This document provides an architectural overview of the EMC Physical Security solution enabled by EMC VNX, EMC VNXe, EMC Isilon, Iomega4, and Genetec Security Center and Omnicast. Use this document in conjunction with the document entitled "Configuration Guidelines: EMC Storage for Physical Security Enabled by Genetec Omnicast and Security Center", which includes configuration guidelines and resource specifications for the solution components, storage arrays, and other EMC product integration.
Security for Automotive with Multicore-based Embedded SystemsFraunhofer AISEC
The document discusses security issues with automotive systems as they transition to multi-core embedded systems with more connectivity. It notes existing security vulnerabilities and risks that multi-core architectures could exacerbate if not properly addressed. However, it also outlines opportunities for multi-cores to enhance attack tolerance and enable self-monitoring. Key research challenges include developing secure architectures with hardware trust anchors and secure elements, as well as secure software through techniques like sandboxing and attestation. Secure multi-cores could be an enabling technology for cyber-physical systems if these open challenges are addressed.
The document discusses security options for printed and stored documents to protect sensitive data. As threats have increased, advanced security measures are becoming more commonplace, such as encryption of stored data, secure deletion techniques that overwrite files, and use of fiber optic cabling. For organizations that prioritize convenience and privacy over high-level security, adding a mailbox unit or personal printers for key staff are simpler options. The document promotes contacting ITQ to implement a tailored security strategy using available hardware options.
The document discusses the Unisys STEALTH solution, which uses data splitting and encryption techniques to allow multiple networks with different classification levels to securely share the same infrastructure. It describes how the solution works, including using appliances and software to split data into slices and control access. It also provides examples of how the solution has been implemented for the US Special Operations Command and other agencies to consolidate networks and improve security.
ISACA National Capital Area Chapter (NCAC) in Washington, DC - Ulf MattssonUlf Mattsson
Ulf Mattsson discusses newer data protection options such as format controlling encryption (FCE) and data tokenization. FCE is a secret key encryption algorithm that restricts cipher text output to match the input format. It has benefits like ease of deployment and reduced changes to downstream systems, but also considerations around its security, performance overhead, and key management. Data tokenization generates random replacement values for sensitive data that can be used to retrieve the original data via a lookup. It provides stronger security but also has operational impacts to consider compared to other options. Overall, the document explores balancing data protection, compliance, costs, and business needs.
Update On The Cern. Computing And Network Infrastructure For Controls. (Cnic)...ESS BILBAO
This document summarizes the implementation of a security policy at CERN to protect its control systems from cyber threats. It discusses establishing separate network domains, centralized installation schemes for Linux and Windows systems, and user training. Authentication is based on role-based access control. Incident response involves the security team and domain administrators. The implementation uses a defense-in-depth approach across multiple levels to minimize risks to CERN's operations and assets from threats exploiting vulnerabilities in its increasingly standard IT-based control infrastructure.
The document discusses the Forward! platform from Unisys for deploying mission critical workloads. It offers secure partitioning of Intel Xeon servers with dedicated CPU, memory and I/O resources for each partition. This allows workloads to be consolidated while maintaining isolation and predictable performance. Up to 16 servers can be connected via a high speed interconnect fabric for scalability. The platform aims to provide many of the benefits of physical servers, such as isolation and redundancy, while achieving better utilization than traditional virtualized servers.
This document provides an overview and agenda for a presentation on the CCNA Security career path option. The presentation covers topics such as attack methodologies, security policies, cryptography, firewalls, VPNs, IPS, and layer 2 security. It aims to discuss security issues and relevant Cisco technologies at the associate level, using demonstrations of attacks and their mitigation. The goals are to supplement but not replace the CCNA Security certification course, and include both conceptual discussions and practical examples.
Security for Automotive with Multicore-based Embedded SystemsFraunhofer AISEC
The document discusses security issues with automotive systems as they transition to multi-core embedded systems with more connectivity. It notes existing security vulnerabilities and risks that multi-core architectures could exacerbate if not properly addressed. However, it also outlines opportunities for multi-cores to enhance attack tolerance and enable self-monitoring. Key research challenges include developing secure architectures with hardware trust anchors and secure elements, as well as secure software through techniques like sandboxing and attestation. Secure multi-cores could be an enabling technology for cyber-physical systems if these open challenges are addressed.
The document discusses security options for printed and stored documents to protect sensitive data. As threats have increased, advanced security measures are becoming more commonplace, such as encryption of stored data, secure deletion techniques that overwrite files, and use of fiber optic cabling. For organizations that prioritize convenience and privacy over high-level security, adding a mailbox unit or personal printers for key staff are simpler options. The document promotes contacting ITQ to implement a tailored security strategy using available hardware options.
The document discusses the Unisys STEALTH solution, which uses data splitting and encryption techniques to allow multiple networks with different classification levels to securely share the same infrastructure. It describes how the solution works, including using appliances and software to split data into slices and control access. It also provides examples of how the solution has been implemented for the US Special Operations Command and other agencies to consolidate networks and improve security.
ISACA National Capital Area Chapter (NCAC) in Washington, DC - Ulf MattssonUlf Mattsson
Ulf Mattsson discusses newer data protection options such as format controlling encryption (FCE) and data tokenization. FCE is a secret key encryption algorithm that restricts cipher text output to match the input format. It has benefits like ease of deployment and reduced changes to downstream systems, but also considerations around its security, performance overhead, and key management. Data tokenization generates random replacement values for sensitive data that can be used to retrieve the original data via a lookup. It provides stronger security but also has operational impacts to consider compared to other options. Overall, the document explores balancing data protection, compliance, costs, and business needs.
Update On The Cern. Computing And Network Infrastructure For Controls. (Cnic)...ESS BILBAO
This document summarizes the implementation of a security policy at CERN to protect its control systems from cyber threats. It discusses establishing separate network domains, centralized installation schemes for Linux and Windows systems, and user training. Authentication is based on role-based access control. Incident response involves the security team and domain administrators. The implementation uses a defense-in-depth approach across multiple levels to minimize risks to CERN's operations and assets from threats exploiting vulnerabilities in its increasingly standard IT-based control infrastructure.
The document discusses the Forward! platform from Unisys for deploying mission critical workloads. It offers secure partitioning of Intel Xeon servers with dedicated CPU, memory and I/O resources for each partition. This allows workloads to be consolidated while maintaining isolation and predictable performance. Up to 16 servers can be connected via a high speed interconnect fabric for scalability. The platform aims to provide many of the benefits of physical servers, such as isolation and redundancy, while achieving better utilization than traditional virtualized servers.
This document provides an overview and agenda for a presentation on the CCNA Security career path option. The presentation covers topics such as attack methodologies, security policies, cryptography, firewalls, VPNs, IPS, and layer 2 security. It aims to discuss security issues and relevant Cisco technologies at the associate level, using demonstrations of attacks and their mitigation. The goals are to supplement but not replace the CCNA Security certification course, and include both conceptual discussions and practical examples.
The Polytechnic of Namibia implemented Cisco network security solutions to address increasing cyber attacks, simplify management for limited staff, and prepare for doubling of students. Cisco ASA firewalls and Identity Services Engine provide scalable, virtualized security and access control. Initial results show simplified deployment and ability to rapidly expand virtual firewalls to meet growth needs.
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
The document discusses security issues with cloud storage and proposes a solution called Virtual Jail Storage System (VJSS). VJSS aims to prevent information leaks from servers and clients by encrypting and splitting data across multiple providers. It also seeks to address concerns about information erasure and loss through error correction and an append-only file system.
This document describes an innovative unified video surveillance system (Unified VSS) developed by Networking For Future (NFF) to address challenges with analyzing and storing video data from multiple disconnected legacy surveillance systems. The Unified VSS uses a "Red Zone" to capture video streams from different systems and a "Green Zone" with video management and analytics software to analyze and view the stored video. This platform provides a centralized storage solution with greater retention capabilities and analytics compared to existing systems, allowing organizations to consolidate video from multiple sources.
The document discusses Intel's vision for pervasive computing by 2015, including:
1) Over 1 billion additional users and more than 15 billion connected devices will require 8x more network capacity, 16x more storage, and 20x more compute capacity.
2) Intel's cloud vision includes federating data securely across public and private clouds and automating IT systems for increased innovation and reduced management.
3) Intel technologies like TXT, VT, and AES-NI help provide security across layers from clients to the cloud by isolating VMs, enforcing trusted platforms, and accelerating encryption.
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
Physical security systems use various methods to identify individuals and control access to secure areas in data centers. These systems balance reliability, cost, and risk. Common identification methods include cards, tokens, passwords, and biometrics that verify "what you have, know, or are". Effective security combines multiple identification layers with concentric zones of increasing protection depth for sensitive areas like computer rooms and racks. Physical security is critical to reducing data center downtime from human errors or threats.
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, ParisOW2
This talk presents VESPA, an open self-protection architecture and framework for cloud infrastructures that overcomes the previous limitations. Developed in the OpenCloudWare project, VESPA adopts a policy-based management approach, and allows a two-level regulation of security, both within a software layer and across layers. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies such as cross-layer detection and reaction. A multi-plane, extensible architecture also enables simple integration of commodity detection and reaction components. Evaluation results on a VESPA KVM-based implementation show that the design is applicable for effective and yet flexible self-protection of cloud infrastructures.
MT16 Future-Ready Networking for the CampusDell EMC World
Enterprise mobility and multimedia are having a profound impact in the Campus, redefining the desktop experience while driving greater requirements for performance and security. Learn how a Dell One Network solution can help boost performance, simplify management and enhance visibility.
1. Dell EMC offers a range of solutions for Platform 3 technologies including the Internet of Things (IoT), including IoT infrastructure, analytics, and support for containerized applications.
2. The Dell EMC modern data center supports social, mobile, analytics, cloud and IoT technologies through virtual and cloud native applications, converged infrastructures, hyper-converged solutions, software defined storage, and networking.
3. Dell EMC provides end user compute and security solutions to enable Platform 3 technologies.
An overview on current Microsoft Technologies around Private - / Hybrid-Clouds and what's coming up with the next version aka Azure Stack from our session at e2evc Berlin.
The document discusses using cyberinfrastructure such as smart traffic lights and smart parking to help reduce traffic in major Saudi Arabian cities. Smart traffic lights would analyze traffic flow and adjust light times accordingly. Smart parking would use cameras to identify available spots and share that data. The conclusion is that if cities implement this strong cyberinfrastructure, it could help make them more organized and beautiful while decreasing traffic and accidents.
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...OpenStack
Making Openstack Really Easy - Why Build Open Source When You Can Buy?
Audience: Beginner
Topic: Enterprise IT Strategies
Abstract: Delivering a a OpenStack platform is no small feat. Dell|EMC is now among a very small minority of vendors that have ventured into this space with a simplified IaaS model based on Open Source technologies to enable the building of next generation application.
Speaker Bio: Danny Elmarji, DellEMC
Danny Elmarji is a passionate technology advocate across Dell|EMC Australia and New Zealand. Danny joined EMC in 2005 and is responsible for running the Dell|EMC engineering community, focused on the both our Core Technology and Emerging Technology Divisions. From his original background in application development in Java and C++, Danny has further built extensive technical knowledge around cloud computing, third platform applications, DevOps and data science. Over the past 15 years he has received numerous industry certifications across virtualisation and Infrastructure solutions. Danny is originally from Canada where he completed his bachelor degree in Computer Science and Computing.
OpenStack Australia Day Government - Canberra 2016
https://events.aptira.com/openstack-australia-day-canberra-2016/
The document provides an overview of Microsoft Azure Stack, which allows organizations to run applications and services built on Azure in their own datacenters. It discusses how Azure Stack provides a hybrid cloud that combines public Azure services with private, on-premises infrastructure. It also covers key aspects of Azure Stack including Azure Resource Manager, supported services, cloud-inspired architecture, and next steps for learning more.
Occupational therapy evaluates health conditions to determine holistic measures that can improve a patient's ability to function in everyday activities. Therapists help both children and elderly patients by developing skills for school participation, addressing cognitive challenges, and recommending personalized interventions and equipment to work toward treatment goals. When undergoing occupational therapy, a patient receives an evaluation where the therapist understands their goals, may visit their home and workplace, and recommends specific therapy measures.
This document discusses mobile research and how to effectively capture consumer data through mobile platforms. It addresses common myths about mobile research, such as people not being willing to participate in mobile surveys or mobile data not being representative. The document advocates for catching consumers on mobile where and when it matters most to them through location-triggered surveys, in-store surveys using bluetooth beacons, and immersive home studies using photos and videos uploaded from mobile devices. Examples are given of successful mobile studies in different contexts. The key is recognizing people are increasingly mobile and capturing data in a way that appeals to consumers on the platforms they use.
Motivated employees can fall short of performance goals for several reasons:
1. Goals may not be clearly defined or employees lack the proper tools and resources to achieve them.
2. Employees are not given sufficient guidance, recognition, or development opportunities by supervisors.
3. There is a lack of effective leadership, appreciation, or proper resources and support systems within the organization.
4. Personal or family issues can distract employees from focusing on work goals.
This document discusses citation styles and how to properly cite sources. It covers the different styles like APA, MLA, and Chicago and what they are used for. APA style is commonly used in the social sciences. The document outlines how to cite different types of sources like books, periodicals, websites, and databases. It provides examples of in-text citations and reference list entries in APA style. Shortcuts for citations like online services like RefWorks and Zotero are also mentioned. Proper capitalization and including all necessary information is important for accurate citations.
This document summarizes Mark Burns' work on rewriting Jim Breen's Japanese-English online dictionary. It aims to create a JSON API and simpler UI, including features like autocomplete. Autocomplete is implemented using a trie index with O(logN) lookup time and N*(M+1) space complexity. The project has imported data into Redis, allows indexed word lookup, and begun work on text glossing. Future work includes connecting it to a graph database, analyzing kanji, improving user experience, and exploring other ideas through collaboration.
The document discusses how converged TV and on-demand viewing habits will affect viewership. It provides data on consumer expectations for more convenient, personalized content access across devices. The data shows growing preference for on-demand and pay-for-content options when legal alternatives are available. However, many markets still lack sufficient legal digital content, which the report argues must be addressed through policies that increase availability of lawful digital services and accommodate reasonable consumer expectations like time- and place-shifting to promote innovation while displacing illegal access.
This white paper describes the benefits, challenges, and strategies of setting up a government entity-wide enterprise content management (ECM) as a service offering within a governmental central IT organization.
The Polytechnic of Namibia implemented Cisco network security solutions to address increasing cyber attacks, simplify management for limited staff, and prepare for doubling of students. Cisco ASA firewalls and Identity Services Engine provide scalable, virtualized security and access control. Initial results show simplified deployment and ability to rapidly expand virtual firewalls to meet growth needs.
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
The document discusses security issues with cloud storage and proposes a solution called Virtual Jail Storage System (VJSS). VJSS aims to prevent information leaks from servers and clients by encrypting and splitting data across multiple providers. It also seeks to address concerns about information erasure and loss through error correction and an append-only file system.
This document describes an innovative unified video surveillance system (Unified VSS) developed by Networking For Future (NFF) to address challenges with analyzing and storing video data from multiple disconnected legacy surveillance systems. The Unified VSS uses a "Red Zone" to capture video streams from different systems and a "Green Zone" with video management and analytics software to analyze and view the stored video. This platform provides a centralized storage solution with greater retention capabilities and analytics compared to existing systems, allowing organizations to consolidate video from multiple sources.
The document discusses Intel's vision for pervasive computing by 2015, including:
1) Over 1 billion additional users and more than 15 billion connected devices will require 8x more network capacity, 16x more storage, and 20x more compute capacity.
2) Intel's cloud vision includes federating data securely across public and private clouds and automating IT systems for increased innovation and reduced management.
3) Intel technologies like TXT, VT, and AES-NI help provide security across layers from clients to the cloud by isolating VMs, enforcing trusted platforms, and accelerating encryption.
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
Physical security systems use various methods to identify individuals and control access to secure areas in data centers. These systems balance reliability, cost, and risk. Common identification methods include cards, tokens, passwords, and biometrics that verify "what you have, know, or are". Effective security combines multiple identification layers with concentric zones of increasing protection depth for sensitive areas like computer rooms and racks. Physical security is critical to reducing data center downtime from human errors or threats.
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, ParisOW2
This talk presents VESPA, an open self-protection architecture and framework for cloud infrastructures that overcomes the previous limitations. Developed in the OpenCloudWare project, VESPA adopts a policy-based management approach, and allows a two-level regulation of security, both within a software layer and across layers. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies such as cross-layer detection and reaction. A multi-plane, extensible architecture also enables simple integration of commodity detection and reaction components. Evaluation results on a VESPA KVM-based implementation show that the design is applicable for effective and yet flexible self-protection of cloud infrastructures.
MT16 Future-Ready Networking for the CampusDell EMC World
Enterprise mobility and multimedia are having a profound impact in the Campus, redefining the desktop experience while driving greater requirements for performance and security. Learn how a Dell One Network solution can help boost performance, simplify management and enhance visibility.
1. Dell EMC offers a range of solutions for Platform 3 technologies including the Internet of Things (IoT), including IoT infrastructure, analytics, and support for containerized applications.
2. The Dell EMC modern data center supports social, mobile, analytics, cloud and IoT technologies through virtual and cloud native applications, converged infrastructures, hyper-converged solutions, software defined storage, and networking.
3. Dell EMC provides end user compute and security solutions to enable Platform 3 technologies.
An overview on current Microsoft Technologies around Private - / Hybrid-Clouds and what's coming up with the next version aka Azure Stack from our session at e2evc Berlin.
The document discusses using cyberinfrastructure such as smart traffic lights and smart parking to help reduce traffic in major Saudi Arabian cities. Smart traffic lights would analyze traffic flow and adjust light times accordingly. Smart parking would use cameras to identify available spots and share that data. The conclusion is that if cities implement this strong cyberinfrastructure, it could help make them more organized and beautiful while decreasing traffic and accidents.
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...OpenStack
Making Openstack Really Easy - Why Build Open Source When You Can Buy?
Audience: Beginner
Topic: Enterprise IT Strategies
Abstract: Delivering a a OpenStack platform is no small feat. Dell|EMC is now among a very small minority of vendors that have ventured into this space with a simplified IaaS model based on Open Source technologies to enable the building of next generation application.
Speaker Bio: Danny Elmarji, DellEMC
Danny Elmarji is a passionate technology advocate across Dell|EMC Australia and New Zealand. Danny joined EMC in 2005 and is responsible for running the Dell|EMC engineering community, focused on the both our Core Technology and Emerging Technology Divisions. From his original background in application development in Java and C++, Danny has further built extensive technical knowledge around cloud computing, third platform applications, DevOps and data science. Over the past 15 years he has received numerous industry certifications across virtualisation and Infrastructure solutions. Danny is originally from Canada where he completed his bachelor degree in Computer Science and Computing.
OpenStack Australia Day Government - Canberra 2016
https://events.aptira.com/openstack-australia-day-canberra-2016/
The document provides an overview of Microsoft Azure Stack, which allows organizations to run applications and services built on Azure in their own datacenters. It discusses how Azure Stack provides a hybrid cloud that combines public Azure services with private, on-premises infrastructure. It also covers key aspects of Azure Stack including Azure Resource Manager, supported services, cloud-inspired architecture, and next steps for learning more.
Occupational therapy evaluates health conditions to determine holistic measures that can improve a patient's ability to function in everyday activities. Therapists help both children and elderly patients by developing skills for school participation, addressing cognitive challenges, and recommending personalized interventions and equipment to work toward treatment goals. When undergoing occupational therapy, a patient receives an evaluation where the therapist understands their goals, may visit their home and workplace, and recommends specific therapy measures.
This document discusses mobile research and how to effectively capture consumer data through mobile platforms. It addresses common myths about mobile research, such as people not being willing to participate in mobile surveys or mobile data not being representative. The document advocates for catching consumers on mobile where and when it matters most to them through location-triggered surveys, in-store surveys using bluetooth beacons, and immersive home studies using photos and videos uploaded from mobile devices. Examples are given of successful mobile studies in different contexts. The key is recognizing people are increasingly mobile and capturing data in a way that appeals to consumers on the platforms they use.
Motivated employees can fall short of performance goals for several reasons:
1. Goals may not be clearly defined or employees lack the proper tools and resources to achieve them.
2. Employees are not given sufficient guidance, recognition, or development opportunities by supervisors.
3. There is a lack of effective leadership, appreciation, or proper resources and support systems within the organization.
4. Personal or family issues can distract employees from focusing on work goals.
This document discusses citation styles and how to properly cite sources. It covers the different styles like APA, MLA, and Chicago and what they are used for. APA style is commonly used in the social sciences. The document outlines how to cite different types of sources like books, periodicals, websites, and databases. It provides examples of in-text citations and reference list entries in APA style. Shortcuts for citations like online services like RefWorks and Zotero are also mentioned. Proper capitalization and including all necessary information is important for accurate citations.
This document summarizes Mark Burns' work on rewriting Jim Breen's Japanese-English online dictionary. It aims to create a JSON API and simpler UI, including features like autocomplete. Autocomplete is implemented using a trie index with O(logN) lookup time and N*(M+1) space complexity. The project has imported data into Redis, allows indexed word lookup, and begun work on text glossing. Future work includes connecting it to a graph database, analyzing kanji, improving user experience, and exploring other ideas through collaboration.
The document discusses how converged TV and on-demand viewing habits will affect viewership. It provides data on consumer expectations for more convenient, personalized content access across devices. The data shows growing preference for on-demand and pay-for-content options when legal alternatives are available. However, many markets still lack sufficient legal digital content, which the report argues must be addressed through policies that increase availability of lawful digital services and accommodate reasonable consumer expectations like time- and place-shifting to promote innovation while displacing illegal access.
This white paper describes the benefits, challenges, and strategies of setting up a government entity-wide enterprise content management (ECM) as a service offering within a governmental central IT organization.
The document outlines steps to create a new company with a partner, including defining what the firm would do, what raw materials are needed, which classmates would be hired and how much they would be paid, and what equipment needs to be purchased. The entrepreneur must determine the company's product or service, what makes it unique, hire 4 classmates and set their wages and roles, and identify necessary equipment to purchase.
This document lists various sports and games that are played in different countries including volleyball, basketball, softball, baseball, soccer, sepak takraw, chess, athletics, badminton, swimming, lawn tennis, and arnis.
This document contains notes from a history lesson on various topics from the 1920s-1930s including:
- Three school rules the student agrees with and one they think should change along with a reason why.
- Information on Benito Mussolini as the leader of Italy from 1921-1943 who removed the king from power in 1922 and enforced rules.
- A list of major countries during that era including details on their government and economic situation.
- Descriptions of fictional schools representing Soviet Communist, Fascist, and Capitalist ideologies.
- A closing activity asking students to provide five reasons life is better under Bush and Obama than Mussolini's Italy.
Intelligence Driven Threat Detection and ResponseEMC
This document discusses intelligence driven threat detection and response. The key points are:
1) Organizations must detect threats early before harm occurs by actively hunting for intruders rather than relying on passive detection tools. This requires new capabilities in data analysis and incident response.
2) Intelligence driven security enhances threat detection and response by providing visibility, advanced analytics, signature-less malware detection, and empowering security teams.
3) To achieve intelligence driven security, organizations should advance capabilities in network and endpoint monitoring, advanced analytics, malware analysis, and incident response practices.
White Paper: EMC VNXe Data Protection — A Detailed Review EMC
This White Paper details the integrated features that can be positioned for business continuity in the EMC VNXe series platforms. Data protection features include snapshots, replication, and NDMP backups.
This document discusses the benefits of using EMC Symmetrix V-Max virtual provisioning with Veritas Storage Foundation. Virtual provisioning, also called thin provisioning, allows higher storage utilization by presenting more storage space to applications than is physically allocated. Veritas Storage Foundation helps optimize storage usage during migration from traditional thick storage to thin storage. The document provides details on implementing thin provisioning with Symmetrix V-Max arrays and using Storage Foundation features like SmartMove to improve thin storage utilization.
Historically backups have been defined and referenced by the hostname of the physical system being protected. This has worked well when the relationship between the physical host and the operating system was a direct, one to one relationship. Backup processing impact was limited to each physical client and the biggest concern was saturating the network with backup traffic. This was easily managed by limiting the number of simultaneous client backups via a simple setting within the NetBackup policy.
Virtual machine technologies have changed this physical hardware dynamic. Dozens of operating systems (virtual machines) can now reside on a single physical (ESX) host connected to a single storage LUN with network access through a single NIC. When using traditional policy configurations, backup processing randomly occurs with no regard to the physical location of each virtual machine. As backups progress, a subset of ESX servers can be heavily impacted with active backups while other ESX systems sit idly waiting for their virtual machines to be protected. The effect of this is that backups tend to be slower than they need to be and backup processing impact on the ESX servers tends to be random and lopsided. Standard backup policy definitions simply do not translate well into virtual environments.
The NetBackup Virtual machine Intelligent Policy (VIP) feature is designed to solve this problem and more. With Virtual machine Intelligent Policy, backup processing can be automatically load balanced across the entire virtual machine environment. No ESX server is unfairly taxed with excessive backup processing and backups can be significantly faster. Once configured, this load balancing automatically detects changes in the virtual machine environment and automatically compensates backup processing based on these changes. Virtual machine Intelligent Policy places virtual machine backups on autopilot.
This document provides an introduction to the Symmetrix Foundations training course. It discusses EMC's range of storage platforms from low-end CLARiiON systems to high-end DMX arrays. The training will provide an architectural overview of the Symmetrix family with a focus on DMX models and will discuss prior Symmetrix generations. It outlines the learning objectives which include describing Symmetrix architecture, configurations, I/O handling, logical volumes, and media protection options.
This document discusses security considerations for videoconferencing and provides an overview of Criticom's ISEC line of secure videoconferencing products. It explains that a secure videoconferencing setup requires isolation between dialing and transmission interfaces, approved encryption of transmitted data, and physical security measures. Criticom's products like the ISEC-320 switch and ISEC-STS system allow switching between secure and non-secure modes without re-cabling by providing optical isolation and integrated encryption. The document concludes that Criticom's solutions address key needs for ease of use, security compliance, and integration in secure videoconferencing environments.
The document discusses EMC's ViPR software-defined storage platform. Some key points:
- ViPR automates, abstracts, and pools heterogeneous storage resources, providing REST-based APIs and self-service access for storage management.
- It creates virtual storage pools with data protection policies that can include various EMC and third-party storage platforms.
- ViPR simplifies storage management and reduces provisioning time by an average of 63%, integrating automation, reporting, data protection technologies, and cloud stacks.
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
VSE (Virtualized Security and Encryption) technology leverages Trusted Execution Environments and encryption to provide scalable, cost-efficient security solutions for organizations. It reduces costs compared to traditional hardware-based systems by not requiring dedicated equipment. VSE also enables advanced services like zero-trust networking and cloud-native security. JET Technology Labs has developed a VSE framework incorporating their high-performance cryptographic library to address limitations of existing solutions and provide defense against various attacks. This framework can benefit both private sector organizations and government agencies.
The Security Fabric Alliance is an informal consortium dedicated to the deployment of "designed in security" for embedded systems in critical infrastructure.
It uses the NIST IR 7628 guidelines and the "tailored trustworthy space" as the basis for the Security Fabric Reference Architecture. The SFRA is discussed in detail in the slides herein.
The document describes the EMC VNX5400 unified storage system. It delivers high performance through its MCx multicore optimization and supports up to 1 PB of storage capacity. Features include block, file, and object support along with data reduction technologies. It offers strong integration with virtualization platforms and automated storage tiering through FAST Suite to optimize performance and costs. A range of services and support options are available as well.
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...The Linux Foundation
This presentation will detail a practical approach to memory introspection of virtual machines running on the Xen hypervisor with no in-guest footprint. The functionality makes use of the mem-event API with a number of improvements which enable the proper tracking of guest OS activity. The technology created on top of this Xen API opens the door for several immediate applications, including: rootkit detection and prevention, detection and action on several categories of malware, and event source information for low-level post-event forensics and correlation based on real event data during events.
ViPR Services Storage Engine Architecture
This white paper explains in detail the ViPR Services architecture, which is a geo-scale cloud storage platform that delivers cloud-scale storage services, global access, and operational efficiency at scale.
This white paper provides a detailed overview of the EMC ViPR Services architecture, a geo-scale cloud storage platform that delivers cloud-scale storage services, global access, and operational efficiency at scale.
The EMC VNX family provides unified storage optimized for virtualized applications, with file, block, and object storage capabilities. It offers powerful new multi-core Intel CPUs, high-bandwidth configurations, administration simplicity, and flash-optimized storage with auto-tiering. The VNX family includes the VNXe series for smaller environments and the VNX series to meet high-performance, high scalability requirements of midsize and large enterprises.
White Paper: EMC VNXe File Deduplication and Compression EMC
This White Paper describes EMC VNXe file deduplication and compression, a VNXe system feature that increases the efficiency with which network-attached storage (NAS) data is stored.
St. Vincents Private Hospital Physical Securitynmullen
St. Vincent's Private Hospital wanted to improve security across its campus by integrating its existing Cisco network infrastructure with a physical security system. It needed a solution that could be easily designed, integrated and deployed, and allow centralized monitoring and control of cameras, access controls, and other systems. Cisco and ViS Security Solutions collaborated on a solution using Cisco's physical security products that met the hospital's goals of improved safety, security and efficiencies through a single, integrated system.
This document summarizes Fred Seigneur's presentation on computer security innovation at the 2014 Cybersecurity Innovation Forum. The presentation discussed foundational weaknesses in current operating systems and applications due to a lack of built-in security. It proposed that developing a Secure Computing Infrastructure (SCI) using a separation kernel, Erlang virtual machine, and hardware security could help address these weaknesses by building security in from the beginning. A phased approach was outlined to develop an SCI prototype using the Parallella board.
The document discusses network forensics and the ability to capture and analyze all network traffic at high speeds. It notes that advances in storage technologies now enable total network traffic capture without loss. This allows analyzing past network events, even those from months prior, with full packet fidelity. The author proposes that network forensics technologies could evolve similarly to how firewalls became universal. By making total network traffic capture and analysis practical and easy to use, security defenses could become more effective against both known and unknown threats.
Breakout session tijdens Proact's SYNC 2013.
VSPEX en vBlock Converged Infrastructure bouwblokken van hypervisor server network en storage.pptx
John Lavallée
Practice Mgr – Cloud Services EMEA
EMC | Global Services Partners
This document discusses computer security innovation and proposes a Secure Computing Infrastructure (SCIF) as a foundational solution. Some key points:
- Current computer security approaches are unsustainable and non-scalable as they do not build security in from the beginning.
- Operating systems and applications lack basic immune systems and are not written robustly, leading to vulnerabilities.
- The document proposes a SCIF that uses components like the Parallella board running seL4 microkernel with Erlang virtual machine to securely run applications and provide fault tolerance.
- A phased approach is outlined to prototype and field trial the SCIF as a more secure computing foundation.
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
CloudBoost is a cloud-enabling solution from EMC
Facilitates secure, automatic, efficient data transfer to private and public clouds for Long-Term Retention (LTR) of backups. Seamlessly extends existing data protection solutions to elastic, resilient, scale-out cloud storage
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
With EMC XtremIO all-flash array, improve
1) your competitive agility with real-time analytics & development
2) your infrastructure agility with elastic provisioning for performance & capacity
3) your TCO with 50% lower capex and opex and double the storage lifecycle.
• Citrix & EMC XtremIO: Better Together
• XtremIO Design Fundamentals for VDI
• Citrix XenDesktop & XtremIO
-- Image Management & Storage
-- Demonstrations
-- XtremIO XenDesktop Integration
EMC XtremIO and Citrix XenDesktop provide an optimized virtual desktop infrastructure solution. XtremIO's all-flash storage delivers high performance, scalability, and predictable low latency required for large VDI deployments. Its agile copy services and data reduction features help reduce storage costs. Joint demonstrations showed XtremIO supporting thousands of desktops with sub-millisecond response times during boot storms and login storms. A unique plug-in streamlines the automated deployment and management of large XenDesktop environments using XtremIO's advanced capabilities.
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
Explore findings from the EMC Forum IT Study and learn how cloud computing, social, mobile, and big data megatrends are shaping IT as a business driver globally.
Reference architecture with MIRANTIS OPENSTACK PLATFORM.The changes that are going on in IT with disruptions from technology, business and culture and so IT to solve the issues has to change from moving from traditional models to broker provider model.
This document summarizes a presentation about scale-out converged solutions for analytics. The presentation covers the history of analytic infrastructure, why scale-out converged solutions are beneficial, an analytic workflow enabled by EMC Isilon storage and Hadoop, test results showing performance benefits, customer use cases, and next steps. It includes an agenda, diagrams demonstrating analytic workflows, performance comparisons, and descriptions of enterprise features provided by using EMC Isilon with Hadoop.
The document discusses identity and access management challenges for retailers. It outlines security concerns retailers face, including the need to protect customer data and payment card information from cyber criminals. It then describes specific identity challenges retailers deal with related to compliance, access governance, and managing identity lifecycles. The document proposes using RSA Identity Management and Governance solutions to help retailers with access reviews, governing access through policies, and keeping compliant with regulations. Use cases are provided showing how IMG can help with challenges like point of sale monitoring, unowned accounts, seasonal workers, and operational issues.
Container-based technology has experienced a recent revival and is becoming adopted at an explosive rate. For those that are new to the conversation, containers offer a way to virtualize an operating system. This virtualization isolates processes, providing limited visibility and resource utilization to each, such that the processes appear to be running on separate machines. In short, allowing more applications to run on a single machine. Here is a brief timeline of key moments in container history.
This white paper provides an overview of EMC's data protection solutions for the data lake - an active repository to manage varied and complex Big Data workloads
This infographic highlights key stats and messages from the analyst report from J.Gold Associates that addresses the growing economic impact of mobile cybercrime and fraud.
Virtualization does not have to be expensive, cause downtime, or require specialized skills. In fact, virtualization can reduce hardware and energy costs by up to 50% and 80% respectively, accelerate provisioning time from weeks to hours, and improve average uptime and business response times. With proper training and resources, virtualization can be easier to manage than physical environments and save over $3,000 per year for each virtualized server workload through server consolidation.
An Intelligence Driven GRC model provides organizations with comprehensive visibility and context across their digital assets, processes, and relationships. It enables prioritization of risks based on their potential business impact and streamlines remediation. By collecting and analyzing data in real time, an Intelligence Driven GRC strategy reveals insights into critical risks and compliance issues and facilitates coordinated responses across security, risk management, and compliance functions.
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
This white paper discusses the results of a CIO UK survey on a“Trust Paradox,” defined as employees and business partners being both the weakest link in an organization’s security as well as trusted agents in achieving the company’s goals.
Emory's 2015 Technology Day conference brought together faculty, staff and students to discuss innovative uses of technology in teaching and research. Attendees learned about new tools and platforms through hands-on workshops and presentations by Emory experts. The conference highlighted how technology is enhancing collaboration and creativity across Emory's campus.
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
This document provides information about data science and big data analytics. It discusses discovering, analyzing, visualizing and presenting data as key activities for data scientists. It also provides a website for further information on a book covering the tools and methods used by data scientists.
Using EMC VNX storage with VMware vSphereTechBookEMC
This document provides an overview of using EMC VNX storage with VMware vSphere. It covers topics such as VNX technology and management tools, installing vSphere on VNX, configuring storage access, provisioning storage, cloning virtual machines, backup and recovery options, data replication solutions, data migration, and monitoring. Configuration steps and best practices are also discussed.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Security Center Reference Architecture
1. Reference Architecture
EMC STORAGE FOR PHYSICAL SECURITY
EMC VNX, VNXe, and Isilon, and Genetec Security Center
• Genetec Omnicast performance using EMC storage arrays
• Genetec Security Center performance using EMC storage arrays
• Correct sizing storage in a Genetec physical security environment
EMC Solutions Group
April 2012
3. Table of contents
Reference architecture overview ........................................................................................................... 4
Document purpose .......................................................................................................................... 4
Solution purpose ............................................................................................................................. 4
The business challenge.................................................................................................................... 4
The technology solution ................................................................................................................... 5
Key components ................................................................................................................................... 6
Introduction ..................................................................................................................................... 6
Digital video streams ....................................................................................................................... 6
Main server and expansion server .................................................................................................... 6
EMC storage ..................................................................................................................................... 6
Physical architecture ............................................................................................................................ 8
Architecture diagram........................................................................................................................ 8
EMC storage configurations ...................................................................Error! Bookmark not defined.
Genetec architecture ............................................................................................................................ 9
Genetec servers ............................................................................................................................... 9
Genetec deployment size ................................................................................................................. 9
Main roles ...................................................................................................................................... 10
EMC RSA secured domain ................................................................................................................... 11
Overview ........................................................................................................................................ 11
RSA logon ...................................................................................................................................... 11
Validated environment profile ............................................................................................................ 12
Profile characteristics..................................................................................................................... 12
Hardware resources ....................................................................................................................... 12
Software resources ........................................................................................................................ 13
Conclusion ......................................................................................................................................... 14
Summary ....................................................................................................................................... 14
EMC Storage for Physical Security 3
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
4. Reference architecture overview
Document purpose This document provides an architectural overview of the EMC Physical Security
solution enabled by EMC® VNX™, EMC VNXe™, EMC Isilon®, Iomega4®, and Genetec
Security Center and Omnicast.
Use this document in conjunction with the document entitled “Configuration
Guidelines: EMC Storage for Physical Security Enabled by Genetec Omnicast and
Security Center,” which includes configuration guidelines and resource specifications
for the solution components, storage arrays, and other EMC product integration.
Solution purpose The purpose of this Reference Architecture is to demonstrate how using the EMC and
Genetec integrated solution enables a security team to view real-time video streams
while also receiving policy-based and anomaly-based alerts. Genetec’s sophisticated
software analyzes data from remote locations and historical archives and generates
alerts based on your criteria.
The business Private businesses and public entities alike have responded to rising concerns about
challenge theft, fraud, and terrorism by sharpening their focus on physical security and
surveillance systems. Organizations such as retailers, casinos, financial institutions,
higher education institutions, transportation companies, law enforcement, school
systems, prison systems, and government agencies all need to manage and protect
their ever-growing volume of physical security information.
The ability to access the right data at the right time from anywhere is crucial to
supporting physical security and surveillance needs. However, the following factors
can hinder a comprehensive solution:
• Proprietary software
• Closed hardware platforms
• Lack of manageable archival capabilities
• Data retrieval wait times
• Lost data
• Unproven content authenticity
• Information management limitations
The high expansion costs of legacy video surveillance systems, based on CCTV,
digital video recorders (DVRs), or network video recorder (NVR) technologies and non-
integrated IT and physical security systems, amplify these limitations further.
After Genetec Omnicast captures the information — and throughout the initial
response, detection, legal, judicial submission, and data disposal processes —
information management, availability, security, and protection are the core
capabilities needed for tamper-proof evidence collection, increased conviction rates,
and asset protection.
EMC Storage for Physical Security 4
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
5. The technology EMC physical security solutions provide flexibility to control video surveillance and
solution analyze security incidents in real time, collect evidence faster, and easily review
archived data, from anywhere.
EMC storage arrays provide quality storage for the smallest to the largest customers
using a variety of storage topologies including SAN (FC and iSCSI) and NAS (NFS,
CIFS).
Virtualization with VMware consolidates the number of Genetec Archivers required at
a given site. Aggregating multiple Genetec Archivers onto VMware® ESX®/ESXi™
hosts enables more bandwidth per physical host than is normally recognized from a
physical host.
With EMC Isilon's easy installation, management, and scalability, this solution also
adds value to non-IT centric and IT-centric customers alike.
Data management This solution integrates EMC and Genetec technology to help meet the challenges of
video surveillance information convergence and management. This enterprise-class
solution provides data management in each phase of the video surveillance lifecycle,
including:
• Capturing and monitoring
• Analyzing
• Protecting and securing
• Archiving
• Authenticating evidence
Genetec Security Genetec Security Center is a unified security platform that seamlessly blends
Center Genetec’s IP security and safety systems within a single innovative solution. The
systems unified under Security Center management include Genetec’s Omnicast IP
video surveillance, Synergis IP access control, and AutoVu license plate recognition
(LPR).
Developed with simplicity of operation in mind, the Security Center presents
information to operators through a single interface and simplifies operators’ tasks,
standardizes workflows, increases productivity, and enhances decision-making. It
aggregates physical security content from multiple sources, integrating IP networking
with a full range of physical security systems, including:
• Video surveillance cameras
• Access control devices and intrusion detection systems
• Information security applications
• Visitor management and identity recognition
• Asset management
• Sensors and alarms
EMC Storage for Physical Security 5
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
6. Although you can use EMC VNX and EMC Isilon storage for high-throughput solutions,
alternate storage solutions include EMC Symmetrix® VMAX™ and Symmetrix DMX™.
Key components
Introduction The physical security components typically consist of legacy analog monitoring
capabilities, analog cameras, and IP cameras.
Video encoders convert standard NTSC/PAL video from analog cameras to a digital
video stream over TCP/IP. You can also deploy customer-furnished IP cameras in this
solution. Each camera is capable of producing a digital video stream over TCP/IP.
This solution uses EMC storage platforms to provide single- or multi-tiered storage
architectures for centralized or decentralized enterprise requirements. EMC
PowerPath® software provides channel failover on Omnicast Security Center servers
for both fiber and iSCSI connectivity options.
Digital video An Omnicast System Center Archiver captures digital video streams over TCP/IP and
streams then typically writes the video to EMC VNX or Isilon storage.
Main server and A System Center installation consists of a single server or of multiple servers in a
expansion server hierarchical structure.
The main server is the only server on your system that hosts the Directory role. The
Directory is the role that identifies your system. All other servers on the system must
connect to the main server in order to be part of the same system. You may have only
one main server on any Security Center system.
An expansion server is any computer other than the main server that you add to your
system to increase its total computing power. An expansion server must connect to
the main server and may host any role in Security Center, except the Directory role.
EMC storage This reference architecture uses the EMC VNXe and VNX storage platforms. However,
you can integrate different EMC storage platforms and array sizes with Genetec
Security Center to provide a physical security solution to meet any size application.
Table 1 describes EMC storage platforms that are compatible with Genetec software
for physical security.
Table 1. EMC storage platforms available for this solution
EMC storage Description
Symmetrix VMAX The EMC Physical Security Lab tested the EMC Symmetrix VMAX
storage array connected to a Cisco UCS server using VMware ESX
4.0 running Microsoft Windows Server 2008 64-bit.
This solution is ideal for very large, demanding installations or
environments that already have VMAX and Cisco UCS.
EMC Storage for Physical Security 6
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
7. EMC storage Description
VNX EMC VNX and EMC CLARiiON storage arrays, from the AX4 through
VNXe/Celerra the VNX7500, all perform exceptionally well with the Genetec
Security Center physical security solution.
The solution also supports unified storage derivatives such as the
VNXe, NX, and NS storage arrays. Unified storage topologies
include FC, iSCSI, NFS, and CIFS. NFS and CIFS accommodate
smaller customers and those with specific use cases. FC attaches
directly to the VNX or CLARiiON, bypassing the data mover.
Isilon Isilon storage arrays provide exceptional NAS performance.
Omnicast version 4.8 or greater and Security Center 5.1 and
greater are compatible with the Isilon storage arrays.
Iomega The Iomega PX12, IX12, and PX4d storage arrays are ideal for
smaller customers.
For data resilience, use RAID 6 if possible.
EMC Storage for Physical Security 7
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
8. Physical architecture
Architecture Figure 1 shows the overall physical architecture of the core solution.
diagram
Figure 1. Solution architecture
EMC Storage for Physical Security 8
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
9. Genetec architecture
Genetec servers Security Center’s architecture uses a client/server model in which a pool of server
computers distributed over an IP network handles all system functions. The number
of servers can range from a single machine for a small system to hundreds of
machines for a large-scale system.
Genetec Server is the Windows service you must install on every computer that you
want included in the pool of servers available for Security Center to use. Every server
is a generic computing resource capable of taking on any role (set of functions) you
assign to it.
A role is a software module that performs a specific function (or job) within Security
Center. For example, you can assign roles for archiving video, for controlling a group
of units, or for synchronizing Security Center users with your corporate directory
service.
Genetec You can position Genetec solutions for both small and large customers. As illustrated
deployment size in Table 2, acceptable storage solutions may be large or small, as long as the file
server meets the requirements of EMC and Genetec. The solution also works very well
with VMware ESX/ESXi 4.x.
You can use VMware ESX/ESXi 4.0 (and later) to greatly reduce the server farm
footprint while increasing the bandwidth each physical server can produce. Genetec
Omnicast and Security Center are ideally suited for VMware.
Table 2. Deployment guidelines
Validated component Compatibility
Storage VMAX, VNX, CX4, CX3, AX4, VNXe, Isilon,
NS, NX, Iomega PX line and IX12
Platform Blade and rack-mount servers
Operating system Microsoft Windows Server 2008 (64-bit
used in lab)
VMware Compatible (with excellent performance )
EMC Storage for Physical Security 9
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
10. Main roles Table 3 describes the main roles provided by the Genetec Security Center for video
surveillance.
Table 3. Genetec main roles
Service Description
Media Router • Handles all stream (audio or video) requests on the system
• Calculates the optimal path between the source and destination
based on location and transmission capabilities
Directory • The Directory role is what defines a Security Center system.
• The main server module provides a centralized configuration
database for all entities in the system including cameras, users,
other Security Center roles, and applications on the system.
• The Directory role is responsible for authentication and access
control using the built-in security model or through Microsoft Active
Directory.
• The Directory also offers the option to log all system events and user
actions in a relational database for reporting purposes.
• Starting with Security Center 5.1, multiple Directories can run
concurrently to provide high availability and load-balance client
connections.
• SQL mirroring is also available for Directory DB failover.
Health • Set of tools to monitor the health of Security Center
monitoring
• Provides real-time status of the system entities
• Health statistics providing valuable information like availability,
uptime, mean time between failures, mean time to recovery for
cameras, door controllers, and intrusion panels
• Detects health issues early enough to avoid potential problems in
the future
Archiver • Manages the communication with IP cameras and an encoder. The
Archiver is the only Security Center component that communicates
directly with the IP cameras.
• Has a plug-in architecture to introduce support for new camera
manufacturers without requiring a complete software upgrade.
• Records up to 300 cameras or 300 Mb/s of throughput
• Responsible for maintaining the database that links a specific
camera at a specific time to a video file stored on disk
• Performs motion detection algorithms on recorded video streams
EMC Storage for Physical Security 10
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
11. EMC RSA secured domain
Overview The Genetec Security Center solution installed with EMC’s RSA-secured domain
increases Windows and Security Center security. RSA® authentication using
constantly changing RSA tokens increases the user’s Security Center experience by
providing a single logon structure for accessing multiple Security Center applications.
For more information refer to the EMC white paper entitled EMC Physical Security—
Enabled By RSA SecurID Two-Factor Authentication with Genetec Omnicast Client
Applications.
RSA logon In general, the login process consists of the following steps:
1. The login request using RSA authentication (token) sends the request through
the EMC RSA SecurID® appliance.
2. If the user credentials are correct, the EMC RSA SecurID appliance proxies the
login to the Active Directory and the Active Directory authenticates the login
into the requested Windows Domain.
3. Login to the Windows Domain is complete.
4. User accesses the requested application.
5. User credentials verify if this user has access rights for the requested
application. The user may be required to press Enter before continuing into
the application (this is application-specific).
Figure 2 shows the login process.
Figure 2. RSA login process
EMC Storage for Physical Security 11
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
12. Validated environment profile
Profile Table 5 describes the environment that EMC validated for this solution.
characteristics
Table 4. Validated provide
Profile characteristic Value
Omnicast application software Omnicast 4.4 – Windows Server 2003 SP2/R2 on local
server disk or boot from CLARiiON
Omnicast 4.4 through 4.6 – Windows Server 2008 x32
and x64
Omnicast 4.7 and above – Windows Server 2008 X64
Omnicast 4.8 (Security Center 5.1) required for EMC
Isilon storage arrays
Storage topology SAN, DAS, iSCSI
• iSCSI – HBA
• iSCSI – Microsoft initiators with Windows Server
2008 and later only
NAS
• SMB2 to the Isilon X200 or 108NL storage arrays
Total bandwidth per Archiver 37.5 MB/s (300 Mb/s)
server
Hardware Table 5 lists the hardware used in this solution.
resources
Table 5. Solution hardware
Hardware Quantity Configuration
Any 1U, 2U, or blade server on 1 Per Security Center server
Genetec and EMC’s supported
hardware listing
Any VNX, VNXe, AXA, AX4-5/5i, Based on See the Genetec Omnicast
CX3-XX, CX4-XXX, Isilon X200, solution Bandwidth Technical Note for
and 108NL, NX, NS requirements additional information. If you do not
have access to this document, see
your EMC representative.
EMC Storage for Physical Security 12
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
13. Software resources Table 6 lists the software used in this solution.
Table 6. Solution software
Software Version Configuration
Windows Server 2003 SP2/R2 Operating system for Omnicast servers and
workstation(s), used for AX and CX3 testing
Windows Server 2008 64-bit Operating system for Security Center servers and
workstation(s)
Genetec Omnicast 4.4 – 4.8 4.4 – 4.6 Windows Server 2003 R2; Windows Server
Server 2008
4.7 – 4.8 Windows 2008 x32 and x64
Local disk drive installation for all non-boot from SAN
configurations
Genetec Security Center 5.0 – 5.1 Windows 2008 x64
EMC PowerPath Latest GA version Installed on Omnicast servers
EMC Naviagent Latest GA version Installed on Omnicast servers
Security Center, Minimum of 1; Specified in Genetec Security Center documentation
Security Desk, and maximum – unlimited
Configuration Tool
EMC Storage for Physical Security 13
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
14. Conclusion
Summary The EMC Physical Security solution enabled by EMC storage arrays and Genetec
Security Center products represents an ideal solution for surveillance management
and IT infrastructure. The solution provides a flexible and highly scalable
infrastructure that can meet a broad range of today’s demanding physical security
requirements.
As requirements change and become more sophisticated, the EMC Physical Security
solution’s flexibility and modular architecture can be enhances to meet customers’
individual needs.
EMC Storage for Physical Security 14
EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture