gds international - next - generation - security - summit - us - 7

Download GDS International - Next - Generation - Security - Summit - US - 7

Post on 21-Nov-2014

471 views

Category:

Technology

1 download

Embed Size (px)

DESCRIPTION

UNIFIED PHYSICAL IDENTITY & ACCESS MANAGEMENT

TRANSCRIPT

  • 1. UNIFIED PHYSICAL IDENTITY& ACCESS MANAGEMENTUSING POLICY-DRIVEN SOFTWARE TO SEAMLESSLY MANAGE IDENTITIES (CARDHOLDERS) ANDTHEIR PHYSICAL ACCESS ACROSS DISPARATE EXTERNAL SYSTEMS WHILE MAINTAININGCOMPLIANCEQuantum Secure, Inc.100 Century Center CourtSuite 800San Jose, CA 95112USAPhone: 408 453 1008Email: info@quantumsecure.comWeb: www.quantumsecure.com 2010 Quantum Secure, Inc. White Paper Page 1 of 19
  • 2. T ABLE OF C ONTENTS Executive Summary .....................................................................................................................................................3 Physical Security Infrastructure: Decades of Haphazard Growth ..............................................................................5 Resulting Implications for Physical Security ...............................................................................................................5 Significant Operating and Capital COSTS ...................................................................................................................6 Risk of Non-COMPLIANCE .........................................................................................................................................6 RISK of Theft, Fraud, and Crime ................................................................................................................................7 The Next-Generation Solution: Policy-Driven Physical Identity and Access Management ......................................9 What Should One Look For In An Ideal Solution? ....................................................................................................10 Centrally Manages Lifecycle of Physical Identity .....................................................................................................10 Automates Policy Definition and Deployment ........................................................................................................11 Integrates with Physical Security and Logical Identity Management Systems ........................................................11 Automates Compliance Initiatives ...........................................................................................................................12 Unifies Security Events and Correlates with Identity Data ......................................................................................12 Provides Executive-level, Detailed Reporting of the Overall State of Security Operations .....................................13 The Quantum Secure Solution: SAFE ........................................................................................................................14 Components of Quantum Secure SAFE ...................................................................................................................14 SAFE INTEGRATION FRAMEWORK .......................................................................................................................14 SAFE POLICY SERVER ............................................................................................................................................15 SAFE SUITE APPLICATIONS ...................................................................................................................................15 Transforming Physical Security Using Quantum Secure SAFE .................................................................................18 Cost Savings .............................................................................................................................................................18 Compliance ..............................................................................................................................................................18 Investment Protection and Future-Proofing ...........................................................................................................18 Security & Reduced Risk ..........................................................................................................................................18 Conclusion Why Quantum Secure? .......................................................................................................................19 2010 Quantum Secure, Inc. White Paper Page 2 of 19
  • 3. E XECUTIVE S UMMARYPhysical security practitioners of any organization should ask themselves one fundamental question: Can I respond to todays challenges in a resource-conscious world by subscribing to the traditional way of managing physical security?This traditional approach, often characterized by the incorporation of additional hardware systems, hasoften led to complex security infrastructure, consisting of systems which are disparate, disjointed anddifficult to manage. This problem is compounded because physical security processes are by largemanual in nature, operating in silos with little or no connection with other enterprise processes likethose of IT.As a result, most physical security departments today lack the agility and flexibility to address todayschallenges of increasing cost, risk of non-compliance and high risk of theft or fraud. And this struggledoes not limit itself to any particular type of business, as these challenges can be seen acrossorganizations of all types and sizes, including global corporations, government institutions, airports andhospitals.To address these challenges, physical security practitioners should adopt a software-driven approachtowards unifying various physical security systems and electronically maintaining all security-relateddata. A software-driven approach will automate processes related to physical identity (cardholder),simplify the management of identities and access management across the physical securityinfrastructure and also streamline compliance initiatives.Quantum Secure supports this approach through its SAFE software suite. Quantum Secure is the leadingprovider of enterprise software to manage and streamline security identities, compliance and correlatewith events across disparate physical security systems. Its SAFE suite of software enables securitypractitioners to integrate physical security systems, automate processes and simplify control ofemployees, vendors and other identities across their organization. By connecting physical securityoperations closely to their IT infrastructure, corporations can quickly lower operational costs, improvecompliance and reduce risk.This whitepaper achieves the following: Reviews the current situation and lists out the key challenges faced by security practitioners in context of physical identity and access management Proposes an approach that unifies physical identity and access management using a policy- driven software solution Discusses the essential capabilities of such an ideal solution including security policy automation and integration among disparate physical security systems and with logical security systems 2010 Quantum Secure, Inc. White Paper Page 3 of 19
  • 4. Discusses how Quantum Secure SAFE can support the unified approach by automating manual security processes to centrally manage physical identities and their associations with systems, events, and stakeholders while adhering to real-time compliance Presents the benefits and some examples of how Quantum Secure SAFE has improved the key performance indicators for physical security department 2010 Quantum Secure, Inc. White Paper Page 4 of 19
  • 5. P HYSICAL S ECURITY I NFRASTRUCTURE : D ECADES OF H APHAZARD G ROWTHPRESENT DAY COMPLICATIONS The turn of events at the beginning of this millennium will be etched in the memory of physical security practitioners for the next few decades. While 9/11Multiple and disparate PACS ushered in a spate of changes in physical security management at governmentManual and inconsistent institutions and airports, it has also prompted businesses to assess their riskenforcement of security exposure as they operate multiple locations spread throughout the world.policies Internal threats such as employee pilferage and collusion pose even a greaterManual administration of high threat for corporate entities, educational institutions and other non-volumes of access requests government entities, creating new elements of cost and risk.Siloed systems with no Unfortunately the current state of physical security infrastructure for mostintegration with logical organizations is not designed to respond effectively to the changingsecurity environment. Ever since the inception of video surveillance cameras five decades ago, organizations have added boxes of these and other systems such

Recommended

View more >