1 / 29

Physical IT Security Converge Oct 17, 2007

trula
Download Presentation

Physical IT Security Converge Oct 17, 2007

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    2. Physical & IT Security Converge Convergence – Huh? What is SmartPlus? Possible workflows Success Stories Road Map

    3. Convergence is… Interfacing of mission critical systems Zero time provisioning & de-provisioning Employees continue to use the tools that they’ve always used Event correlation & forensics One card solutions for physical security and IT Leverage investments Reduced total cost of ownership Software controlled processes User self-service web portals with e-mail notifications Automation with audit trails (e.g. – compliance ready) Risk management

    4. Convergence reduces costs and risks

    5. 1 + 1 > 2

    6. Benefits of convergence Create more efficient business processes and workflows Enable new business relationships through dynamic real-time data exchange Ensure compliance to the latest regulations facing their organization and industry Reduce cost of administration and improve security for both physical and logical Improves interoperability internally and with partners Workflow capability allows organizations to eliminate paper process- also reduces response time Connected systems keep information updated in real time (0 day provision- de-provision) Ability to allow employees to self- serve, reducing security workload Audit, digital signature and reporting functionality provide compliance tools Rule based event handling enforces the workflow process Seamless interfacing of logical and physical security for total ‘Security Policy’ Create more efficient business processes and workflows Enable new business relationships through dynamic real-time data exchange Ensure compliance to the latest regulations facing their organization and industry Reduce cost of administration and improve security for both physical and logical Improves interoperability internally and with partners Workflow capability allows organizations to eliminate paper process- also reduces response time Connected systems keep information updated in real time (0 day provision- de-provision) Ability to allow employees to self- serve, reducing security workload Audit, digital signature and reporting functionality provide compliance tools Rule based event handling enforces the workflow process Seamless interfacing of logical and physical security for total ‘Security Policy’

    7. Physical & IT Security Converge Convergence – Huh? What is SmartPlus? Possible workflows Success Stories Road Map

    8. SmartPlus: Definition SmartPlus™ (smärt plus’) noun A convergence platform that enables end users to expand their security umbrella by managing additional data, events, and/or resources have not been conducive to either access control systems or facility security in the past SmartPlus refers to a value-add user platform of features and products that integrate with each other and to third party systems, increasing overall enterprise security

    9. SmartPlus: What is it? SmartPlus Connectors 300+ Pre-Built Adapters for active directory, HR applications, mail servers, databases and more… Data exchange is bi-directional and real-time

    10. SmartPlus components are… Provides a flexible solution to address smart card deployment, process flow, and background check requirements

    11. SmartPlus framework enables… Increased security Logical and physical systems now share information “Zero day” de-provisioning Compared events Connect Pro-Watch to enterprise systems Real-time data 300+ adapters One-card solutions Productivity Enforced workflows Removal of paper processes Cross-system communication Web-based, self-service interface Audit Authoritative data controls Automated reports Increased Security Logical and physical systems now share information Security breaches no longer confined to either logical or physical, usually a combination of both. Logical/ Physical security interfacing is the answer. 0 day de-provisioning; allows IT or Security to remove an employee immediately from all systems in a matter of minutes. No lingering access issues. Ability to pass events from physical and logical systems back and forth allows for new security policies to be implemented within the organization. Participation in Corporate Enterprise Systems Adapters allow Pro-Watch to connect to enterprise systems and share events Physical security can no longer participate within an organization in a stand alone manner, security solutions must be ‘open’ 300+ Adapters connect Pro-Watch to the rest of the enterprise Productivity Workflow capabilities expand Pro-Watch’s feature set Many customers currently using paper trail processes for physical access authorization. Time consuming, prone to mistakes and frustrating to employees Compliance requires all transaction history be maintained for a period of time. Workflows give Pro-Watch the ability to take any paper process and move it into the electronic domain providing audit and electronic signature capability Increased Security Logical and physical systems now share information Security breaches no longer confined to either logical or physical, usually a combination of both. Logical/ Physical security interfacing is the answer. 0 day de-provisioning; allows IT or Security to remove an employee immediately from all systems in a matter of minutes. No lingering access issues. Ability to pass events from physical and logical systems back and forth allows for new security policies to be implemented within the organization. Participation in Corporate Enterprise Systems Adapters allow Pro-Watch to connect to enterprise systems and share events Physical security can no longer participate within an organization in a stand alone manner, security solutions must be ‘open’ 300+ Adapters connect Pro-Watch to the rest of the enterprise Productivity Workflow capabilities expand Pro-Watch’s feature set Many customers currently using paper trail processes for physical access authorization. Time consuming, prone to mistakes and frustrating to employees Compliance requires all transaction history be maintained for a period of time. Workflows give Pro-Watch the ability to take any paper process and move it into the electronic domain providing audit and electronic signature capability

    12. SmartPlus framework modularity…

    13. Physical & IT Security Converge Convergence – Huh? What is SmartPlus? Possible workflows Success Stories Road Map

    14. Database management New hire data Contractor data “Change of status” events Terminations Staff suspensions Time & attendance validation

    15. Database interfacing

    16. 1 – New staffer on-boarding process

    17. 2 – Suspension or reinstatement by staffing

    18. 3 – Suspension of staffer by security

    19. 4 – Physical quarantine a group of employees

    20. 5 – Watch list person from facilities

    21. 6 – Staffer and access to secure rooms

    22. 7 – Mobile card readers (first responders)

    23. 8 – Update/reset Pro-Watch PIN code

    24. Physical & IT Security Converge Convergence – Huh? What is SmartPlus? Possible workflows Success Stories Road Map

    25. Fairchild Semiconductor This solution has unified our worldwide file and print environment for the first time," said Whited. "With identity management, many of our users went from seven passwords to one. User feedback has been very positive." Fairchild plans to extend the identity management solution to its ERP systems and other core business applications worldwide. As with all public companies, compliance with applicable laws and regulations, including Sarbanes-Oxley, is a requirement of doing business. "For applications and data that are authenticated with Novell, we can now perform audits quickly and accurately." said Whited. "With a few clicks, we can tell exactly who has access to specific applications and data." "Controlling access to confidential information and intellectual property is vital to our business. With Novell, we can secure our data, while making sure users have easy access to information, regardless of location." Marguerite Whited Enterprise Client Services Manager Fairchild Semiconductor

    26. M & T Bank "This solution is enormously important to us," said Quinn. "We have a rich user directory that is the basis of our user and application access on the M&T network and the key to our centralized IT philosophy." Identity Manager helps M&T Bank synchronize user identities across multiple applications including its human resources and business applications. A new teller application with identity-based access will significantly reduce the amount of paperwork in branch offices. Robert Nichols Assistant VP for Network Computing Systems M&T Bank

    27. Bridgepoint Health MEDITECH is Bridgepoint's Hospital Information Systems partner, providing both clinical and business solution software. Bridgepoint is also a beta site for MEDITECH's new Human Resources suite which will serve as its authoritative source of user identity information to assign badges, phones and application access. With an identity-based portal, Bridgepoint can now provide personalized views of information to users, based on their roles and responsibilities. A single user ID and password for each employee speeds access and has also significantly reduced password-related helpdesk calls. "We reviewed the market, but Novell came to us with a comprehensive suite of products. We didn't have to look elsewhere to get a complete solution." Steve Banyai CIO Bridgepoint Health

    28. Physical & IT Security Converge Convergence – Huh? What is SmartPlus? Possible workflows Success Stories Road Map Roadmap

More Related