Designing Resilient and Reliable
|
|
- Ashley Ramsey
- 6 years ago
- Views:
Transcription
1 Designing Resilient and Reliable Video Survellaince Systems Copyright 2013 NICE Systems Ltd. All rights reserved.
2 Important Notice NICE Systems Ltd. shall bear no responsibility or liability to a client or to any person or entity with respect to liability, loss or damage caused or alleged to be caused directly or indirectly by any NICE product. This includes, but is not limited to, any interruption of service, loss of business or anticipatory profits or consequential damage resulting from the use or operation of any NICE products. Information in this document is subject to change without notice and does not represent a commitment on the part of NICE Systems Ltd. The systems described in this document are furnished under a license agreement or non-disclosure agreement. All information included in this document, such as text, graphics, photos, logos and images, is the exclusive property of NICE Systems Ltd. and protected by United States and international copyright laws. Permission is granted to view and photocopy (or print) materials from this document for personal, non-commercial use only. Any other copying, distribution, retransmission or modification of the information in this document, whether in electronic or hard copy form, without the express prior written permission of NICE Systems Ltd., is strictly prohibited. In the event of any permitted copying, redistribution or publication of copyrighted material, no changes in, or deletion of, author attribution, trademark legend or copyright notice shall be made. This product is covered by one or more of the following US patents: 5,216,744 5,457,782 6,246,752 6,615,193 6,865,604 7,010,106 7,305,082 7,474,633 7,587,454 7,705,880 7,751,590 RE41,292 5,274,738 5,911,134 6,249,570 6,694,374 6,871,229 7,010,109 7,333,445 7,532,744 7,599,475 7,714,878 7,761,544 5,289,368 5,937,029 6,252,946 6,728,345 6,880,004 7,058,589 7,346,186 7,545,803 7,631,046 7,716,048 7,770,221 5,325,292 6,044,355 6,252,947 6,775,372 6,937,706 7,085,728 7,383,199 7,546,173 7,660,297 7,720,706 7,788,095 5,339,203 6,115, ,194 6,785,369 6,959,079 7,152,018 7,386,105 7,573,421 7,664,794 7,725,318 7,801,288 5,396,371 6,122,665 6,330,025 6,785,370 6,965,886 7,203,655 7,392,160 7,577,246 7,665,114 7,728,870 7,822,605 5,446,603 6,192,346 6,542,602 6,856,343 6,970,829 7,240,328 7,436,887 7,581,001 7,683,929 7,738,459 7,848,947 NICE Disclaimer: NICE Disclaimer: We own the following trademarks in different countries: 360º View, Alpha, ACTIMIZE, Actimize logo, Customer Feedback, Dispatcher Assessment, Encorder, enicelink, Executive Connect, Executive Insight, FAST, FAST alpha Blue, FAST alpha Silver, FAST Video Security, Freedom, Freedom Connect, IEX, Interaction Capture Unit, Insight from Interactions, Investigator, Last Message Replay, Mirra, My Universe, NICE, NICE logo, NICE Analyzer, NiceCall, NiceCall Focus, NiceCLS, NICE Inform, NICE Learning, NiceLog, NICE Perform, NiceScreen, NICE SmartCenter, NICE Storage Center, NiceTrack, NiceUniverse, NiceUniverse Compact, NiceVision, NiceVision Alto, NiceVision Analytics, NiceVision ControlCenter, NiceVision Digital, NiceVision Harmony, NiceVision Mobile, NiceVision Net, NiceVision NVSAT, NiceVision Pro, Performix, Playback Organizer, Renaissance, Scenario Replay, ScreenSense, Tienna, TotalNet, TotalView, Universe, Wordnet are trademarks and/or registered trademarks of NICE Systems Ltd. All other trademarks are the property of their respective owners. All contents of this document are: Copyright 2011 NICE Systems Ltd. All rights reserved.
3 7Industry Overview Video surveillance systems have been deployed extensively in various organizations around the world. The capabilities and features of video surveillance systems assist security officers to improve security operations; deterring, managing and mitigating possible threats to the organization security and safety thus reducing the overall TCO (total cost of ownership) of the security array. One of the main concerns of security managers in modern organizations is to have a video surveillance service that is operable and accessible at any given time, for 24x7x365 live monitoring and ongoing investigation operations. 0Building a Resilient Video Surveillance System for IP Environments To achieve the required reliability for the security organization, it is necessary to ensure resilience on several layers. This concept is referred to as Multi Layered Resilience (MLR). The MLR approach integrates the resilience of the various layers, reinforcing overall system resilience, and ensuring that all system operations are always available to the security force, even in cases of failure. The MLR approach is depicted in XFigure 1X: Due to the increased importance of the video surveillance system, a failure in the system, which results in service downtime, can cause severe implications to the security of organization assets, customers and employees. Moreover, the financial impact of a failed video surveillance system can be critical to the organization. For example, failed video surveillance can initiate a costly evacuation of an airport due to a late noticed suspicious object, and in some cases can even lead to personal liability lawsuits against organization managers. System reliability is thus a critical factor in the successful operation of a security organization, which is charged with protecting lives and assets within a business. In traditional video surveillance systems, the reliability of the video surveillance system depended mainly on the reliability of the specific CCTV components on-site. On the other hand, IP-based video surveillance solutions can be installed in centralized as well as highly distributed architectures. The network-based solution demands the resiliency of the overall video surveillance architecture and its underlying layer, namely the IP network to enforce the required reliability in order to avoid the degradation of the security force s performance and capabilities. Figure 1 Multi-layer Resilience 1Networking Resilience The IP network infrastructure constitutes the foundation of a video surveillance system. The IP network is used to carry IP encoded video data from surveillance cameras to decoding devices. A failure in the IP network, or even a temporary disturbance, might degrade or even completely halt the overall security operations, creating a security risk. Operators must therefore ensure that the networking infrastructure is based upon proven switching and routing components from wellknown vendors, and that it employs highavailability mechanisms, such as Rapid Spanning Tree Protocol (RSTP) in L2 devices Page 1
4 and Virtual Router Redundancy Protocol (VRRP) in L3 devices. The design and implementation of a resilient networking infrastructure ensures that the video surveillance service continues without interruptions or failures. To support the redundant structure of the IP network, the video surveillance system itself must provide dual networking interfaces to the network, so that if a specific network switch or router fails, the video traffic is routed to the alternative path without user intervention and delay. 2Video Surveillance Infrastructure Resilience On top of the network infrastructure, the video surveillance components themselves must be designed to be resilient to various failures and problems. place and continues to route the video signals transparently to the user and there is no need for intervention in the process. Figure 2: Encoder Resilience Normal Operation 8Encoder Resilience At the ingress point of the video into the video surveillance networks are the video encoders. Encoders are used to convert analog video signal into digital video and transport it across the IP network. Careful attention should be given to encoder redundancy mechanisms, because failure in the encoding devices results in no video streaming. Firstly, the encoder should include dual power supplies, which are connected to different power sources. This guarantees the video stream during a power failure. Secondly, the encoder should employ dual fans to ensure proper operation even if one of the fans fails. In addition, dual Network Interface Cards (NIC) should be available to route video traffic through the second interface if a failure in the first interface or a network switch connected port occurs. Another important mechanism is complete encoder redundancy. In this architecture, a single encoder is used as a backup device to a group of encoders. This configuration is sometimes referred to as N+1 redundancy, where N represents the number of active devices that are backed up by the additional decoder, which is in stand-by mode. If an active encoder fails, the standby encoder takes its Figure 3: Encoder Resilience - Failover Finally, one of the most important encoder features is multicast streaming. With multicast streaming, the video signal can be delivered directly from the edge devices without the need to pass through the Smart Video Recorder; improving overall system reliability. Note that for multicast support the network video Recorder, decoding devices and IP network must all be able to support multicast protocols such as Internet Group Multicast Protocol (IGMP). 9Smart Video Recorder (SVR) Resilience The network video Recorder is responsible for recording video streams originating from encoding devices (IP encoders and/or IP cameras) to an internal or external storage device. The recording functionality is essential to the investigation capabilities of the security force. The SVR must be designed as a highly reliable computing platform, including all the relevant components: CPU and memory, networking interfaces and storage devices. The latter is one of the most critical components in the SVR system, mainly because video data is physically stored on the hard drives, and Page 2
5 retrieved for later use on a regular basis. Because hard drives (HDD) are mechanical components, they are prone to failure, so failure in a storage device means that the video recorded on the device cannot be used for investigation. To overcome this barrier, the SVR must support Redundant Array of Independent Disks (RAID) configuration, which is a standard technology in IT environments. RAID ensures the possibility to recreate (or rebuild) the original data from the remaining disks when an HDD fails. It is important to emphasize that the data rebuilding operation requires massive computing and storage resources, so that during this operation SVR performance can be limited. It therefore is critical to measure and publish SVR performance under rebuilding conditions; otherwise, the operator risks a significant drop in video quality, and even video loss, due to limited recording and playback resources during this operation. Similarly to encoders, the SVR platform must support an N+1 configuration as well as provide a resilient physical architecture including support of dual power supplies, dual fans and dual networking interfaces. 10Dual Channel Recording Resilience In addition to Recorder resilience as described in the above section, the ability to record the same channel simultaneously on two different SVRs is a valuable functionality which enhances the reliability of recording services. Dual channel recording provides two major benefits: Flexible backup each SVR can store the recorded video for different periods of time. Moreover, the video recording quality can vary between the two SVRs (e.g. different resolution, different frame rate and even a different recording configuration such as events only or continuous). Zero downtime service missionwith a critical installations are supported zero downtime recording solution (without failover time). 11Digital Video Recorder Resilience A video surveillance system can be based on Digital Video Recorders (DVR), which replace both legacy encoder and SVR environments. A video surveillance system based on a DVR should support high-resilience architecture similar to network-based architectures. Like the SVR, the DVR must be designed as a highly reliable computing platform, including all components, and especially support RAID arrays. Furthermore, the DVR platform must provide resilient physical architecture including dual power supplies, dual fans, and dual networking interfaces. The DVR should also support multicast transmission to enable multiple decoders to receive the video stream, and thus overcome possible decoder failures. 12Decoder Resilience The last link in the video streaming chain is the decoding device. Decoding devices can be embedded devices, dedicated appliances, or PC workstations. Decoder resilience should be complemented by advanced application functionalities such as Level of Service and Persistent Video Monitoring (PVM). 3Applications and Services Resilience The video surveillance service is based on the underlying networking and video infrastructure, and controlled by the user via the security application. Both the service and application itself must therefore provide a resilient and consistent user experience to ensure that monitoring and investigation are effective at all times. Level of Service (LoS) support is one of the most important mechanisms that ensures a resilient and reliable user experience. LoS guarantees an optimal video stream according to both networking conditions and decoding platform resources. For example, if the user defines that the required resolution for the video signal monitoring is 4CIF at 30fps (for NTSC), and the IP network cannot sustain the load due to congestion or other related phenomenon, the LoS mechanism is initiated. The LoS Page 3
6 mechanism dynamically reduces the frame rate or resolution to accommodate the new conditions. A similar overload in the decoding station is handled by the LoS mechanism resulting is a smooth viewing experience for the operator, who does not need to configure the network or decoder parameters. Video monitoring is usually based on nonreliable network transmission protocols such as UDP, which reduce latency and jitter but do not guarantee the orderly delivery of IP packets containing video data. This can sometimes cause a temporary disconnection from the source, for a varying period of time. The application suite should therefore employ a Persistent Video Monitoring (PVM) mechanism, to ensure the automatic video signal display when the data is available. The PVM mechanism should be accompanied by appropriate buffering techniques that guarantee a high-quality experience for the security officer. The video information itself has to be reliable, making sure that the video will be valuable and usable for by the different system s users, and be admissible in court. Therefore the following mechanisms should be applied: Visual Parameter Optimization guarantees the highest video quality in different lighting conditions Camera Tampering Detection protects against camera tampering such as obstruction and dislocation Video Authentication guarantees the authenticity of the digital video image, and making sure that it was not altered by an attacker (also considered as an IT security mechanism) Finally, the overall application, including the virtual matrix functionalities, must be designed in an intuitive manner for quick video recording and streaming problem recognition, facilitating corrective actions, such as monitoring rerouting or configuration of the recording devices to record a certain channel. 4Management and IT Security In addition to the resilience design of video components and services, management operations and system security against malicious attacks must be ensured. The management components are responsible for the ongoing configuration and maintenance of the system, and for the central point of management and enforcement of the connections between different entities of the systems. The Application Management Server (AMS) must be highly resilient, and should employ high-availability architecture. If the primary AMS fails, the backup server continues to control and maintain the overall video surveillance system operations and handling. Figure 4: AMS Redundancy Configuration Furthermore, to provide a truly resilient solution with no single point of failure, even if the AMS fails, all monitoring and investigation operations must be able to continue without interruption. Other management resilience schemes support Disaster Recovery Protection (DRP) solutions. In this solution two or more management servers work in an active-active mode to support seamless failover for service continuity in case one of the management servers fails. The DRP software synchronizes the management servers using virtualization technology. In the event of a failure on one server, applications in the virtual environment continue to operate using the redundancy provided by the other server. All in-process disk transactions and application state are maintained through the failure. To assist maintenance and operations personnel to quickly locate and isolate problems and failures in the video surveillance system, the management system should provide the user with a comprehensive and accurate maintenance alarm application, which provides clear details about the fault source, and enables the maintenance crew to fix the problem rapidly, ensuring the continuation of all security operations. Penetration of the IP infrastructure by hackers must also be controlled; the IP network itself must be protected against cyber attack. Page 4
7 Additionally, the video surveillance system must provide extensive user configuration and operational capabilities to define relevant operational profiles. Configurability ensures proper segmentation between users and departments, so that only relevant personnel are able to perform specific actions with specific equipment, thus limiting the potential damage from malicious attacks or even incorrect operation. This should be enforced using an advanced Role-Based Access Control (RBAC) mechanism that defines user profiles and their associated properties, managed entities, and operations. To complete the protection of the system, the video surveillance management application should include an extensive password protection scheme, with comprehensive password configuration capabilities, and an option to perform a Single Sign-on login to the organizational Active Directory repository as this hinders potential intruders from gaining access to the system. 5System Availability Figures The system architecture influences the system availability figures. System availability is the percentage of time that the system provides its users with a service (in surveillance system the service is video recording and display). Availability is often measured by number of 9 s. For example a 5 9 s system is a system which is available % of the year (5 minutes downtime. These figures are extremely important for planning operations and services accordingly. NICE has conducted extensive research that calculated availability figures, based on the resilient architecture which was described throughout this document. Below are the availability figures for several layers of resilience options. System Redundancy Resilient Components System Availability (MTTR=4 hours) System Yearly Downtime (MTTR=4 hours) System Availability (MTTR=24 hours) System Yearly Downtime (MTTR=4 hours) Complete Redundancy AMS, Encoder, SVR >99.999% <5.26 minutes >99.99% <52.6 minutes Partial Redundancy No Redundancy Encoder >99.9% <8.76 hours >99.8% <17.52 hours None 99.9% 8.8 hours 99.4% 2.2 days Notes: All figures include a Mean Time To Repair (MTTR) of 4 or 24 hours. MTTR of 24 hours usually corresponds with an SLA of Next Business Day which is the common SLA, where MTTR of 4 hours usually corresponds with a more advanced SLA. The complete details and calculation method can be found in Technical Note # 154. All figures relate to a high capacity system, which represents an enterprise grade system. Page 5
8 6Conclusions The table below summarizes the different resiliency mechanisms which apply to each component in the system: Components AMS Encoder Smart Video Recorder Application Information Security Resilience Mechanisms Hardware Redundancy (Dual Power Supply, Dual NIC, RAID) Cold backup (manual database backup) Hot-standby (database redundancy) Active Active redundancy (Geo-Clustering) Hardware Redundancy (Dual Power Supply, Dual NIC) Encoder N+1 cluster architecture Hardware Redundancy (Dual Power Supply, Dual NIC, RAID) Recorder N+1 cluster architecture Dual Recording Central Storage Server Archiving Level of Service Persistent Monitoring Visual Parameter Optimizer Camera Tampering Role Base Access Control privilege mechanism Single Sign-On and Active Directory Integration Video Authentication To truly achieve the sought after reliable security service, both the security officer and IT manager should pay special attention to the design of overall system reliability and resiliency, including all video surveillance components, applications and services, as well as the IP network infrastructure. As the video surveillance arena is rapidly moving towards IPbased video surveillance systems, supporting either DVR or encoder/svr, the resilience of video surveillance systems is strongly dependent on the IP network. This trend is accelerating mainly due to business and operational drivers, such as reduced TCO and improved ROI, along with improved security operations and new business applications. However, this migration must be accompanied with the introduction of highly resilient and reliable video surveillance solutions that ensure operational continuity of the security service, and lead to a safer, more secure organization and business environment. About NICE Systems NICE Systems (NASDAQ: NICE), is the worldwide leader of intent-based solutions that capture and analyze interactions and transactions, realize intent, and extract and leverage insights to deliver impact in real time. Driven by cross-channel and multi-sensor analytics, NICE solutions enable organizations to improve business performance, increase operational efficiency, prevent financial crime, ensure compliance, and enhance safety and security. NICE serves over 25,000 organizations in the enterprise and security sectors, representing a variety of sizes and industries in more than 150 countries, and including over 80 of the Fortune 100 companies. Page 6
9 ABOUT NICE systems NICE (NASDAQ: NICE) is the worldwide leader of software solutions that deliver strategic insights by capturing and analyzing mass quantities of structured and unstructured data in real time from multiple sources, including, phone calls, mobile apps, s, chat, social media, and video. NICE solutions enable organizations to take the Next-Best-Action to improve customer experience and business results, ensure compliance, fight financial crime, and safeguard people and assets. NICE solutions are used by over 25,000 organizations in more than 150 countries, including over 80 of the Fortune 100 companies. ABOUT NiceVision NiceVision helps leading organizations enhance their security operations and improve performance using intelligent digital video solutions. NiceVision integrates real-time analysis, IP networking, recording and management to enable automatic threat detection, instant verification, event resolution and effective investigation. CONTACTS Global International HQ, Israel, T F Americas, North America, T F EMEA, Europe & Middle East, T F Asia Pacific, Singapore Office T F The full list of NICE marks are the trademarks or registered trademarks of Nice Systems Ltd. For the full list of NICE trademarks, visit All other marks used are the property of their respective proprietors. DATE 04/2013 P/N WP CONTENTS OF THIS DOCUMENT ARE COPYRIGHT nice.com
All contents of this document are: Copyright 2010 NICE Systems Ltd. All rights reserved.
NICE Perform Releases 3.1 & 3.2 Insight from Interactions TM Information in this document is subject to change without notice and does not represent a commitment on the part of NICE Systems Ltd. The systems
More informationComplete. Open. Architecture. Reliable. Evolutionary.
NiceVision express NiceVision express is a high-end open IP video management solution tailored for systems up to 64 cameras. Statistically the majority of video security installations are under 64 cameras,
More informationNICE Perform Virtualization Solution Overview
INSIGHT FROM INTERACTIONS Solution Overview NICE Perform Virtualization Solution Overview Table of Contents Introduction... 3 Server Virtualization... 4 The Virtualization Layer (aka Hypervisor)... 6 CPU
More informationNICE Perform. Insight from Interactions TM
NICE Perform Insight from Interactions TM NICE Systems Ltd. shall bear no responsibility or liability to a client or to any other person or entity with respect to liability, loss or damage caused or alleged
More informationAll contents of this document are: Copyright 2008 NICE Systems Ltd. All rights reserved.
NICE Perform Release 3.1 Insight from Interactions TM NICE Systems Ltd. shall bear no responsibility or liability to a client or to any other person or entity with respect to liability, loss or damage
More informationVideo Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance
S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless
More informationHow Industrial PoE Switches Facilitate Reliable Outdoor IP Surveillance Networks. Jackey Hsueh Product Manager
How Industrial PoE Switches Facilitate Reliable Outdoor IP Surveillance Networks Jackey Hsueh Product Manager Abstract Outdoor IP surveillance networks can reap substantial benefits from PoE technologies.
More informationInterCall Virtual Environments and Webcasting
InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationSecuring Your Campus
Securing Your Campus Copyright CheckVideo LLC. All Rights Reserved. Introduction Security and Safety Officers are committed to providing a safe and welcoming learning environment that prepares students
More informationSolutions for Rising Video Surveillance Storage Demands
IHS TECHNOLOGY FEBRUARY 2016 Solutions for Rising Video Surveillance Storage Demands Josh Woodhouse, Senior Analyst, Video Surveillance TABLE OF CONTENTS The Video Surveillance Market... 2 Options and
More informationPut Time Back on your Side
Access Control Put Time Back on your Side When it comes to ensuring safety, preparing for emergencies and protecting your people and assets, time is of the essence. Avigilon Access Control Manager (ACM)
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationOne Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software
Solution Brochure High-Performance Networking for the Enterprise with JUNOS Software Using the Network to Achieve Higher Availability, Lower OPEX and Improved Productivity for Your Business Core Branch
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationSuccessfully Transitioning to VoIP Recording
INSIGHT FROM INTERACTIONS TM White Paper Successfully Transitioning to VoIP Recording All contents of this document are: Copyright 2006 NICE Systems Ltd. All rights reserved Overview Contact center recording
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationA MARCH NETWORKS WHITE PAPER. Shadow Archiving in Video Surveillance Systems. Fail Safe Recording Options for IP Edge Devices
A MARCH NETWORKS WHITE PAPER Shadow Archiving in Video Surveillance Systems Fail Safe Recording Options for IP Edge Devices Table of Contents Executive Summary...2 Introduction...2 Background...2 DVR
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions
ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT Guidelines and Frequently Asked Questions About NETSCOUT NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) assures digital business services against disruptions
More informationCisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center
Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing
More informationAugust Oracle - GoldenGate Statement of Direction
August 2015 Oracle - GoldenGate Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your
More informationAn ESRI White Paper June 2009 ArcGIS Server and Virtualization
An ESRI White Paper June 2009 ArcGIS Server and Virtualization ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2009
More information5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C
WHITE PAR 5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C 1 WHITE PAR from Legacy Voice to VoIP and UC&C Voice communications are undergoing a profound shift, with many organizations
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationOverview. Business value
PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to
More informationVirtual Security Server
Data Sheet VSS Virtual Security Server Security clients anytime, anywhere, any device CENTRALIZED CLIENT MANAGEMENT UP TO 50% LESS BANDWIDTH UP TO 80 VIDEO STREAMS MOBILE ACCESS INTEGRATED SECURITY SYSTEMS
More information5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C
GOVERNMENT WHITE PAR 5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C 1 GOVERNMENT WHITE PAR from Legacy Voice to VoIP and UC&C Voice communications are undergoing a profound shift,
More informationVMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology
VMware Technology Overview Leverage Nextiva Video Management Solution with VMware Virtualization Technology Table of Contents Overview... 2 Seamless Integration within the IT Infrastructure... 2 Support
More informationBuilding Management Solutions. for Data Centers and Mission Critical Facilities
Building Management Solutions for Data Centers and Mission Critical Facilities How Efficient is Your Data Center? Recent years have seen rapid growth in global demand for computing capacity, resulting
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationWhite Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft
White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS
More informationNew York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief
Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationMicrosoft Office SharePoint Server 2007
Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC
More informationUse Cases. E-Commerce. Enterprise
Use Cases E-Commerce Enterprise INTRODUCTION This document provides a selection of customer use cases applicable for the e-commerce sector. Each use case describes an individual challenge faced by e-commerce
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationQuickBooks Online Security White Paper July 2017
QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a
More informationStorwize/IBM Technical Validation Report Performance Verification
Storwize/IBM Technical Validation Report Performance Verification Storwize appliances, deployed on IBM hardware, compress data in real-time as it is passed to the storage system. Storwize has placed special
More informationW H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud
W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...
More informationVMWARE AND NETROUNDS ACTIVE ASSURANCE SOLUTION FOR COMMUNICATIONS SERVICE PROVIDERS
SOLUTION OVERVIEW VMWARE AND NETROUNDS ACTIVE ASSURANCE SOLUTION FOR COMMUNICATIONS SERVICE PROVIDERS Combined solution provides end-to-end service and infrastructure visibility, service monitoring and
More informationVirtual Disaster Recovery
The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationLatitude Network Video Management System
Latitude Network Video Management System PRODUCT DESCRIPTION: The Latitude Network Video Management System (NVMS) is a fully-digital, IPbased video surveillance system that brings together in one system
More informationSocial Engineering: We are the target Sponsor Guide
Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the
More informationData Processing Amendment to Google Apps Enterprise Agreement
Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google
More informationSymantec Enterprise Security Manager JRE Vulnerability Fix Update Guide
Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under
More informationDeploying VSaaS and Hosted Solutions using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architectures. Salient Systems
More informationRecording at the Edge Solution Brief
CCTV IP Video Solution Brief Recording at the Edge Recording at the Edge Solution Brief Reliability Recording is independent of the network s health and degree of congestion. Even if the network grinds
More informationLifecycle Performance Care Services. Bulletin 43D02A00-04EN
Performance Care Services Bulletin 43D02A00-04EN As your trusted partner, Yokogawa is always with you to address your concerns whether recognized or hidden. Performance Care Services offer a complete service
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationConquer New Digital Frontiers with leading Public Cloud Platforms.
Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationTrends and challenges Managing the performance of a large-scale network was challenging enough when the infrastructure was fairly static. Now, with Ci
Solution Overview SevOne SDN Monitoring Solution 2.0: Automate the Operational Insight of Cisco ACI Based Infrastructure What if you could automate the operational insight of your Cisco Application Centric
More informationHitachi Virtual Storage Platform Family: Virtualize and Consolidate Storage Management
Hitachi Virtual Storage Platform Family: Virtualize and Consolidate Storage Management Get the Ultimate in Enterprise Storage Technology OVERVIEW To maintain customer loyalty and maximize revenue in the
More informationCould Your Systems be Hindering Your Most Productive Employees?
MAIMIZING BUSINESS VALUE WITH OPERATIONAL ARCHIVING Could Your Email Systems be Hindering Your Most Productive Employees? An Executive Guide to Maximizing Business Value with Operational Archiving EECUTIVE
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationReserve Bank of India Cyber Security Framework
Reserve Bank of India Cyber Security Framework HOW SMOKESCREEN HELPS YOU COMPLY RBI Cyber Security Framework How Smokescreen Helps You Comply Table Of Contents Executive Summary 3 About the Framework 3
More informationMilestone Systems XProtect Advanced VMS System Architecture. 1
Milestone Systems XProtect Advanced VMS 2014 www.milestonesys.com 1 Content Copyright, trademarks and disclaimer... 3 Introduction... 4 Target audience and purpose... 4 Overall system architecture... 5
More informationEthernet Network Redundancy in SCADA and real-time Automation Platforms.
Ethernet Network Redundancy in SCADA and real-time Automation Platforms www.copadata.com sales@copadata.com Content 1. ABSTRACT... 2 2. INTRODUCTION... 2 IEC 61850 COMMUNICATION SERVICES... 2 APPLICATION
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationBenefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition
An Oracle White Paper February 2012 Benefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition Disclaimer The following is intended to outline our general product direction.
More informationCisco Collaborative Knowledge
Cisco Collaborative Knowledge Product Overview. Your workforce needs knowledge, speed and flexibility to solve real-world business challenges in today s fast moving digital economy. Cisco Collaborative
More informationMEETING ISO STANDARDS
WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced
More informationDifferentiate Your Business with Oracle PartnerNetwork. Specialized. Recognized by Oracle. Preferred by Customers.
Differentiate Your Business with Oracle PartnerNetwork Specialized. Recognized by Oracle. Preferred by Customers. Joining Oracle PartnerNetwork differentiates your business, connects you with customers,
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationVCStack - Powerful Simplicity
Solutions Guide VCStack - Powerful Simplicity Powerful Simplicity Today s enterprises rely on Information Technology resources and applications for accessing business-critical information and for day-to-day
More informationAbstract. Introduction
Four Steps Toward Planning a Successful Email Migration How MessageStats Can Help You Understand and Clean Up Your Source Environment to Simplify Your Move Written by Joel Blaiberg, Dell Software Abstract
More informationIndependent DeltaV Domain Controller
Independent DeltaV Domain Controller The domain controller functionality can be de-coupled from the ProfessionalPLUS / Application stations in DeltaV systems version 14.3 and higher. Table of Contents
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationIBM TS7700 grid solutions for business continuity
IBM grid solutions for business continuity Enhance data protection and business continuity for mainframe environments in the cloud era Highlights Help ensure business continuity with advanced features
More informationBusiness- Centric Storage
Business- Centric Storage Providing reliable data services more efficiently with FUJITSU Storage ETERNUS ETERNUS Business-Centric Storage Digitization is fundamentally transforming businesses. This transformation
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationCYBERBIT P r o t e c t i n g a n e w D i m e n s i o n
CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n CYBETBIT in a Nutshell A leader in the development and integration of Cyber Security Solutions A main provider of Cyber Security solutions for the
More informationHik-Connect Mobile Client Software (ios)
User Manual V1.1.0 UD01586B 1 COPYRIGHT 2015 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings, pictures, graphs are the properties
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationComplexity made simple
Milestone Systems XProtect Corporate Complexity made simple Premium software for high security Enhance the manageability of sophisticated, multi-site installations with XProtect Corporate, powerful IP
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationRSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief
Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout
More informationSplunk. Splunk. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationPlacing you at the heart of your operations. Vijeo Citect
Placing you at the heart of your operations Vijeo Citect 10 things you should know about SCADA 1 Safety of workers and equipment are ensured through predefined processes managed by a SCADA system. 2 Engineering
More informationDell EMC Surveillance for Reveal Body- Worn Camera Systems
Dell EMC Surveillance for Reveal Body- Worn Camera Systems Functional Validation Guide H14646 REV 1.1 Copyright 2015 Dell Inc. or its subsidiaries. All rights reserved. Published October 2015 Dell believes
More informationIntegrated Switching: Cisco Blade Switch Modules for HP BladeSystem Enclosures. Reduce data center complexity
Integrated Switching: Cisco Blade Switch Modules for HP BladeSystem Enclosures Reduce data center complexity Increase agility and decrease TCO with integrated switching As a company s data center expands,
More informationMilestone Systems. XProtect VMS 2017 R2. System Architecture Document. XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+
Milestone Systems XProtect VMS 2017 R2 System Architecture Document XProtect Corporate XProtect Expert XProtect Professional+ XProtect Express+ Contents Introduction... 6 Target audience and purpose...
More informationIBM Z servers running Oracle Database 12c on Linux
IBM Z servers running Oracle Database 12c on Linux Put Z to work for you Scale and grow Oracle Database 12c applications and data with confidence Benefit from mission-critical reliability for Oracle Database
More informationSoftware Defined Storage for the Evolving Data Center
Software Defined Storage for the Evolving Data Center Petter Sveum Information Availability Solution Lead EMEA Technology Practice ATTENTION Forward-looking Statements: Any forward-looking indication of
More informationDell EMC Surveillance for IndigoVision Body-Worn Cameras
Dell EMC Surveillance for IndigoVision Body-Worn Cameras Functional Validation Guide H14821 REV 1.1 Copyright 2016 Dell Inc. or its subsidiaries. All rights reserved. Published February 2016 Dell believes
More informationDrive digital transformation with an enterprise-grade Managed Private Cloud
Singtel Business Product Factsheet Brochure Managed Private Defense Cloud Services Drive digital transformation with an enterprise-grade Managed Private Cloud Singtel Managed Private Cloud enables enterprises
More informationTHE ACCENTURE CYBER DEFENSE SOLUTION
THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly
More informationA (sample) computerized system for publishing the daily currency exchange rates
A (sample) computerized system for publishing the daily currency exchange rates The Treasury Department has constructed a computerized system that publishes the daily exchange rates of the local currency
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationAxis IP-Surveillance. Endless possibilities for video surveillance.
Axis IP-Surveillance. Endless possibilities for video surveillance. Meeting today s video surveillance challenges The video surveillance market is booming, driven by increased public and private security
More information