GDS International - Next - Generation - Security - Summit - US - 7

  • 262 views
Uploaded on

UNIFIED PHYSICAL IDENTITY & ACCESS MANAGEMENT

UNIFIED PHYSICAL IDENTITY & ACCESS MANAGEMENT

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
262
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
9
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. UNIFIED PHYSICAL IDENTITY& ACCESS MANAGEMENTUSING POLICY-DRIVEN SOFTWARE TO SEAMLESSLY MANAGE IDENTITIES (CARDHOLDERS) ANDTHEIR PHYSICAL ACCESS ACROSS DISPARATE EXTERNAL SYSTEMS WHILE MAINTAININGCOMPLIANCEQuantum Secure, Inc.100 Century Center CourtSuite 800San Jose, CA 95112USAPhone: 408 453 1008Email: info@quantumsecure.comWeb: www.quantumsecure.com© 2010 Quantum Secure, Inc. White Paper Page 1 of 19
  • 2. T ABLE OF C ONTENTS Executive Summary .....................................................................................................................................................3 Physical Security Infrastructure: Decades of Haphazard Growth ..............................................................................5 Resulting Implications for Physical Security ...............................................................................................................5 Significant Operating and Capital COSTS ...................................................................................................................6 Risk of Non-COMPLIANCE .........................................................................................................................................6 RISK of Theft, Fraud, and Crime ................................................................................................................................7 The Next-Generation Solution: Policy-Driven Physical Identity and Access Management ......................................9 What Should One Look For In An Ideal Solution? ....................................................................................................10 Centrally Manages Lifecycle of Physical Identity .....................................................................................................10 Automates Policy Definition and Deployment ........................................................................................................11 Integrates with Physical Security and Logical Identity Management Systems ........................................................11 Automates Compliance Initiatives ...........................................................................................................................12 Unifies Security Events and Correlates with Identity Data ......................................................................................12 Provides Executive-level, Detailed Reporting of the Overall State of Security Operations .....................................13 The Quantum Secure Solution: SAFE ........................................................................................................................14 Components of Quantum Secure SAFE ...................................................................................................................14 SAFE INTEGRATION FRAMEWORK .......................................................................................................................14 SAFE POLICY SERVER ............................................................................................................................................15 SAFE SUITE APPLICATIONS ...................................................................................................................................15 Transforming Physical Security Using Quantum Secure SAFE .................................................................................18 Cost Savings .............................................................................................................................................................18 Compliance ..............................................................................................................................................................18 Investment Protection and Future-Proofing ...........................................................................................................18 Security & Reduced Risk ..........................................................................................................................................18 Conclusion – Why Quantum Secure? .......................................................................................................................19© 2010 Quantum Secure, Inc. White Paper Page 2 of 19
  • 3. E XECUTIVE S UMMARYPhysical security practitioners of any organization should ask themselves one fundamental question: Can I respond to today’s challenges in a resource-conscious world by subscribing to the traditional way of managing physical security?This traditional approach, often characterized by the incorporation of additional hardware systems, hasoften led to complex security infrastructure, consisting of systems which are disparate, disjointed anddifficult to manage. This problem is compounded because physical security processes are by largemanual in nature, operating in silos with little or no connection with other enterprise processes likethose of IT.As a result, most physical security departments today lack the agility and flexibility to address today’schallenges of increasing cost, risk of non-compliance and high risk of theft or fraud. And this struggledoes not limit itself to any particular type of business, as these challenges can be seen acrossorganizations of all types and sizes, including global corporations, government institutions, airports andhospitals.To address these challenges, physical security practitioners should adopt a software-driven approachtowards unifying various physical security systems and electronically maintaining all security-relateddata. A software-driven approach will automate processes related to physical identity (cardholder),simplify the management of identities and access management across the physical securityinfrastructure and also streamline compliance initiatives.Quantum Secure supports this approach through its SAFE software suite. Quantum Secure is the leadingprovider of enterprise software to manage and streamline security identities, compliance and correlatewith events across disparate physical security systems. Its SAFE suite of software enables securitypractitioners to integrate physical security systems, automate processes and simplify control ofemployees, vendors and other identities across their organization. By connecting physical securityoperations closely to their IT infrastructure, corporations can quickly lower operational costs, improvecompliance and reduce risk.This whitepaper achieves the following:  Reviews the current situation and lists out the key challenges faced by security practitioners in context of physical identity and access management  Proposes an approach that unifies physical identity and access management using a policy- driven software solution  Discusses the essential capabilities of such an ideal solution including security policy automation and integration among disparate physical security systems and with logical security systems© 2010 Quantum Secure, Inc. White Paper Page 3 of 19
  • 4.  Discusses how Quantum Secure SAFE can support the unified approach by automating manual security processes to centrally manage physical identities and their associations with systems, events, and stakeholders while adhering to real-time compliance  Presents the benefits and some examples of how Quantum Secure SAFE has improved the key performance indicators for physical security department© 2010 Quantum Secure, Inc. White Paper Page 4 of 19
  • 5. P HYSICAL S ECURITY I NFRASTRUCTURE : D ECADES OF H APHAZARD G ROWTHPRESENT DAY COMPLICATIONS The turn of events at the beginning of this millennium will be etched in the memory of physical security practitioners for the next few decades. While 9/11Multiple and disparate PACS ushered in a spate of changes in physical security management at governmentManual and inconsistent institutions and airports, it has also prompted businesses to assess their riskenforcement of security exposure as they operate multiple locations spread throughout the world.policies Internal threats such as employee pilferage and collusion pose even a greaterManual administration of high threat for corporate entities, educational institutions and other non-volumes of access requests government entities, creating new elements of cost and risk.Siloed systems with no Unfortunately the current state of physical security infrastructure for mostintegration with logical organizations is not designed to respond effectively to the changingsecurity environment. Ever since the inception of video surveillance cameras five decades ago, organizations have added boxes of these and other systems such as access control, alarms and sensors to strengthen their security posture. While these systems proved to be good point products, there were no industry- wide standards and/or open architectures by which these systems could work. Some organizations got locked into proprietary hardware products from a single vendor, and others spent millions on best-of-breed solutions from multiple vendors, only to struggle with the management of these disparate technologies. As a result, security practitioners rarely have complete visibility and control over their physical security infrastructure, and their physical security policies are often dictated by their hardware, rather than the other way around. To compound this challenge, many physical security policies and various administrative tasks are executed manually by the security staff, leading to costly, error-prone data entry that can lead to duplication and erroneous identity information within the system. R ESULTING I MPLICATIONS FOR P HYSICAL S ECURITY As a result of the present situation and the complications, organizations of all kinds and size face the following challenges in context of physical identity and access management: © 2010 Quantum Secure, Inc. White Paper Page 5 of 19
  • 6. S IGNIFICANT O PERATING AND C APITAL COSTSManual access and change The manual nature of managing physical identities and their access implies amanagement processes significant cost overhead. Security staff maintains access-related information either in paper or in spreadsheets and manually updates them wheneverCumbersome and time- changes are required. In other words, a significant amount of time is spent inconsuming on-boarding and card and access rights administration tasks. These manual efforts lead to errors,off-boarding which lead to more effort towards their fixing, driving additional costs.Significant capital expenses On- /off-boarding of a physical identity is a cumbersome and time-consumingtowards standardizing on onePAC system process, primarily because of lack of integration with the logical side of an identity. Activities like background verification, role-based access determination and subsequent approval, and credential management are by large manual in nature and executed in a disjointed and improper sequence. Organizations wanting to standardize on one type of physical access control system (PACS) are worried by the huge capital expenses that can be incurred for any rip and replacement effort. This may especially concern large enterprises that grow through acquisitions and in that process face the problem of standardizing the PACS. As a result, many companies forego this large capital expenditure, or simply add new systems on top of their existing ones. This further compounds the challenges they experience with their existing physical security infrastructure. R ISK OF N ON -COMPLIANCE There is a constant pressure on physical security practitioners to ensureIncreasing pressure to compliance to internal policies and external regulations like SOX, ISO 27000 andcomply with externalregulations like SOX, ISO other industry-specific regulations. As most of the security processes are27000 manual, security staff needs to spend additional effort in ensuring that compliance related controls are operating effectively. They are also expected toStringent industry-specific prepare reports asserting their compliance. All this effort spent may go waste ifregulations like TSAs 49 CFR due to some oversight, compliance exceptions are reported by third-partyPart 1540, 1542 directives for agencies. These exceptions can not only result in fines and penalties for theAirports; HSPD-12 for US organization but they can also dent the organization’s reputation.federal agencies, NERC CIPstandards for Energy Today, there is hardly any way to ensure that compliance-related exceptions arecompanies, CFATS RBPS for not allowed in the first place. Off-boarding is a manual process which meansPetrochemical facilities, that an employee can still have physical access despite having the logical accessHIPAA/DEA/FDA for terminated. Delay in removal of physical access for a terminated employee canHealthcare sector © 2010 Quantum Secure, Inc. White Paper Page 6 of 19
  • 7. lead to compliance exceptions. Similarly, access management is a manual process which can be error-prone and lead to compliance violations. RISK OF T HEFT , F RAUD , AND C RIMEManual processes are error- Since security policies are created and enforced manually in so many instances,prone which increase risk there is no way to track and ensure if they are being implemented properly.exposure Manual processes expose the organization to potential risk of theft/fraud, as the handling of large volumes of card administration requests manually can lead toManual or standalone visitor errors and create undesired exposure. For example, delays in removing accessmanagement solution lack rights for a terminated employee, contractor or other third-party identity mayflexibility, scalability and create a security breach by which he/she can potentially return and commitsecurity theft within the premises. Organizations also face the challenge of managing their visitors in a secure and organized manner. Most of the existing visitor management solutions are standalone applications which can’t be easily deployed across multiple sites and which lack the flexibility to adapt to changes in visitor-related policies. It is also important to note the unique situation and challenges faced by different types of industries/sectors: Airports need to manage a litany of vendors and related staff and manage access to airside and sterile areas while complying with ever-growing regulations like 49 CFR Part 1540, 1542 directive from Transportation Security Authority (TSA) in USA and similar regulations in other countries. Government institutions in the US, who are often geographically dispersed with multiple proprietary PACS need to integrate physical access management on the standardized Personal Identity Verification (PIV) credential as mandated by Homeland Security Presidential Directive 12 (“HSPD-12”). Things become complicated because their current physical infrastructure is not capable of handling digital certificates and biometric information from PIV cards. Energy and Petrochemical facilities in the US are under increasing pressure to comply with NERC Critical Infrastructure Protection (CIP) standards and CFATS Risk-Based Performance Standards (RBPS) respectively but lack complete control and automation of these standards. Healthcare institutions also need to drive DEA, FDA and HIPAA compliance with their complex network of facilities, role and related access. © 2010 Quantum Secure, Inc. White Paper Page 7 of 19
  • 8. Higher education institutions face the challenge of integrating their different systems like ERP, facilities, housing, dining, bookstores and more in order to have complete control over their physical identities.© 2010 Quantum Secure, Inc. White Paper Page 8 of 19
  • 9. T HE N EXT -G ENERATION S OLUTION : P OLICY -D RIVEN P HYSICAL I DENTITY AND A CCESS M ANAGEMENT One thing is certain: the traditional way of solving physical security problems simply will not suffice. Additional hardware, standalone software solutions and adding more manpower only compound the issue. These challenges can be addressed by a “unified approach towards physical security management using policy-driven software that can seamlessly manage identities, their physical access, and their correlation with physical security events in a multi-stakeholder environment while providing real-time compliance”.PRINCIPLES OF A UNIFIEDAPPROACH:One physical identityConsistent policy enforcementIntegrated physical and logicalsecurity systemsCompliance across physicalsecurity infrastructure Figure: Policy-driven unified approach for physical identity and access management As shown above, a unified approach involves centrally managing:  Identities through various stages of their lifecycle including on-/off- boarding, access provisioning, badging  Integrations with all types of external systems (logical and physical) for ensuring one identity definition  Policies which are rules governing relationship of identities across different systems, with different stakeholders (like IT, facility, physical security) and with physical security events  Compliance and reporting as it relates to physical security © 2010 Quantum Secure, Inc. White Paper Page 9 of 19
  • 10. W HAT S HOULD O NE L OOK F OR I N A N I DEAL S OLUTION ? Listed below are essential capabilities that one should look out for in a unified physical identity and access management solution.Automating identity-related C ENTRALLY M ANAGES THE E NTIRE L IFECYCLE OF Atasks like on-boarding, P HYSICAL I DENTITYprovisioning improves The solution should be the central place to manage the lifecycle of an identity asefficiency and service levels it relates to physical security.and minimizes risksIt gives security staffcomplete view of who hasgot what access in theorganization. Self servicereleases substantial time forsecurity staff to carry outimportant activities Figure: Lifecycle Management of a Physical Identity The solution should allow pre-enrollment which includes identity verification against HR/LDAP or any authoritative data source. It should enroll an identity by performing activities like background check through integration with federal, state or local repositories (like Criminal History Records Check (CHRC), Sex Offender Registry). Thereafter, the solution should be able to issue assets like access cards, metal keys, and provision role-based physical access for the identity. © 2010 Quantum Secure, Inc. White Paper Page 10 of 19
  • 11. The solution should also manage different associations for an identity like other personnel, visitors, parking permits. Once the identity starts using the physical security infrastructure, the same solution should report access audits and events for the identity. The solution should give security practitioners the ability to manage the identity through reports on trends and utilizations. An ideal solution should also allow the identity to execute a part of any of the above activities through an easy to use and intuitive self-service interface. For example, end users should be able to make request (like for a new access) and later track its status through self-service.Policy automation A UTOMATES P OLICY D EFINITION AND D EPLOYMENTdramatically lowers cost of The solution should enable security department to centrally define, deploy andoperations while giving monitor the vast number of global and regional policies. Security practitionerssecurity staff complete should be able to easily create new and update existing policies from within thecontrol over the enforcement. software. Once deployed, the software should execute the logic behind theIt helps security respond scene without any manual intervention. For example, the user can create a rulequickly to changes by including set of activities connected through a workflow for granting role-basedupdating policies and access to data center. Once the rule is deployed, the software shoulddeploying them within no automatically broadcast access to the data center PACS for the pertinenttime identities. I NTEGRATES WITH P HYSICAL S ECURIT Y AND L OGICAL I DENTITY M AN AGEMENT S YSTEMS The solution should enable various PACS, alarms, event management systems and other devices to integrate and interoperate with enterprise IT systems such as SAP, PeopleSoft, IDMS systems, LDAP, MS Active Directory. It should be pre- integrated with leading systems thereby reducing the need for custom integration.Integration minimizes Disparate systems lead to operational inefficiencies as a security staff needs tomanual effort of security manually assign access to an identity to various physical security systems. Withstaff. It improves a unified solution, user should be able to configure and integrate both theoperational efficiency while physical and logical security systems. The integration should capture identity,retaining the existing security and event data from these systems and trigger execution of relevantphysical security rules for seamless automation. For example, if a new employee is added to theinfrastructure. It gives HR system, then the unified solution should automatically capture and store thecomplete control as security information in its local repository. Thereafter, if a policy is configured within thestaff can have a central view solution to automatically assign access to certain PACS, then it should beof their infrastructure triggered and the access details should be broadcasted to the relevant PACS. © 2010 Quantum Secure, Inc. White Paper Page 11 of 19
  • 12. Figure – Integrating Disparate Systems using Unified SolutionCompliance automation A UTOMATES C OMPLIANCE I NITIATIVESminimizes risk and reduces The solution should allow security practitioners to enforce governance acrossmanual effort. diverse systems, and to create a transparent, traceable, and repeatable real-It helps avoid potential fines, time unified compliance process. The solution should allow users to centrallyand penalties, and puts define controls as per external regulations and internal policies. It shouldsecurity practitioners in good subsequently automate the measurement, remediation and reporting actionslight both within and outside against these controls.the organization U NIFIES S ECURITY E VENTS AND C ORRELATES WITH I DENTITY D AT A The solution should allow correlation of physical identity, access and event data by integrating with physical security event management systems. This can provide security administrators with complete control and visibility into physical security operations. The integrated solution should provide activity profiling toEvent correlation improves determine combinations of actions that raise a warning. For example, it canthe quality and time of scan the activities of the last 50 terminated employees to see which actionssecurity response through might serve as early warnings about future at-risk employees, automatic watch-policy-based actions based on list creation and escalation of users to different severity levels, out-of-the-boxassociation of events with rules for anomaly detection, unauthorized actions, etc.identity data © 2010 Quantum Secure, Inc. White Paper Page 12 of 19
  • 13. Security analytics allows P ROVIDES E XECUTIVE - LEVEL , D ETAILED R EPORTING OF THEinformed decision making O VERALL S TATE OF S ECURITY O PERATIONSfor management by An ideal solution should also retrieve, aggregate and store data from variousproviding insights generated operational systems. Its analytics capabilities should process and incorporatefrom analysis of historical this data into interactive reports that can provide a high-level snapshot of thedata physical security operations and at the same time provide drill-down capabilities. For example, the solution can provide security practitioners with a high-level snapshot of the total alarm count across all the global sites and at the same time it can provide easy drill-down into details of an individual alarm. © 2010 Quantum Secure, Inc. White Paper Page 13 of 19
  • 14. T HE Q UANTUM S ECURE S OLUTION : SAFE Quantum Secure has created the industry’s first and most comprehensive physical security management software – SAFE. SAFE is designed to connect disparate physical security and IT and operational systems, automate manual security processes and reduce both costs and risks. C OMPONENTS OF Q U ANTUM S ECURE SAFE Figure – Building Blocks of SAFE As shown above, the building blocks of SAFE are: SAFE INTEGRATION FRAMEWORK The SAFE Integration Framework includes out-of-the-box adapters for all leading physical access control systems, biometric systems and other security devices. It also comes pre-integrated with enterprise IT systems, logical identity management systems, LDAP, MS Active Directory and more. The framework supports native API and Web services-based integration, such as interoperability via SPML and SAML standards for badge issue, termination, badge-location validation, SSO and RFID interface. This framework also includes connectors to various databases for background screening like the TSA No-Fly List, CHRC.© 2010 Quantum Secure, Inc. White Paper Page 14 of 19
  • 15. SAFE POLICY SERVER The SAFE Policy Server is the industry’s first patented policy management engine that allows users to deploy globally proven best practices and policies across disparate applications, systems and devices without requiring training or knowledge of individual systems programming. Users can create new or update existing policies by simply dragging and dropping appropriate live objects and linking them on an electronic whiteboard. The SAFE Policy Server automatically converts the visual schematic drawing of a policy into appropriate rules and instruction set applicable to the underlying physical security infrastructure. SAFE SUITE APPLICATIONS IDENTITY AND ACCESS MANAGEMENT SAFE Physical Identity and Access Manager allows enterprises to manage the lifecycle of identities as they relate to physical access. It includes wide range of functions, including synchronized on-/ off-boarding across all systems harboring an identity record, access profile and zone management, and role-based physical access. Other related modules are:  SAFE Self Service which enables identities (end users) with proper login privileges to carry out part of physical security processes on their own.  SAFE Visitor Manager which provides an easy way to centrally pre- register, approve, enroll and subsequently manage visitors.  SAFE Web Badging which allows to easily design and manage badge templates, and provides centralized badge enrolment.  SAFE Physical Identity and Access Manager for PIV allows government agencies to integrate with LDAP/HR systems to provision cardholders (PIV, CAC, TWIC etc) in their PACS. It provides policies for PIV card registration, identification, certificate check, and card authentication.  SAFE Visitor and Credential Management for PIV allows to enroll FIPS 201 compliant cardholders into the PACS.  SAFE Asset Manager provides central management of physical security assets like metal keys, fobs, tokens, access cards which have been provisioned to identities managed within SAFE.© 2010 Quantum Secure, Inc. White Paper Page 15 of 19
  • 16. COMPLIANCE AND RISK MANAGEMENT SAFE Compliance Regulator provides a central place to enforce and monitor compliance to external regulations (like NERC/FERC, CFATS, SOX, FDA/DEA) and internal policies. Using a closed-loop approach, this solution allows users to define controls for measuring and reporting compliance. Subsequently, the system automates assessment and if found out of compliance, acts and auto- remediates the exception scenario. It closes the loop by providing “one-click” compliance reporting for the control back to the user.. SAFE Infraction Manager automates the process of managing security policy infractions against the centrally-managed identities and issues any resulting notifications or automates access privilege changes. SAFE Document Management provides integrated document management to facilitate collection of identity documents. SAFE Log Analysis/ Log Management maintains log details or audit trail records for various transactions executed within SAFE. SAFE Watch List Manager manages an internal list of physical identities who are potential threats to an organization along with their risk profile and historical details. IDENTITY AND EVENT CORRELATION SAFE Event Correlation Engine provides unified user management of events and associated identities. It is a data exchange interface for sharing identity status and usage related to physical security alarms. It includes policy management to configure responses and actions to identity and alarm events. It also integrates reporting and analytics across identities and events. SECURITY INTELLIGENCE Also called as SAFE Analytics, this block provides an executive-level, graphical dashboard view of the overall state of an organization’s physical security infrastructure. Each day, operational data is retrieved, aggregated and stored in the solution. Data is processed and incorporated into web-ready reports that contain information for higher-level analysis and drill-down capabilities. Some of such metrics displayed include alarms by site, by alarm type, by count; sites and devices that are generating the most alarms; badge allocation by type. Related modules are:© 2010 Quantum Secure, Inc. White Paper Page 16 of 19
  • 17.  SAFE Identity Analytics captures and reports metrics related to facility occupancy and space utilization from identity data  SAFE Alarm Analytics captures and reports key security operational metrics such as alarm count and alarm response times© 2010 Quantum Secure, Inc. White Paper Page 17 of 19
  • 18. T RANSFORMING P HYSICAL S ECURITY U SING Q UANTUM S ECURE SAFE Quantum Secure has been transforming the physical security departments forSAFE has improved physical organizations of all types and magnitude to address the present-day challengessecurity KPIs: and prepare for a secure future.Decreased average cost ofmanaging physical identity C OST S AVINGSby up to 30% Automation of physical security processes and compliance initiatives, integration of disjointed systems, self-service and delegated administrationReduced enrollment time byup to 96% results in immediate cost savings for organizations. By centralizing security operations, organizations can do more with fewer resources.Decreased average servicetime for a physical security C OMPLIANCErequest by up to 66% SAFE makes physical security compliance a real-time, repeatable, sustainable and cost-effective process. Since it eliminates manual compliance initiatives, it has helps organizations avoid any penalties and ensures that the organization doesn’t face any embarrassment because of compliance exceptions. I NVESTMENT P ROTECTION AND F UTURE -P ROOFING SAFE gives organizations the flexibility to use existing systems seamlessly without worrying for the huge capital expenses involved in any rip-and- replacement exercise. Organizations making frequent acquisitions can easily integrate disparate physical security systems using SAFE. S ECURITY & R EDUCED R ISK SAFE enables physical security department to ensure a more secure and risk- free workplace. Automating policies using SAFE eliminates human-led errors and delays. Dashboards showing consolidated and correlated events reduce time and improve quality of response from security staff. SAFE delivers unprecedented control over the scattered infrastructure to the security practitioners. © 2010 Quantum Secure, Inc. White Paper Page 18 of 19
  • 19. C ONCLUSION – W HY Q UANTUM S ECURE ? The current complications and resulting implications for physical securitySave multi-million dollars practitioners should encourage them to look at resolving the problem in antowards rip and replace effort innovative and yet least-disruptive manner. Quantum Secure SAFE is the onlyReduce operational expenses product in the physical security industry that unifies global identity, complianceand resources required to and risk assessment in one seamlessly integrated web console. Also SAFE is theoperate security only offering that delivers a holistic approach to identity and accessinfrastructure management by integrating logical security with physical security.Get real-time policy Marquee organizations across the world have recognized the unique valuecompliance proposition of Quantum Secure and are using SAFE to streamline their physical security operations. Organizations of all types, including global Fortune 500 enterprises, some of the world’s largest airports, leading government institutions have turned their investment in SAFE into a strong ROI and in the process have minimized the risk of theft/fraud and non-compliance. SAFE also allows the physical security department to align itself closer to the business and more importantly to the employees. With better visibility into all facets of the security infrastructure, security practitioners can provide key data and insight to their peers in the real estate and property management functions, helping save costs via better space utilization and user self service. Quantum Secure augments the strength of its product SAFE with its high-quality support and professional services. The testimony to the success of its vision is the fact that its customers are now partnering in this revolutionary innovation through a world class advisory council. Quantum Secure recommends physical security practitioners to evaluate their current physical security operational costs especially with respect to alignment of security with core business of the respective organization. One will soon realize that apart from guarding budgets, most physical security operational costs is tied to management of identities, events and compliance across multiple physical security systems. Practitioners will be able to relate with one or more challenges outlined in this paper, which can be addressed without being disruptive to the current operations. Quantum Secure Subject Matter Experts can be reached at info@quantumsecure.com to further explain how these challenges could be addressed. To find more about Quantum Secure and its breakthrough SAFE solution, visit www.quantumsecure.com or call 1-408-453-1008. © 2010 Quantum Secure, Inc. White Paper Page 19 of 19