Information Technology | IT security » Datacenter physical security technologies overview

Datasheet

Year, pagecount:2011, 12 page(s)

Language:English

Downloads:12

Uploaded:November 10, 2012

Size:1006 KB

Institution:
-

Comments:

Attachment:-

Download in PDF:Please log in!



Comments

No comments yet. You can be the first!


Content extract

White Paper Next Level Security Systems, Inc. Datacenter Physical Security Technologies Overview Next Level Security Systems Datacenter Physical Security Overview Introduction Datacenter facilities house an immense amount of sensitive information and equipment. For this reason, they are often the target of security incidents such as theft or intentional damage. Hackers can gain a great amount of knowledge about a company in a matter of seconds. With the world ever advancing toward IP-based information storage, datacenters need to advance security of these facilities, not only from potential attacks from the outside, but also from inside facility walls. Datacenters have typically placed emphasis on physical security at the main access points. Entrance to the facilities is often heavily guarded and entrants require stringent physical security credentials. However, once inside, physical security for equipment and data storage systems is often limited to a traditional lock and key

at best. This poses a serious security risk because not all individuals with clearance into the facility should have access to all equipment within the facility. Also, traditional lock and key sets leave no audit trail of who accessed which equipment cabinet, when, and for how long. With the compliancy requirements for Datacenter Service Providers, the protection of both the equipment and data is extremely important. Most datacenters now require SAS70 Audits, PCI, GLBA, HIPAA and Sarbanes-Oxley protection to access and operate electronically and physically. Giving the sensitivity of data stored, Datacenters must control which technicians are allowed access to equipment as well as when they are allowed to enter. This white paper will show how Next Level Security Systems’ unified security platform operates in a datacenter environment and why it is an ideal solution for this application. Individuals with access to the datacenter facility also have access sensitive data and equipment

cabinets. About Next Level Security Systems and the NLSS Gateway Next Level Security Systems is a physical security company delivering a new breed of unified networked security technologies. The NLSS Gateway, Next Level’s flagship product, is an award-winning, IP-based security management platform that integrates video management, access control, intrusion, video analytics, HD video display, remote management and more into a single appliance. Because these essential elements are incorporated into the software platform from the point of manufacture, users benefit from a complete view of security operations through a comprehensive event management system. The NLSS Gateway is a true browser-based appliance. With no software to install, its intuitive interface can be accessed from most Web-enabled devices including smartphones and tablets. 2 Next Level Security Systems Datacenter Physical Security Overview IP offers “eyes” throughout the complete datacenter. Users can view

live or recorded video, export clips or still frames, talk to audio-enabled cameras, operate PTZ functions and digital PTZ functions, or set up analytics through a Web browser. Access and Video Working Together The NLSS Gateway includes a comprehensive access control and video management solution in one. Because they are completely integrated, alerts from these two systems work together in a correlated security management approach. Using the NLSS Gateway, datacenter security personnel can not only restrict access to equipment cabinets with electronic locks and access control cards, they can take security one step further by also associating a digital surveillance camera to the equipment for an associated video stream. Security personnel benefit from an instantaneous alert management system and audit trail with video showing who managed the equipment, at what time, for how long and what was done. Furthermore, individuals without authorization who access the equipment will set off an

alarm to the appropriate security personnel with an associated video event. Video and access events populate instantaneously in event log (on right). Click on event to view associated video and cardholder information (on left). 3 Next Level Security Systems Datacenter Physical Security Overview Benefits of IP Access Control Fully networked access control systems offer enhanced security and flexibility over traditional lock and key sets. It is far easier and less costly to activate or de-activate digital key cards from a database housed on the network than it is to replace traditional keys and locks. Network-based access control also identifies break-ins faster and has the ability to record a DATA CENTER RACK SECURITY DESIGN time-stamped event when a door lock has been tampered with. With the NLSS Gateway, new or existing equipment cabinets can be fitted with the necessary access control hardware with little modification: Datacenter Rack Security Design CAT 5e ACS Controller

camera DC camera DC card reader card reader lock rear door front door 1.72" lock side view DATA CENTER RACK SECURITY TOP VIEW frame mtd Datacenter Rack Security Top View 10/11/11 top view card reader ACS Controller rear door camera front door camera card reader 4 Next Level Security Systems Datacenter Physical Security Overview IP rack and cabinet locks can be opened with a key fob, through the interface, or with a physical key. LED light indicates the lock is on and activated. Any time the lock is accessed, an event will appear on the interface Cardholder Management Datacenters can manage employees, customers and contractors through one interface. At the same time they can set up cardholder access areas (cabinets), specific cardholder information, access schedules, card traces and more. This interface also enables cardholder activation and deactivation while maintaining a complete audit log of activity. Manage cardholder access rights, schedules,

information, traces and more from a single interface. Ease-of-Installation System installation is made easy with built-in tools such as auto-discovery and configuration. The NLSS Gateway will automatically locate and configure surveillance cameras and other edge devices that support self-discovery protocols, reducing the need for complex networking and training. 5 Next Level Security Systems Datacenter Physical Security Overview Video Analytics Digital Video is further enhanced by video analytics – advanced algorithms that quickly identify pattern deviations in video streams. Video analytics offers instantaneous alerts for activity such as movement in a specific direction, loitering, or an object left in the frame of view. They can also capture specific parts of a video frame such as a face and store that video as an alert. For forensic investigation, video analytics are a fast and easy way to search through hours of video. Simply set up an analytic such as line crossing on

archived video, press play, and instantly locate the one minute of video needed out of an hour of recording. The NLSS Gateway includes ten built-in analytics metrics at no additional cost. They are easy to set up and offer another way to search for specific events. These analytics include: activity, direction, dwell time (loitering), face capture, line crossing, object moved, object taken, people count, people count directional and perimeter. The NLSS Gateway also includes forensic analytics for any analytics metric on any archived video stream. Video analytics are easy to set up by overlaying boxes or lines to indicate sensitive areas. Ten analytics are included on the NLSS Gateway as well as forensic analytics for archived video. Video analytics are easy and fast to set up. Simply overlay digital lines or boxes onto the field of view to identify sensitive areas. Events from these metrics will populate in the event management system alongside access control and other critical

security events. 6 Next Level Security Systems Datacenter Physical Security Overview Reporting and Event Management Because the NLSS Gateway includes built-in security systems such as video management, access control, video analytics and intrusion, datacenters benefit from a complete view of their risk profile through correlated data. Built-in reporting tools collect data from these systems and display them in a customizable layout. Users can choose from a list of over 40 report types and print or export the data to a CSV file. Reports can be used to indicate vulnerabilities such as staffing levels or sensitive zones. System data is also correlated into a comprehensive event management system. Event management queues sort data into high-risk incidents, lock critical events or restrict userdefined events from populated the event log. Users are also able to assign event status and record event notes with date/time/user stamped and assign multiple event filters. Incoming events

can also be linked with specific actions. For example, an access denied alarm sets the corresponding area’s PTZ camera into motion. Users can choose from 42 pre-programmed events and 15 actions. Event Management features include: • • • • • • • Correlated event management across video, access control, and video analytics Incident management with color-coded event severity levels Multiple search filters Event view options: 3D timeline, standard timeline, traditional event table log Built-in reporting tools SMS and email notifications CSV Export 7 Next Level Security Systems • • • • • • Datacenter Physical Security Overview Snap-shot event display for faster video search Shunt queue restricts certain user-defined events from cluttering the event log Lock queue ensure that critical events do not get groomed from the event log Event view options: 3D timeline, standard timeline, traditional event table log Events with high severity levels are

automatically added to the emergency queue An emergency notification flashes throughout the entire interface when a new event is added to the emergency queue Events can be displayed in list log or grid view. Quickly locate and identify video events involving a specific person with face capture analytic and grid view event search. Click on the video clip on the right and display associated video and notes on the left. Floor Plans Interactive floor plans are easy to set up and offer a complete view of facility activity. Users can upload customized datacenter floor plans and overlay cameras, doors, monitors and other edge devices onto it for quick access to associated video and other data. Alerts pop up on the floor plan highlighting areas of activity. Multiple floor plans may be uploaded to further customize the field of view. 8 Next Level Security Systems Datacenter Physical Security Overview Floor plans are easy to build. Upload a customized datacenter floorplan, overlay

cameras, doors and monitors in the appropriate places, and click on these devices to access video and other data instantly. Zoom in or out of floor plans in aerial view Event alerts appear on the floor plan highlighting areas of activity. Click on the alert for more information and associated video. Remote Management and Mobility The NLSS Gateway is a true browser-based IP product. With no software to install, its interface can be accessed from most Web-enabled devices at any time through a common Web browser. Users are able to access data such as event information or video, as well as interface with their system and its connected devices. Users can view live or recorded video, control cameras and doors, export reports, talk to local sites and more from a secure browser. 9 Next Level Security Systems Datacenter Physical Security Overview Mobile device support allows datacenter operators to remotely view and receive alerts in real time. interface with connected devices

including cameras and doors. Users can Taken one step further, a Next Level Remote Management Service (Next Level RMS) package, offers innovative ways to manage security systems across multiple sites from anywhere in the world. Drawing on improvements in cloud-computing technology, Next Level RMS offers more than other hosted service models currently used in the security market. Security data is correlated across sites on a consolidated interface, offering users a comprehensive view of security operations. Intuitive Map interface displays all sites or facilities in customizable layout. Click on a site to access video, events and more. 10 Next Level Security Systems Datacenter Physical Security Overview Remote Audio and Environmental Control The NLSS Gateway includes full duplex audio functionality through the user-interface. Operators can click to talk to and listen to audio-enabled cameras from anywhere through a Web browser. From a remote location, datacenter operators can

unlock cabinet doors and talk to and instruct technicians as they work on equipment. Further customization and system expansion is a possibility through the use of contact closures. Utilizing inputs, outputs and linkages, datacenters can connect to and monitor other environmental factors in the facility such as HVAC systems or even simple light switches. Talk with technicians and other personnel at the datacenter through an audio-enabled camera. Lock or unlock cabinets Control other environmental systems such as HVAC through the use of contact closures. 11 Next Level Security Systems Datacenter Physical Security Overview Conclusion Datacenters need security not just on the perimeter of the facilities, but also within the facilities’ walls to protect data and equipment. Traditional locks and keys can only do so much to protect against theft and damage. They cannot provide valuable information to datacenter operators and security personnel. A unified, networked platform that

incorporated video and access, control along with other advancements such as video analytics, intrusion and remote audio, offers new levels of insight. Data from these systems is combined and correlated to provide instant alerts of activity as well as comprehensive reports and event management of the facility’s risk profile. The NLSS Gateway provides owners of SAS Type II Datacenters the ability to secure and control access to their facilities and equipment down to the cabinet level at all times. Thus allowing for immediate control, real time alerts, and complete physical security of their customer’s equipment and data. This system also provides an audit and event trail for compliancy requirements. With the NLSS Gateway, more services can be offered to end users in the way of improved reporting and safety. The NLSS Gateway’s integrated video management, access control, video analytics and event reporting make it an ideal solution for datacenter security. 12