25
1 Getting the most out of your IP security systems by leveraging the Cloud Moderation: Detlef Korus Freelance Journalist for COMPUTERWOCHE and CIO

Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

1

Getting the most out of your IP security systems by leveraging the Cloud

Moderation: Detlef KorusFreelance Journalist forCOMPUTERWOCHE and CIO

Page 2: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

2

Jean-Philippe Deby

Soren Lau

Business Development Director –Europe, Genetec

General Manager EMEA Microsoft IoT Device Experience

Page 3: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms
Page 4: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Genetec Security Center

Page 5: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Scalability Application

innovation

Data and

intelligence

Security and

management

Built on AzureScalability and security to safely and cost-effectively Physical Security systems

Page 6: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Collaboration

People need to connect and share

Complexity

Overwhelming volume of data

Inefficiency

Unable to tap into productivity

Security

Threats are evolving

WHO WE ARE

Common challenges and trendsorganizations face today?

Understanding

A need for greater intelligence

Page 7: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms
Page 8: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Vulnerabilities can be present everywhere

Client workstation

Wiegand

Exposed Readers -outside the perimeter

ControllerP

erim

eter

IP

125-KHz Prox or Magstripe cards

1. One-directional

2. Unsecure

3. Low throughput (>37b)

1. Provide identification

2. Unencrypted

3. No storage

1. How do users authenticate?

2. Once authenticated, what can they see or do?

3. How is data hidden from unauthorized users?

1. Are there controllers on the outside of the perimeter

2. How often is the firmware on these IP controllers updated?

3. Have default passwords been changed?

CSN only readers undermine the security on a smartcard

Page 9: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

A secure architecture

OSDP2

Controller

Per

imet

er

IP

Client workstation

1. Bi-directional

2. Secured with AES-128 bit encryption

3. High throughput (>1024b)

reader

Synergis Cloud link

1. Encrypted comms to the server using TLS 1.2 authenticated encryption

2. No direct interface with the OS

3. Certificate for communication

Transparent reader: No decryption keys on the reader

TLS

1. Ensure controllers are enclosed in a secure and hidden part of the building

2. Ensure the firmware on these IP controllers are always updated?

3. Ensure admin default passwords have been changed?

TLS 1.2

credential

13.56 MHz Smartcard, mobile or biometric credentials

Page 10: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms
Page 11: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Genetec ClearanceDigital Evidence Management System

Page 12: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms
Page 13: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Recommended approach

Follow cybersecurity and IT best practices

Ask the right questions

Choose security vendors you can trust

Invest in cybersecurity to prevent significant costs and liability

Page 14: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms
Page 15: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

True Cloud – Managed Cloud - Hybrid

Global monitoring

Investigation

Security Center SaaS

Remotemonitoring

Localmonitoring

Readers &cameras

Security Centerservers

SOC

Site 1 – Local Deployment Site 2 – As a Service

LPR units Readers &Cameras

LPR units

Page 16: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Impressive operational value

Stratocast has been a reliable security system, and it has also delivered major operational advantages for our team.”

Job Pijpers,

Dedicated Roll-Out Manager for new stores, leapp

Page 17: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Leverage the Cloud for On-Premise Systems

Page 18: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Creating actionable information from dataRaw data

Unify, filter, connect, refine & qualify Actionable info

Page 19: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

FAMILIAR LEGACY ENTERPRISE MODEL EVOLUTION OF DATA TRANSFORMATION

Data Silos

React to the Past

Limited Data Expertise

Data Aggregation

Proactive Decision Support

Data Democratization

Page 20: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

System Administration Dashboard

Page 21: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

From Greater Security to better Business Decisions

Helps from a Security understand how many persons are in a store

Helps the Business understand the Dynamic of a Store

Page 22: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

New Mobile Experience

USER EXPERIENCE & VISUALIZATION

Page 23: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

New Mobile Experience

USER EXPERIENCE & VISUALIZATION

Page 24: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

HIPAA /

HITECH ActFERPA

GxP

21 CFR Part 11

Singapore

MTCS

UK

G-Cloud

Australia

IRAP/CCSL

FISC Japan

New Zealand

GCIO

China

GB 18030

EU

Model Clauses

ENISA

IAF

Argentina

PDPA

Japan CS

Mark Gold

CDSAShared

Assessments

Japan My

Number Act

FACT UK GLBA

Spain

ENS

PCI DSS

Level 1MARS-E FFIEC

China

TRUCS

Canada

Privacy Laws

MPAA

Privacy

Shield

India

MeitY

Germany IT

Grundschutz

workbook

Spain

DPA

HITRUST IG Toolkit UK

China

DJCP

ITARSection 508

VPATSP 800-171 FIPS 140-2

High

JAB P-ATOCJIS

DoD DISA

SRG Level 2

DoD DISA

SRG Level 4IRS 1075

DoD DISA

SRG Level 5

Moderate

JAB P-ATO

GLO

BA

LU

S G

OV

IND

US

TR

YR

EG

ION

AL

ISO 27001

SOC 1

Type 2ISO 27018CSA STAR

Self-AssessmentISO 27017SOC 2

Type 2SOC 3ISO 22301

CSA STAR

Certification

CSA STAR

AttestationISO 9001

Azure has the deepest and most comprehensive compliance coverage in the industry

Page 25: Getting the most out of your IP security systems by ...€¦ · Getting the most out of your IP security systems by leveraging the Cloud Moderation: ... Cloud link 1. Encrypted comms

Next steps

For a 30 minutes consultative call – Connect directly with Jean-Philippe Deby

[email protected]

Trial Genetec Clearance for 45 Days:

https://www.genetec.com/solutions/all-products/clearance