Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
1
Getting the most out of your IP security systems by leveraging the Cloud
Moderation: Detlef KorusFreelance Journalist forCOMPUTERWOCHE and CIO
2
Jean-Philippe Deby
Soren Lau
Business Development Director –Europe, Genetec
General Manager EMEA Microsoft IoT Device Experience
Genetec Security Center
Scalability Application
innovation
Data and
intelligence
Security and
management
Built on AzureScalability and security to safely and cost-effectively Physical Security systems
Collaboration
People need to connect and share
Complexity
Overwhelming volume of data
Inefficiency
Unable to tap into productivity
Security
Threats are evolving
WHO WE ARE
Common challenges and trendsorganizations face today?
Understanding
A need for greater intelligence
Vulnerabilities can be present everywhere
Client workstation
Wiegand
Exposed Readers -outside the perimeter
ControllerP
erim
eter
IP
125-KHz Prox or Magstripe cards
1. One-directional
2. Unsecure
3. Low throughput (>37b)
1. Provide identification
2. Unencrypted
3. No storage
1. How do users authenticate?
2. Once authenticated, what can they see or do?
3. How is data hidden from unauthorized users?
1. Are there controllers on the outside of the perimeter
2. How often is the firmware on these IP controllers updated?
3. Have default passwords been changed?
CSN only readers undermine the security on a smartcard
A secure architecture
OSDP2
Controller
Per
imet
er
IP
Client workstation
1. Bi-directional
2. Secured with AES-128 bit encryption
3. High throughput (>1024b)
reader
Synergis Cloud link
1. Encrypted comms to the server using TLS 1.2 authenticated encryption
2. No direct interface with the OS
3. Certificate for communication
Transparent reader: No decryption keys on the reader
TLS
1. Ensure controllers are enclosed in a secure and hidden part of the building
2. Ensure the firmware on these IP controllers are always updated?
3. Ensure admin default passwords have been changed?
TLS 1.2
credential
13.56 MHz Smartcard, mobile or biometric credentials
Genetec ClearanceDigital Evidence Management System
Recommended approach
Follow cybersecurity and IT best practices
Ask the right questions
Choose security vendors you can trust
Invest in cybersecurity to prevent significant costs and liability
True Cloud – Managed Cloud - Hybrid
Global monitoring
Investigation
Security Center SaaS
Remotemonitoring
Localmonitoring
Readers &cameras
Security Centerservers
SOC
Site 1 – Local Deployment Site 2 – As a Service
LPR units Readers &Cameras
LPR units
Impressive operational value
Stratocast has been a reliable security system, and it has also delivered major operational advantages for our team.”
‟
Job Pijpers,
Dedicated Roll-Out Manager for new stores, leapp
Leverage the Cloud for On-Premise Systems
Creating actionable information from dataRaw data
Unify, filter, connect, refine & qualify Actionable info
FAMILIAR LEGACY ENTERPRISE MODEL EVOLUTION OF DATA TRANSFORMATION
Data Silos
React to the Past
Limited Data Expertise
Data Aggregation
Proactive Decision Support
Data Democratization
System Administration Dashboard
From Greater Security to better Business Decisions
Helps from a Security understand how many persons are in a store
Helps the Business understand the Dynamic of a Store
New Mobile Experience
USER EXPERIENCE & VISUALIZATION
New Mobile Experience
USER EXPERIENCE & VISUALIZATION
HIPAA /
HITECH ActFERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSAShared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITARSection 508
VPATSP 800-171 FIPS 140-2
High
JAB P-ATOCJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLO
BA
LU
S G
OV
IND
US
TR
YR
EG
ION
AL
ISO 27001
SOC 1
Type 2ISO 27018CSA STAR
Self-AssessmentISO 27017SOC 2
Type 2SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
Azure has the deepest and most comprehensive compliance coverage in the industry
Next steps
For a 30 minutes consultative call – Connect directly with Jean-Philippe Deby
Trial Genetec Clearance for 45 Days:
https://www.genetec.com/solutions/all-products/clearance