18
Integration of Port of Miami legacy systems into Integration of Port of Miami legacy systems into Florida Unified Port Access Credential Program Florida Unified Port Access Credential Program Enterprise Integration Objectives Enterprise Integration Objectives Louis A. Noriega Louis A. Noriega Computer Services Manager Computer Services Manager

Integration of Port of Miami legacy systems into Florida

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Integration of Port of Miami legacy systems into Integration of Port of Miami legacy systems into Florida Unified Port Access Credential ProgramFlorida Unified Port Access Credential Program

Enterprise Integration Objectives Enterprise Integration Objectives Louis A. NoriegaLouis A. Noriega

Computer Services ManagerComputer Services Manager

Information is a critical asset to Information is a critical asset to any business, and the ability to any business, and the ability to dynamically assimilate, analyze dynamically assimilate, analyze and modify this asset dictates and modify this asset dictates an enterprise’s chances of an enterprise’s chances of success. In a competitive and success. In a competitive and volatile market, all the volatile market, all the stakeholders in an enterprise stakeholders in an enterprise need to be connected to a need to be connected to a companycompany--wide information wide information fabric.fabric.

Unfortunately while Unfortunately while networking infrastructures networking infrastructures have evolved into universal have evolved into universal and affordable and affordable connectivity, many connectivity, many applications riding this applications riding this infrastructure are still infrastructure are still bound into stovepipe bound into stovepipe systems systems

• Years of buying “best of breed” applications have left business with numerous different systems, most if not all of which do not easily communicate.

• The lack of integrated applications and information leads to inefficient business processes like re-keying or file transfers between systems. This results in the slow-down in information processing as the flow of information moves piecemeal from one place to another.

• Every intervention (manual or system) becomes an opportunity for information loss through translation of formats or inconsistency of interpretation.

How do you Manage Security How do you Manage Security Information Systems so resultsInformation Systems so results

can be achieved withoutcan be achieved withoutNegatively Affecting Commerce?Negatively Affecting Commerce?

Security Measures

Expedient flow of commercevs

What is EAI ?What is EAI ?

EAI is the unrestricted sharing of data and EAI is the unrestricted sharing of data and business processesbusiness processes throughout the throughout the networkednetworked applicationsapplications or data sources in or data sources in an organization. an organization.

Enterprise Application Integration Enterprise Application Integration

How to implement EAIHow to implement EAI•• Develop Port IT expertise (internal staff, Develop Port IT expertise (internal staff,

consultants) to develop and support consultants) to develop and support technologytechnology

•• Purchase systems from vendors which provide Purchase systems from vendors which provide open source (allowing for customization), or open source (allowing for customization), or provide sophisticated Application Program provide sophisticated Application Program Interfaces (API’S)Interfaces (API’S)

•• Create new highly customized applicationsCreate new highly customized applications•• Create an “ENTERPRISE database approach”Create an “ENTERPRISE database approach”

How to implement EAIHow to implement EAI•• Review and enforce portReview and enforce port--wide standards in wide standards in

regards to infrastructure and hardwareregards to infrastructure and hardware•• Continue to stress the requirement that all Continue to stress the requirement that all

applications (whether developed inapplications (whether developed in--house house or acquired) are implemented as a part of or acquired) are implemented as a part of your seaport’s executive information system your seaport’s executive information system (integration of all applications)(integration of all applications)

Importance of Importance of Port Information Technology Port Information Technology

RepresentationRepresentation

• Prevent Islands of information resulting inloss of data integrity

• Prevent Disparate Hardware• Create manageable infrastructure• Assure fault tolerant implementation• Eliminate Server Farms• Assure position for future growth

Standardization in regards to Standardization in regards to infrastructure and hardwareinfrastructure and hardware

• Operating Systems (Windows, Unix, Linux, etc)• Databases (Oracle 9i,IBM DB2,MS SQL*Server)• Telecom Equipment (Cisco, Nortel,etc.)• Communication Topologies

- Fiber Optics (Star, Loop, Ring)- Wireless (Point to Point, Span)

Integrate vs. Interface

What’s the difference?

Port of MiamiPort of MiamiIntegrated Security ApplicationsIntegrated Security Applications

•• CredentialingCredentialing•• Access control / CCTV VideoAccess control / CCTV Video•• Gate controlGate control•• Container imagingContainer imaging•• Company permittingCompany permitting•• CashieringCashiering

Gifts provided byGifts provided byTSA, FDHSMV, and CBPTSA, FDHSMV, and CBP

•• TSA provided Credential (FUPAC / TSA provided Credential (FUPAC / TWIC) TWIC)

•• FDHSMV provided Access controlFDHSMV provided Access control•• CPB provided Radiation Portal UnitsCPB provided Radiation Portal Units

What is the difference between What is the difference between TWIC and FUPAC, and what is TWIC and FUPAC, and what is

FUPACFUPAC

Differences between TWIC and FUPAC Programs

1.) TSA TWIC Program does not mandate the Access Control System. Only Florida state statues require it at this time.

2.) TSA considers the Florida FUPAC/TWIC Implementation a prototype

3.) TWIC validates against terrorism watch lists while Florida also requires criminal background check with no felonies

TSA Regional DB

TSA

Threat List

Enrollment Center

RestrictedArea A

Port Access Control System

State of FloridaCentral Access Control

Database

TWIC Node

TWIC Node

WWWWWW

T1 LineState of Florida ProvidedLocal Port Access Control

System

RestrictedArea B

Systems ArchitectureSystems Architecture

EnterpriseDatabase

CPB RadiationPortal Units

TSACredentialing

FloridaAccess Control

Integration of Port of Miami legacy systems into Florida Integration of Port of Miami legacy systems into Florida Unified Port Access Credential ProgramUnified Port Access Credential Program

Enterprise Integration ObjectivesEnterprise Integration Objectives

Louis A. Noriega1015 N. America Way2nd floorMiami, FL. 33132Phone: (305) 347-4921Email: [email protected]