Date post: | 12-Jan-2016 |
Category: |
Documents |
Upload: | vernon-reynolds |
View: | 218 times |
Download: | 0 times |
Keogh and Associates Copyright 2003
Sellers, Resellers,Integrators, Consultants
What Are Their Roles??
PresenterColin Keogh
Keogh and Associates
Keogh and Associates Copyright 2003
Physical Security
Physical security is about protecting tangibleassets from harm. These assets can include(but are not limited to) people, buildings,
vehicles, documents, food and drink, pharmaceuticals, consumer or industrial
products, art, museum artifacts, and money.The harm to be avoided can include theft,
destruction, vandalism, sabotage,espionage, or tampering.
Keogh and Associates Copyright 2003
RESELLER INTEGRATOR
CONSULTANT
SECURITY SYSTEM
MANUFACTURER
Keogh and Associates Copyright 2003
Consultants
Consultants can help with your complete security plan and implementaion. They can
also recommend integrators and resellers that they have worked with in the past.
Their knowledge of the industry will save you thousands of dollars and hundreds of
hours.
Keogh and Associates Copyright 2003
Vendors
The biometric vendors manufacture the hardware or write the software. They
do not supply complete integrated solutions. They work with resellers
and integrators as their interface to the end user.
Keogh and Associates Copyright 2003
Integrators
Integrators work closely with leading biometric technology vendors and
independently keep abreast of the latest developments in the biometrics sector, they
can provide solutions specific to each customer's security requirements. They are
independent of the manufacturer so they can let the need drive the solution.
Keogh and Associates Copyright 2003
Resellers
Resellers are retail partners for a manufacturer. They specialize in that
manufacturer’s products and usually carry solution based software for the
manufacturer’s hardware. Resellers let the hardware drive the solution. Give them your specifications and let them respond
with their solution.
Keogh and Associates Copyright 2003
Som
ethi
ng Y
ou H
ave Som
ething Your G
iven
Something you know
SecurityTriangle
Keogh and Associates Copyright 2003
There is no single biometric that fits all and each deployment
situation must be viewed on its own merits; this way, the requirements shape the biometric solution, the biometric solution does not shape
the requirements.
Keogh and Associates Copyright 2003
The RFP
• Describe what is needed not how to achieve it
• Allow vendors to tender solutions
• Make the vendor prove that their integrated product meets your requirements
• Develop an evaluation model to compare the different solutions
Keogh and Associates Copyright 2003
People
Property
Information Technology
75%
20%5%
Security Threats
Keogh and Associates Copyright 2003
Risk Assessment
Policies, Procedures, Standards
Training Education, Best Practices, Info Sharing
Bio
metr
ic
Inte
gra
tion
Pers
on
nel
Secu
rity
Ph
ysic
al P
lan
t S
ecu
rity
Soft
ware
an
dm
idd
lew
are
Access C
on
trol
Secu
rity
Syste
ms
Policy Review / Assurance / Tests / Audit / Certification
Physical Security
Keogh and Associates Copyright 2003
Security Components
Security Policy
Security Awareness
Security Organization
Physical Security
Personnel Security
Threat Assessment
IT Security Incident Analysis
Security Training
Keogh and Associates Copyright 2003
Top Security Mistakes• Security threats and risks are not analyzed
prior to selection of security technology and design
• Corporations fail to deal with the awareness and operational aspects of security
• Lack of robust security policy definition or non-adherence to security policies
• Absence of non-periodic security audits • Lackadaisical implementation of physical
security
Keogh and Associates Copyright 2003
Security Mistakes By Management
• Assigning untrained people to maintain security
• Failing to understand the relationship of physical security to the business problem
• Failing to deal with the operational aspects of security
• Authorizing reactive, short-term fixes leading to problems re-emerging
Keogh and Associates Copyright 2003
Keogh and Associates Copyright 2003
Keogh and Associates Copyright 2003
Expenditure Areas Increased Stayed the Same Decreased % % &
Internal security personnel expenditures 32 52 11
Internal security operations expenditures 40 50 7
Security consulting expenditures 23 43 27
Contract guard expenditures 32 37 22
General personnel screening expenditures 34 49 12
Access control expenditures 55 31 8
Anticipated Security Expenditures for 2003-2004
Keogh and Associates Copyright 2003
Keogh and Associates Copyright 2003
Keogh and Associates Copyright 2003
PROTECTION
DETECTION
REACTION