Next Generation Security Solutions Fault Tolerant powered by Hydra January 2013.

Slides:



Advertisements
Similar presentations
Express5800/ft series servers Product Information Fault-Tolerant General Purpose Servers.
Advertisements

Yokogawa Network Solutions Presents:
Your Introduction to… SYSTEM VII - Built to Impress Vista Business Capability Designed to run on the very latest in Operating Systems.
John Bailey Feature Updates for IDaxxess. MS SQL & MS Access: ability to load database on Enterprise DBMS Notifications: service will send status.
IBM Software Group ® Integrated Server and Virtual Storage Management an IT Optimization Infrastructure Solution from IBM Small and Medium Business Software.
NetApp Confidential - Limited Use
SYSTEM-WIDE PROCESS CONTROLS UPGRADE Detroit Water & Sewerage Department.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Page 1 Dorado 400 Series Server Club Page 2 First member of the Dorado family based on the Next Generation architecture Employs Intel 64 Xeon Dual.
High Availability Group 08: Võ Đức Vĩnh Nguyễn Quang Vũ
Network+ Guide to Networks, Fourth Edition
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
Chapter 19: Network Management Business Data Communications, 4e.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 8: Troubleshooting Storage Devices and Display Devices.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 4: Integrity and security.
Web UI and BrightAuthor networking features
The middleware that makes real time integration a reality.
DatacenterMicrosoft Azure Consistency Connectivity Code.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
10 February Door Configuration. 10 February Door Configuration Allows you to define the operating parameters for each door, individually There.
Agenda  Overview  Configuring the database for basic Backup and Recovery  Backing up your database  Restore and Recovery Operations  Managing your.
ONYX Product Overview.
Ethernet Data Gateway EDG Enables Information Boundary-less Over Ethernet.
1111 Continuous Availability for Critical SharePoint Environments Arthur Cafiero Sr. Systems Engineer SharePoint User Group July 8 th, 2010.
How Smart Is Your Gateway? Lior Moyal – Director, Product Marketing AudioCodes.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Module 10 Configuring and Managing Storage Technologies.
1 Fault Tolerance in the Nonstop Cyclone System By Scott Chan Robert Jardine Presented by Phuc Nguyen.
E1 / T1 Series Product Introduction.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
1 Understanding the TCP/IP Protocol Suite Industry standard Enables enterprise networking and connectivity.
ENTERPRISE COMPUTING QUIZ By: Lean F. Torida
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Next Generation Security Solutions Next Generation Controllers January 2013.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
AppManager Product Status Update David Mount Technical Manager – UK, Ireland & Middle East David Mount Technical Manager – UK, Ireland & Middle East.
1 NexSentry Command Center Powerful security management system with UNIX server and Windows NT 4 Operator Stations.
Distributed Data Mining System in Java Group Member D 王春笙 D 林俊甫 D 王慧芬.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Topics of presentation
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Fault Tolerant Configuration
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Hardware Training Product: ITMS2.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Chapter2 Networking Fundamentals
High Availability in DB2 Nishant Sinha
Stretching A Wolfpack Cluster Of Servers For Disaster Tolerance Dick Wilkins Program Manager Hewlett-Packard Co. Redmond, WA
The CoBFIT Toolkit PODC-2007, Portland, Oregon, USA August 14, 2007 HariGovind Ramasamy IBM Zurich Research Laboratory Mouna Seri and William H. Sanders.
NERC Lessons Learned Summary LLs Published in September 2015.
Introduction to Active Directory
1 Objectives Discuss the basics of Dynamic Host Configuration Protocol (DHCP) Describe the components and processes of DHCP Install DHCP in a Windows Server.
Secure Transmission over public networks. ThruLink – Features and benefits Fully encrypted at all times – AES, Camillia and Blowfish options Extremely.
1 Chapter Overview Using Standby Servers Using Failover Clustering.
PYRESCOM - Mas des Tilleuls Canohès -FRANCE Tél. : +33 (0)4. 68
emerald™ New Product Announcement November 2012.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Fermilab Cal Tech Lambda Station High-Performance Network Research PI Meeting BNL Phil DeMar September 29, 2005.
Network Infrastructure
Network Load Balancing
Cluster Communications
CIS 409 RANK Lessons in Excellence-- cis409rank.com.
An Introduction to Computer Networking
STP Enhancements for z10 EC, z10 BC, z9 EC, z9 BC
Setting up PostgreSQL for Production in AWS
Presentation transcript:

Next Generation Security Solutions Fault Tolerant powered by Hydra January 2013

Introducing: The Next Logical Evolution of Systems…

Virtual Point Architecture

Fault Tolerance Architecture Is a means of System Recovery utilizing “Automated System Reconfiguration” provided through Dynamic Network Architecture (DNA) with little or no impact on system security or operations upon a failure within any of the components within the system.

PCSC - Hydra Protocol Utilizes “Authentication” Protocol Peer to Peer Communication Protocol Dynamic Communication Architecture Communication Manager for FTCs, DDMs and SDMs Ability to Quickly Detect “communication failure” Automatically “Re-Route” DDM/SDM to “Alternate” FTCs Host to FTC Data Synchronization FTC to FTC Data Synchronization FTC to DDM/SDM System Parameter Synchronization Automated Firmware Validation and Updates for FTC, DDM and SDM

FTC 1 LAN Door Lock Card Reader NXG System Dual Door Module 1 Door Status REX LAN Door Lock DDM’s 2 through “n” Door Status REX FTC 2 Hydra Protocol

Hydra Protocol — FTC Auto Recover NXG System FTC 1 LAN Door Lock Card Reader DDM 1 Door Status REX LAN Door Lock DDMs 2 through “n” Door Status REX FTC 2

Hydra System Recovery After Failure FTC 1 LAN Door Lock Card Reader NXG System DDM 1 Door Status REX LAN Door Lock DDM 2 through “n” Door Status REX FTC 2

Hydra Recovery and Synchronization FTC 1 LAN Door Lock Card Reader NXG System DDM 1 Door Status REX LAN Door Lock DDM 2 through “n” Door Status REX FTC 2

Hydra FTC2 Updated - System Operational FTC 1 LAN Door Lock Card Reader NXG System DDM 1 Door Status REX LAN Door Lock DDM 2 through “n” Door Status REX FTC 2

FTC Status Display  Optional - VFD (Vacuum Fluorescent Display)  FTC Number at top  FTC-DDM-SDM # – Scrolling Status  Status (where X = Controller Number) +X+Requesting Assignment X?Not in Initial Assignment List -X-Deleted from FTC monitoring List X+Added to FTC monitoring list XController Communication Status Okay. No Response from Nodes

New FTC Features All the Features of IQ series 12 AG per Cardholder Stale Cards Escort Required by Reader 12 or 24 Digit Card Numbers Card Activation & Deactivation by Date and Time (hh:mm) Global I/O within Clique Global Entry/Exit within Clique HSPD Compliant (PIV, TWIC, etc.)

Rack Mount FTCs

Typical FTC Installation WAN Work Station Rack Mount FTCs FTC Host System DDM/SDM

Enterprise Topology Primary DDM and FTCs at Remote Site Backup FTCs at Remote Site Management Center WAN

Questions?