classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Convergence of physical and IT security
October 2004, Cyber Security

Electronic security and information security as individual, non-integrated sub-systems can create security gaps in your organisation. It is commonly acknowledged that 30% of intrusions within a company's computer system are from outside hackers; 70% are from people associated with the company, so finding the common ground where physical security and IT security systems meet will undoubtedly bring significant enterprise-wide benefits by leveraging areas of similarities within the two domains.

Identifying and exploiting these similarities can bring substantial cost-savings while streamlining your security policies. In a typical business environment, physical and IT security meet in any number of ways, including:

* The use of 'doors' to control access to restricted areas (physical and logical).

* Administrators managing PC-based network applications.

* The use of credentials (physical badges or PIN/passwords).

* Same users: company employees, contractors, visitors, etc.

* The same person to access a restricted area in the facility is accessing a restricted area in the network, PC and other IT applications.

* The use of a common network infrastructure.

Whilst not routinely done, integration can be as simple as sharing common cardholder data between physical security and IT systems. Integration can extend far beyond this, to tighter seamless integration with many of the sub-systems shown above, such that events in one domain create actions and alarms in the other domain.

Solutions through integration

Of course the real beauty of integration is that a single solution can be utilised for managing people, assets and information. Lenel has pioneered this market for convergence in the security industry, most notably with its intro-duction in 2002 of OnGuard OpenIT, which has long offered an advanced application integration service that allows realtime, bidirectional data exchange and seamless integration between OnGuard and external IT applications. As the diagram (Figure 1) shows, OpenIT is designed as the foundation for many of the integration points between physical and IT security.

Figure 1. Typical integration points between physical and IT security
Figure 1. Typical integration points between physical and IT security

This flexibility allows many unique business applications to be solved by leveraging existing available data. The integration possibilities are endless. Some of the more important areas include:

* LDAP/active directory linkages.

* Integration with SNMP.

* Digital certificate management services through PKI integration.

* OPC - OLE process control, and more.

LDAP application examples

Using OpenIT type solutions, system administrators can develop scripts and applications that allow events in one domain (security or IT) to cause appropriate actions in the other. For example:

* Login access (activation of LDAP accounts) to computers in a lab can be controlled based on whether that person's card was used to access the lab. If they did not use their card to access the lab they will be denied access to computers within the lab.

* Leaving the building by swiping the person's credential at a building egress reader will automatically deactivate the person's LDAP account; thus, preventing unauthorised use of that account.

SNMP application examples

Using SNMP, system administrators can automate delivery of alarms to e-mail systems, pagers, PDAs, etc; when any number of network-based activities occur, including notifications to the security solution of:

* A DDOS attack on the corporate network.

* A virus detection on a PC or LAN segment.

* An access denial into the company's virtual private network (VPN).

PKI application example: smartcards

Administrators can now issue smartcard logon certificates (which provide authentication) from a single cardholder enrolment workstation. Employees do not need to type CTRL+ALT+DEL and remember a user name/password. They simply insert their smartcard into a smartcard reader attached to (or integrated into) the keyboard or PC, and they are prompted for their personal identification number (PIN), thus providing a more secure way for system logon. Removing the smartcard from its reader will automatically log out the existing user.

OPC - application example

Using an integrated security solution as an OPC Client, administrators can automate their response procedures based on an alarm generated from their building automation system. For example, in a multitenant property environment, where the tenants are not managing or monitoring the activity at the premises, property managers can be notified if there is a change in the room temperature in a server room. An automatic page or e-mail can be sent to the officer in charge of the area so immediate action can take place. The system can link video to provide live surveillance, and in sophisticated environments, where wireless networks are in place, it can be sent to the officer's wireless PDA device. Because the system provides a comprehensive audit trail, critical events can be quickly investigated; thus, a consolidated report could be run showing all activity in the server room including all credential holder activity prior to the alarm.

The bottom line: finding the common ground where physical security and IT security systems meet will bring significant enterprise-wide benefits by leveraging areas of similarities within the two domains, and identifying and exploiting these similarities can bring substantial cost-savings while streamlining your security policies. In other words, the bottom line is that true convergence will have a positive impact on your bottom line.

Figure 2. The business security management process
Figure 2. The business security management process

The value of true integration with IT convergence

* Centralised physical and logical identity management.

* Unified security policies for physical and IT systems.

* IT and security departments maintain control over their domains.

* Eliminates the need for multiple credentials/tokens.

* Decrease chance for errors during enrolment/termination.

* Automate business processes.

* Reduced total cost of ownership.

* Comprehensive audit trail for investigations.

* Increase return on investment.

* Realtime monitoring of disparate systems using one user interface.

For more information contact Phil Mailes, Lenel Systems International, 0944 1483 815230, phil@lenel.com, www.lenel.com


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trusted Platform Module explained
    May 2017, Bosch Security Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.
  • Procore Trading
    Securex 2017 preview, Cyber Security
    Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...
  • Security skills shortage?
    May 2017, Galix Networking, Cyber Security
    We’re currently faced with a global information security skills crisis with an expected deficit of 1.5 million people within five years.
  • Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
    May 2017, Vision Catcher, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
  • IoT running wild compromises security
    May 2017, Genetec, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Constant connectivity and the rapid flow of information may offer new and convenient ways to do business and create value, but it also places the corporate network at significant risk.
  • Are you afraid of the dark (net)?
    May 2017, J2 Software, This Week's Editor's Pick, Cyber Security
    Given the recent global malware attacks, you should be, argues John McLoughlin, MD, J2 Software. Worst of all, you are probably not aware you have been hacked.
  • Accelerating the community theme
    May 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, News
    Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.
  • Securing your security
    April 2017, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
    The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.
  • Wireless works for CCTV
    April 2017, MiRO Distribution, RADWIN, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.
  • Be prepared for these three cyber threats
    April 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    A person or organisation with malicious intent can harm or sabotage a VMS system in several ways. This means that people or assets could be at risk.
  • Cybersecurity: an electronic security distributor’s view
    April 2017, Tyco Security Products, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Over 79% of South African internet users who have lost money at the hands of cyber criminals have only got some, or none, of their stolen funds back.
  • Weaponised IoT attacks: what does the future hold?
    April 2017, This Week's Editor's Pick, Cyber Security
    The first Mirai attack was a portend of the new, dark era in cybercrime and the physical security industry is right in the middle.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.