Corps Security Open DayInnovations in Access Control,          Standards    & Integrated Systems         Mike Sussman
Access Control - What is happening?                                             How is IT changingIs access control     Ho...
Credentials                     Secure accessUse of phone as a    required – PIN orcredential - NFC     facial            ...
Hosted systemsOutsource modelprovides better      Lower Total Cost ofcontrol of costs     OwnershipReduce hardware        ...
Cloud Based SolutionsWhat is the cloud?     Provides faultAre we ready for it?   tolerance and DR     Provides flexibility...
Why cloud based systemsNo IT infrastructureto purchase and        Scalability and   Available accessmaintain              ...
Why are customers using              the cloud?Reduced annualcosts                               Agility and mobility     ...
Integrate disparate systems                                        SDK and otherOpen fire doors in                      in...
Integration and PSIMConverges physical                 Analysis andsecurity with                      reasoning ofautomati...
5 key capabilities                                           Analyse and                     Collect data from     correla...
Work with Corps Security           and Partners                 Integration with    Remote                 Immix for      ...
StandardsNot as regulated asthe intruder and firemarkets                                   EN50133 outdated               ...
Summary                    Increasing use of    Convergence ofShift to IP based   web based            physical securitysy...
TDSi Open Day
Upcoming SlideShare
Loading in …5
×

TDSi Open Day

189 views

Published on

TDSI presentation from Corps Monitoring open day.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
189
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Is AC stagnant or evolving? If you look at the industry and the technology in use some areas are stagnant and have been for many years, for example the wiegand interface between readers and controllers. There has been a reluctance within the industry to change and a great deal of the equipment available is similar to what was around years ago. This trend is similar to the intruder and fire industry and it is only in the last few years that we are seeing changes happening.These changes, which are occurring in both the reader and credential arena’s along with the control panels and software can bring significant benefits to both the installer, systems integrator and end user.With the introduction of IP and it’s growing acceptance IT managers are taking more of an interest in the physical security market. In a number of industries the IT Manager is taking overall control and the security manager’s role does not exist anymore. The integration between the physical and IT / logical security systems has also increased the role of the IT department within this arena.I’d say that the Access Control industry is probably where the CCTV and telecoms industry were 5 years ago. Will the speed of change be the same? Only time will tell, but with the current political and terrorist climate security on all levels is only going to increase.There are certainly trends within the industry and these will become apparent throughout this presentation and hopefully by the end you will know what is happening within the industry. I can’t guarantee that I have covered all aspects but the main trends will be covered.
  • Whilst there isn’t much change in the card market, the biggest move is starting to happen with the introduction of NFC into the mobile phone. The question is why do you need to carry a separate credential when you always have your mobile with you? This is fine until you realise that you need extra authentication to ensure that the phone as a security credential is secure. Whilst PIN is the obvious choice facial recognition will become standard on phones of the future as an authentication method. Whilst already available in tablets I think you will start seeing this in the next generation phones.As mentioned for readers, biometrics is growing in acceptance for authorisation. Whilst they all have their advantages and disadvantages these issues with the technology will disappear over the coming years.
  • All using hosted providers at some point, for example skype and skydrive
  • What is the cloudAn approach to computing that’s about internet scale and connecting to a variety of devices and endpoints (source Microsoft®)We all use the cloud now, skype, amazon, bankingDon’t require costly hardware and IT teams to maintainProvides scalability and flexibility
  • TDSi Open Day

    1. 1. Corps Security Open DayInnovations in Access Control, Standards & Integrated Systems Mike Sussman
    2. 2. Access Control - What is happening? How is IT changingIs access control How can it change the traditionalstagnant or is it to bring benefits to security managersevolving? all? role?Are we playing What are thecatching with other technologicalindustries? trends?
    3. 3. Credentials Secure accessUse of phone as a required – PIN orcredential - NFC facial Facial becomingMulti modal popular – nonbiometrics growing contact
    4. 4. Hosted systemsOutsource modelprovides better Lower Total Cost ofcontrol of costs OwnershipReduce hardware Integrate withand resource costs Improve efficiency receiving centres
    5. 5. Cloud Based SolutionsWhat is the cloud? Provides faultAre we ready for it? tolerance and DR Provides flexibilityYES as standard and scalability By 2014, 65% of new products to be delivered in cloud
    6. 6. Why cloud based systemsNo IT infrastructureto purchase and Scalability and Available accessmaintain elasticity 24/7 from anywhere Simple licensingNo installation of models – try beforeupdates buy
    7. 7. Why are customers using the cloud?Reduced annualcosts Agility and mobility Simple Increased end userHighly automated implementation productivity
    8. 8. Integrate disparate systems SDK and otherOpen fire doors in integration toolsalarm condition available Display intruder Arm/DisarmView live video on alarms in the intruder usingaccess event access software access credentials
    9. 9. Integration and PSIMConverges physical Analysis andsecurity with reasoning ofautomation computing Integrates Correlate events to unconnected proactively manage systems situations
    10. 10. 5 key capabilities Analyse and Collect data from correlate data to disparate systems identify situationPresent in quick Provide standard Provide complianceand easy format to operating practices reports, trainingverify situation to manage situation and investigation
    11. 11. Work with Corps Security and Partners Integration with Remote Immix for management of monitoring events serverWebway One SPT Remote sitesfor secure through secure Integration of Videoconnections Webway interface into Immix
    12. 12. StandardsNot as regulated asthe intruder and firemarkets EN50133 outdated Has some goodIEC 60839-11-1 out points like all … it also hasfor parallel voting standards …. contentious points
    13. 13. Summary Increasing use of Convergence ofShift to IP based web based physical securitysystems platforms and IT Uptake of NFC as a Cloud basedUse of managed credential using solutions willservices mobiles increase

    ×