www.axis.com
Enhancing
Defence-in-Depth using
automated systems
Jeffrey Lam
Senior Manager, End-customers, APAC
www.axis.com
USD**
Total sales 2020
1.2B
3,805
employees* in more
than countries
50
Axis at a glance
*Q4 2020 **Full year 2020, SEK 11.6 B, EUR 1.1 B
Video surveillance I audio |
intercom I access control I
training, service & support
Distributors
Customers
Resellers System integrators
Axis
Local presence around the world
through our extensive partner network
HQ and
founded
in Sweden,
part of
Canon group
Committed to
UN Global
Compact
75,000
partners worldwide
www.axis.com
Jeffrey Lam
Senior Program Manager
Defence in depth
(DiD)
www.axis.com
"Hohenzollern Castle - Stuttgart, Germany" by Trodel is licensed under CC BY-SA 2.0
outer walls
Inner walls
keep
Hill
www.axis.com
Datacenter
Defence in Depth
Perimeter
Premises
Building
Critical Spaces / Asset
www.axis.com
Defence in Depth in critical facilities
Perimeter
Premises Critical Spaces
Buildings
www.axis.com
Jeffrey Lam
Senior Program Manager
Automation &
Integration
www.axis.com
Deter
Detect
Delay
Response
Perimeter
Premises
Building
Critical spaces
Electronic
Systems
Automated
Environmental
Design
DiD INTENT
Manguards
www.axis.com
Objectives
• Reduce response time by reducing human inputs
• Increase effectiveness by using technology
• Facilitate human supervision & intervention
Approach
• Leverage on technology to automate tasks
• Integrate different systems to automate response
• Redesign processes to incorporate both human & tech.
www.axis.com
Automated Systems
INTERFACE
INTEGRATION
INTELLIGENCE
• Information & controls
• User dashboard / interface
• Manguards Communication
• Video images vs meta-data
• Interoperablity
• High level vs low level integration
• Detect & response
• Rules based/Machine Learning
• EDGE / server /cloud
www.axis.com
Jeffrey Lam
Senior Program Manager
Automated Systems
www.axis.com
Defence in Depth - typical systems
Security Cameras
Access control
Analytics & other
applications
Audio
Visitor entry
Control & Command
software
www.axis.com
Response
"Siren Light" by paurian is licensed under CC BY 2.0
"Floodlight Moon" by DOS82 is licensed under CC BY-NC-ND 2.0
"Garage Doors Long Panel Pebble Stone Color" by carywaynepeterson is
licensed under CC BY-ND 2.0
www.axis.com
Perimeter
Detect and verify potential
intrusion incidents at your
perimeter in real time.
www.axis.com
Perimeter Protection
Thermal
Camera
Detect
PTZ
Verify
Network
Horn
Speaker
Network
I/O
controlle
r
Siren
www.axis.com
Drones & Vehicles • Perimeter
Deter
Speakers
Detect
Fixed & PTZ cameras
Access
Vehicle recognition
& Door controller
Detect
Drone detection
system
www.axis.com
Premises & Site
Detect and track
people & objects
across multiple
sites.
www.axis.com
Site and lot management • Premises
Verify
PTZ cameras
Deter
Speakers
Detect
Thermal Cameras
/Radar detectors
Deter /
Detect
Bodyworn system /
Robotic Patrol
www.axis.com
Layer 2: Radar / Robot Guards
Reponse
Speakers
Detect
Multisensor cameras
Radar detectors
www.axis.com
Building
Control entrances
& exits to ensure
only authorized
personnel can
enter or leave the
space.
www.axis.com
Access control • Building exterior and interiors
Grant
access
Door controller
Identify
Card readers
Visitors
Door station
www.axis.com
Crossline and zone intrusion • Building interiors & Server rooms
Deter
Speakers
Detect
Fixed cameras
Verify
PTZ cameras
www.axis.com
Audio Analytics • Building exterior and interiors
Detect
Fixed cameras
Deter
Speakers
www.axis.com
Server rooms & server racks
Smart cameras and sensors
to protect people and assets
in the white space.
www.axis.com
White Space • Server rooms
Deter
Speakers
Multidirectional cameras
Verify
Detect
www.axis.com
Security-based operations
Cabinet, door and rack entry • Server racks
Deny
Rack based
access control
Post-event images
Pre-event images
Modular & PTZ camera
Detect
www.axis.com
Jeffrey Lam
Senior Program Manager
Systems
Considerations
www.axis.com
• Devices vs Applications
• Visibility, Flexibilty and Scalability
Level of
integration
• Comprehensive API
• Open Systems or Proprietary systems
Interoperability
• Supports current & future devices/systems
• Firmware upgrade - LTS track vs Active track
Backward
compatibility
Integrating systems
www.axis.com
IDENTIFY
/
DESIGN
Internal Policies
Regulatory
Compliance
Governance
ISO 27001
GDPR
FIPS 140-2
PCI-DSS
Secure by Default
Devices Inventory
PROTECT
/
DETECT
Hardening Guide
Signed Firmware
Secure Boot
LTS/firmware update
CVE Advisory
Vulnerability
Scanning
Encryption(certificates)
N/W Segmentation
TPM
RESPONSE/
RECOVER
SYS Log /
RemoteSys Log
Backup/Restore
SEIM/SOAR
(automation
&response)
Business Continuity
IT Security
www.axis.com
Jeffrey Lam
Senior Program Manager
Design
Considerations
www.axis.com
Environment considerations
• Lighting levels
• Shadows/ Reflections /Glare
• Dirt / dust/ Rain
• Temperature
• Strong winds / Vibration
• Electro-magnetic Interference
• Others
• Obstruction
• Theft, vandalism
"Hidden Camera" by miskan is licensed under CC BY-NC 2.0
"rain | window | reflection" by waferboard is licensed under CC BY 2.0
www.axis.com
Video considerations - lighting conditions
Lighting conditions are never right!
www.axis.com
Video considerations
Normal transmission: 2881 kbit/s
Without
Zipstream
Zipstream compression : 1433 kbit/s
With
Zipstream
www.axis.com
Cabling considerations
Cabling : major time & costs component
• Trenching, cable runways, grounding
• Surge protection, waterproofing, firestopping
Reduce cabling complexity
• Multi-sensor cameras = 1 cable / switch port
• PoE extenders: Transmitting UTP >100m
Reuse cables :
• UTP couplers/cables repair kit
• Cabling Testing/ Warranty
• Using existing coaxial cables for IP devices
www.axis.com

Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference)