Guide to Access Control Systems

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
OPC WPFHMI.NET.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Virtual techdays INDIA │ November 2010 SQL Azure Data Sync Shilpa Nirmale │ Associate Manager, Accenture.
Mobility Methods for document access while away from the office.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
2N® Access Commander Product presentation.
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Microsoft Management Seminar Series SMS 2003 Change Management.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Linux Virtual Desktop Infrastructure (VDI) Access Bringing Linux virtualization to the enterprise Presenter: James Lui Director of Technical Services,
Clouding with Microsoft Azure
Today’s challenges Data Users Apps Devices
Barracuda Backup Easy Cloud-Connected Backup Version 5.4 | July 2014.
REV REV Who Uses Ignition? Who Uses Ignition? Thousands of companies worldwide depend on Ignition every day, here are just a.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Nexbase Invites You To Our Special Products
Basharat Institute of Higher Education
Microsoft Azure Virtual Machines
Hybrid Cloud Web Filtering Platform
Content Management Solutions in the Cloud
Case Study: Real Life Unified Architecture Value
Barracuda Web Security Flex
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
2016 Citrix presentation.
Securing the Network Perimeter with ISA 2004
Power BI Security Best Practices
Enterprise Launch Cloud Networking Connected Experience
Veeam Backup Repository
Cisco Express Foundation for Systems Engineers Exam Name : practice-questions.html.
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
BOMGAR REMOTE SUPPORT Karl Lankford
VERSATILE NETWORK ATTACHED DOOR ACCESS CONTROL SYSTEMS
Unit 27: Network Operating Systems
Comparison June 2017.
Pack Your Park by Modernizing Your Business Online
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
IT INFRASTRUCTURES Business-Driven Technologies
Access and Information Protection Product Overview October 2013
Getting Started.
Simplified Development Toolkit
Getting Started.
Security Information and Event Management (SIEM) Solution Runs on Microsoft Azure Power “We are so happy to be using Microsoft Azure to make our security.
Pack Your Park by Modernizing Your Business Online
Azure Enables Mobility, Easy Sync and Share, and Allows Companies to Retain Data Control MINI-CASE STUDY “Azure provides the full stack of technology that.
Telecom Software & VoIP Communication Platforms Provider.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
+ Chen Hsong Cloud = Connectivity.
DATS International Portfolio.
2N Access Unit 2.0 Multi-technology access control readers.
System Center Marketing
Designed for powerful live monitoring of larger installations
PLANNING A SECURE BASELINE INSTALLATION
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Designing IIS Security (IIS – Internet Information Service)
Writing for Cloud Tools, Process, & D
Scaling Businesses on the Cloud
Productive + Hybrid + Intelligent + Trusted
Microsoft Virtual Academy
Presentation transcript:

Guide to Access Control Systems

What is an access control system? An access control system allows you to manage, monitor and maintain who has access to for example your doors. Using an access control system allows you to manage access or entry to almost anything: file access, workstation access, printer access and in our case, door, facility, building or office access. The standard form of today’s access control is an “access card” to grant access to the secured area.

Challenges of Traditional Access Control Often requires VPN configuration Labor-intensive provisioning and de-provisioning process No easy way to tell if devices are correctly working Insecure protocols (e.g. Wiegand) 5. Fragmented system design is difficult to update and maintain 6. Single point of failure (local server) 7. Insecure practices (password sharing, credential cloning)

Basic Components of Access Control User-facing Admin-facing Infrastructure Mobiles, access cards, card reader and access control keypad Access management dashboard, integrations or API Electric door lock hardware, access control panels, access control server computer and low voltage cabling

Founded in 2012 by a team of Columbia and Stanford cloud specialists. Missio n Vision Create a full stack door access control that is easy to set up, scale and operate. To be a secure and scalable physical security platform for AI applications. Founded in 2012 by a team of Columbia and Stanford cloud specialists.

IT-centric Door Access No local server. No insecure standards. No old firmware. Controller Mobile (BLE & NFC) access NFC smart cards (128bit AES) Smart door controls PoE Reader (BLE & NFC) Scalability (1-X devices) Industrial grade Local cache Remote manage-able Every device, every site, worldwide -- anytime Provide secure, audited access to door access Cloud management Works with any wired locks Integration in IT

At A Glance All-in-One System End-to-end encryption Easy, 24/7 access - No local server, scales easily - Automatic firmware updates - PoE based readers - On-board power for locks - Local cache on each device End-to-end encryption - At rest: AES - In transit: HTTPS / SSL - Devices directly connected to firewall Easy, 24/7 access - User friendly cloud software - Unlimited users - No SDK’s

Built for Enterprise Scale and Simplicity Secure - Encryption at Rest (AES) - In Transit (HTTPS, SSL) - 2FA for Mobile - Detailed Audit Logs in Real Time - Automatic Firmware Updates Smart - Secure Remote Access - Active Monitoring & Smart Alerts - On-demand access sharing - Heatmap Following Usage Patterns Scalable - Scalable to Unlimited Devices - Not Dependent on Local Server - Fast Deployment - Scalable User Permissions and Controls

Typical Client Situations 1 Unify Access Control No local differences Enable all employees Support growth or change → Standardize security in facility premises 2 Streamline Operations Have a fast and easy set-up Remote management Employee enablement → Use technology to enable business 3 Achieve Standards Directory integration 2FA, Single Sign On Data analysis → Become compliant in physical access control

How to Evaluate, Buy and Implement Kisi 1 2 3 Deploy Proof of Concept (POC) Technology validation Management approval Employee testing Calculate Unit Cost Kisi hardware incl license Installation price, schedule site inspection Project Plan Timeline Involved contacts Door schedule

Get A Demo.