SlideShare una empresa de Scribd logo
1 de 27
Cisco Physical SecurityConverge, Connect, Protect Security Overview Scott Maxwell, CISSP Business Development Manager scmaxwel@cisco.com 614-718-2784 1
Traditional Deployment Models and Costs Data Voice CCTV / Cable TV Video Conferencing Surveillance Energy Management Overhead Paging Fire Clocks & Bells Physical Security PSTN Internet Router ISDN PBX MCM Data Switch
The Power of Convergence – Reduce TCO Data Voice VideoStreaming IP Network VideoConferencing PA(Intercom) VideoMonitoring BuildingControls Clocks and Bells
Executives Facilities Corporate Security  Employees Guests Community Police Corporate and Remote Property Response Collaborative Effort Lines of Business
Physical Security Core Applications  IP Cameras Notification & Response Access Control Video Surveillance Video Surveillance Manager Stream Manager Products Strategies Open API Open API Open API General  (IPv6, SAF, MediaNet) Security  ,[object Object],Provisioning  (Auto Detection, Auto Configuration, etc) Network Network Availability (Bandwidth Mgt, QoS, Resiliency, etc) ,[object Object]
(Health, Updates, etc),[object Object]
[object Object]
 Centralized Control
 Relevant Information
 Streamlined Operations
 Immediate PaybackVideo Access Control Video Analytics Perimeter Intrusion An Open Platform Delivers the Right Information to the Right Person at the Right Time Detect Respond Email Analyze PDA Convert Data to Knowledge Right Information, Right Person, Right Time  Radio Intercom Knowledge Information Data Phone Sensors Cell Phone Weather
Optimize Operational Efficiencies
Product OverviewVideo Surveillance
Cisco IP Video Surveillance Cameras  CIVS-IPC-2500 Standard Res CIVS-IPC-2500W Standard Wireless ,[object Object]
Indoor/Outdoor Vandal
CIVS-IPC-2530/31V
Extend Temp Vandal
CIVS-IPC-2520/21
Indoor
CIVS-IPC-4300/4500
High DefinitionCamera shown with optional DC auto iris lens, available separately
Product OverviewIPICSIP Interoperability and Collaboration System
P25 & Tetra Radio Systems Analog Trunking Radio Systems Telephony Networks Analog  Conventional Systems IP Network Interoperability Across Radio Systems  Comprehensive Communications Interoperability Mobile Phones Nextel PTT Phones Landline Phones Messaging/ Paging Interoperability to Telephony and Notification Interoperability  to PCs & IP Phones
Cisco Unified Dispatch Console Detection and Monitoring Response Cisco Unified Dispatch Console (Built on IPICS technology)
Product OverviewAccess Control
Access Control Architectures today…. Up to 64 Controllers/ Access Panels Network Serial RS485Cables Badging Server Up to 32 Mgmt Server ,[object Object]

Más contenido relacionado

La actualidad más candente

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
EnclaveSecurity
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 

La actualidad más candente (20)

Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
MobileIron plus Cisco - Mobilizing Network Security
MobileIron plus Cisco - Mobilizing Network SecurityMobileIron plus Cisco - Mobilizing Network Security
MobileIron plus Cisco - Mobilizing Network Security
 
Ensure Software Security already during development
Ensure Software Security already during developmentEnsure Software Security already during development
Ensure Software Security already during development
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 

Destacado

PCN Português
PCN PortuguêsPCN Português
PCN Português
23568921
 
Firmas binominal 04 14 2012
Firmas binominal 04 14 2012Firmas binominal 04 14 2012
Firmas binominal 04 14 2012
elquintopoder.cl
 
TIQStrategy - Strategieberatung für qualitätsorientiertes Datenmanagement
TIQStrategy - Strategieberatung für qualitätsorientiertes DatenmanagementTIQStrategy - Strategieberatung für qualitätsorientiertes Datenmanagement
TIQStrategy - Strategieberatung für qualitätsorientiertes Datenmanagement
Vizlib Ltd.
 
Trabajo etica y valores
Trabajo etica y valoresTrabajo etica y valores
Trabajo etica y valores
dahiana4
 
Proyecto De DireccióN Liceo Rayen Mapu 2010 2014
Proyecto De DireccióN Liceo Rayen Mapu 2010 2014Proyecto De DireccióN Liceo Rayen Mapu 2010 2014
Proyecto De DireccióN Liceo Rayen Mapu 2010 2014
itarife
 

Destacado (20)

Akhil Arora
Akhil AroraAkhil Arora
Akhil Arora
 
PCN Português
PCN PortuguêsPCN Português
PCN Português
 
Tetra Pak- Trick or Treat Me Campaign
Tetra Pak- Trick or Treat Me CampaignTetra Pak- Trick or Treat Me Campaign
Tetra Pak- Trick or Treat Me Campaign
 
Folleto Ofertas Ecomputer Abril 2016
Folleto Ofertas Ecomputer Abril 2016Folleto Ofertas Ecomputer Abril 2016
Folleto Ofertas Ecomputer Abril 2016
 
Firmas binominal 04 14 2012
Firmas binominal 04 14 2012Firmas binominal 04 14 2012
Firmas binominal 04 14 2012
 
TIQStrategy - Strategieberatung für qualitätsorientiertes Datenmanagement
TIQStrategy - Strategieberatung für qualitätsorientiertes DatenmanagementTIQStrategy - Strategieberatung für qualitätsorientiertes Datenmanagement
TIQStrategy - Strategieberatung für qualitätsorientiertes Datenmanagement
 
Mediosdepago latamsummit2012
Mediosdepago latamsummit2012Mediosdepago latamsummit2012
Mediosdepago latamsummit2012
 
diapo luana 2
diapo luana 2diapo luana 2
diapo luana 2
 
Trabajo etica y valores
Trabajo etica y valoresTrabajo etica y valores
Trabajo etica y valores
 
FRACASO TERAPEUTICO BAJA DE PESO
FRACASO TERAPEUTICO BAJA DE PESO FRACASO TERAPEUTICO BAJA DE PESO
FRACASO TERAPEUTICO BAJA DE PESO
 
Program Sama-Sama Kaya | Winners Sabah
Program Sama-Sama Kaya | Winners SabahProgram Sama-Sama Kaya | Winners Sabah
Program Sama-Sama Kaya | Winners Sabah
 
Proyecto De DireccióN Liceo Rayen Mapu 2010 2014
Proyecto De DireccióN Liceo Rayen Mapu 2010 2014Proyecto De DireccióN Liceo Rayen Mapu 2010 2014
Proyecto De DireccióN Liceo Rayen Mapu 2010 2014
 
Wild rydes serverless website workshop
Wild rydes   serverless website workshopWild rydes   serverless website workshop
Wild rydes serverless website workshop
 
Saggi Pensieri
Saggi PensieriSaggi Pensieri
Saggi Pensieri
 
Proyecto tecnología pdf
Proyecto tecnología pdfProyecto tecnología pdf
Proyecto tecnología pdf
 
Somos Tela Hoteles y Tour Operadores
 Somos Tela Hoteles y Tour Operadores  Somos Tela Hoteles y Tour Operadores
Somos Tela Hoteles y Tour Operadores
 
Escuelas Saludables
Escuelas SaludablesEscuelas Saludables
Escuelas Saludables
 
Anti Phishing Working Group Report 1H 2009
Anti Phishing Working Group Report 1H 2009Anti Phishing Working Group Report 1H 2009
Anti Phishing Working Group Report 1H 2009
 
Computational Modeling of Biophysical Processes in a Cell
Computational Modeling of Biophysical Processes in a CellComputational Modeling of Biophysical Processes in a Cell
Computational Modeling of Biophysical Processes in a Cell
 
Savings Bond Training Webinar
Savings Bond Training WebinarSavings Bond Training Webinar
Savings Bond Training Webinar
 

Similar a Cisco Phy Sec Overview Netversant

Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation
 

Similar a Cisco Phy Sec Overview Netversant (20)

Network Configuration and Audit Simplified
Network Configuration and Audit SimplifiedNetwork Configuration and Audit Simplified
Network Configuration and Audit Simplified
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
Mpole system introduction 2018
Mpole system introduction 2018Mpole system introduction 2018
Mpole system introduction 2018
 
Karim hassan gallal 2 cv 2017 last update
Karim hassan gallal 2 cv 2017 last update Karim hassan gallal 2 cv 2017 last update
Karim hassan gallal 2 cv 2017 last update
 
TAC Vision & Strategy
TAC Vision & StrategyTAC Vision & Strategy
TAC Vision & Strategy
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
NSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdfNSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdf
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 

Cisco Phy Sec Overview Netversant

  • 1. Cisco Physical SecurityConverge, Connect, Protect Security Overview Scott Maxwell, CISSP Business Development Manager scmaxwel@cisco.com 614-718-2784 1
  • 2. Traditional Deployment Models and Costs Data Voice CCTV / Cable TV Video Conferencing Surveillance Energy Management Overhead Paging Fire Clocks & Bells Physical Security PSTN Internet Router ISDN PBX MCM Data Switch
  • 3. The Power of Convergence – Reduce TCO Data Voice VideoStreaming IP Network VideoConferencing PA(Intercom) VideoMonitoring BuildingControls Clocks and Bells
  • 4. Executives Facilities Corporate Security Employees Guests Community Police Corporate and Remote Property Response Collaborative Effort Lines of Business
  • 5.
  • 6.
  • 7.
  • 11. Immediate PaybackVideo Access Control Video Analytics Perimeter Intrusion An Open Platform Delivers the Right Information to the Right Person at the Right Time Detect Respond Email Analyze PDA Convert Data to Knowledge Right Information, Right Person, Right Time Radio Intercom Knowledge Information Data Phone Sensors Cell Phone Weather
  • 14.
  • 15.
  • 22. High DefinitionCamera shown with optional DC auto iris lens, available separately
  • 23. Product OverviewIPICSIP Interoperability and Collaboration System
  • 24. P25 & Tetra Radio Systems Analog Trunking Radio Systems Telephony Networks Analog Conventional Systems IP Network Interoperability Across Radio Systems Comprehensive Communications Interoperability Mobile Phones Nextel PTT Phones Landline Phones Messaging/ Paging Interoperability to Telephony and Notification Interoperability to PCs & IP Phones
  • 25. Cisco Unified Dispatch Console Detection and Monitoring Response Cisco Unified Dispatch Console (Built on IPICS technology)
  • 27.
  • 28.
  • 29. Benefits of Cisco Physical SecurityUsing the Network as Platform Integrates Surveillance, access control and incident collaboration Installed and new third party devices, systems and solutions Leverages investment in Cisco network infrastructure Grows and adapts to new technologies, organizational evolution, economic change, and new threats Use Cases / Proof Points Gas sensor triggers automatic incident notification to IP phones Gunshot activates building evacuation plan on Digital Signs Live video sent to PDAs as security staff are en route First responders collaborate across cellphones, IP phones and hand held radios Video analytics monitors digital sign usage, and sends text alert to sales staff when customer is unattended Badge swipe adjusts heating and lighting in office
  • 30.
  • 31. Physical Security US/CAN Coverage S Calif / Nevada North West and, West PSS: Rich Greenberg Email: rgreenbe@cisco.com SE: Cyrus Choobineh Email: cchoobin@cisco.com PSS: Jonathan Seigle Email: jseigle@cisco.com SE: TBD South East PSS: Ken Mills Email: kemills@cisco.com SE: Rocky Smith Email: rocsmith@cisco.com Channels Leads: Chris Cressy ccressy@cisco.com Scott Maxwell scmaxwel@cisco.com North East, Atlantic, East Canada PSS: Phil Hudson Email: phudson@cisco.com SE: Stephen Squeglia Email: ssquegli@cisco.com US/Canada Leadership Regional Manager: Lisa Hale lhale@cisco.com Federal Leadership/Sales Team: Region Manager : Kent Breaux kbreaux@cisco.com PSS: Robert Edmondston Email: roedmons@cisco.com CSE: Bryan Berezdiven Email: bberezdi@cisco.com Central US & West and Central Canada PSS: Mark Tomallo Email: mtomallo@cisco.com SE: Brannon Hollinger Email: bhollige@cisco.com Worldwide Leadership Team Director of Sales: JP Kenney Email: jkenney@cisco.com SE Manager: Matt Graham Email: mattgra@cisco.com Harrah’s CSA: Carlton Larrieu Email: clarrieu@cisco.com
  • 32. What Does a Good Physical Security Customer Look Like? Sees value in a Cisco relationship. Is an existing UC customer IT has a relationship with the security team and/or owns the purchase decision for physical security. The decision is not based on a feature checklist. Price is not the only factor. Technology Integration is important. Places value on the roadmap. Wants to purchase from current IT partner. A platform is important. Incident Response is important.
  • 33. Who to Call On Networking Contacts Ask them to facilitate a meeting with the Physical Security team Physical Security Team Can reside in Loss Prevention, Facilities, Operations. . . Etc. These are the guys who run the systems and make the day-to-day decisions. Usually pretty up-to-date on the technology but don’t have the $ or resources to build the system they want Engineering Firm This team might be involved, especially in new build situations Architect of Record Same as above Executives Focus on Operational Efficiencies and savings
  • 34. Why We Win? We have the network experience that our competitors do not. Ask the customer what our competitors strategy is for support the network and the application and you will find they do not have an answer. We are the only Physec company leveraging UC and the Router to deliver Physec Value. Do not under play this. Bottom line we may not have all the features today but Cisco is the clear choice over the next 12-18 months. Be clear, choosing Cisco will prove to be a better business investment long term. (use voice as an example) Play up the IP camera API, Access Control architecture and the HD camera as examples of technology leadership. We own the IT buyer, do not be afraid to leverage IT decision makers to be our champions and drive the decision upwards. The higher the conversation goes within the company, the better we look against a start up. Leverage COPSS, if you can get you customer to buy into the vision of COPSS, our competitors can not follow. Use this even if all they want is video or access. Own the vision. Talk about Network Security and how we have a solid strategy to support end to end security. 802.1x in the camera, CPD on the Access Gateway, AES/WEP on the Wireless cameras. None of our competitors can sell security on the network and at the door.
  • 35. What We Need To Know (Video) How Many Cameras Per Location Analog or IP What Quality 2CIF is middle of the road. Most common. What Frame Rate 5-10 fps. Anything higher is usually wasted. How Many Days 14-30 days is most common. Any other requirements Pan/Tilt/Zoom Specific Features Integration Requirements etc. If it is an ISR Solution Do they have an available NM slot (Analog) Do they have an available EVM slot (IP/Analog)
  • 36. What We Need To Know (Access) How Many Doors Per Location How Many Readers Per Door Are Biometrics Required We do not support all biometric readers today. Is POE Available? We can power the door hardware over POE if it is an ‘E’ series switch What Type of Reader is Required We support Prox and Pin type readers today. Any other requirements Elevator Control High Availability Integration to Video System (Non-Cisco) Enterprise Integration (HR, AD, etc) Time and Attendance Integration Visitor Management Smart Card Integration
  • 37. Training Resources http://cisco.partnerelearning.com/Saba/Web/Main Login with your CCO login Click on the “Browse Catalog” Tab on top On the left, click on “ATP” From the “Video Surveillance” line, click on the “Account Manager” link On the next page, click on the “Register” link
  • 38. Additional resources www.ciscoet.com (Use Scott Maxwell as sponsor) www.cisco.com/go/physec

Notas del editor

  1. It starts with audio-only; IPICS allows you to integrate PCs, IP-Phones and cellphones into a radio channel.But video from surveillance, users in the field and tihngs like YouTube are important and captureChild abductionAccident detailsFireCisco Unified Dispatch enable the dispatcher to link important video to a talkgroup, distributing video to rich media devices – radios continue to participate in audio PTT channel only.Additional capabilities:Users can update incident status at any time – status will be distributedUsers can add video/pictures to an incident at any time – it will be distributed to all incident participantsUsers can talk on PTT with integrated audio channel interoperability
  2. Cisco ‘s network-based approach to security takes integration – and hence effectiveness - to a different level:We integrate IP based surveillance, access control and incident collaborationWe integrated installed and new third party devices, systems and solutionsThe network “platform” makes this integration possible.It means our customer security system can grow and adapt to new technologies, to organizational evolution, to economic change, and – of course – to new threatsLet’s walk through a few examples, or “Proof Points” of what Cisco’s network based approach can achieve. You’ll really get the idea of the integration we make possible and the effectiveness your security system can deliver:A gas sensor can trigger automatic incident notification messages to IP phones A gunshot can activate building evacuation plan on Cisco Digital SignsLive or video clips can be sent to PDAs as security staff are en route First responders can collaborate whether they have cellphones, IP phones or hand held radios Video analytics can monitor digital sign usage, and sends text alert to sales staff when a customer is unattendedA badge swipe can not only give access to a building, it can also adjusts the heating and lighting in office