. 22
VIDEO SURVEILLANCE
SENSORS &
ALARMS
EMERGENCY COMMUNICATION
ACCESS CONTROL
INTRUSION DETECTION
INFORMATION SECURITY
SHARED DATABASES
ASSET MANAGEMENT
VISITOR MANAGEMENT
&
IDENTITY RECOGNITION
UNIFIED REPORTING
SurveillanceTechnologies
© 2005 EMC Corporation. All rights reserved. 33
… and increasing Regulatory Compliance Requirements….
Regulation Who Data Retention and Data Privacy
Gramm-Leach-Bliley Act (GLBA)
Financial
Institutions
Ensure security, confidentiality and integrity of non-public client records (15 U.S.C. § 6801)
Health Insurance Portability and Accountability Act (HIPAA)
Healthcare Industry Patient privacy (Sec 164.306)
Data encryption is an “addressable” requirement.
CA 1386
AB 1950
Companies with customers in California
Encrypting stored data to prevent identity theft (SEC. 2. Section 1798.29)
DoD 5015.2
SEC 17.a-4
U.S. Government Storage encryption and secure deletion for records management applications and data archiving
VISA CISP Merchants, payments processors
Requirement to protect stored data, preferably with strong encryption (s.3)
Sarbanes-Oxley U.S. Corporations Integrity of financial records and systems (Sec. 404)
© 2005 EMC Corporation. All rights reserved. 44
EMC Core Competencies for Best Practice
Content Management
Network Management
Storage Management
Information Security
4
Physical Security Solutions
© 2005 EMC Corporation. All rights reserved. 55
… databases, operating systems backup / recovery software, management software
Investing in Best Practices
$2 billion investment = $2 billion experience
More than 2.6PT in 200,000+ square feet of labs– More than 1,200 servers and 30 mainframes from
25 manufacturers– 38 operating systems and HA clusters in multiple supported
versions– Over 1,600 different devices, HBAs, drivers, switches, and tape
subsystems– Dedicated NAS test environment with 90 switches, 7,500 IP
addresses, 750 client systems and switches from eight vendors
More than 380 engineers constantly testing every environment supported by EMC
Documented e-lab output and tools available directly to customers
… storage systems, servers, switches, hubs, host adapters, bridges, tape systems...
© 2005 EMC Corporation. All rights reserved. 66
DeliverCreate / Capture
Archive / Dispose
Desktop Authoring
ToolsWeb and Portal
Content
ScannedImages
E-mails
Manage
Content Management
Platform
Security and Access Control
Library Services
Rendition Management
Search
Workflow
Lifecycle ManagementEnterprise Applications
Rich Media
WirelessPortalsFax
CD-RomE-mail Paper
Physical Security Applications
Best Practices – Content Management
© 2005 EMC Corporation. All rights reserved. 77
Best Practices – Network Management & Storage Architecture
SAMS SERVER
3 Tiered Storage
Network Archive
Active Archive
Priority Lifecycle
Management
Access Control Intrusion Detection Visitor Management
Identity Recognition
Asset ManagementSensors & Alarm Systems
Emergency Communications
© 2005 EMC Corporation. All rights reserved. 88
Customerdata
Customerdata
Information Security – Concerns with Convergence
Earningsreleases
Earningsreleases
Salariesand
reviews
Salariesand
reviews
Litigationdocs
Litigationdocs
CEO
GeneralCounsel
CFO
NetworkAdministrators
SystemAdministrators
BackupAdministrators
StorageAdministrators
OutsourcingVendors
DR StorageAdministrators
TapeCourier
Storage Repair/Service Staff
Storage
© 2005 EMC Corporation. All rights reserved. 99
NAS/DAS
Disaster Recovery
SAN CAS
Horizontal Security Service
Ethernet iSCSI Fiber Channel Fiber Channel
End User Client
FileServices
DatabaseApplications
ERP E-MailWeb
Services
Hor
izon
tal
Pro
visi
oni
ng
Fra
mew
ork
Ver
tica
lP
rovi
sion
in
g F
ram
ewor
k
Network
Storage
Application
Secure storage consolidation = ROI
Insider threat mitigation
Regulatory compliance
Database security Secure disaster
recovery Intellectual
property protection Encryption Secure
Information lifecycle management
Best Practices – Information Security
© 2005 EMC Corporation. All rights reserved. 1010
Surveillance Analysis & Management Solutions
SAMS Core Monitoring Engines – Video: Motion & Object Awareness– Audio: Word Spotting & Transcription– Text: Native (email) & Object (fax, scan)– Data: Infosec Prevention & Response– Transit: RFID & GPS– Device Drivers
3rd Party Applications– Edge Devices– Intelligent Analytics
• Behavior: Physical, Fraud• Association: Obvious, Covert• Sensors: CBRNE• Biometrics: IRIS, Fingerprint, Facial
Network & Storage Architecture– Local: Network Archive – Central: Active – Archive– ILM: Active – Archive – Recycle
SAMS Server - Video Monitoring - Audio Monitoring - Text Monitoring - Data Monitoring - Transit Monitoring - Device Drivers
Storage Infrastructure
3rd Party Analytics and Rendering
Invo
ked
Man
agem
ent
&O
per
atio
nal
Ser
vic
es A
pp
sE
nte
rpri
se C
on
ten
t M
gt.
Pla
tfo
rm
Mu
ltimed
ia D
ata So
urces
(Vid
eo, au
dio
, Telep
ho
ny, em
ail)
Interfaces / APIs
Interfaces / APIs
Interfaces / AP
IsInte
rfac
es /
AP
Is
© 2005 EMC Corporation. All rights reserved. 1111
•P
olicy M
anag
emen
t•
Perfo
rman
ce En
han
cemen
ts•
No
n-rep
ud
iation
•S
ecurityH
igh A
vailab
ility
Ba
ckup
Re
covery
Re
plication
Archive
Wo
rkflow
Co
mp
liance
Wo
rd S
po
tting
Tran
scriptio
ns
OC
R(L
ice
ns
e P
late
s, e
tc.)
Sp
eaker ID
No
n-sp
eechA
ud
io R
ec
og
nitio
n
Stress
/emo
tion
recog
nitio
n
RF
ID
Ex
traS
pe
ctru
m
Au
dio
&T
ele
ph
on
y
Mu
ltiM
od
al
mg
mt
SAMS Value Proposition – Step Two
SOURCES
CORE
PLATFORM
APPLICATIONS
VIEWS
BROWSER BASED, THIN CLIENTS,
EMBEDDED CLIENTS
© 2005 EMC Corporation. All rights reserved. 1212
1000s of Cameras
SAMS Servers on Dell Hardware
Integrate 3rd Party Analytic Applications
Leverage Existing Cameras
Leverage Existing Network
SAN Storage
12
CLARiiON Storage Array
Digital Encoder
SAMS Server
Application Servers
Integrating Best Practices for Security Infrastructure