10/16/12 1 NETWORKED PHYSICAL SECURITY SYSTEMS Severin Sorensen, CPP Sikurity LLC PO Box 980068 Park City, UT 84098 .[email protected]202-258-7600 DISCLAIMER The named security manufacturer equipment and solutions identified in this presentation are not an endorsement of the manufacturer, and are offered in this presentation to provide a visual of the particular technology, issue, or feature benefit available in the industry. Points of view are those of the presenter and are not those of ASIS or the security manufacturers identified. The audience is further advised that strongly held opinions of the presenter are opinions only, and could be wrong, though strongly held opinions gained from over 20 years experience in the security industry. DEFINE YOUR SYSTEMS INTEGRATION SCOPE – START WITH THE END IN MIND System Components Purpose H ow? Deter Discourge easy access Fences, walls Reinforce boundaries Barriers, gates, locks Physical constraints Detect Provide early warning Intrusion detection sensors of unauthorized entry Delay Impede easy access Fences, barriers to key assets Audio visual alerts Delay devices Assess Delay intruder for assessment Direct visual identification Provide positive confirmation CCTV, central control of valid alarm Lighting, sound Respond Take appropriate action Communications Guards Safe places Police, etc. Adapted from presentation by Martin L. Vitch, CPP, at the Physical Security Technology & Applications Conference, Minneapolis, MN, June 3-5, 1996. SYSTEMS INTEGRATION TECHNOLOGY IN DISCUSSION IN THIS PRESENTATION Networked Physical Security Systems The What and Why of Integration Command & Control with Physical Security Information Management (PSIM) Expansion of capabilities through data interaction with access control, CAD, intrusion, process control/SCADA, etc. Integrated systems through C4I (national security related systems) WHO USES SECURITY SYSTEMS INTEGRATION TODAY Airports Casinos Chemical Plants Corporate campuses Critical infrastructure Multinational corporations Rail and sea ports Shopping centers Distributed operations TYPICAL SYSTEM INTEGRATION NEEDS Scenario: Casino
10
Embed
Networked Physical Security Information Systems 101612Physical... · automating compliance. IP360’s agentless architecture is designed ... Incident Management Display Relevant Geo-Referenced
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
10/16/12
1
NETWORKED PHYSICAL SECURITY SYSTEMS Severin Sorensen, CPP Sikurity LLC PO Box 980068 Park City, UT 84098 [email protected] 202-258-7600
DISCLAIMER
� The named security manufacturer equipment and solutions identified in this presentation are not an endorsement of the manufacturer, and are offered in this presentation to provide a visual of the particular technology, issue, or feature benefit available in the industry.
� Points of view are those of the presenter and are not those of ASIS or the security manufacturers identified.
� The audience is further advised that strongly held opinions of the presenter are opinions only, and could be wrong, though strongly held opinions gained from over 20 years experience in the security industry.
DEFINE YOUR SYSTEMS INTEGRATION SCOPE – START WITH THE END IN MIND System Components Purpose How?
Assess Delay intruder for assessment Direct visual identificationProvide positive confirmation CCTV, central controlof valid alarm Lighting, sound
Respond Take appropriate action CommunicationsGuardsSafe placesPolice, etc.
Adapted from presentation by Martin L. Vitch, CPP, at the Physical SecurityTechnology & Applications Conference, Minneapolis, MN, June 3-5, 1996.
SYSTEMS INTEGRATION TECHNOLOGY IN DISCUSSION IN THIS PRESENTATION
� Networked Physical Security Systems � The What and Why of Integration � Command & Control with Physical
Security Information Management (PSIM)
� Expansion of capabilities through data interaction with access control, CAD, intrusion, process control/SCADA, etc.
� Integrated systems through C4I (national security related systems)
WHO USES SECURITY SYSTEMS INTEGRATION TODAY
� Airports
� Casinos
� Chemical Plants
� Corporate campuses
� Critical infrastructure
� Multinational corporations
� Rail and sea ports
� Shopping centers
� Distributed operations
TYPICAL SYSTEM INTEGRATION NEEDS
� Scenario: Casino
10/16/12
2
HARRAH’S NEW ORLEANS � 450 Room Hotel �� 120 Table Games�� 2,400 Slot Machines�� 9 Restaurants�� 13 Bar Outlets�� Theatre Box Office �� Valet and Parking Garage Revenue Outlets�� 5.6 Million Visitors in 2007�� 2,400 Employees�
This presentation and all trademarks appearing in this presentation are the sole and exclusive property of Harrah’s Operating Company, Inc. and its affiliated companies for use by its related companies (collectively, “Harrah’s”). This presentation and its contents are confidential and proprietary to Harrah’s and may not be used or reproduced in whole or in part without Harrah’s express prior written authorization. Trademarks not owned by Harrah’s that appear in this presentation are the property of the respective owners.
SURVEILLANCE DEPARTMENT � 30 Highly Trained Personnel �� Over 1450 Cameras�� Non-stop Recording of the Entire Casino Operation 7-60 Day Video Retention�
PROTECTING ASSETS AND REPUTATION � Actively Monitoring all Facets of the Casino to Include:�� All Public Areas on Property �� Live Gaming and Slots�� Cashiering �� Randomly Observe all Casino Employees and Guest Activity in Casino �
� Ensure Employees are Following �State Regulations, Internal Controls,�and Departmental Standard�Operating Procedures�
� Report Violations of Procedure �� Partner with LSP�
PROPERTY POLICIES AND PROCEDURES � State Regulations�� Internal Control Standards�� Departmental Standard Operating Procedures�
� Role of Surveillance is to observe and report any infractions �
OPERATIONS SUPPORT
� Perform Pace Audits/Service Audits�� Security Assistance �� Investigate Variances�� 2000 Photo Requests Monthly �� Video Retention for Injuries�� Testify in Court �� Assist Operations by Answering �1000+ Phone Calls a Day �
SURVEILLANCE WORKING ENVIRONMENT � Physical characteristics of the Surveillance Room.�
� Console, Radio, Phones�� Video Monitors�
� Keyboards �� 1450 Cameras on Property �
� Parking Garages, Hotel and Casino Property.�� VCR’s, DVR’s, and Stand Alone Digital Systems.�� Quads, Multiplexers Recording all Cameras on Property �
WHAT YOU SEE IN TERMS OF PRACTICE OR ORGANIZATION IN THESE CENTRAL STATIONS
23
CENTRAL STATION DESIGN
Central station components SOC - Security Operation Center NOC – Network Operation Center DOCK – HVAC, Backup Power Generation, Controls Training Room, Engineer Support Kitchen, Shower, Storage
24
EX. NETWORK STORAGE VIA SAN
� SAN – Storage Area Networks enable storage of video data beyond limitations of device operating systems. Note below how multiple device OS can be used in a SAN Storage array
� SAN storage arrays can also be distributed increasing data protection
ww
w.ceg-dss.com
/vid_solution.html
10/16/12
5
25
EX., MVAAS – MANAGED VIDEO AS A SERVICE
• Software as a Service (SaaS) models strive to off-load the equipment costs of storage to central service providers, offering online services on a monthly fee-for-service basis.
• There are at least 12 Video SaaS models being rolled out by industry providers
• Common traits are browser based recall, access, via cell phone and Internet browser PC
INTEGRATION POSSIBILITIES
� Truly any connected device
� Information access
� Information distribution, annunciation, and notification
� Situational awareness, health, and present status
� FIDS, BIDS, BMS, SCADA, … � Emerging User Interface Features � Geospa8al, Graphics, Tracking, Caller ID, Dispatch, CAD… � Ad context to all events including video, especially for large systems with many devices
28
GE MASTERMIND
29
THE BUSINESS CONTROL CENTER
Sensor
1 VIDEO RECORDING AND STORAGE OPTIONS
� Indeed video systems can be the ‘brain’ of the security operations.
10/16/12
6
BEYOND CONVENTIONAL ACCESS CONTROL ARE BIOMETRIC COMPONENT POSSIBILITIES � Fingerprints
� Voiceprint
� Retinal scan
� Iris scan
� Facial recognition
� Thermal Recognition
� Activity Recognition
6 VM SOFTWARE (MANY OPTIONS)
6 VM SOFTWARE (VARIETY OF OPTIONS WITHIN SINGLE VENDOR PLATFORM)
DEVELOP VIDEO MANAGEMENT SYSTEMS WITH METRICS, VISUALIZATION, AND DASHBOARDS
� Video metrics are characteristics or attributes from the video system health or observations that are automatically captured and processed.
� Electronic dashboards can help security managers assess data with ease, drilling down on specific needs and trends. � Good metrics are
� Consistently measured
� Inexpensive to gather
� Quantified by common units of measure
� Expressed as a numerical value
� Sample metrics might include � CCTV System health
� CCTV camera status
� IP bandwidth availability
� IP through put and signal loss
� Video information characteristics � Video intelligent based information capture
(e.g., people counting, etc.)
� Video alarm handling and characterization
36
PPM2000
� PPM 2000 specializes in software solutions for criminal and incident reporting and investigation management
� Thousands of organizations have implemented a PPM solution, and our clients span all industries and include many of the Fortune 1000.
10/16/12
7
37
NCIRCLE � Comprehensive, agentless
discovery and profiling of all network assets
� IP360 is the market-leading discovery platform that comprehensively profiles all networked devices and their applications, vulnerabilities, and configurations, providing the ideal foundation for managing risk and automating compliance. IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally distributed networks.
Specializing in live-updated mash-ups of network security data
38
NEXIDIA -- AUDIO SPEECH ANALYTICS
� US market exists for audio products.
� All utterances made in the entire world have been catalogued within a 400 phoneme range. The majority of languages fall around the 40 phoneme range. Searches using phoneme pattern matching can be executed on:
� blended words
� proper names, slang, code words, brands, etc.
� non-standard grammar patterns
� ad-hoc use of different languages
www.nexidia.com
39
SAMPLE GUI OPERATOR OF INTEGRATED SECURITY SYSTEMS
CINARIO � Cinario sells itself as a world leader in Intelligent Operational Risk
Management Systems.
� Cinario has four products built on a base of integrated IP technology for central station and security use
� Cinario Enterprise Manager
� Cinario Enterprise Manager Command Center
� Cinario Security Manager
� Cinario Adaptive Intelligence Server
� Cinario EM Com Centre is an application is a business class software designed to be implemented in a Command Centre or a Control Room environment. Cinario EM Com Centre allows an organization integrate all of its risk monitoring systems into a single management application.
� Cinario solutions allow organizations integrate and intelligently manage their physical infrastructure assets, reducing cost, risk and losses. Cinario EM Com Centre allows Control Room operators have full management and control of all end equipment, including CCTV, Alarms, Access Control, Access Points, EPOS, BMS systems and more. Operators use a single interface which gives a common look and feel to the environment, irrespective of the multitudes of equipment used within the environment.
� Organizations use Cinario software to manage their Security, BMS, Energy, Refrigeration, Engineering, EPOS, HR and back office systems, often integrating their legacy systems into a command centre environment. Cinario EM Com Centre is a non proprietary application, and currently supports full integration to over 60 different types of equipment. This flexibility allows the end user the freedom to specify the equipment which meets their budgetary and functional requirements. Not being tied into a single manufacturer can have significant cost benefits for an organization.
A solution approach comprised of tools and methods for the coordination between:
Situation Management
10/16/12
8
43
Overload of Information
THE CHALLENGE IN CONTROL ROOM
44
Risk/Cost of mismanaging security & safety situations
is on the rise Public Pressure
New Regulations Government Pressure
New Technologies Industry Pressure
CHALLENGES - MARKET TRENDS
45
Situation Management
Plans Operations Analysis
Video Access Control
Location Devices Sensors Internet
Feeds IT Systems
What is Situation Management?
46
Situator Planning
Tool
Situator Debriefing
Tool
Situator Control Room
Situator Mobile
Application
SITUATION MANAGEMENT LIFECYCLE
48 48
HOW WOULD IT LOOK LIKE? Incident Management
Display Geo-Referenced
Display Relevant
Video Feeds
10/16/12
9
49 50
Simultaneously, the relevant tasks are sent to the relevant
personnel and field responders
51 52
53
Door Forced Incident
54
STANDARDS WATCH – RESOURCE: THE SELECTION OF CAMERAS, DIGITAL RECORDING SYSTEMS, DIGITAL HIGH-SPEED NETWORKS AND TRAIN-LINES FOR USE IN NEW TRANSIT-RELATED CCTV SYSTEMS
� Security monitoring in stations � Security monitoring in parking lots and structures � Security monitoring for tunnels and bridges � Security monitoring for facilities � Operations monitoring in stations and key locations � On-board monitoring on trains (safety, security, interior
monitoring, and loss prevention) � On-board monitoring on buses (safety, security, interior
monitoring, and loss prevention) � External monitoring (safety, security, accident investigation, and
platform monitoring) � Loss-prevention monitoring for revenue systems
Source: http://www.transitcommtech.com/cctv.htm
10/16/12
10
55 55
SITUATION MANAGEMENT BENEFITS
� Integration and unified view of all alarming sensors and systems (open system � Optimizes investments in your existing technologies � Improved security. Ensures better, faster decision making in routine and emergency
situations � Ensures compliance with updated regulations and standards. Provides proof of
compliance � Reduces human error � Controls operating costs
56
IPVIDEOMARKET.INFO
STANDARDS
� Example of what an integrated security systems might look like in a Central Station or Co-located Server Farm � Interna8onal Standards Se]ng Bodies (i.e., ISO, IEC….) � Regional Standards Se]ng Bodies (i.e., for the EU -‐ CEN, CENLEC….) � Na8onal Standards Se]ng Bodies (i.e., ANSI, BSI, AFNOR…..) � ANSI Accredited Standards Development Organiza8ons (SIA, ASIS, IEEE, INCITS,
ASTME, other accredited organiza8ons) � ANSI/SIA OSIPS-‐01:2008 Framework
� ANSI/SIA OSIPS-‐01:2008 DVI (Current revision work covers video integra8on and video analy8cs )
� Open Network Video Interface Forum (ONVIF) – www.onvif.org is an open industry forum for the development of a global standard for the interface of network video products. (Axis, Sony, Bosch) and 330+ industry collaborators
� Other Industry Standards that are industry specific