Presentation to the SECURITY INDUSTRY INSTITUE Conference on "Physical meets Cyber Security" 2020
Integrating different automated systems together with a defence-in-depth design philosophy. Different dimensions are examined including environmental, cabling and integration to enhance the physical security of datacenters / critical facilities.
2. www.axis.com
USD**
Total sales 2020
1.2B
3,805
employees* in more
than countries
50
Axis at a glance
*Q4 2020 **Full year 2020, SEK 11.6 B, EUR 1.1 B
Video surveillance I audio |
intercom I access control I
training, service & support
Distributors
Customers
Resellers System integrators
Axis
Local presence around the world
through our extensive partner network
HQ and
founded
in Sweden,
part of
Canon group
Committed to
UN Global
Compact
75,000
partners worldwide
9. www.axis.com
Objectives
• Reduce response time by reducing human inputs
• Increase effectiveness by using technology
• Facilitate human supervision & intervention
Approach
• Leverage on technology to automate tasks
• Integrate different systems to automate response
• Redesign processes to incorporate both human & tech.
12. www.axis.com
Defence in Depth - typical systems
Security Cameras
Access control
Analytics & other
applications
Audio
Visitor entry
Control & Command
software
13. www.axis.com
Response
"Siren Light" by paurian is licensed under CC BY 2.0
"Floodlight Moon" by DOS82 is licensed under CC BY-NC-ND 2.0
"Garage Doors Long Panel Pebble Stone Color" by carywaynepeterson is
licensed under CC BY-ND 2.0
28. www.axis.com
• Devices vs Applications
• Visibility, Flexibilty and Scalability
Level of
integration
• Comprehensive API
• Open Systems or Proprietary systems
Interoperability
• Supports current & future devices/systems
• Firmware upgrade - LTS track vs Active track
Backward
compatibility
Integrating systems
29. www.axis.com
IDENTIFY
/
DESIGN
Internal Policies
Regulatory
Compliance
Governance
ISO 27001
GDPR
FIPS 140-2
PCI-DSS
Secure by Default
Devices Inventory
PROTECT
/
DETECT
Hardening Guide
Signed Firmware
Secure Boot
LTS/firmware update
CVE Advisory
Vulnerability
Scanning
Encryption(certificates)
N/W Segmentation
TPM
RESPONSE/
RECOVER
SYS Log /
RemoteSys Log
Backup/Restore
SEIM/SOAR
(automation
&response)
Business Continuity
IT Security