Professional Documents
Culture Documents
syslogNG daemon instead of an actual There are a number of solutions that can be tied
printer, you have to deal with things not
commonly associated with syslogs, such as together, such as RFID, HVAC, burglar/fire alarm
page numbers, hash marks and dashes
everywhere. Typically these issues can be systems, and timesheets, as well as vertical-specific
overcome with mature, enterprise security
monitoring solutions. Once the logs are solutions such as SCADA and fraud detection.
captured and normalized, the data itself
must be valuable.
Again, modern systems provide
valuable data such as time, user ID, loca- server’s OS and application logs on the as well as vertical-specific solutions such
tion, number of attempts, etc. As covered targeted system, an enterprise security as SCADA and fraud detection. Not all
in the CAC example with the DoD, this management (ESM) system correlating integration makes sense for every organi-
ID can be further associated with logical that data can trigger an event that zation, but for almost every organization,
access. With older physical security prompts the video camera to take a snap- convergence at some level can aid in risk
systems, the value of the logs is unclear at shot. The security analyst is alerted to the reduction and increase in operational effi-
best. However, as industry analysts have event, and with a mouse click on their ciencies.
been pointing out, because of increased ESM, they can display the photo. Since Convergence is achieved through
efficiencies and improved security, con- the video surveillance is fed to the physi- endurance; it’s not a sprint. Executive-
vergence is here, and if the current phys- cal security team’s CCTV system, that level sponsorship is a must, and even
ical systems can’t co-exist, they’ll ulti- team can also receive an ESM alert small victories will ultimately ensure that
mately require an upgrade. detailing which camera feed to observe. convergence is successful. For manage-
Another interesting video camera ment, this success will increase opera-
More Synergies example comes from a retailer, which tional efficiencies and mitigate risk, while
Convergence doesn’t stop and start with records countless hours of time-stamped adding to stronger ROI and enhanced
monitoring physical security access video. Since it is nearly impossible to go ROSI. Operationally, both physical and
controls. There are a number of other over every second of video, its main logical security teams will benefit from
areas where organizations have taken purpose is to act as a deterrent. However, broader event collection, incident detec-
advantage of synergies. One organiza- it can also assist in supporting investiga- tion, analysis, reporting, tracking and
tion that I worked with integrated video tions. This organization had cameras remediation. The integration will also
surveillance with traditional logical secu- positioned above point-of-sale (POS) facilitate tighter controls over regulatory
rity products. They have a number of registers. The transaction logs were sent compliance, policy and enhance security
systems that allow remote user access or over the network to an ESM for process- awareness. The net effect: convergence
administration. If somebody has to log ing. If suspicious register activity is will positively amplify your organization’s
on and make changes, they must do from detected within the ESM, the security security posture.
a local keyboard and monitor attached to team will receive an alert. The time-
the server. stamped video surveillance can be used Brian T. Contos, CISSP, is the Chief
This is somewhat common for to substantiate the alert and the IT secu- Security Officer of ArcSight.
mission-critical applications or devices rity team can work with the physical
containing highly sensitive data. These security team to review video.
systems are under 24-hour surveillance These examples only touch a few
by network-enabled cameras that are technologies and synergies that can be
capable of not only video recording, but leveraged with convergence. There
also taking still photographs that can be are a number of solutions that can be
automatically stored on a web server. tied together, such as RFID, HVAC, bur-
Based on suspicious activity derived from glar/fire alarm systems, and timesheets,