Physical Access Control New Technologies for the DataComm Industry Mance Harmon CEO and Founder BlueWave Security.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Asterisk in the Enterprise: A Case Study Dan Thomson – Executive VP VocalNet, Inc.
“Web Based Access Control and Integration to BAS” March 2007
John Bailey Feature Updates for IDaxxess. MS SQL & MS Access: ability to load database on Enterprise DBMS Notifications: service will send status.
bright blue. So Smart, Its Simple! To the Presenter:
Basic Concepts of a Computer Network
ACCESS CONTROL SOLUTIONS Since RBH Access Technologies RBH was established in 1995 and released its first Axiom system in the fall of To date.
DNA-A212 / DNA-A213 ADSL 2+ Modem/Router
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
GateFusion Wireless Content Delivery
Thin Client vs. Zero Client Key Account Government 04 / 2012 Tim Riedel What are the advantages of Thin Clients over Zero Clients?
By Glenn Z.  A network is 2 or more computers connected to each other.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Wyse.com 2010 Cameron Smith Sales Engineer for IN, KS, and MO Desktop Virtualization.
Your future is bright blue! So Smart, Its Simple..
©2014 Extreme Networks, Inc. All rights reserved. Extreme Networks Optimized Networks Kevin Kuenker, Solutions Architect – Central Region.
Sales Manual B.Braun Space
Accessible voice services and systems: Technical trends Jim Tobias v/tty.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
IGEL Security Product Marketing Manager October 2011 Florian Spatz Thin computing secures your data.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Training.
ARE YOU SURFING WITHOUT A LIFE JACKET? LOOKING AT THE PROS AND CONS OF WEB BASED SOFTWARE Karen Burkhardt, Mobilitat Software.
Copyright 2009 GxP Automation, LLC Welcome Complete Automation Solutions for Critical Facilities.
System Components Hardware overview for Apollo ACS.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
TOSIBOX LOCK security options 1 1.
2N® Access Commander Product presentation.
Introduction To DSX WinDSX DSS (Dallas Security Systems)
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
1 PAC530 | Output Controller. 2 The Output Controller (PAC530) provides the local connection on an RS-485 network between an Access and Alarm Server (PAC500)
Brief overview Basic Concepts of Computer. What is a computer? A computer is a tool to process data Data Alphabet/Numeric Graphic Sound.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Who is Inner Range? Inner Range is an Australian Electronic Security Manufacturing Company. Established in 1988 with a Major focus on the Australian Security.
Locknetics CIP Module Upgrade Akin Olugbade Justin Gilstrap Lutalo Webb.
March 15, 2008 PM of FMC 1 Rich Watson Director of Technical Marketing DiVitas Networks – Mountain View March 15, 2008.
1 © 2008 Avaya Inc. All rights reserved. Enterprise Infrastructure Anne L Coulombe Global Unified Communications Solutions September.
Technology Training that Works Setting Up, Understanding & Troubleshooting of Industrial Ethernet & Automation Networks.
JUNIPER TECHNOLOGY UPDATE Debbie Montano Jan 31, 2011.
Architecture and Design of Customer Support System using Microsoft.NET technologies Nikolay Pavlov Asen Rahnev.
Tim Gilger National Manager of OEM & Integration Partners.
Sales / Marketing Meeting
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
Copyright 2007 John Wiley & Sons, Inc. Information Systems: Creating Business Value John Wiley & Sons, Inc. Mark Huber, Craig Piercy, and Patrick McKeown.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Access Network Devices Remotely— Even if the Network is Down— with Out-of-Band Management.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Peer-to-Peer Vs. Client/Server.
Net-Centric Computing Overview
GEMTEK Management Center
ICON Signals Event Alert Notification Platform Overview March 28, 2017
COSEC ARC IP based Access Control Panel.
System Architecture Issues
Wireless IP products: GWN series
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Comparison of LAN, MAN, WAN
IzoT™ Routers and Network Interfaces
Изготвено от Билял Карахасанов
How to install hotspot server in stand-alone pc
Presentation transcript:

Physical Access Control New Technologies for the DataComm Industry Mance Harmon CEO and Founder BlueWave Security

ACCESS CONTROL FOR THE DATACOMM INDUSTRY The Changing Face Of Access Control Customer Cost $$ Low High Manageability & Flexibility Low High Standard Locks & Keys Stand-alone keypad locks PC-managed stand-alone locks Panel-based Access Control (manageable, not flexible) Network-based Access Control WiFi / Ethernet-based Access Control WiFi-based stand-alone locks RF-based Access Control RF-based stand-alone locks Concept and Market Overview

Stand-Alone Locksets Pros –Relatively Inexpensive –More manageable than standard locks and keys –Can be mounted in most doors in less than an hour Cons –No central management or alarm notification –Requires Sneaker Net to update credentials and download audit Market Size: $3.5B, U.S. Only

ACCESS CONTROL FOR THE DATACOMM INDUSTRY The Changing Face Of Access Control Customer Cost $$ Low High Manageability & Flexibility Low High Standard Locks & Keys Stand-alone keypad locks PC-managed stand-alone locks Panel-based Access Control (manageable, not flexible) Network-based Access Control WiFi / Ethernet-based Access Control WiFi-based stand-alone locks RF-based Access Control RF-based stand-alone locks Concept and Market Overview

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Intelligent Control Panels Company Overview: Products Network Interface ROM (Firmware) CPU RAM (Database) Reader / Lock Interface RS-232

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Door Peripherals Locking DevicesReaders Sensors and Other Peripherals

ACCESS CONTROL FOR THE DATACOMM INDUSTRY The Changing Face Of Access Control Customer Cost $$ Low High Manageability & Flexibility Low High Standard Locks & Keys Stand-alone keypad locks PC-managed stand-alone locks Panel-based Access Control (manageable, not flexible) Network-based Access Control WiFi / Ethernet-based Access Control WiFi-based stand-alone locks RF-based Access Control RF-based stand-alone locks Concept and Market Overview

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Intelligent Control Panels Company Overview: Products Network Interface ROM (Firmware) CPU RAM (Database) Subnetwork Interface Ethernet LAN / WAN Reader / Lock Interface Subnetwork Interface Reader / Lock Interface Subnetwork Interface Reader / Lock Interface Subnetwork Interface RS-485

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Proprietary Converged Solutions Schlage – Bright Blue –Master panel manages both traditional doors and proprietary wireless doors –Requires additional communications networking infrastructure –Authentication is performed on master panel / or server –Maximum of 32 doors Stanley / OSI –Proprietary wireless stand-alone lock solution

ACCESS CONTROL FOR THE DATACOMM INDUSTRY The Changing Face Of Access Control Customer Cost $$ Low High Manageability & Flexibility Low High Standard Locks & Keys Stand-alone keypad locks PC-managed stand-alone locks Panel-based Access Control (manageable, not flexible) Network-based Access Control WiFi / Ethernet-based Access Control WiFi-based stand-alone locks RF-based Access Control RF-based stand-alone locks Concept and Market Overview

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Company Overview: Products Network Interface ROM (Firmware) CPU RAM (Database) Reader / Lock Interface The New Architecture for Access Control: IP Door Controllers Ethernet LAN / WAN

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Open Standards Converged Solutions

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Thin Client vs. Thick Client When is thin-client useful? Cons –Webservers present additional security risk –Requires the purchase of special-purpose hardware appliance –System is more difficult to manage (must be patched by exception) –System can be harder to integrate with 3 rd party databases and applications Example: Bloomingdales

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Why Proprietary Wireless is Evil! Security Is Not Auditable –Security Through Obscurity doesnt work –Wi-Fi security created and peer reviewed by the worlds experts Stuck with limited vendor toolkit –Is my network under attack? Or is it just broken? –Lack of a rich toolset for troubleshooting communication problems IT Administrators Want Standards-Based Solutions! Concept and Market Overview

ACCESS CONTROL FOR THE DATACOMM INDUSTRY Contact Info Mance Harmon (512) BlueWave Security Research Blvd., Suite Austin, TX 78750