Industry Sector. Zug (Switzerland), July 4, Security in an IT world

Similar documents
Your single source for a safe, secure, and sustainable airport

Logicalis What we do

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

New Partners Join Charter of Trust to Protect Critical Infrastructure

Cisco Smart+Connected Communities

WHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: US: HK:

Press Presse Prensa. Siemens organizes operations in three Sectors with total of 15 Divisions

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

What can the OnBase Cloud do for you? lbmctech.com

Cloud Computing: Making the Right Choice for Your Organization

The simplicity of integrating HVAC&R machines into BMS architectures

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Transformation Through Innovation

Back to the Future Cyber Security

CA Security Management

Mediterranean Nautilus Greece S.A. Cloud Solutions

ALCATEL-LUCENT OPENTOUCH PERSONAL CLOUD A Revolution in Communications Applications for Enterprise End Users

T-Systems company profile

White Paper How IP is impacting Physical Access Control

Simplify IP Telephony with System i. IBM System i IP Telephony

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

Sustained success through reliability and efficiency

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

Halifax Regional Municipality

BUILDING the VIRtUAL enterprise

Cisco Wireless Video Surveillance: Improving Operations and Security

Data Centre & Colocation in Birmingham. Flexible. Secure. Accredited.

Fiscal year 2017: TÜV Rheinland continues growth strategy with investments in future-oriented topics

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

PLAYBOOK. How Do You Plan to Grow? Evaluating Your Critical Infrastructure Can Help Uncover the Right Strategy

Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet

SDN for Multi-Layer IP & Optical Networks

Tech Data s Acquisition of Avnet Technology Solutions

HP environmental messaging

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Accelerating the Business Value of Virtualization

Intermedia s Private Cloud Exchange

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

WHOLESALE HOSTED CENTREX

Create a sustainable, high-performance university campus.

Making your information system simple again

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

CYBERSECURITY AND THE MIDDLE MARKET

WHOLESALE HOSTED CENTREX

Version: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

CASE STUDY. TaylorMade Golf moves to cloud-based DR of ERP systems for greater reliability, scalability and performance

Put Time Back on your Side

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

An overview of mobile call recording for businesses

Country Focus: USA +2.2% $43 5.7% Trillion 21.7% of the total global GDP 1 Government Spending on Infrastructure. 80% of GDP. 3% of GDP.

Go Cloud. VMware vcloud Datacenter Services by BIOS

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

5G Readiness Survey 2017

LESSONS LEARNED IN SMART GRID CYBER SECURITY

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012

Government Data Center Modernization

Securing Your Digital Transformation

Aged Care Security Solutions. security.gallagher.com

Simplify Hybrid Cloud

The State of Cloud Monitoring

Accelerating High Performance Manufacturing

Software-defined Storage by Veritas

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

Exempla Healthcare Case Study. Challenge. Solution. Benefits. 75% reduced investigation time 20% reduced up-front costs Doubled productivity

Bus Way vs. Cable: a CapEx comparison

Total Cost of Ownership: Benefits of the OpenText Cloud

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Reliable, fast data connectivity

Build confidence in the cloud Best practice frameworks for cloud security

Symantec Data Center Transformation

Run a Smart Workplace Introducing the Digital Building. Digital Building Solutions

EUW - Session 9 Metering and grid data management for grid optimisation and energy transition a raising role for DSOs

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

ENISA EU Threat Landscape

Simplified. Software-Defined Storage INSIDE SSS

MRV Communications Inspiring Optical Networks for over 20 Years

Checklist for building an edge data center

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Trust Harris for LTE. Critical Conditions Require Critical Response

Annual Report for the Utility Savings Initiative

Continuous protection to reduce risk and maintain production availability

IBM Security Services Overview

At Hewlett Packard Enterprise, an HR Transformation

Secure Messaging as a Service

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Excellence Assured Accelerate your business potential with innovative IT Services

SMART SOLUTIONS TM INTELLIGENT, INTEGRATED INFRASTRUCTURE FOR THE DATA CENTER

India s National Policy On. Information Technology. Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT

Solution Oil & Gas. tgood.com

SIEM: Five Requirements that Solve the Bigger Business Issues

The power management skills gap

Defence, Safety and Security

ENHANCING INTELLIGENCE IN THE INTERNET OF THINGS The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS

Information Technology

Rockwell Automation ODVA Annual Meeting

FUJITSU Backup as a Service Rapid Recovery Appliance

Transcription:

Technical Article Industry Sector Building Technologies Division Zug (Switzerland), July 4, 2011 Security in an IT world There is a move towards more integrated solutions in security, with security management software being employed to provide a greater degree of situational awareness. This means that IT will have an increasing role to play in the security world, and this raises challenges. One challenge is the need to ensure that the solution providers and system integrators have a good understanding of what the expectations are from an enterprise or corporate customer. For the system integrators, this requires a strong focus on developing security software that meets the standards of an enterprise organization. Another challenge is to develop the resources to implement the solutions, recognizing that it is a very different world in which the vendors now operate. All those involved in the security equation, from the software developers through to those selling the solutions, the installers and commissioners of the systems, have to complement their current expertise with the right set of IT skills. It is a very different scenario looking at a one building, one site application based on securing the location through traditional physical security measures than it is addressing a campus or multi-site location where the software component is much more critical. While in the first case it may well be a conversation with a single security manager or facilities manager responsible for that one location, in the latter it might involve discussions with C-level executives so that a different skills set is required. Legacy issues Increased situational awareness is a benefit of an integrated approach. With all the security disciplines of video surveillance, access control and intrusion detection co-existing and cooperating on a single platform, the safety and security of a site is optimized through centralized management and alarm handling. Another benefit is that the solutions now available are more flexible, customizable and scalable. 1 / 5

For any system integrator with a large installed base, it is important that the move to newer solutions and to the new breed of equipment takes account of the need to enable migration of the older installations. This is achieved through an open architecture based software approach. A complete migration plan can be developed which removes the need to rip out the existing infrastructure and start again, instead using the software to maintain and work with older style field devices and hardware and complement those with newer equipment. There are obviously still a number of analogue security components in use. With the likes of IP encoders enabling, for example, the integration of analogue cameras and using cabling already in place, it is possible to reuse a significant amount of existing hardware when looking to employ security management software to convert from an analogue to a digital solution. Returning to the flexibility afforded by a software led approach to security integration, this certainly applies to the different configurations that are possible. It removes any tie to physical location. This can be important, particularly in greenfield sites and those where new software is being introduced, since the customer may not initially have a fully developed idea of how the systems are going to run. Even with comprehensive planning, actually experiencing in practice how the systems are fitting in with operational procedures could lead to changes from the initial configuration. As a site develops, its security requirements are also subject to change. Accommodating such changes is very easy to do if the integration is software based. The virtualized world The virtual aspect of computing can bring benefits in terms of investment. A lot of companies are moving towards virtualization of their hardware, particularly in light of the current economic climate. Constraints are common now with capital expenditure (capex) but not so much with operating expenditure (opex), and this IT-led approach is conventionally dealt with as an opex. Within this virtual world, maintenance, service and many other associated costs are reduced simply because there is not the requirement to maintain hundreds of servers but rather a much smaller set of base hardware. This has environmental benefits too as data centers focus on reducing their power and energy consumption. Large scale corporations also have the opportunity to offer security based services. IT departments in such businesses are expected to provide a range of services email, file services, remote connections etc to individual departments, with each department paying a given amount a month, for example, for a mailbox or data storage facility. With the move of security onto the IT infrastructure, many IT departments want to maintain this service-led approach but without having to administer things such as cards for access control systems. While some will take responsibility 2 / 5

for access card management, others will prefer to look after just the IT aspect and ensure everything is working, offering this as a chargeable monthly service to the security facilitator who will be responsible for card management. This points to some crucial questions to be answered for any installation: Who manages the networking structure and who manages access to that infrastructure? Who creates the users and who manages them? In small businesses and SME s, it may be a single department looking after everything. But certainly in larger organizations, two or three different departments can be involved, one taking care of the network infrastructure and another running the data center servers and video storage infrastructure. Coupled with this is the issue of cyber security and the need to prove how secure systems are. Regulations will have to be developed to which software companies can work in terms of proving their degree of security compliance. Integration: security devices and beyond In terms of integration, the main focus initially was to pass simple information between the main disciplines of physical security and to have a level of control over the sub-systems. For most solution providers this started by loosely coupling their different platforms together to give the users the perception of having an integrated system. The Siemens Siveillance Fusion security management solution has a different approach: the software was based on a single platform that integrated the devices through the different proprietary protocols of their own devices and those of their partners. This has been extended to cover standard open interfaces which significantly increases the number and types of devices that can be integrated. This goes beyond the main base applications, integrating into enterprise systems as well and being able to pool data. A good example is human resources where personnel data can be integrated with the security system, thereby enabling organizations to have self-service portals through which visitor access can be completely controlled. This goes back to the need for complete situational awareness. For many organizations knowing exactly where people are located is useful, particularly so in large operations. There are two aspects to this: the safety requirement where such information is invaluable if, for example, an evacuation of the building is required in the event of an emergency, and then the security requirement where the location of an incident needs to be pinpointed, as well as the people involved. With older technology, it may well have been just an alarm generated to say somebody has passed through a door. Now, the option is available, through integrated systems, to take information from 3 / 5

access control, intrusion and video surveillance devices to get a much clearer understanding of the situation in real time and therefore respond much more effectively. It is no longer just a case of knowing that somebody has passed through a door but that the room is still occupied because the PIRs are still in active mode, and people can be identified through real time video images. Taking it a stage further, through integration with other software systems, it is possible, for example, to identify that somebody has plugged into a network access point back to the cyber security issues referred to earlier which are becoming an ever increasing factor in security threats. And to the future From a software point of view, open protocols is certainly the way to go. The more software developers have to accommodate proprietary integration, the more time is consumed and therefore the greater the costs. Some people labor under the misguided belief that a proprietary approach brings greater security and that open protocols reduce security levels. In fact, the more security solutions companies are able to integrate with other systems, the more information can be gleaned and the greater the situational awareness provided. Now that security is operating very clearly in the IT arena, nearly all protocols are open so the ease with which such information can be fed into the security process is improving. The data is often sitting there, under-utilized in terms of how it can enhance security measures. It is a case of tapping into that resource and recognizing what information can help to improve security levels. Looking ahead, the currently high profile issue of cloud computing will certainly have a role to play in future integrated solutions, particularly given the potential cost savings it offers. There is some maturity required in the cloud world, including security reliability and privacy issues to be resolved, before it is taken up extensively. However, if such issues can be successfully addressed there is certainly the potential for use of the public cloud, as well as the opportunity for the creation of private clouds for the bigger enterprises to realize the benefits of embracing cloud technology. Author Mark Mooney, Head of Product Line Corporate Security, Siemens Building Technologies Division Siemens AG (Berlin and Munich) is a global powerhouse in electronics and electrical engineering, operating in the industry, energy and healthcare sectors. For over 160 years, Siemens has stood for technological excellence, innovation, quality, reliability and internationality. The company is the world s largest provider of environmental technologies. More than one-third of its total revenue stems from green products and solutions. In fiscal 2010, which ended on September 30, 2010, revenue from continuing operations (excluding Osram and Siemens IT Solutions and Services) totaled 69 billion and net income from continuing operations 4.3 billion. At the end of September 2010, Siemens had around 336,000 employees worldwide on the basis of continuing operations. Further information is available on the Internet at: www.siemens.com. 4 / 5

The Siemens Industry Sector (Erlangen, Germany) is the worldwide leading supplier of environmentally friendly production, transportation and building technologies. With integrated automation technologies and comprehensive industry-specific solutions, Siemens increases the productivity, efficiency and flexibility of its customers in the fields of industry and infrastructure. In fiscal 2010, which ended on September 30, 2010, revenue from continuing operations of the Industry Sector (excluding Osram) totaled around 30.2 billion. At the end of September 2010, Siemens Industry Sector had around 164,000 employees worldwide without consideration of Osram. Further information is available on the Internet at: www.siemens.com/industry. The Siemens Building Technologies Division (Zug, Switzerland) is the world s leading provider of safe, secure and energy efficient solutions for buildings ( Green Buildings ) and building infrastructure. As a service provider, system integrator and product supplier Building Technologies offers building automation, HVAC, fire safety, security, low voltage power distribution and electrical installation technology. With around 42,000 employees worldwide (September 30), Building Technologies achieved a turnover of 6.9 billion in fiscal year 2010. www.siemens.com/buildingtechnologies. 5 / 5