interoperability of diverse security systems – a framework approach september 2008 steve lucas –...

26
“Interoperability of Diverse Security Systems – a Framework Approach” September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application Engineer © 2008 Tridium, Inc.

Upload: aidan-dearborn

Post on 29-Mar-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

“Interoperability of Diverse Security Systems – a

Framework Approach”

September 2008

Steve Lucas – Security Business ManagerScott Muench – Senior Application

Engineer

© 2008 Tridium, Inc.

Page 2: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

2

Agenda• What is a Framework?• Why Utilize a Framework? • Industry Trends• Emerging Standards• Framework Concepts• Example Solutions• Summary of Benefits• Q & A

Page 3: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

3

What is a Framework?• From Wikipedia

– Framework, a basic conceptual structure used to solve or address complex issues.

– Software Framework, a re-usable design for a software system (or subsystem). A software framework may include support programs, code libraries, a scripting language, or other software to help develop and glue together the different components of a software project.

Page 4: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

4

Why Use a Framework?• Integration only makes sense if it adds value• All stakeholders must agree

– CFO, COO, CIO, Facilities Director, Security and Safety Director, Energy Manager

• Test the business model then design a technology architecture

• Think about usage scenarios and general information transfer required to meet the needs of the tenant and stakeholders

• Model the interactions between systems• Develop an Architecture to represent the physical world • “Think, Model, Architect”

Page 5: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

5

Industry Trends• Closed Proprietary, OEM Driven Industry

– Similar to the state of the BAS industry in early 90s

• Industry Push to Open Systems– IP movement results in many like devices that need to

communicate– No open standards…Wiegand reader communication

protocol is the one exception– Emergence of many standards organizations

• Increasing Role of IT Departments / Systems– Global permissions through corporate IT security policy– Convergence of physical and logical security– Network utilization issues associated with IP video

Page 6: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

6

Industry Trends (Cont)• Devices Moving to IP Network

– Recent migration from serial based communications to IP– Network topology flattening, systems becoming more

distributed– POE solutions becoming reality

• Web Based Solutions Becoming More Accepted– No PC required, standard web browser access – Remote access pros and cons– Flattening of architecture

• Facilities Seeking Integration with Rest of Building– Access control integrated with HVAC for energy

management– Common user experience for all building systems

Page 7: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

7

Emerging Standards• Security Industry Association (SIA)

– Open Systems Integration and Performance Standards (OSIPS)

– Access Point Controller– Access Control Roles– Digital Video Standards

• ASHRAE BACnet– Access Door Object Type– Access Point Object

• OASIS oBIX– Common Alerting Protocol– Common Biometric Format– Directory Services Markup Language

Page 8: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

8

Fire

SecurityEnergy Lighting

And More

Maintenance

FacilityManagement

CFO

HVAC

MODBUS

LEGACY

XML SQL

HTTP HTML

WAP

ODBC SNMP

JDBC FTP

SMTP

Open SystemOpen SystemFrameworkFramework

SystemsEnterprise

Not One Protocol Will DominateNot One Protocol Will Dominate

Page 9: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

9

Traditional Security • Isolated Systems each

with dedicated workstations

Card Access Video Intrusion

Page 10: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

10

Current Security • Diverse systems, many

different connections• Complexity creates

barriers to true interoperability

Card Access Video Intrusion

Page 11: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

11

Normalized Security• Diverse systems

normalized to common object model

• Interaction between security systems and unified workstation

Card Access Video Intrusion

Page 12: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

12

Intelligent Building• Interaction between

security systems and other building systems

• Unified user experience

Card Access Video Intrusion HVAC Lighting

Page 13: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

13

Framework Example

Unoccupied building, Saturday night

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

Page 14: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

14

Framework Example

Scott swipes card at main entrance, works on 4th floor South

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

Page 15: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

15

Framework Example

Video system needs to verify and record Scott’s entrance

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

Page 16: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

16

Framework Example

Alarm system armed, need to disarm 4th floor intrusion zone

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

“Disarm Intrusion Zone 4”

LEGACY

Page 17: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

17

Framework Example

Allow access to 4th floor

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

“Disarm Intrusion Zone 4”

“Floor 3 Enable”XML

LEGACY

Page 18: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

18

Framework Example

It is hot in Scott’s office, turn on AC

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

“Disarm Intrusion Zone 4”

“Floor 3 Enable”XML

“Zone 4 Occupied”

LEGACY

Page 19: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

19

Framework Example

Scott needs light on 4th floor hallway and office

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

“Disarm Intrusion Zone 4”

“Floor 3 Enable”XML

“Zone 4 Occupied”

“Circuit 1, 2 ON”

MODBUS® LEGACY

Page 20: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

20

Framework Example

Lights and AC for Scott used 50 kWH

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

“Disarm Intrusion Zone 4”

“Floor 3 Enable”XML

“Zone 4 Occupied”

“Circuit 1, 2 ON”

MODBUS®

“Totalize light and HVAC for Zone 4”

LEGACY

Page 21: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

21

Framework Example

Invoice Scott for $150 of after hours energy usage

Card Access

Video

Intrusion Elevator HVAC Lighting

Energy

Tenant Billing

System Interaction:

“Access Granted, Zone 4”

“Camera Preset 1,Initiate Recording”

HTTP

“Disarm Intrusion Zone 4”

LEGACY

“Floor 3 Enable”XML

“Zone 4 Occupied”

“Circuit 1, 2 ON”

MODBUS®

“Totalize light and HVAC for Zone 4”

“Generate / email Invoice for Sat”

SMTP

Page 22: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

22

Traditional Architecture

Central ServerFull client workstationsIsolated Systems

Access

Control

Host Based ServerClient Workstation

EnergyHVAC

LightingElevator

Control

Video

Local Area Network

Intrusion

Page 23: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

23

Framework Architecture

Network topology is flatteningSystems becoming more distributedIntegrations through IP open protocols

Web Browser Tenant BillingEmbedded Controller

Energy

Lighting

HVAC

Elevator

Control

Video IntrusionAccess

Control

Local Area Network

Page 24: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

24

Think about Advantages from a Business Perspective• Multi-tenant Office Building• Marketed as Class A, High tech, Energy efficient,

“Green”, Comfortable and Safe• Systems being installed:

– Card Access/Elevator Access– HVAC – Lighting – Energy Monitoring– Business Enterprise

• HVAC and Lights from 7am-7pm M-F• After hours usage billed extra• What degree of systems integration makes sense?• Where can I derive value?

Page 25: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

25

Benefits of a Framework Approach• Open Architecture

– Maximum freedom of choice for end users– Competitive marketplace– Ease of systems integration / interoperability– Reduced installation / upgrade costs– Vendor / protocol neutral platform

• Niagara Framework– Solutions focused, open framework architecture– Capability to support many different communication

protocols – legacy and open standards– Integrated application development tools to customize

solutions– Scalable, embedded solution with built in internet standards

Page 26: Interoperability of Diverse Security Systems – a Framework Approach September 2008 Steve Lucas – Security Business Manager Scott Muench – Senior Application

26

Q & A• We would like your feedback on today’s TridiumTALK• If you have any further questions, comments or topic

suggestions, please email them to [email protected]

• Exhibiting at ASIS – Booth # 4905 – stop by and see us!

Steve Lucas Scott MuenchRick Weisensale