13
© 2004 EMC Corporation. All rights reserved. 1 1 SAMS: Surveillance Analysis & Management Solution Physical Security & IT Convergence Leads to Emerging Best Practices TSG Physical Security Solutions Group EMC Corporation

© 2004 EMC Corporation. All rights reserved

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: © 2004 EMC Corporation. All rights reserved

© 2004 EMC Corporation. All rights reserved. 111

SAMS: Surveillance Analysis & Management Solution

Physical Security & IT Convergence Leads to Emerging Best Practices

TSGPhysical Security Solutions GroupEMC Corporation

Page 2: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 22

VIDEO SURVEILLANCE

SENSORS &

ALARMS

EMERGENCY COMMUNICATION

ACCESS CONTROL

INTRUSION DETECTION

INFORMATION SECURITY

SHARED DATABASES

ASSET MANAGEMENT

VISITOR MANAGEMENT

&

IDENTITY RECOGNITION

UNIFIED REPORTING

SurveillanceTechnologies

Page 3: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 33

… and increasing Regulatory Compliance Requirements….

Regulation Who Data Retention and Data Privacy

Gramm-Leach-Bliley Act (GLBA)

Financial

Institutions

Ensure security, confidentiality and integrity of non-public client records (15 U.S.C. § 6801)

Health Insurance Portability and Accountability Act (HIPAA)

Healthcare Industry Patient privacy (Sec 164.306)

Data encryption is an “addressable” requirement.

CA 1386

AB 1950

Companies with customers in California

Encrypting stored data to prevent identity theft (SEC. 2. Section 1798.29)

DoD 5015.2

SEC 17.a-4

U.S. Government Storage encryption and secure deletion for records management applications and data archiving

VISA CISP Merchants, payments processors

Requirement to protect stored data, preferably with strong encryption (s.3)

Sarbanes-Oxley U.S. Corporations Integrity of financial records and systems (Sec. 404)

Page 4: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 44

EMC Core Competencies for Best Practice

Content Management

Network Management

Storage Management

Information Security

4

Physical Security Solutions

Page 5: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 55

… databases, operating systems backup / recovery software, management software

Investing in Best Practices

$2 billion investment = $2 billion experience

More than 2.6PT in 200,000+ square feet of labs– More than 1,200 servers and 30 mainframes from

25 manufacturers– 38 operating systems and HA clusters in multiple supported

versions– Over 1,600 different devices, HBAs, drivers, switches, and tape

subsystems– Dedicated NAS test environment with 90 switches, 7,500 IP

addresses, 750 client systems and switches from eight vendors

More than 380 engineers constantly testing every environment supported by EMC

Documented e-lab output and tools available directly to customers

… storage systems, servers, switches, hubs, host adapters, bridges, tape systems...

Page 6: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 66

DeliverCreate / Capture

Archive / Dispose

Desktop Authoring

ToolsWeb and Portal

Content

ScannedImages

E-mails

Manage

Content Management

Platform

Security and Access Control

Library Services

Rendition Management

Search

Workflow

Lifecycle ManagementEnterprise Applications

Rich Media

WirelessPortalsFax

CD-RomE-mail Paper

Physical Security Applications

Best Practices – Content Management

Page 7: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 77

Best Practices – Network Management & Storage Architecture

SAMS SERVER

3 Tiered Storage

Network Archive

Active Archive

Priority Lifecycle

Management

Access Control Intrusion Detection Visitor Management

Identity Recognition

Asset ManagementSensors & Alarm Systems

Emergency Communications

Page 8: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 88

Customerdata

Customerdata

Information Security – Concerns with Convergence

Earningsreleases

Earningsreleases

Salariesand

reviews

Salariesand

reviews

Litigationdocs

Litigationdocs

CEO

GeneralCounsel

CFO

NetworkAdministrators

SystemAdministrators

BackupAdministrators

StorageAdministrators

OutsourcingVendors

DR StorageAdministrators

TapeCourier

Storage Repair/Service Staff

Storage

Page 9: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 99

NAS/DAS

Disaster Recovery

SAN CAS

Horizontal Security Service

Ethernet iSCSI Fiber Channel Fiber Channel

End User Client

FileServices

DatabaseApplications

ERP E-MailWeb

Services

Hor

izon

tal

Pro

visi

oni

ng

Fra

mew

ork

Ver

tica

lP

rovi

sion

in

g F

ram

ewor

k

Network

Storage

Application

Secure storage consolidation = ROI

Insider threat mitigation

Regulatory compliance

Database security Secure disaster

recovery Intellectual

property protection Encryption Secure

Information lifecycle management

Best Practices – Information Security

Page 10: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 1010

Surveillance Analysis & Management Solutions

SAMS Core Monitoring Engines – Video: Motion & Object Awareness– Audio: Word Spotting & Transcription– Text: Native (email) & Object (fax, scan)– Data: Infosec Prevention & Response– Transit: RFID & GPS– Device Drivers

3rd Party Applications– Edge Devices– Intelligent Analytics

• Behavior: Physical, Fraud• Association: Obvious, Covert• Sensors: CBRNE• Biometrics: IRIS, Fingerprint, Facial

Network & Storage Architecture– Local: Network Archive – Central: Active – Archive– ILM: Active – Archive – Recycle

SAMS Server - Video Monitoring - Audio Monitoring - Text Monitoring - Data Monitoring - Transit Monitoring - Device Drivers

Storage Infrastructure

3rd Party Analytics and Rendering

Invo

ked

Man

agem

ent

&O

per

atio

nal

Ser

vic

es A

pp

sE

nte

rpri

se C

on

ten

t M

gt.

Pla

tfo

rm

Mu

ltimed

ia D

ata So

urces

(Vid

eo, au

dio

, Telep

ho

ny, em

ail)

Interfaces / APIs

Interfaces / APIs

Interfaces / AP

IsInte

rfac

es /

AP

Is

Page 11: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 1111

•P

olicy M

anag

emen

t•

Perfo

rman

ce En

han

cemen

ts•

No

n-rep

ud

iation

•S

ecurityH

igh A

vailab

ility

Ba

ckup

Re

covery

Re

plication

Archive

Wo

rkflow

Co

mp

liance

Wo

rd S

po

tting

Tran

scriptio

ns

OC

R(L

ice

ns

e P

late

s, e

tc.)

Sp

eaker ID

No

n-sp

eechA

ud

io R

ec

og

nitio

n

Stress

/emo

tion

recog

nitio

n

RF

ID

Ex

traS

pe

ctru

m

Au

dio

&T

ele

ph

on

y

Mu

ltiM

od

al

mg

mt

SAMS Value Proposition – Step Two

SOURCES

CORE

PLATFORM

APPLICATIONS

VIEWS

BROWSER BASED, THIN CLIENTS,

EMBEDDED CLIENTS

Page 12: © 2004 EMC Corporation. All rights reserved

© 2005 EMC Corporation. All rights reserved. 1212

1000s of Cameras

SAMS Servers on Dell Hardware

Integrate 3rd Party Analytic Applications

Leverage Existing Cameras

Leverage Existing Network

SAN Storage

12

CLARiiON Storage Array

Digital Encoder

SAMS Server

Application Servers

Integrating Best Practices for Security Infrastructure

Page 13: © 2004 EMC Corporation. All rights reserved