1 / 15

Security Management Press Conference, April 14 th 2003

Security Management Press Conference, April 14 th 2003. Russ Artzt , Executive Vice President, Computer Associates International, Inc. Joe Grillo , President and CEO, ASSA ABLOY Identification Technology Group (ITG) -- Parent company to HID Corporation Alex Mandl , CEO, Gemplus

kelly-rojas
Download Presentation

Security Management Press Conference, April 14 th 2003

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Management Press Conference, April 14th 2003 • Russ Artzt, Executive Vice President, Computer Associates International, Inc. • Joe Grillo, President and CEO, ASSA ABLOY Identification Technology Group (ITG) -- Parent company to HID Corporation • Alex Mandl, CEO, Gemplus • Don Lyman, Vice President, Software House, a member of Tyco Fire and Security • Robert Rodriguez, Special Agent, United States Secret Service, Electronic Crimes Task Force • Nazzareno E. Paciotti, President, Pinkerton Consulting & Investigations

  2. Security Management For The Enterprise

  3. Challenges • Security remains a board-level concern • Lack of integrated security management • Creates vulnerabilities • Results in high-operating costs • Limits organizational collaboration Corporate Risk Exposure & Grounds For Liability

  4. The Open Security Exchange™ • Cross-industry, open forum delivering: • Interoperability specifications • Best practices for security management • Goals • Unify disparate security technologies • Optimize security and operational efficiencies • Respect existing operational requirements

  5. First Deliverables: Physical and IT Security Management • Specifications now available for… • End-to-end audit and forensics capabilities • Single view • Powerful authentication • One common credential • Centralized provisioning • One point of control • …from gates to gateways

  6. First Deliverables: Physical and IT Security Management • Enhanced security • Concerted response • Superior detection • Consistent policy enforcement • Reduced costs • Simplified implementation • Streamlined security operations • Enhanced automation Less time…less risk

  7. HID Corporation • With over 150 million credentials shipped, HID is the world’s largest manufacturer of readers and cards used for physical access control. • Proximity • iCLASSTM 13.56 MHz read/write contactless smart card technology • Multi-technology credentials: • Provide users the ability to leverage investments in existing systems. • Enable seamless, cost-effective upgrades to advanced technologies and new applications. • Allow users to carry a single credential for multiple applications. • Increase security - add a photo ID or anti-counterfeiting element!

  8. Gemplus • Adding intelligence to credentials • Enhanced security • Enable business applications • Why smart cards? • Two-Factor Authentication • Protect sensitive ID data • Combine Physical and IT access control • Flexible – able to host multiple applications • Gemplus is the #1 producer of smart cards

  9. Software House A Tyco Fire & Security Company • Leading provider of integrated security solutions since 1978 • Nearly 10,000 systems installed in 50 countries in 9 different languages • Industry acclaimed API for seamless integration with business applications • Total event and credential management system • Physical access control • Critical life safety and area management • Complete Network Compatibility • DHCP compatible field hardware • TCP/IP communications • Dual network communications

  10. Computer Associates • Unique expertise in IT infrastructure management: • Platform independent • Leadership & innovation • Security Command Center • Provide a complete view of the enterprise • Increase security situational awareness • Eliminate information overflow • Maximize organizational efficiency 27 years of IT expertise, 99% of the Global 1000 use CA technology

  11. America’s Security Partnership Federal Bureau of Investigation www.fbi.gov United States Secret Service www.secretservice.gov Electronic Crimes Task Force www.ectaskforce.com Infragard www.infragard.com

  12. Computer AssociatesPinkerton Consulting & Investigations

  13. HTTP://www.ci-pinkerton.com • The Global Leader in Security Consulting, Investigations and Business Risk Services. • Established in 1850. • Comprehensive Information Technology Services including: Computer Forensics, Network Security and Brand Protection. • Division of Securitas AB -World’s largest security firm – Operating in 30 Countries, 6.2 billion in revenue, 210,000 employees.

  14. The Alliance • Unique combined expertise • Policies & Technologies • Physical & IT Security • Strategic partnership • Joint Engagement • Development Collaboration • Complementary Solutions

  15. Questions ?

More Related