Title: Security Management Press Conference, April 14th 2003
1Security Management Press Conference, April 14th
2003
- Russ Artzt, Executive Vice President, Computer
Associates International, Inc. - Joe Grillo, President and CEO, ASSA ABLOY
Identification Technology Group (ITG) -- Parent
company to HID Corporation - Alex Mandl, CEO, Gemplus
- Don Lyman, Vice President, Software House, a
member of Tyco Fire and Security - Robert Rodriguez, Special Agent, United States
Secret Service, Electronic Crimes Task Force - Nazzareno E. Paciotti, President, Pinkerton
Consulting Investigations
2Security Management For The Enterprise
3Challenges
- Security remains a board-level concern
- Lack of integrated security management
- Creates vulnerabilities
- Results in high-operating costs
- Limits organizational collaboration
Corporate Risk Exposure Grounds For Liability
4The Open Security Exchange
- Cross-industry, open forum delivering
- Interoperability specifications
- Best practices for security management
- Goals
- Unify disparate security technologies
- Optimize security and operational efficiencies
- Respect existing operational requirements
5First Deliverables Physical and IT Security
Management
- Specifications now available for
- End-to-end audit and forensics capabilities
- Single view
- Powerful authentication
- One common credential
- Centralized provisioning
- One point of control
- from gates to gateways
6First Deliverables Physical and IT Security
Management
- Enhanced security
- Concerted response
- Superior detection
- Consistent policy enforcement
- Reduced costs
- Simplified implementation
- Streamlined security operations
- Enhanced automation
Less timeless risk
7HID Corporation
- With over 150 million credentials shipped, HID is
the worlds largest manufacturer of readers and
cards used for physical access control. - Proximity
- iCLASSTM 13.56 MHz read/write contactless smart
card technology - Multi-technology credentials
- Provide users the ability to leverage
investments in existing systems. - Enable seamless, cost-effective upgrades to
advanced technologies and new applications. - Allow users to carry a single credential for
multiple applications. - Increase security - add a photo ID or
anti-counterfeiting element! -
8Gemplus
- Adding intelligence to credentials
- Enhanced security
- Enable business applications
- Why smart cards?
- Two-Factor Authentication
- Protect sensitive ID data
- Combine Physical and IT access control
- Flexible able to host multiple applications
- Gemplus is the 1 producer of smart cards
9Software House A Tyco Fire Security Company
- Leading provider of integrated security solutions
since 1978 - Nearly 10,000 systems installed in 50 countries
in 9 different languages - Industry acclaimed API for seamless integration
with business applications - Total event and credential management system
- Physical access control
- Critical life safety and area management
- Complete Network Compatibility
- DHCP compatible field hardware
- TCP/IP communications
- Dual network communications
10Computer Associates
27 years of IT expertise, 99 of the Global 1000
use CA technology
- Unique expertise in IT infrastructure management
- Platform independent
- Leadership innovation
- Security Command Center
- Provide a complete view of the enterprise
- Increase security situational awareness
- Eliminate information overflow
- Maximize organizational efficiency
11Americas Security Partnership
- Federal Bureau of Investigation
- www.fbi.gov
- United States Secret Service
- www.secretservice.gov
- Electronic Crimes Task Force
- www.ectaskforce.com
- Infragard
- www.infragard.com
12Computer AssociatesPinkerton Consulting
Investigations
13HTTP//www.ci-pinkerton.com
- The Global Leader in Security Consulting,
Investigations and Business Risk Services. - Established in 1850.
- Comprehensive Information Technology Services
including Computer Forensics, Network Security
and Brand Protection. - Division of Securitas AB -Worlds largest
security firm Operating in 30 Countries, 6.2
billion in revenue, 210,000 employees.
14The Alliance
- Unique combined expertise
- Policies Technologies
- Physical IT Security
- Strategic partnership
- Joint Engagement
- Development Collaboration
- Complementary Solutions
15Questions