25
Protecting Enterprises from External Threats through Intrusion Detection

Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

Protecting Enterprises from External Threats through Intrusion Detection

Page 2: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

TODAY’S SPEAKERS

Mark Brown

FLIR Systems, Director - FLIR Security and Surveillance

Ian Steele

PBX Engineering, Managing Principal and Professional Electrical Engineer

Page 3: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

SESSION CONTENT

Designing and Specifying Perimeter Systems

Perimeter Detection

Site Challenges and Considerations

Concept of Operation Factors

Technologies –Thermal Cameras, Radar, and Integration Software

Questions

Page 4: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

DESIGNING PERIMETER SYSTEMS

• Risk/threat assessment

• Setting coverage expectations

• Infrastructure vs. equipment costs

• Functional vs. technology

• Work to optimize design to meet the budget

Page 5: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

PERIMETER DETECTION

• Multi-layered approach

• Automation

• Cost benefits, ROI

• Reliability (low false alarm rates)

Page 6: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

SITE CHALLENGES AND CONSIDERATIONS

• Geometry

• Size and location

• Entry points

• Infrastructure location and availability

Page 7: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

CONCEPT OF OPERATION FACTORS

• Differing threats and mandates

• Varied workflows

• Intelligent alarm and event management

Page 8: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

ALARM SCENARIOS

• Detect everything vs filtering and automation (birds, rabbits at an airport)

• Utilize persistence in longer range radar applications where targets may appear/disappear (border surveillance)

• Directional detection - only detect targets coming from a certain direction (Dam buoy line)

Page 9: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

PERIMETER TECHNOLOGIES/SYSTEMS

Session

Focus

Page 10: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

PERIMETER TECHNOLOGIES/SYSTEMS

ASSESS RESPONDDETECT

EO/IR Wide Area Radar Command & Control

Page 11: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

SURVEILLANCE RADAR

• Proven technology

• Different technologies to suit application (FMCW & Doppler)

• Variety of ranges (short, mid, long)

Page 12: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

RADAR BENEFITS

• Detects movement

• Provides location/speed/heading

• Works rain or shine/day or night

• Detects, classifies and tracks multiple targets

• Low false alarm rate

Page 13: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

DRONE DETECTION

• Significant threat

• Accessibility – cheap and simple

• Provides elevation data

• Classifies targets

• Camera tracking for assessment

• Integrate with countermeasures

Page 14: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

THERMAL CAMERA TYPES

Uncooled – less range, less expensive Cooled – more range, more expensive

Page 15: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

THERMAL CAMERA ADVANTAGES

24/7 operation in dark or low light areas

Page 16: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

THERMAL CAMERA ADVANTAGES

Not affected by lighting conditions

Page 17: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

THERMAL CAMERA ADVANTAGES

Superior contrast Superior analytics

Page 18: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

DUAL-SENSOR THERMAL CAMERAS

Page 19: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

DRONE SURVEILLANCE

• Access difficult locations

• Quickly deployable for incident response

• Automation – incident response, autonomous patrols

Page 20: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

INTEGRATION SOFTWARE – OVERVIEW

• Combine technologies

• Scalable and flexible

• Mapping engine

• Response automation

Page 21: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

INTEGRATION SOFTWARE - MAPPING

• Key interface element

• Static and dynamic GIS maps

• 2D and 3D support

• Configurable zones

• Icon animation

Page 22: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

INTEGRATION SOFTWARE - AUTOMATION

• Filtering and re-classify targets based on zone, speed, heading, age, and schedule

• Support known tracks -blue force trackers, GPS, and AIS sources

• Camera groups, tracking priority

Page 23: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

INTEGRATION SOFTWARE – DEVICE CONTROL

Advanced control examples:

Cameras:

• visible/thermal selection

• white hot/black hot

• NUC, autofocus

Radars:

• transmit on/off

• track icon display properties

Page 24: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

Interface Example

System example of radar tracking and dual sensor cameras

Page 25: Protecting Enterprises from External Threats …...ALARM SCENARIOS •Detect everything vs filtering and automation (birds, rabbits at an airport) •Utilize persistence in longer

QUESTIONS