Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their...

Preview:

Citation preview

Keogh and Associates Copyright 2003

Sellers, Resellers,Integrators, Consultants

What Are Their Roles??

PresenterColin Keogh

Keogh and Associates

Keogh and Associates Copyright 2003

Physical Security

Physical security is about protecting tangibleassets from harm. These assets can include(but are not limited to) people, buildings,

vehicles, documents, food and drink, pharmaceuticals, consumer or industrial

products, art, museum artifacts, and money.The harm to be avoided can include theft,

destruction, vandalism, sabotage,espionage, or tampering.

Keogh and Associates Copyright 2003

RESELLER INTEGRATOR

CONSULTANT

SECURITY SYSTEM

MANUFACTURER

Keogh and Associates Copyright 2003

Consultants

Consultants can help with your complete security plan and implementaion. They can

also recommend integrators and resellers that they have worked with in the past.

Their knowledge of the industry will save you thousands of dollars and hundreds of

hours.

Keogh and Associates Copyright 2003

Vendors

The biometric vendors manufacture the hardware or write the software. They

do not supply complete integrated solutions. They work with resellers

and integrators as their interface to the end user.

Keogh and Associates Copyright 2003

Integrators

Integrators work closely with leading biometric technology vendors and

independently keep abreast of the latest developments in the biometrics sector, they

can provide solutions specific to each customer's security requirements. They are

independent of the manufacturer so they can let the need drive the solution.

Keogh and Associates Copyright 2003

Resellers

Resellers are retail partners for a manufacturer. They specialize in that

manufacturer’s products and usually carry solution based software for the

manufacturer’s hardware. Resellers let the hardware drive the solution. Give them your specifications and let them respond

with their solution.

Keogh and Associates Copyright 2003

Som

ethi

ng Y

ou H

ave Som

ething Your G

iven

Something you know

SecurityTriangle

Keogh and Associates Copyright 2003

There is no single biometric that fits all and each deployment

situation must be viewed on its own merits; this way, the requirements shape the biometric solution, the biometric solution does not shape

the requirements.

Keogh and Associates Copyright 2003

The RFP

• Describe what is needed not how to achieve it

• Allow vendors to tender solutions

• Make the vendor prove that their integrated product meets your requirements

• Develop an evaluation model to compare the different solutions

Keogh and Associates Copyright 2003

People

Property

Information Technology

75%

20%5%

Security Threats

Keogh and Associates Copyright 2003

Risk Assessment

Policies, Procedures, Standards

Training Education, Best Practices, Info Sharing

Bio

metr

ic

Inte

gra

tion

Pers

on

nel

Secu

rity

Ph

ysic

al P

lan

t S

ecu

rity

Soft

ware

an

dm

idd

lew

are

Access C

on

trol

Secu

rity

Syste

ms

Policy Review / Assurance / Tests / Audit / Certification

Physical Security

Keogh and Associates Copyright 2003

Security Components

Security Policy

Security Awareness

Security Organization

Physical Security

Personnel Security

Threat Assessment

IT Security Incident Analysis

Security Training

Keogh and Associates Copyright 2003

Top Security Mistakes• Security threats and risks are not analyzed

prior to selection of security technology and design

• Corporations fail to deal with the awareness and operational aspects of security

• Lack of robust security policy definition or non-adherence to security policies

• Absence of non-periodic security audits • Lackadaisical implementation of physical

security

Keogh and Associates Copyright 2003

Security Mistakes By Management

• Assigning untrained people to maintain security

• Failing to understand the relationship of physical security to the business problem

• Failing to deal with the operational aspects of security

• Authorizing reactive, short-term fixes leading to problems re-emerging

Keogh and Associates Copyright 2003

Keogh and Associates Copyright 2003

Keogh and Associates Copyright 2003

Expenditure Areas Increased Stayed the Same Decreased % % &

Internal security personnel expenditures 32 52 11

Internal security operations expenditures 40 50 7

Security consulting expenditures 23 43 27

Contract guard expenditures 32 37 22

General personnel screening expenditures 34 49 12

Access control expenditures 55 31 8

Anticipated Security Expenditures for 2003-2004

Keogh and Associates Copyright 2003

Keogh and Associates Copyright 2003

Keogh and Associates Copyright 2003

PROTECTION

DETECTION

REACTION