Скачать презентацию Security Management Press Conference April 14 th 2003 Скачать презентацию Security Management Press Conference April 14 th 2003

29ee63576704c73f4aa64a107bf24c3c.ppt

  • Количество слайдов: 15

Security Management Press Conference, April 14 th 2003 • Russ Artzt, Executive Vice President, Security Management Press Conference, April 14 th 2003 • Russ Artzt, Executive Vice President, Computer Associates International, Inc. • Joe Grillo, President and CEO, ASSA ABLOY Identification Technology Group (ITG) -- Parent company to HID Corporation • Alex Mandl, CEO, Gemplus • Don Lyman, Vice President, Software House, a member of Tyco Fire and Security • Robert Rodriguez, Special Agent, United States Secret Service, Electronic Crimes Task Force • Nazzareno E. Paciotti, President, Pinkerton Consulting & Investigations

Security Management For The Enterprise Security Management For The Enterprise

Challenges ¤ Security remains a board-level concern ¤ Lack of integrated security management ¤ Challenges ¤ Security remains a board-level concern ¤ Lack of integrated security management ¤ Creates vulnerabilities ¤ Results in high-operating costs ¤ Limits organizational collaboration Corporate Risk Exposure & Grounds For Liability

The Open Security Exchange™ ¤ Cross-industry, open forum delivering: ¤ Interoperability specifications ¤ Best The Open Security Exchange™ ¤ Cross-industry, open forum delivering: ¤ Interoperability specifications ¤ Best practices for security management ¤ Goals ¤ Unify disparate security technologies ¤ Optimize security and operational efficiencies ¤ Respect existing operational requirements

First Deliverables: Physical and IT Security Management ¤ Specifications now available for… ¤ End-to-end First Deliverables: Physical and IT Security Management ¤ Specifications now available for… ¤ End-to-end audit and forensics capabilities ¤ Single view ¤ Powerful authentication ¤ One common credential ¤ Centralized provisioning ¤ One point of control ¤ …from gates to gateways

First Deliverables: Physical and IT Security Management ¤ Enhanced security ¤ Concerted response ¤ First Deliverables: Physical and IT Security Management ¤ Enhanced security ¤ Concerted response ¤ Superior detection ¤ Consistent policy enforcement ¤ Reduced costs ¤ Simplified implementation ¤ Streamlined security operations ¤ Enhanced automation Less time…less risk

HID Corporation ¤ With over 150 million credentials shipped, HID is the world’s largest HID Corporation ¤ With over 150 million credentials shipped, HID is the world’s largest manufacturer of readers and cards used for physical access control. ¤ Proximity ¤ i. CLASSTM 13. 56 MHz read/write contactless smart card technology ¤ Multi-technology credentials: ¤ Provide users the ability to leverage investments in existing systems. ¤ Enable seamless, cost-effective upgrades to advanced technologies and new applications. ¤ Allow users to carry a single credential for multiple applications. ¤ Increase security - add a photo ID or anti-counterfeiting element!

Gemplus ¤ Adding intelligence to credentials ¤ Enhanced security ¤ Enable business applications ¤ Gemplus ¤ Adding intelligence to credentials ¤ Enhanced security ¤ Enable business applications ¤ Why smart cards? ¤ Two-Factor Authentication ¤ Protect sensitive ID data ¤ Combine Physical and IT access control ¤ Flexible – able to host multiple applications ¤ Gemplus is the #1 producer of smart cards

Software House A Tyco Fire & Security Company ¤ Leading provider of integrated security Software House A Tyco Fire & Security Company ¤ Leading provider of integrated security solutions since 1978 ¤ Nearly 10, 000 systems installed in 50 countries in 9 different languages ¤ Industry acclaimed API for seamless integration with business applications ¤ Total event and credential management system ¤ Physical access control ¤ Critical life safety and area management ¤ Complete Network Compatibility ¤ DHCP compatible field hardware ¤ TCP/IP communications ¤ Dual network communications

Computer Associates 27 years of IT expertise, 99% of the Global 1000 use CA Computer Associates 27 years of IT expertise, 99% of the Global 1000 use CA technology ¤ Unique expertise in IT infrastructure management: ¤ Platform independent ¤ Leadership & innovation ¤ Security Command Center ¤ Provide a complete view of the enterprise ¤ Increase security situational awareness ¤ Eliminate information overflow ¤ Maximize organizational efficiency

America’s Security Partnership • Federal Bureau of Investigation www. fbi. gov • United States America’s Security Partnership • Federal Bureau of Investigation www. fbi. gov • United States Secret Service www. secretservice. gov • Electronic Crimes Task Force www. ectaskforce. com • Infragard www. infragard. com

Computer Associates Pinkerton Consulting & Investigations Computer Associates Pinkerton Consulting & Investigations

HTTP: //www. ci-pinkerton. com • The Global Leader in Security Consulting, Investigations and Business HTTP: //www. ci-pinkerton. com • The Global Leader in Security Consulting, Investigations and Business Risk Services. • Established in 1850. • Comprehensive Information Technology Services including: Computer Forensics, Network Security and Brand Protection. • Division of Securitas AB -World’s largest security firm – Operating in 30 Countries, 6. 2 billion in revenue, 210, 000 employees.

The Alliance • Unique combined expertise • Policies & Technologies • Physical & IT The Alliance • Unique combined expertise • Policies & Technologies • Physical & IT Security • Strategic partnership • Joint Engagement • Development Collaboration • Complementary Solutions

Questions ? Questions ?