SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Reference Architecture




 EMC STORAGE FOR PHYSICAL SECURITY
 EMC VNX, VNXe, and Isilon, and Genetec Security Center
     • Genetec Omnicast performance using EMC storage arrays
     • Genetec Security Center performance using EMC storage arrays
     • Correct sizing storage in a Genetec physical security environment




                         EMC Solutions Group

                         April 2012
Copyright © 2012 EMC Corporation. All Rights Reserved.

EMC believes the information in this publication is accurate as of its
publication date. The information is subject to change without notice.

The information in this publication is provided “as is.” EMC Corporation makes
no representations or warranties of any kind with respect to the information in
this publication, and specifically disclaims implied warranties of
merchantability or fitness for a particular purpose.

Use, copying, and distribution of any EMC software described in this
publication requires an applicable software license.

For the most up-to-date listing of EMC product names, see EMC Corporation
Trademarks on EMC.com.

VMware, VMware vCenter, and VMware vSphere are registered trademarks or
trademarks of VMware, Inc. in the United States and/or other jurisdictions.
Iomega and IomegaWare are registered trademarks or trademarks of Iomega
Corporation. All other trademarks used herein are the property of their
respective owners.

All trademarks used herein are the property of their respective owners.

Part Number H10583




                                              EMC Storage for Physical Security      2
     EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Table of contents
  Reference architecture overview ........................................................................................................... 4
     Document purpose .......................................................................................................................... 4
     Solution purpose ............................................................................................................................. 4
     The business challenge.................................................................................................................... 4
     The technology solution ................................................................................................................... 5

  Key components ................................................................................................................................... 6
    Introduction ..................................................................................................................................... 6
    Digital video streams ....................................................................................................................... 6
    Main server and expansion server .................................................................................................... 6
    EMC storage ..................................................................................................................................... 6

  Physical architecture ............................................................................................................................ 8
    Architecture diagram........................................................................................................................ 8
    EMC storage configurations ...................................................................Error! Bookmark not defined.

  Genetec architecture ............................................................................................................................ 9
    Genetec servers ............................................................................................................................... 9
    Genetec deployment size ................................................................................................................. 9
    Main roles ...................................................................................................................................... 10

  EMC RSA secured domain ................................................................................................................... 11
    Overview ........................................................................................................................................ 11
    RSA logon ...................................................................................................................................... 11

  Validated environment profile ............................................................................................................ 12
     Profile characteristics..................................................................................................................... 12
     Hardware resources ....................................................................................................................... 12
     Software resources ........................................................................................................................ 13

  Conclusion ......................................................................................................................................... 14
    Summary ....................................................................................................................................... 14




                                                                                                        EMC Storage for Physical Security                   3
                                              EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Reference architecture overview
Document purpose This document provides an architectural overview of the EMC Physical Security
                 solution enabled by EMC® VNX™, EMC VNXe™, EMC Isilon®, Iomega4®, and Genetec
                 Security Center and Omnicast.

                   Use this document in conjunction with the document entitled “Configuration
                   Guidelines: EMC Storage for Physical Security Enabled by Genetec Omnicast and
                   Security Center,” which includes configuration guidelines and resource specifications
                   for the solution components, storage arrays, and other EMC product integration.

Solution purpose   The purpose of this Reference Architecture is to demonstrate how using the EMC and
                   Genetec integrated solution enables a security team to view real-time video streams
                   while also receiving policy-based and anomaly-based alerts. Genetec’s sophisticated
                   software analyzes data from remote locations and historical archives and generates
                   alerts based on your criteria.

The business       Private businesses and public entities alike have responded to rising concerns about
challenge          theft, fraud, and terrorism by sharpening their focus on physical security and
                   surveillance systems. Organizations such as retailers, casinos, financial institutions,
                   higher education institutions, transportation companies, law enforcement, school
                   systems, prison systems, and government agencies all need to manage and protect
                   their ever-growing volume of physical security information.

                   The ability to access the right data at the right time from anywhere is crucial to
                   supporting physical security and surveillance needs. However, the following factors
                   can hinder a comprehensive solution:
                     •   Proprietary software
                     •   Closed hardware platforms
                     •   Lack of manageable archival capabilities
                     •   Data retrieval wait times
                     •   Lost data
                     •   Unproven content authenticity
                     •   Information management limitations

                   The high expansion costs of legacy video surveillance systems, based on CCTV,
                   digital video recorders (DVRs), or network video recorder (NVR) technologies and non-
                   integrated IT and physical security systems, amplify these limitations further.

                   After Genetec Omnicast captures the information — and throughout the initial
                   response, detection, legal, judicial submission, and data disposal processes —
                   information management, availability, security, and protection are the core
                   capabilities needed for tamper-proof evidence collection, increased conviction rates,
                   and asset protection.




                                                                        EMC Storage for Physical Security      4
                               EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
The technology     EMC physical security solutions provide flexibility to control video surveillance and
solution           analyze security incidents in real time, collect evidence faster, and easily review
                   archived data, from anywhere.

                   EMC storage arrays provide quality storage for the smallest to the largest customers
                   using a variety of storage topologies including SAN (FC and iSCSI) and NAS (NFS,
                   CIFS).

                   Virtualization with VMware consolidates the number of Genetec Archivers required at
                   a given site. Aggregating multiple Genetec Archivers onto VMware® ESX®/ESXi™
                   hosts enables more bandwidth per physical host than is normally recognized from a
                   physical host.

                   With EMC Isilon's easy installation, management, and scalability, this solution also
                   adds value to non-IT centric and IT-centric customers alike.

Data management    This solution integrates EMC and Genetec technology to help meet the challenges of
                   video surveillance information convergence and management. This enterprise-class
                   solution provides data management in each phase of the video surveillance lifecycle,
                   including:
                     •   Capturing and monitoring
                     •   Analyzing
                     •   Protecting and securing
                     •   Archiving
                     •   Authenticating evidence

Genetec Security   Genetec Security Center is a unified security platform that seamlessly blends
Center             Genetec’s IP security and safety systems within a single innovative solution. The
                   systems unified under Security Center management include Genetec’s Omnicast IP
                   video surveillance, Synergis IP access control, and AutoVu license plate recognition
                   (LPR).

                   Developed with simplicity of operation in mind, the Security Center presents
                   information to operators through a single interface and simplifies operators’ tasks,
                   standardizes workflows, increases productivity, and enhances decision-making. It
                   aggregates physical security content from multiple sources, integrating IP networking
                   with a full range of physical security systems, including:
                     •   Video surveillance cameras
                     •   Access control devices and intrusion detection systems
                     •   Information security applications
                     •   Visitor management and identity recognition
                     •   Asset management
                     •   Sensors and alarms




                                                                        EMC Storage for Physical Security      5
                               EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Although you can use EMC VNX and EMC Isilon storage for high-throughput solutions,
                   alternate storage solutions include EMC Symmetrix® VMAX™ and Symmetrix DMX™.

Key components
Introduction       The physical security components typically consist of legacy analog monitoring
                   capabilities, analog cameras, and IP cameras.

                   Video encoders convert standard NTSC/PAL video from analog cameras to a digital
                   video stream over TCP/IP. You can also deploy customer-furnished IP cameras in this
                   solution. Each camera is capable of producing a digital video stream over TCP/IP.

                   This solution uses EMC storage platforms to provide single- or multi-tiered storage
                   architectures for centralized or decentralized enterprise requirements. EMC
                   PowerPath® software provides channel failover on Omnicast Security Center servers
                   for both fiber and iSCSI connectivity options.

Digital video      An Omnicast System Center Archiver captures digital video streams over TCP/IP and
streams            then typically writes the video to EMC VNX or Isilon storage.

Main server and    A System Center installation consists of a single server or of multiple servers in a
expansion server   hierarchical structure.

                   The main server is the only server on your system that hosts the Directory role. The
                   Directory is the role that identifies your system. All other servers on the system must
                   connect to the main server in order to be part of the same system. You may have only
                   one main server on any Security Center system.

                   An expansion server is any computer other than the main server that you add to your
                   system to increase its total computing power. An expansion server must connect to
                   the main server and may host any role in Security Center, except the Directory role.

EMC storage        This reference architecture uses the EMC VNXe and VNX storage platforms. However,
                   you can integrate different EMC storage platforms and array sizes with Genetec
                   Security Center to provide a physical security solution to meet any size application.

                   Table 1 describes EMC storage platforms that are compatible with Genetec software
                   for physical security.

                   Table 1.    EMC storage platforms available for this solution

                    EMC storage             Description
                    Symmetrix VMAX          The EMC Physical Security Lab tested the EMC Symmetrix VMAX
                                            storage array connected to a Cisco UCS server using VMware ESX
                                            4.0 running Microsoft Windows Server 2008 64-bit.
                                            This solution is ideal for very large, demanding installations or
                                            environments that already have VMAX and Cisco UCS.




                                                                           EMC Storage for Physical Security    6
                               EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
EMC storage           Description
VNX                   EMC VNX and EMC CLARiiON storage arrays, from the AX4 through
VNXe/Celerra          the VNX7500, all perform exceptionally well with the Genetec
                      Security Center physical security solution.
                      The solution also supports unified storage derivatives such as the
                      VNXe, NX, and NS storage arrays. Unified storage topologies
                      include FC, iSCSI, NFS, and CIFS. NFS and CIFS accommodate
                      smaller customers and those with specific use cases. FC attaches
                      directly to the VNX or CLARiiON, bypassing the data mover.

Isilon                Isilon storage arrays provide exceptional NAS performance.
                      Omnicast version 4.8 or greater and Security Center 5.1 and
                      greater are compatible with the Isilon storage arrays.

Iomega                The Iomega PX12, IX12, and PX4d storage arrays are ideal for
                      smaller customers.
                      For data resilience, use RAID 6 if possible.




                                                      EMC Storage for Physical Security    7
          EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Physical architecture
Architecture   Figure 1 shows the overall physical architecture of the core solution.
diagram




               Figure 1.   Solution architecture




                                                                    EMC Storage for Physical Security      8
                           EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Genetec architecture
Genetec servers   Security Center’s architecture uses a client/server model in which a pool of server
                  computers distributed over an IP network handles all system functions. The number
                  of servers can range from a single machine for a small system to hundreds of
                  machines for a large-scale system.

                  Genetec Server is the Windows service you must install on every computer that you
                  want included in the pool of servers available for Security Center to use. Every server
                  is a generic computing resource capable of taking on any role (set of functions) you
                  assign to it.

                  A role is a software module that performs a specific function (or job) within Security
                  Center. For example, you can assign roles for archiving video, for controlling a group
                  of units, or for synchronizing Security Center users with your corporate directory
                  service.

Genetec           You can position Genetec solutions for both small and large customers. As illustrated
deployment size   in Table 2, acceptable storage solutions may be large or small, as long as the file
                  server meets the requirements of EMC and Genetec. The solution also works very well
                  with VMware ESX/ESXi 4.x.

                  You can use VMware ESX/ESXi 4.0 (and later) to greatly reduce the server farm
                  footprint while increasing the bandwidth each physical server can produce. Genetec
                  Omnicast and Security Center are ideally suited for VMware.

                  Table 2.    Deployment guidelines

                   Validated component                         Compatibility
                   Storage                                     VMAX, VNX, CX4, CX3, AX4, VNXe, Isilon,
                                                               NS, NX, Iomega PX line and IX12

                   Platform                                    Blade and rack-mount servers

                   Operating system                            Microsoft Windows Server 2008 (64-bit
                                                               used in lab)

                   VMware                                      Compatible (with excellent performance )




                                                                       EMC Storage for Physical Security      9
                              EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Main roles   Table 3 describes the main roles provided by the Genetec Security Center for video
             surveillance.

             Table 3.      Genetec main roles

              Service            Description
              Media Router       • Handles all stream (audio or video) requests on the system
                                 • Calculates the optimal path between the source and destination
                                   based on location and transmission capabilities

              Directory          • The Directory role is what defines a Security Center system.
                                 • The main server module provides a centralized configuration
                                   database for all entities in the system including cameras, users,
                                   other Security Center roles, and applications on the system.
                                 • The Directory role is responsible for authentication and access
                                   control using the built-in security model or through Microsoft Active
                                   Directory.
                                 • The Directory also offers the option to log all system events and user
                                   actions in a relational database for reporting purposes.
                                 • Starting with Security Center 5.1, multiple Directories can run
                                   concurrently to provide high availability and load-balance client
                                   connections.
                                 • SQL mirroring is also available for Directory DB failover.

              Health              • Set of tools to monitor the health of Security Center
              monitoring
                                  • Provides real-time status of the system entities
                                  • Health statistics providing valuable information like availability,
                                    uptime, mean time between failures, mean time to recovery for
                                    cameras, door controllers, and intrusion panels
                                  • Detects health issues early enough to avoid potential problems in
                                    the future

              Archiver            • Manages the communication with IP cameras and an encoder. The
                                    Archiver is the only Security Center component that communicates
                                    directly with the IP cameras.
                                  • Has a plug-in architecture to introduce support for new camera
                                    manufacturers without requiring a complete software upgrade.
                                  • Records up to 300 cameras or 300 Mb/s of throughput
                                  • Responsible for maintaining the database that links a specific
                                    camera at a specific time to a video file stored on disk
                                  • Performs motion detection algorithms on recorded video streams




                                                                      EMC Storage for Physical Security     10
                           EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
EMC RSA secured domain
Overview    The Genetec Security Center solution installed with EMC’s RSA-secured domain
            increases Windows and Security Center security. RSA® authentication using
            constantly changing RSA tokens increases the user’s Security Center experience by
            providing a single logon structure for accessing multiple Security Center applications.

            For more information refer to the EMC white paper entitled EMC Physical Security—
            Enabled By RSA SecurID Two-Factor Authentication with Genetec Omnicast Client
            Applications.

RSA logon   In general, the login process consists of the following steps:
              1.    The login request using RSA authentication (token) sends the request through
                    the EMC RSA SecurID® appliance.
              2.    If the user credentials are correct, the EMC RSA SecurID appliance proxies the
                    login to the Active Directory and the Active Directory authenticates the login
                    into the requested Windows Domain.
              3.    Login to the Windows Domain is complete.
              4.    User accesses the requested application.
              5.    User credentials verify if this user has access rights for the requested
                    application. The user may be required to press Enter before continuing into
                    the application (this is application-specific).

            Figure 2 shows the login process.




            Figure 2.   RSA login process




                                                                 EMC Storage for Physical Security      11
                        EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Validated environment profile
Profile           Table 5 describes the environment that EMC validated for this solution.
characteristics
                  Table 4.     Validated provide

                   Profile characteristic            Value
                   Omnicast application software     Omnicast 4.4 – Windows Server 2003 SP2/R2 on local
                                                     server disk or boot from CLARiiON
                                                     Omnicast 4.4 through 4.6 – Windows Server 2008 x32
                                                     and x64
                                                     Omnicast 4.7 and above – Windows Server 2008 X64
                                                     Omnicast 4.8 (Security Center 5.1) required for EMC
                                                     Isilon storage arrays

                   Storage topology                  SAN, DAS, iSCSI
                                                     • iSCSI – HBA
                                                     • iSCSI – Microsoft initiators with Windows Server
                                                       2008 and later only
                                                     NAS
                                                     • SMB2 to the Isilon X200 or 108NL storage arrays

                   Total bandwidth per Archiver      37.5 MB/s (300 Mb/s)
                   server



Hardware          Table 5 lists the hardware used in this solution.
resources
                  Table 5.     Solution hardware

                   Hardware                           Quantity         Configuration
                   Any 1U, 2U, or blade server on     1                Per Security Center server
                   Genetec and EMC’s supported
                   hardware listing

                   Any VNX, VNXe, AXA, AX4-5/5i,      Based on         See the Genetec Omnicast
                   CX3-XX, CX4-XXX, Isilon X200,      solution         Bandwidth Technical Note for
                   and 108NL, NX, NS                  requirements     additional information. If you do not
                                                                       have access to this document, see
                                                                       your EMC representative.




                                                                        EMC Storage for Physical Security      12
                              EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Software resources Table 6 lists the software used in this solution.

                       Table 6.    Solution software

       Software                   Version                  Configuration
       Windows Server 2003        SP2/R2                   Operating system for Omnicast servers and
                                                           workstation(s), used for AX and CX3 testing

       Windows Server 2008        64-bit                   Operating system for Security Center servers and
                                                           workstation(s)

       Genetec Omnicast           4.4 – 4.8                4.4 – 4.6 Windows Server 2003 R2; Windows Server
       Server                                              2008
                                                           4.7 – 4.8 Windows 2008 x32 and x64
                                                           Local disk drive installation for all non-boot from SAN
                                                           configurations

       Genetec Security Center    5.0 – 5.1                Windows 2008 x64

       EMC PowerPath              Latest GA version        Installed on Omnicast servers

       EMC Naviagent              Latest GA version        Installed on Omnicast servers

       Security Center,           Minimum of 1;            Specified in Genetec Security Center documentation
       Security Desk, and         maximum – unlimited
       Configuration Tool




                                                                             EMC Storage for Physical Security       13
                                   EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
Conclusion
Summary      The EMC Physical Security solution enabled by EMC storage arrays and Genetec
             Security Center products represents an ideal solution for surveillance management
             and IT infrastructure. The solution provides a flexible and highly scalable
             infrastructure that can meet a broad range of today’s demanding physical security
             requirements.

             As requirements change and become more sophisticated, the EMC Physical Security
             solution’s flexibility and modular architecture can be enhances to meet customers’
             individual needs.




                                                                 EMC Storage for Physical Security      14
                        EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture

Más contenido relacionado

La actualidad más candente

Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco SoldiSMAU
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, ParisVESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, ParisOW2
 

La actualidad más candente (7)

The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
Unified VSS white paper
Unified VSS white paperUnified VSS white paper
Unified VSS white paper
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, ParisVESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris
VESPA- Multi-Layered Self-Protection for Cloud Resources, OW2con'12, Paris
 

Destacado

MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusDell EMC World
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC Technologies
 
Cyber-infrastructure Presentation 2015
Cyber-infrastructure Presentation 2015Cyber-infrastructure Presentation 2015
Cyber-infrastructure Presentation 2015Jazan University
 
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...OpenStack
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure StackTudor Damian
 
Occupational therapy
Occupational therapyOccupational therapy
Occupational therapyLaurel Blond
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targetsResearch Now
 
Under what circumstances do motivated
Under what circumstances do motivatedUnder what circumstances do motivated
Under what circumstances do motivatedDaleCarnegieIndia1
 
Introduction to wwwjdic project
Introduction to wwwjdic projectIntroduction to wwwjdic project
Introduction to wwwjdic projectMark Burns
 
Connected tv conference rene summer
Connected tv conference rene summerConnected tv conference rene summer
Connected tv conference rene summerRene Summer
 
конструктор українська мова_таблиці
конструктор українська мова_таблиціконструктор українська мова_таблиці
конструктор українська мова_таблиціТатьяна Глинская
 
ECM as a Service in Government
ECM as a Service in GovernmentECM as a Service in Government
ECM as a Service in GovernmentEMC
 
Different games in the phillippines
Different  games in the phillippinesDifferent  games in the phillippines
Different games in the phillippinesjanerosco
 
Block fascism and italy
Block fascism and italyBlock fascism and italy
Block fascism and italyTravis Klein
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseEMC
 
API.Design.for.CPlusPlus.Ch5
API.Design.for.CPlusPlus.Ch5API.Design.for.CPlusPlus.Ch5
API.Design.for.CPlusPlus.Ch5박 민규
 

Destacado (20)

MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_Complete
 
Microsoft cloud stack
Microsoft cloud stackMicrosoft cloud stack
Microsoft cloud stack
 
Cyber-infrastructure Presentation 2015
Cyber-infrastructure Presentation 2015Cyber-infrastructure Presentation 2015
Cyber-infrastructure Presentation 2015
 
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...
Making Openstack Really Easy - Why Build Open Source When You Can Buy? Danny ...
 
Microsoft Azure Stack
Microsoft Azure StackMicrosoft Azure Stack
Microsoft Azure Stack
 
Occupational therapy
Occupational therapyOccupational therapy
Occupational therapy
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targets
 
Under what circumstances do motivated
Under what circumstances do motivatedUnder what circumstances do motivated
Under what circumstances do motivated
 
Congrats Siba
Congrats Siba  Congrats Siba
Congrats Siba
 
Citophobia apa
Citophobia apaCitophobia apa
Citophobia apa
 
Introduction to wwwjdic project
Introduction to wwwjdic projectIntroduction to wwwjdic project
Introduction to wwwjdic project
 
Connected tv conference rene summer
Connected tv conference rene summerConnected tv conference rene summer
Connected tv conference rene summer
 
конструктор українська мова_таблиці
конструктор українська мова_таблиціконструктор українська мова_таблиці
конструктор українська мова_таблиці
 
ECM as a Service in Government
ECM as a Service in GovernmentECM as a Service in Government
ECM as a Service in Government
 
Factor markets
Factor marketsFactor markets
Factor markets
 
Different games in the phillippines
Different  games in the phillippinesDifferent  games in the phillippines
Different games in the phillippines
 
Block fascism and italy
Block fascism and italyBlock fascism and italy
Block fascism and italy
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
API.Design.for.CPlusPlus.Ch5
API.Design.for.CPlusPlus.Ch5API.Design.for.CPlusPlus.Ch5
API.Design.for.CPlusPlus.Ch5
 

Similar a EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Security Center Reference Architecture

White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review   White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review EMC
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicySymantec
 
102550121 symmetrix-foundations-student-resource-guide
102550121 symmetrix-foundations-student-resource-guide102550121 symmetrix-foundations-student-resource-guide
102550121 symmetrix-foundations-student-resource-guideAmit Sharma
 
WR Paper: Security for Videoconferencing
WR Paper: Security for VideoconferencingWR Paper: Security for Videoconferencing
WR Paper: Security for VideoconferencingVideoguy
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400RaGaZoMe
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...The Linux Foundation
 
ViPR Services Storage Engine Architecture
ViPR Services Storage Engine Architecture ViPR Services Storage Engine Architecture
ViPR Services Storage Engine Architecture EMC
 
EMC ViPR Services Storage Engine Architecture
EMC ViPR Services Storage Engine ArchitectureEMC ViPR Services Storage Engine Architecture
EMC ViPR Services Storage Engine ArchitectureEMC
 
White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression   White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression EMC
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Cyber security innovation_imho v4
Cyber security innovation_imho v4Cyber security innovation_imho v4
Cyber security innovation_imho v4W Fred Seigneur
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworksJoe Levy
 
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...Proact Netherlands B.V.
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5W Fred Seigneur
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxAccuKnox
 

Similar a EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Security Center Reference Architecture (20)

White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review   White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review
 
Emc storag
Emc storagEmc storag
Emc storag
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
102550121 symmetrix-foundations-student-resource-guide
102550121 symmetrix-foundations-student-resource-guide102550121 symmetrix-foundations-student-resource-guide
102550121 symmetrix-foundations-student-resource-guide
 
WR Paper: Security for Videoconferencing
WR Paper: Security for VideoconferencingWR Paper: Security for Videoconferencing
WR Paper: Security for Videoconferencing
 
Emc vi pr controller
Emc vi pr controllerEmc vi pr controller
Emc vi pr controller
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
 
ViPR Services Storage Engine Architecture
ViPR Services Storage Engine Architecture ViPR Services Storage Engine Architecture
ViPR Services Storage Engine Architecture
 
EMC ViPR Services Storage Engine Architecture
EMC ViPR Services Storage Engine ArchitectureEMC ViPR Services Storage Engine Architecture
EMC ViPR Services Storage Engine Architecture
 
H8520 vnx-family-ds
H8520 vnx-family-dsH8520 vnx-family-ds
H8520 vnx-family-ds
 
White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression   White Paper: EMC VNXe File Deduplication and Compression
White Paper: EMC VNXe File Deduplication and Compression
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Cyber security innovation_imho v4
Cyber security innovation_imho v4Cyber security innovation_imho v4
Cyber security innovation_imho v4
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworks
 
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 

Más de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Más de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

EMC Storage for Physical Security EMC VNX, VNXe, and Isilon, and Genetec Security Center Reference Architecture

  • 1. Reference Architecture EMC STORAGE FOR PHYSICAL SECURITY EMC VNX, VNXe, and Isilon, and Genetec Security Center • Genetec Omnicast performance using EMC storage arrays • Genetec Security Center performance using EMC storage arrays • Correct sizing storage in a Genetec physical security environment EMC Solutions Group April 2012
  • 2. Copyright © 2012 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware, VMware vCenter, and VMware vSphere are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. Iomega and IomegaWare are registered trademarks or trademarks of Iomega Corporation. All other trademarks used herein are the property of their respective owners. All trademarks used herein are the property of their respective owners. Part Number H10583 EMC Storage for Physical Security 2 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 3. Table of contents Reference architecture overview ........................................................................................................... 4 Document purpose .......................................................................................................................... 4 Solution purpose ............................................................................................................................. 4 The business challenge.................................................................................................................... 4 The technology solution ................................................................................................................... 5 Key components ................................................................................................................................... 6 Introduction ..................................................................................................................................... 6 Digital video streams ....................................................................................................................... 6 Main server and expansion server .................................................................................................... 6 EMC storage ..................................................................................................................................... 6 Physical architecture ............................................................................................................................ 8 Architecture diagram........................................................................................................................ 8 EMC storage configurations ...................................................................Error! Bookmark not defined. Genetec architecture ............................................................................................................................ 9 Genetec servers ............................................................................................................................... 9 Genetec deployment size ................................................................................................................. 9 Main roles ...................................................................................................................................... 10 EMC RSA secured domain ................................................................................................................... 11 Overview ........................................................................................................................................ 11 RSA logon ...................................................................................................................................... 11 Validated environment profile ............................................................................................................ 12 Profile characteristics..................................................................................................................... 12 Hardware resources ....................................................................................................................... 12 Software resources ........................................................................................................................ 13 Conclusion ......................................................................................................................................... 14 Summary ....................................................................................................................................... 14 EMC Storage for Physical Security 3 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 4. Reference architecture overview Document purpose This document provides an architectural overview of the EMC Physical Security solution enabled by EMC® VNX™, EMC VNXe™, EMC Isilon®, Iomega4®, and Genetec Security Center and Omnicast. Use this document in conjunction with the document entitled “Configuration Guidelines: EMC Storage for Physical Security Enabled by Genetec Omnicast and Security Center,” which includes configuration guidelines and resource specifications for the solution components, storage arrays, and other EMC product integration. Solution purpose The purpose of this Reference Architecture is to demonstrate how using the EMC and Genetec integrated solution enables a security team to view real-time video streams while also receiving policy-based and anomaly-based alerts. Genetec’s sophisticated software analyzes data from remote locations and historical archives and generates alerts based on your criteria. The business Private businesses and public entities alike have responded to rising concerns about challenge theft, fraud, and terrorism by sharpening their focus on physical security and surveillance systems. Organizations such as retailers, casinos, financial institutions, higher education institutions, transportation companies, law enforcement, school systems, prison systems, and government agencies all need to manage and protect their ever-growing volume of physical security information. The ability to access the right data at the right time from anywhere is crucial to supporting physical security and surveillance needs. However, the following factors can hinder a comprehensive solution: • Proprietary software • Closed hardware platforms • Lack of manageable archival capabilities • Data retrieval wait times • Lost data • Unproven content authenticity • Information management limitations The high expansion costs of legacy video surveillance systems, based on CCTV, digital video recorders (DVRs), or network video recorder (NVR) technologies and non- integrated IT and physical security systems, amplify these limitations further. After Genetec Omnicast captures the information — and throughout the initial response, detection, legal, judicial submission, and data disposal processes — information management, availability, security, and protection are the core capabilities needed for tamper-proof evidence collection, increased conviction rates, and asset protection. EMC Storage for Physical Security 4 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 5. The technology EMC physical security solutions provide flexibility to control video surveillance and solution analyze security incidents in real time, collect evidence faster, and easily review archived data, from anywhere. EMC storage arrays provide quality storage for the smallest to the largest customers using a variety of storage topologies including SAN (FC and iSCSI) and NAS (NFS, CIFS). Virtualization with VMware consolidates the number of Genetec Archivers required at a given site. Aggregating multiple Genetec Archivers onto VMware® ESX®/ESXi™ hosts enables more bandwidth per physical host than is normally recognized from a physical host. With EMC Isilon's easy installation, management, and scalability, this solution also adds value to non-IT centric and IT-centric customers alike. Data management This solution integrates EMC and Genetec technology to help meet the challenges of video surveillance information convergence and management. This enterprise-class solution provides data management in each phase of the video surveillance lifecycle, including: • Capturing and monitoring • Analyzing • Protecting and securing • Archiving • Authenticating evidence Genetec Security Genetec Security Center is a unified security platform that seamlessly blends Center Genetec’s IP security and safety systems within a single innovative solution. The systems unified under Security Center management include Genetec’s Omnicast IP video surveillance, Synergis IP access control, and AutoVu license plate recognition (LPR). Developed with simplicity of operation in mind, the Security Center presents information to operators through a single interface and simplifies operators’ tasks, standardizes workflows, increases productivity, and enhances decision-making. It aggregates physical security content from multiple sources, integrating IP networking with a full range of physical security systems, including: • Video surveillance cameras • Access control devices and intrusion detection systems • Information security applications • Visitor management and identity recognition • Asset management • Sensors and alarms EMC Storage for Physical Security 5 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 6. Although you can use EMC VNX and EMC Isilon storage for high-throughput solutions, alternate storage solutions include EMC Symmetrix® VMAX™ and Symmetrix DMX™. Key components Introduction The physical security components typically consist of legacy analog monitoring capabilities, analog cameras, and IP cameras. Video encoders convert standard NTSC/PAL video from analog cameras to a digital video stream over TCP/IP. You can also deploy customer-furnished IP cameras in this solution. Each camera is capable of producing a digital video stream over TCP/IP. This solution uses EMC storage platforms to provide single- or multi-tiered storage architectures for centralized or decentralized enterprise requirements. EMC PowerPath® software provides channel failover on Omnicast Security Center servers for both fiber and iSCSI connectivity options. Digital video An Omnicast System Center Archiver captures digital video streams over TCP/IP and streams then typically writes the video to EMC VNX or Isilon storage. Main server and A System Center installation consists of a single server or of multiple servers in a expansion server hierarchical structure. The main server is the only server on your system that hosts the Directory role. The Directory is the role that identifies your system. All other servers on the system must connect to the main server in order to be part of the same system. You may have only one main server on any Security Center system. An expansion server is any computer other than the main server that you add to your system to increase its total computing power. An expansion server must connect to the main server and may host any role in Security Center, except the Directory role. EMC storage This reference architecture uses the EMC VNXe and VNX storage platforms. However, you can integrate different EMC storage platforms and array sizes with Genetec Security Center to provide a physical security solution to meet any size application. Table 1 describes EMC storage platforms that are compatible with Genetec software for physical security. Table 1. EMC storage platforms available for this solution EMC storage Description Symmetrix VMAX The EMC Physical Security Lab tested the EMC Symmetrix VMAX storage array connected to a Cisco UCS server using VMware ESX 4.0 running Microsoft Windows Server 2008 64-bit. This solution is ideal for very large, demanding installations or environments that already have VMAX and Cisco UCS. EMC Storage for Physical Security 6 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 7. EMC storage Description VNX EMC VNX and EMC CLARiiON storage arrays, from the AX4 through VNXe/Celerra the VNX7500, all perform exceptionally well with the Genetec Security Center physical security solution. The solution also supports unified storage derivatives such as the VNXe, NX, and NS storage arrays. Unified storage topologies include FC, iSCSI, NFS, and CIFS. NFS and CIFS accommodate smaller customers and those with specific use cases. FC attaches directly to the VNX or CLARiiON, bypassing the data mover. Isilon Isilon storage arrays provide exceptional NAS performance. Omnicast version 4.8 or greater and Security Center 5.1 and greater are compatible with the Isilon storage arrays. Iomega The Iomega PX12, IX12, and PX4d storage arrays are ideal for smaller customers. For data resilience, use RAID 6 if possible. EMC Storage for Physical Security 7 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 8. Physical architecture Architecture Figure 1 shows the overall physical architecture of the core solution. diagram Figure 1. Solution architecture EMC Storage for Physical Security 8 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 9. Genetec architecture Genetec servers Security Center’s architecture uses a client/server model in which a pool of server computers distributed over an IP network handles all system functions. The number of servers can range from a single machine for a small system to hundreds of machines for a large-scale system. Genetec Server is the Windows service you must install on every computer that you want included in the pool of servers available for Security Center to use. Every server is a generic computing resource capable of taking on any role (set of functions) you assign to it. A role is a software module that performs a specific function (or job) within Security Center. For example, you can assign roles for archiving video, for controlling a group of units, or for synchronizing Security Center users with your corporate directory service. Genetec You can position Genetec solutions for both small and large customers. As illustrated deployment size in Table 2, acceptable storage solutions may be large or small, as long as the file server meets the requirements of EMC and Genetec. The solution also works very well with VMware ESX/ESXi 4.x. You can use VMware ESX/ESXi 4.0 (and later) to greatly reduce the server farm footprint while increasing the bandwidth each physical server can produce. Genetec Omnicast and Security Center are ideally suited for VMware. Table 2. Deployment guidelines Validated component Compatibility Storage VMAX, VNX, CX4, CX3, AX4, VNXe, Isilon, NS, NX, Iomega PX line and IX12 Platform Blade and rack-mount servers Operating system Microsoft Windows Server 2008 (64-bit used in lab) VMware Compatible (with excellent performance ) EMC Storage for Physical Security 9 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 10. Main roles Table 3 describes the main roles provided by the Genetec Security Center for video surveillance. Table 3. Genetec main roles Service Description Media Router • Handles all stream (audio or video) requests on the system • Calculates the optimal path between the source and destination based on location and transmission capabilities Directory • The Directory role is what defines a Security Center system. • The main server module provides a centralized configuration database for all entities in the system including cameras, users, other Security Center roles, and applications on the system. • The Directory role is responsible for authentication and access control using the built-in security model or through Microsoft Active Directory. • The Directory also offers the option to log all system events and user actions in a relational database for reporting purposes. • Starting with Security Center 5.1, multiple Directories can run concurrently to provide high availability and load-balance client connections. • SQL mirroring is also available for Directory DB failover. Health • Set of tools to monitor the health of Security Center monitoring • Provides real-time status of the system entities • Health statistics providing valuable information like availability, uptime, mean time between failures, mean time to recovery for cameras, door controllers, and intrusion panels • Detects health issues early enough to avoid potential problems in the future Archiver • Manages the communication with IP cameras and an encoder. The Archiver is the only Security Center component that communicates directly with the IP cameras. • Has a plug-in architecture to introduce support for new camera manufacturers without requiring a complete software upgrade. • Records up to 300 cameras or 300 Mb/s of throughput • Responsible for maintaining the database that links a specific camera at a specific time to a video file stored on disk • Performs motion detection algorithms on recorded video streams EMC Storage for Physical Security 10 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 11. EMC RSA secured domain Overview The Genetec Security Center solution installed with EMC’s RSA-secured domain increases Windows and Security Center security. RSA® authentication using constantly changing RSA tokens increases the user’s Security Center experience by providing a single logon structure for accessing multiple Security Center applications. For more information refer to the EMC white paper entitled EMC Physical Security— Enabled By RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications. RSA logon In general, the login process consists of the following steps: 1. The login request using RSA authentication (token) sends the request through the EMC RSA SecurID® appliance. 2. If the user credentials are correct, the EMC RSA SecurID appliance proxies the login to the Active Directory and the Active Directory authenticates the login into the requested Windows Domain. 3. Login to the Windows Domain is complete. 4. User accesses the requested application. 5. User credentials verify if this user has access rights for the requested application. The user may be required to press Enter before continuing into the application (this is application-specific). Figure 2 shows the login process. Figure 2. RSA login process EMC Storage for Physical Security 11 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 12. Validated environment profile Profile Table 5 describes the environment that EMC validated for this solution. characteristics Table 4. Validated provide Profile characteristic Value Omnicast application software Omnicast 4.4 – Windows Server 2003 SP2/R2 on local server disk or boot from CLARiiON Omnicast 4.4 through 4.6 – Windows Server 2008 x32 and x64 Omnicast 4.7 and above – Windows Server 2008 X64 Omnicast 4.8 (Security Center 5.1) required for EMC Isilon storage arrays Storage topology SAN, DAS, iSCSI • iSCSI – HBA • iSCSI – Microsoft initiators with Windows Server 2008 and later only NAS • SMB2 to the Isilon X200 or 108NL storage arrays Total bandwidth per Archiver 37.5 MB/s (300 Mb/s) server Hardware Table 5 lists the hardware used in this solution. resources Table 5. Solution hardware Hardware Quantity Configuration Any 1U, 2U, or blade server on 1 Per Security Center server Genetec and EMC’s supported hardware listing Any VNX, VNXe, AXA, AX4-5/5i, Based on See the Genetec Omnicast CX3-XX, CX4-XXX, Isilon X200, solution Bandwidth Technical Note for and 108NL, NX, NS requirements additional information. If you do not have access to this document, see your EMC representative. EMC Storage for Physical Security 12 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 13. Software resources Table 6 lists the software used in this solution. Table 6. Solution software Software Version Configuration Windows Server 2003 SP2/R2 Operating system for Omnicast servers and workstation(s), used for AX and CX3 testing Windows Server 2008 64-bit Operating system for Security Center servers and workstation(s) Genetec Omnicast 4.4 – 4.8 4.4 – 4.6 Windows Server 2003 R2; Windows Server Server 2008 4.7 – 4.8 Windows 2008 x32 and x64 Local disk drive installation for all non-boot from SAN configurations Genetec Security Center 5.0 – 5.1 Windows 2008 x64 EMC PowerPath Latest GA version Installed on Omnicast servers EMC Naviagent Latest GA version Installed on Omnicast servers Security Center, Minimum of 1; Specified in Genetec Security Center documentation Security Desk, and maximum – unlimited Configuration Tool EMC Storage for Physical Security 13 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture
  • 14. Conclusion Summary The EMC Physical Security solution enabled by EMC storage arrays and Genetec Security Center products represents an ideal solution for surveillance management and IT infrastructure. The solution provides a flexible and highly scalable infrastructure that can meet a broad range of today’s demanding physical security requirements. As requirements change and become more sophisticated, the EMC Physical Security solution’s flexibility and modular architecture can be enhances to meet customers’ individual needs. EMC Storage for Physical Security 14 EMC VNX, VNXe, and Isilon, and Genetec Security Center—Reference Architecture