19
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 01/28/ 07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

Embed Size (px)

Citation preview

Page 1: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential01/28/07 1CISCO CONFIDENTIAL

GLOBALRISKTECHNOLOGIES

Cisco’s Best Practices

Page 2: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 201/28/07 CISCO CONFIDENTIAL

TECHNOLOGY OBJECTIVE

Cisco’s enterprise networked based security system is a fundamental cornerstone to our Safety and Security program, enabling operationally effective & cost efficient solutions for protecting and safeguarding Cisco’s assets.

• global strategies, centralized corporate services and technology solutions;

• which are regionally calibrated, designed and operationalized;

• for localized application

Results = Optimal Service Delivery & Cost Efficiency

Page 3: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 301/28/07 CISCO CONFIDENTIAL

SCALE

AMER240 sites total216 w/systems

4901 CR’s1,948 cameras

EMEA99 sites total66 w/systems

1,158 CR’s562 cameras

APJ67 sites total51 w/systems

916 CR’s415 cameras

TOTALS406 sites total333 w/systems

6875 CR’s2925 cameras

17 mil sqft60+ countries

Cisco led in the development and implementation of the world’s 1st network enterprise access control and digital video system.

46,954 Active Employees 35,163 Active Contractors

Page 4: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 401/28/07 CISCO CONFIDENTIAL

Security-to-Enterprise Risk Management Solutions

Critical Events

Policy Correlation Engine

SituationalAwareness

SFOChuman intervention

EOCstrategic decision

making

PresentationExecutive analysisData correlationAggregationBoard facing

e-Dashboard

AccessSystem

TelePresence

Critical Events

The network is the platform to change business process

CCTVSystem

Call Lists (7920, cell phones, SMS)

Paging Systems

Digital Signage

Cisco Call Mgr

BMSSystem

(IN CONCEPT DESIGN)

ENTERPRISE RISK MGMT SOLUTIONS

Page 5: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 501/28/07 CISCO CONFIDENTIAL

INTEGRATED & INTEROPERABLE APPLICATIONS

CCTV & DIGITALVIDEO SURVEILLANCE

ACCESS CONTROL

ID CREDENTIALMANAGEMENT

VISITORMANAGEMENT

INTRUSIONDETECTIONBURGLAR ALARMS

FIRE ALARMBMS

DATA & NETWORKSECURITY

ASSETSLOCATIONSINFORMATIONPROTECTION

Security & IT have converged and there will be a continuing trend to enable other edge devices onto IP platforms.

WAN and LANINTEROPERABLE

COMMUNICATIONS

Page 6: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 601/28/07 CISCO CONFIDENTIAL

ACCESS & VIDEO ARCHITECTURE

CONTROLLED MOBILITY

CENTRALIZED MANAGEMENT

SECURITY ENTERPRISESERVER

IMAGINGSYSTEM

US - SJ & WRREGIONAL SERVER

US - ERREGIONAL SERVER

EMEAREGIONAL SERVER

APJREGIONAL SERVER

110 CISCO OFFICES 101 CISCO OFFICES 89 CISCO OFFICES 59 CISCO OFFICES

CISCO WAN

CISCO WAN

HR SERVERPEOPLE SOFT

PARTITIONFOR

IMAGES&

SECURITYDATA

CISCO WAN

SJSOC

RTPSOC

DISASTER RECOVERYdB CLUSTERINGHOT STANDBY

EMEASOC

APJSFOC

Page 7: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 701/28/07 CISCO CONFIDENTIAL

NT OPS

Operating System

Server Hardware

Application Software

Risk Technologies

Converged Support Model

CORE COMPETENCY FOCUS

Operating System

Server Hardware

Application Software

Risk Technologies

Silo Support Model

INDUSTRY CHANGES

IT/SECURITY CONVERGENCE

Page 8: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 801/28/07 CISCO CONFIDENTIAL

Safety & Security

(SAS)

Investigations and Operations

IT Operations

Information Security

Network Storage Solutions

WPR IT and e-Solutions

Purchasing

Risk Technology

Transport and AVVID

INTERNAL PARTNERS

Page 9: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 901/28/07 CISCO CONFIDENTIAL

EXTERNAL PARTNERS

STANLEY SECURITY SOLUTIONSUS DOMESTIC SYSTEM'S PARTNER

Ron Couch317-806-4217

SIEMENS SYSTEMSASIA SYSTEM'S PARTNER

Brett Bertram+61 (0)2 8446 6216

IBM-GSDGLOBAL IP VIDEO UPGRADE PARTNER

Kirk Lindstedt 408-527-2223

DIEBOLD ENTERPRISE SYSTEMSEMEA SYSTEM'S PARTNER

Miles Hick011-44-208-756-9119

CISCO SYSTEMSRISK MANAGEMENT

TECHNOLOGY GROUP

LENEL SYSTEMS INTERNATIONAL, INCACS & CCTV SYSTEM’s MANUFACTURER

Dave Cunningham585-248-9720

Page 10: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1001/28/07 CISCO CONFIDENTIAL

SECURITY / FACILITY OP CENTERS

Where OPERATIONAL MANAGEMENT comes together

CONVERGED CALL CENTERS FOR BOTH SECURITY AND FACILITY MONITORING

San Jose, CA

Page 11: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1101/28/07 CISCO CONFIDENTIAL

“UNIFIED VOICE” INTEROPERABILITYCritical Communications Foundation

““Push-to-Talk Everywhere”Push-to-Talk Everywhere”• Any voice to any voiceAny voice to any voice• Video & Data integrationVideo & Data integration• Bridging the old and the newBridging the old and the new

Page 12: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1201/28/07 CISCO CONFIDENTIAL

IPICS CURRENT IMPLEMENTATION

Cisco IPICS System Server (Linux)

PTT Services7970

Dispatch Console

IPICS RMS

LMR Gateway VHF/UHF Radios

PC PMC Client

Typical Remote Site with Radios and ERT users using PMC

Remote Site

Spoke

SOC Hub

Typical Hub location with SOC Operators and SAS Managers using PMC and IP phone services

WAN

Page 13: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1301/28/07 CISCO CONFIDENTIAL

Intelligent Wireless Video Surveillance Networking - Cisco 3200 Series Router

Wireless Mesh Architecture

Support for Multiple Wired & Wireless Backhauls

Multicast & QoS Multiple Layers of

IP Security

Intelligent Video

Application Adaptive Video

Intelligent Video Analytics

Transrating Codec

Interoperability Interoperability

with Analog & Digital Cameras

+ Intelligent Wireless

Networking=

Intelligent Wireless Video

Surveillance Networking

More Effective Use of Data

Efficient use of Network resources

Shared Information in Real Time

More Cost Effective Deployments

Integration with other sensor applications

Page 14: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1401/28/07 CISCO CONFIDENTIAL

802.11b&g AP antennas

1400 Bridges (x2)

GPS

EMERGENCY MCV 1st RESPONDER

Page 15: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1501/28/07 CISCO CONFIDENTIAL

CRISIS MGMT DASHBOARD

IN CONCEPTUAL DESIGN

Page 16: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1601/28/07 CISCO CONFIDENTIAL

TelePresence

Cisco TelePresence is a new technology that combines innovative video, audio, and interactive elements (both hardware and software) to create a unique, "in person" experience—over the network. Its first application, for business meetings, delivers life size images, ultra high definition video (1080p), spatial audio and environmentals (e.g. lighting, furniture) that create a “room within a room” meeting space.

Bring Crisis Management decision makers from around the globe into one holistic environment for managing emergencies.

Page 17: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1701/28/07 CISCO CONFIDENTIAL

Cisco IMICS (Instant and Mobile Integrated Communications Solution) is the solution architecture for a portable and rapidly deployable communication kit built using off-the-shelf Cisco products and technologies. The core building block for IMICS is the Cisco 3845 Integrated Services Router and the secure data, voice and wireless services supported on it.

In the event of a natural or man-made disaster, one of the first casualties is the communications infrastructure. An IMICS kit can be quickly deployed to enable the First Responders and other agencies active in the area to communicate with the command and control, access critical information and coordinate their efforts with each other. Businesses and Organizations are severely impacted by network outages resulting from natural disasters or service provider outages. IMICS can provide instant and secure connectivity for such customers to maintain business continuity and speed up the recovery.

CISCO IMICS

Page 18: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1801/28/07 CISCO CONFIDENTIAL

Enabling Business Process Transformation in Physical Security

The future of Physical Security will see an increase in Leveraging the Power of the Network. Leading to: Increased information as a utility to maximize ROI

Eliminated infrastructure redundancy to increase productivity and lower TCO

Increased Partnerships

Organizations that leverage investments in an IP network-centric Physical Security Operation will maximize the inherent value of video, capital and personnel, enhancing the safety and security of

people, and an organizations’ assets.

Page 19: © 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential01/28/07 1 CISCO CONFIDENTIAL GLOBAL RISK TECHNOLOGIES Cisco’s Best Practices

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1901/28/07 CISCO CONFIDENTIAL