Security Journal 2012 - Nedap Security Management
Transcription
Security Journal 2012 - Nedap Security Management
Security Journal Security Journal Powered by Nedap Security Management. Issue September 2012 Powered by Nedap Security Management Issue September 2012 Ending the security management drama. Ending the security management drama. The world of security solutions has been undergoing major changes in recent years. Suppliers tend to be regionally operating businesses that supply closed products and systems. Or they are large global players, who have taken over smaller competitors and their solutions. This has glutted the market with a wide variety of products and solutions of varying quality. At the same time, globalization has caused the market to call for integrated solutions. In other words, a major gap has grown between supply and demand. Editorial Team Security Journal 2012 Nedap Security Management is able to bridge this gap. Nedap offers a single solution that is the same the world over. At Nedap, we don’t buy security solutions, we make them. Every day we work on solutions that are smarter, more flexible and future-proof. We use an architecture that combines access control and video and intrusion detection on a single security controller. This approach makes it possible to implement hundreds of functionalities in one server environment. This is what we call Security Redefined. This truly integrated solution is better scalable than any other system on the market and enables our clients to effortlessly expand their security system to multiple locations. One client doing just that is ING Bank, which is currently installing AEOS access control in more than 800 local branch offices in Belgium, as well as in its headquarters. This issue of Security Journal also features an article on the use of AEOS to secure the two Ukraine football stadiums that hosted the European Football Championships. Nedap’s solutions not only contribute to a safe business environment, but also to innovative ways of managing this environment. One example of this is the use of Nedap equipment at Getronics, where Nedap Locker Management is used to support agile working. This issue will also show you that AEOS continues to evolve. We never feel like we’re done, like AEOS has reached its fullest potential. There will always be new challenges to resolve. For example, how can we reduce the complexity of a system while increasing its capabilities? How can we support the trend towards globalization? How can we ensure that the system remains user-friendly for the end user while accommodating growing functionality? If you want to know how Nedap is putting an end to complexity, read this issue of Security Journal. Enjoy! Contents Trends Think global, go hybrid. Usability: the new standard in security systems. 6 12 Case studies AEOS secures nationwide fibre-optic network. Top scorers score in Ukraine. AEOS increases security at ING’s BE branch offices. Locker Management supports Getronics’ New World of Work. 18 22 28 34 Solutions and products Nedap Security Journal AEOS Intrusion: world’s most effective intrusion solution whether stand-alone or integrated. Boost your security solution. Imprint: Nedap Security Management/Marketing & Communication Phone: +31 (0) 544 471 111 Email: info@nedap-securitymanagement.com Connecting wireless locks to AEOS: the cost efficient solution. Web: www.nedap-securitymanagement.com Nedap opens the door to key management. Reproduction is subject to permission from Nedap Security Management. Nedap, AEOS, AEOS faces, etc. are registered trademarks of Nedap N.V. Invexs 190: versatile, extreme-weather reader with keypad. Translation and editing by Word’s Worth Tekst en Vertaling, Zutphen. Hardware built to last: three-year warranty. 38 42 44 48 50 54 7 Think global, go hybrid. The security industry is feeling the impact of two major trends: globalization and ongoing technological development. Multinational enterprise, convergence of IT and physical security systems, compliance issues and legislation – all are influencing access control systems. Nedap is responding to and incorporating these trends into its products. Time for a look at today’s challenges and how AEOS is being adapted to them. Much has been written in the past ten years about convergence or unification: the merging of information (IT) security and physical security systems. Just one of the many benefits of convergence would be an improved capacity for dealing with disparate compliance regulations and national and international legislation. Although several big players have tried to develop all-encompassing systems that integrate, or bridge the gap between, IT security and physical access control systems (PACS), most large corporations still deploy the two separately. This is partly the legacy of the past. Physical security was traditionally a local, site responsibility. This left today’s large multinationals with a wide variety of PACS in different countries. Decentralized decision-making on physical security has in fact hampered attempts at unification. By Albert Dercksen, Victor Ermolaev Call for ready-made solutions. Picture: at Nedap, the technology roadmap is aimed at improving usability and scalability in combination with policy-based security governance. In today’s uncertain economy, most major enterprises are cutting costs and reorganizing to boost operational efficiency. Facility management divisions are being asked to support processes such as asset management, IT infrastructure and security. This shift is generating a strong demand for unification and policy-based systems: essential tools for gaining global control and servicing primary business processes at a fair cost. There is a great demand for Commercial Off-The-Shelf (COTS) products which can encapsulate legacy systems. A degree of customization is accepted, but developing new tailormade systems to support secondary business processes is seen as a bad business decision. Calls for unification and policy-based security governance have grown steadily louder. These appeals are now being heard from global business domains outside IT security and physical access control. Stricter compliance regulations and industry-specific laws in finance, healthcare, manufacturing, pharmaceuticals, travel, transport and energy have spread the need for the integration of multiple systems. Service Oriented Architecture. In our industry, this shift is clearly observable in today’s RFI/RFP documents, all of which call for integration of security systems in a Service Oriented Architecture (SOA) of some kind. Some global enterprises have already introduced an Enterprise Service Bus (ESB), implemented in combination with rule engines, business process modelling engines (BPM), and extensive workflow modelling. More recently, work has been done on the use of business operation platforms that incorporate a service bus but also take things further, towards ideas like the Internet of Things (IoT), the Semantic Web or Web 3.0. The common denominators in these last three movements are: enabling cross-domain service integration, improving usability, delivering true online business operations and decreasing human interventions by adding intelligence. The information industry has been dealing with calls for integration for much longer and has learned to use open standards, to hide legacy systems behind service interfaces, and to minimize service dependencies by using Loose Coupling and the principle of Separation of Concerns. The security industry could learn a great deal from this. Impact on access control. Now let us turn our attention to a core aspect of physical security, Access Control, and analyze how these trends – globalization, unification and the use of open standards – impact the architecture of access control systems. A common domain model in access control systems is that of an abstract subject that wants to gain access to an object. The subject first needs to authenticate itself (based on what it has, what it knows or what it is), after which the access control decision is evaluated based on the identity of the subject and the active policy governing access to the object. The policy typically includes business (security) rules and date/time aspects, and often uses some distinguishing characteristics of the subject, e.g. employee vs. visitor. Access control models. The access control model identifies whether a subject is authorized to access or perform a certain action on an object. In physical access control, the object is usually a physical space, e.g. a room, a parking lot or a locker. (In the system architecture, these objects are referred 8 to as resources.) Here, authentication of the subject (e.g. a person) is usually carried out using an electronic RFID card. In high-security environments, this authentication is supplemented by a PIN or biometric characteristic. Mainstream PACS usually make use of an Access Control List (ACL) model. This means the access control model is based upon a simple list of authorized subjects for different access points at specified dates/times. The ACL model is well-suited to create fine-grained permission structures, but the downside is its mushrooming complexity as the number of subjects and objects grows. Reducing complexity. A slightly more sophisticated approach, aimed at reducing complexity, is the Role Based Access Control (RBAC) model. In this structure, the complexity of assigning permissions to users is overcome by introducing a level of indirection, i.e. a role, which clusters access rights to certain objects. The subject’s role in the organization is used to evaluate its access to an object. Although the RBAC approach seems more usable, it is less suitable for fine-grained permission modelling. In many organizations, role engineering appears to be extremely difficult. Attempts to circumvent the built-in coarseness of the permission model tend to result in so-called role explosions. These make the system virtually unusable. It is worth noting, however, that ACL-based access control systems become unwieldy much sooner than RBAC-based systems when the organization grows or the number of factors affecting access rules increases. ABAC model. In information security, the drawbacks of ACL and RBAC have not gone unnoticed. This has led to the introduction of an Attribute Based Access Control (ABAC) model. In this model, a subject’s access rights depend on the attributes describing this subject, e.g. age, possession of a valid driver’s license, security clearance, etc. Such dependency is expressed in rules, which may be combined into policies, which, in turn, may be clustered in policy sets. A simple example of a rule would be “to enter this amusement park the subject has to be at least x cm. tall”. To express such rules, an XML-based language was developed. OASIS recently published the XACML 3.0 language standard, aimed at standardizing access control models using ABAC. ABAC offers great flexibility and fine-grainedness, but these benefits come at a price: in 9 ABAC it is easy to lose sight of the maximum permission set for a given subject. That is, it is impossible to answer a question like “Is subject A allowed to enter a chemical lab?” until subject A actually tries to enter such an object. Dilemma. ABAC is well-suited for open systems, such as libraries, car-rental offices, video stores and open Wi-Fi networks, where neither the identity of a subject, nor the state of an object or the environmental circumstances are known beforehand. However, openness is not the norm in the physical security industry. And yet some pioneers, like the Open Group, have broken with tradition. By publishing its Open Enterprise Service Architecture (O-ESA), the Open Group is trying to encourage the use of industry best practices in defining organizations’ global security models. The physical security industry clearly faces a dilemma. Should we follow in the footsteps of IT security, open up the controllers, implement open standards like XACML and become (web)service providers in the Identity and Access Governance (IAG) domain? Or should we stubbornly resist the unification of information security and physical security? Best of both worlds. At Nedap, we have decided to do both, and more. AEOS’s technology roadmap is aimed at improving usability and scalability in combination with policy-based security governance. The AEOS platform will be adapted to enable cross-domain integration in global enterprise (SOA) environments. At the same time, it will provide the best policy-based access control models, a modern service lifecycle model and state-of-the-art IPv6-based security devices. The security architecture will be based on the latest encryption technology using Secure Application Model (SAM) devices and network-based key revocation methods. The access control model proposed by Nedap is a hybrid model combining the strengths of RBAC with the flexibility of ABAC. One simple example can illustrate the power of this approach compared to a purely ACL, RBAC or ABAC-based model. Consider a multisite company with employees who regularly travel between company sites. Every site has its own PACS, but both identity and access rights are enforced automatically by global regulations. In an ACL-based system, each individual object would have to be assigned a list of authorized employees. Besides the 10 obvious fact that this approach will fail in any large-scale company, there are other problems, such as a high risk of malicious assignments, made possible by the Segregation of Duties. For example, a dishonest security officer could add himself to the list at any resource. So it might seem better to use the RBAC model, based on the employee’s work role in the organization. RBAC addresses the Segregation of Duties problem by only allowing assignation of either subjects to roles or permissions to roles. However the risk of role explosion becomes apparent as soon as highly fluid factors are included in the role definitions. Using the ABAC model would prevent role explosion, as ABAC makes it possible to combine any number of fluid factors by introducing appropriate policies at resources. However, the ABAC drawback mentioned earlier still stands: the model effectively hides a subject’s actual permissions. Hybrid. AEOS uses both RBAC and ABAC, benefiting from the advantages of both models. RBAC provides the necessary level of coherence and transparency for overall security policies, while ABAC adds flexibility and minimizes the risk of role explosion. In this hybrid model, an employee’s role describes optional permissions necessary for them to fulfil their duties, while rules and attributes identify for each individual whether a permission becomes unconditional or must be withdrawn. A simple example would be the pair: Role-Manager and Attribute-Location. The intelligence in this approach lies in the fact that the location list can be used to evaluate the PACS to which identity information needs to be distributed. This improves performance and scalability. At the same time, knowledge about the PACS configuration is hidden from the users, so data entry interfaces can be based on business process language (role, location). This improves usability. And finally, these meta-access rights can be mapped automatically to any PACS that has some form of import module. This supports the encapsulation of legacy PACS into the policydriven security architecture. In short, Nedap is ready to deal with the challenges posed by globalization, unification and the trend towards open systems. With our hybrid model and the technological developments planned for AEOS, we can ensure that we will continue to deliver a future-proof product to our customers. 13 Usability: the new standard in security systems. The revolution that took place several years ago on the consumer market is breaking into the field of security management. Intuitive user interfaces with attractive apps and widgets are the standard of the future, usability is the latest buzzword. Nedap has put these into practice with its new AEOS 3.0 security management system. By Mischa Hoyink Picture: thanks to AEOS receptionists can smile and mean it. Receptionists who use smartphones in their spare time, swiping from app to app on touchscreens with great ease, can hardly be expected to use a 1990s-style security management system at work. Their motivation to learn how a system works and to use it consistently depends on whether that system meets them halfway. Put differently, a system that demands far too much knowledge will not be accepted by the ‘smartphone generation.’ Achieving usability is a challenge when dealing with a system that integrates a vast number of functionalities like AEOS does. Nedap had to work out how all those functionalities could remain accessible for end users while drastically simplifying the graphical user interface. All the while, the architecture had to remain open, scalable and robust. Not to mention future-proof. In AEOS 3.0, all these characteristics were brought together into one integrated system. Radical simplification. Defining personas. “We visited places where receptionists worked and counted how many screens they had to use in our old AEOS system,” says Nedap sales director Arjan Bouter. “We came to a staggering total of 248 screens. Who was watching over them to make sure they were all being used correctly?” Nedap’s solution in AEOS 3.0, Bouter says, was to radically cut back the number of screens. “We reduced those 248 to just 4!” Nedap pulled it off by analyzing the different types of employees who use AEOS and narrowing them down to four extremely detailed user roles, or personas. These are: the receptionist (the ‘heavy user’ in Nedap’s definition), the security guard, the security manager and the system administrator. In AEOS 3.0, each of these four personas has role-specific widgets with which to manage their daily tasks. Users see only those widgets that provide the functionalities relevant to their role. The great thing about widgets is that they can be used not only on a monitor, but also on a tablet or smartphone. This means that a security guard can take a tablet along while doing rounds, to see what needs to be done at a particular door. This simplification was a sharp turnabout from the trend towards increasing complexity that had dominated security management systems for a long time. Developers were primarily focused on expanding their system’s performance. The race was on to collect more and more data for security purposes and for the management of processes. It was very “impressive”, says Arjan Bouter, “but what was forgotten was the fact that people’s ability to absorb all that information did not keep pace with the system’s capacity. Because of non user-oriented interfaces, end users like reception staff, guards and even managers ultimately became overwhelmed. Some processes became so slow and inefficient that users sometimes just skipped them, which obviously compromises security.” Interaction Design. The key was to redesign AEOS in such a way that users would feel no need to skip steps. So Nedap knew the challenge it faced, and decided to tackle it from the discipline of Interaction Design. Arjan Bouter: “In creating AEOS 3.0, we focussed entirely on the graphical user interface, the crucial point where the user interacts with the system.” Interaction designers are concerned with the function, behaviour and final design of products and systems. They cooperate closely with application engineers to link what the user wants to the technical capabilities of the system. Receptionists had to deal with 248 screens in their daily work. We have reduced this to 4. 14 Usability reviews. Interaction designers make frequent use of test users to steer their development. During the redesign of AEOS 3.0, test users were asked to try the new interface while their reactions to the system were monitored. Users were filmed and asked to talk about what they were doing. The designers monitored not only the number of mouse clicks needed to perform a particular task, but also the emotions the user experienced while interacting with the application. This allowed them to analyze when users made mistakes or got stuck. This feedback made it possible to fine-tune the interface and to make small but important changes to everything users see, hear and feel. The tweaking process at the heart of Interaction Design resulted in a system so intuitive and user-friendly that users can start using AEOS 3.0 with hardly any instruction. As users of previous versions of AEOS know, this is a vast change from what it used to be. According to Bouter, turning to Interaction Design was a good decision: “It was worth it. Even though we are not the only ones in the industry doing this, we are certainly a pioneer in the field. For the time being, we are way ahead of the competition. It is going to be a while before anyone is going to catch up to us.” Usability = security. The advantages of a usability-based system are obvious. Bouter explains that a system that can be learned as easily as AEOS 3.0 reduces the need for training, saving an organization time and implementation costs. Work itself gets done more efficiently when employees are using such an intuitive system, which in turn means the organization can provide service with a higher degree of professionalism. Most importantly, “usability ultimately reduces mistakes and increases security”, says Bouter. “If you like working with a system, you won’t be tempted to skip procedures that are too complicated or tasks that take too long. And an interface that helps prevent human error contributes to a higher degree of security in your organization.” Picture: AEOS 3.0 has an attractive, intuitively usable interface. “Usability ultimately reduces mistakes and increases security.” Take AEOS wherever you want. AEOS gives you instant access to various functionality through widgets. This makes it easier to start using AEOS, and much easier to use AEOS on the go, because the widgets also work on a tablet or smartphone. So a security guard can take a tablet along on his rounds to see which door he has to open, or whether a visitor has arrived. Widgets can be put on smartphones or other portable devices without significant modifications. They’re ready for use, wherever you go. AEOS secures nationwide fibre-optic network. Back in 2005, private investment company Reggeborgh and KPN, the Netherlands’ largest network provider, joined forces to start building a nationwide fibre-optic network. Reggefiber, as the joint venture was called, built new headquarters in Rijssen, which it chose to secure with Nedap AEOS. Since then, Reggefiber has built almost 1,000 Points of Presence (POPs) throughout the Netherlands, a number set to grow to 4,000 over the next decade. All these optical fibre hubs are equipped with AEOS controllers, readers and the latest AEOS functionalities. By Thijs Engelbertink Picture: AEOS’s state-of-the-art security technology is used to guard tomorrow’s communication network. 19 Another requirement was that all the information gathered had to be readable and monitorable with the latest tech nologies. The special environmental conditions and the enormous scale of the project made AEOS the perfect technological match: state-of-the-art security technology used to guard tomorrow’s communication network. Another reason why AEOS was so well-suited to this project, is the fact that the system provides for future developments in terms of growth, capacity and as yet unforeseen demands. AEOS’ scalability allows Reggefiber to increase its number of POPs exponentially without having to worry about the system’s stability. Usability. Receptionist’s desk inside Reggefiber’s headquarters in Rijssen, the Netherlands. Reggefiber had specific requirements for securing its POPs. Therefore, Nedap and Niscayah, a Nedap business partner, sat down with Reggefiber to work out a special “POP Controller”, using standard AEOS elements. The made-to-measure controller now provides all currently needed functionality as well as expansion options for functionalities possibly required in future. POP Controller. The “POP Controller” assembled for Reggefiber contains standard AEOS hardware components and embedded software to manage and monitor intrusion detection, access control, additional sensors and CCTV cameras. Using standard components to build a made-to-measure system saves on development costs when compared to a bespoke system. An added advantage is that Reggefiber will not be dependent on custom-built software and special interfaces if the company decides to expand or change functionalities in the future. This reduces Total Cost of Ownership. Scalability. The Reggefiber project was challenging because of the large number of POP locations and authorizations at contractor and subcontractor level. Every location had to be equipped with a door reader, a door contact, an intrusion sensor, a humidity sensor and a heat sensor. 20 At Reggefiber’s headquarters in Rijssen, a fully-equipped control room (NOC) monitors the various POPs around the clock. This is also where direct control is taken when a system alert comes in. Such alerts are generated when someone enters a POP without authorization, or when someone tries to sabotage the security system, but also when the indoor temperature fluctuates too much, humidity exceeds set limits, or the AC malfunctions. The control room in Rijssen is also where the doors in the POPs are opened when someone identifies him or herself for maintenance or repair work. In addition, contractors and subcontractors have been issued special ID badges with specific, possibly temporary or limited, access rights to the POPs. These badges and authorizations are issued and managed from the central AEOS server in Rijssen. Because AEOS is fully web-based, issuing badges or changing authorizations can be done from any workstation. Flexible environment. The AEOS hardware is physically installed in cooperation with Niscayah. At the production site where the physical POPs are manufactured, Niscayah installs the POP controllers. As soon as the POP is placed in a new fibre-optic cable area, Niscayah connects the controllers by means of UMTS. In this way the POP and the equipment can be controlled, even when the network is not up yet. As soon as the network is available without interruption, AEOS is switched over to the new, continuous, connection. Reggefiber’s headquarters was designed to resemble a cut-away view of a fibre optic cable. Business continuity. In order to guarantee Reggefiber’s business continuity, it is essential to ensure optimal functioning of its core business, i.e. the optical fibre network and related systems. In practice this means that the power supply must be continuous and controlled, the POPs must be cooled continuously and humidity must be regulated. Reggefiber has provided advanced systems to create and maintain the perfect conditions. Any deviations or disruptions are picked up immediately by sensors connected to the AEOS components. At the NOC in Rijssen, Reggefiber employees use the AEOS Graphical Alarm Handler to monitor and deal with incoming alerts. Nedap has provided an intelligent power supply unit with UPS functionality, which provides direct power supply for sensors and locks and emergency power supply. Central monitoring of the power supply unit’s status allows staff to respond proactively. This makes the process of business continuity assurance more efficient and effective. Fibre Optics. In 2005, Reggeborgh and KPN joined forces to start building a nationwide fibre-optic network. Since then, KPN has taken a majority share in Reggefiber as a service provider. Reggefiber is responsible for the roll-out of the nationwide Dutch optic fibre infrastructure. Fibre-optic communications has great advantages over copper wire in terms of speed and data size. Optical fibre has much lower interference because the cables are not affected by external electromagnetic fields. So far, Reggefiber has installed optical fibre in 150 Dutch municipalities. This means that one-tenth of the Dutch population can already use this new means of communication, and that number keeps growing every day. Reggefiber is building POP buildings in central locations in every region. These POPs contain cables, switches, cooling systems and communication centres and function as the hub for a particular optical fibre area. This makes them the most critical element in the network. Therefore, security and monitoring of POPs is crucial to guarantee business continuity. 21 23 Top scorers score in Ukraine. Almost 70,000 spectators watched Spain win the European Football Championship – EURO 2012 – in Kiev’s Olympic Stadium. They enjoyed the match in a fun and safe setting that Nedap Security Management had helped create. Both the brand new Arena in Lviv and the renovated Kiev stadium had been equipped with Nedap’s AEOS security management system for access control and intrusion. In April 2007, UEFA’s Executive Committee chose the joint Polish-Ukrainian bid to host the 2012 European Football Championship finals. In anticipation of the event, two of the four Ukrainian stadiums to host the matches were equipped with AEOS security systems. The Olympic Stadium in Kiev was built in 1923 and needed remodelling to bring it up to UEFA’s ‘category four’ standards for stadiums hosting football finals. Such stadiums usually seat thousands of visitors and must meet strict criteria in terms of public access and egress. By Jos van Nederpelt Picture: both stadiums use the AEOS graphical alarm handler, which gives a graphical representation of the stadium. The Arena in Lviv is brand new and built to meet all of UEFA’s latest technological and functional requirements. With a capacity of 33,400 spectators, it is relatively small. But its extensive grounds and state-of-the-art facilities ensure players and spectators maximum comfort. All seats are covered. Parking is located underneath the stadium. The stadium’s facilities include VIP lounges (seating 450), restaurants, a media centre, various training centres and office space. Construction at the 9-hectare site started in November 2008 and was completed by October 2011. Security levels. Nedap’s business partner ISK Transexpo installed the necessary hardware and Nedap’s AEOS security management software at both venues. In Kiev’s Olympic Stadium, the company installed Convexs M80FC readers at the 480 access points. The Lviv Arena was equipped with the same readers at its 380 access points. In total, 528 intrusion zones were defined. Nedap Convexs Mifare readers are used at some 600 doors and entrances. Both venues also deploy AEOS’s unique ‘security levels’ functionality, enabling security managers to respond swiftly to any calamity that could have occurred at a major event like EURO 2012. In case of emergency, the system switches to a predefined emergency scenario with alternative access authorizations. This takes just seconds. Key Figures Arena Lviv. 33,400 spectators, all covered 450 VIP seats 150+ alarm system loops AEOS @ Arena Lviv 300+ Mifare Convexs readers 20+ electrical cylinders integrated into AEOS for on-line and off-line operation Rule Engine Security Level Management Graphical Alarm Handler People heading into Kiev Olympic Stadium. Security and intrusion. Like all other modern stadiums, those in Kiev and Lviv are equipped, inside and out, with a permanent closed-circuit television system that can take still shots, and with colour monitors in a control room. Security management at the stadiums use the AEOS Graphical Alarm Handler to monitor and handle alarms, and to provide the operators with clear work instructions. The Graphical Alarm Handler shows a graphical representation of buildings, the stadium layouts and alarms as well as the status of the alarms and which guard are handling them. Another very helpful tool used in both stadiums is the fully integrated “Guard Tour” that enables extensive monitoring and audit trailing of security guards. The Guard Tour allows security managers to define a sequence of card readers or alarm inputs that have to be checked within a pre-defined time span during routine tours. With the AEOS Guard Tour option, guards can be sent on their rounds of the premises while their progress is monitored from the control room. In addition, the Lviv Arena’s three-level parking garage underneath the 26 stadium was outfitted with long-range readers and wireless sensors in order to manage and secure the flow of vehicles around the stadium. Topscorer Award. AEOS is Nedap Security Management’s contribution to the smooth and safe European Championship. For this, Nedap has received the Task Force EURO 2012 Topscorer Award. This prize was awarded by Task Force EURO 2012, a EUNITE and FME-CWM initiative aimed at boosting the export of Dutch expertise in infrastructure, construction and other large-event-related fields to Poland and Ukraine. Nedap has also won the bid for installing a new security system at Poznan Airport. The Polish city of Poznan also hosted EURO 2012 matches. The airport was expanded with a new terminal. In cooperation with its Polish partner Atrem S.A., Nedap provided access control and intrusion detection for all terminals. Key Figures Kiev Olympic Stadium. 70,050 spectators (68,055 for EURO 2012) 3,546 VIP seats 150 seats for disabled spectators 1,497 media seats 366 commentators’ booths 500+ alarm system loops AEOS @ Kiev Olympic Stadium 400+ Mifare Convexs readers Authorized access to the fireproof cabinets 50+ electrical cylinders integrated into AEOS for online and off-line operation Counting Manager Rule Engine Security Level Management Graphical Alarm Handler 29 AEOS increases security at ING’s BE branch offices. Security management in banking is a discipline unlike any other. Rather than integrating all security into one centralized system, some banks choose decentralized security for their branch offices. AEOS, a leading platform in integrated security, turns out to be just as effective when deployed decentrally. ”We were already using Nedap AEOS in our headquarters, as well as various regional offices,” says Joris de Greve, Security Manager at ING Belgium. ”Then, in 2011, the security system used by our 800 branch offices in Belgium needed to be extended with access control. Because we were already aware of AEOS’s capabilities and very satisfied with its performance, it was a logical step to ask Nedap to solve our problem.” Autonomous systems. By Erica Meijer ING’s 800 branch offices in Belgium were already equipped with autonomous intrusion detection and camera surveillance. All doors and their accessories, such as locks, push buttons and door contacts, were monitored and controlled by the intrusion detection system. Doors were opened and closed using keys in security cylinders. A central alarm management system handled alarms coming in from local intrusion control systems. Key management had become a problem, according to De Greve. ”It was virtually impossible to keep track of the physical keys and who was authorized to use them. We had no central database in which authorizations could be assigned or retracted.” In addition, changing locks, replacing keys and keeping key plans up to date had become difficult. “It was time for an electronic access control system,” explains Peter Rommens, Country Manager at Nedap Belgium. “Since all peripherals were connected to the intrusion detection system, the scope of the project was clearly defined. We were looking purely at access control at one or more doors per office.” Narrowing it down. After considering a wide range of solutions, ING eventually selected two for further evaluation. One was to add access control to the existing intrusion detection systems. This was technically the least complicated option, because the basic infrastructure and necessary hardware were already ”We were already using Nedap AEOS in our headquarters, as well as various regional offices.” Keeping an eye on things. AEOS at proxy offices. A consequence of decentralization is the need for reports. “Central management wants to keep an eye on what is happening at the various branch offices,” De Greve says. ”Is security functioning properly? And are offices complying with security policy?” He believes reports “are also a valuable management tool.” For example: how many people are at work at any given time, or whether people only come in a few times a week. “This helps us to make sound decisions concerning flexible office space, for instance, and that’s an important way to reduce costs.” “The bank preferred our proposed solution, with one AP4803x per branch office, over a solution with one or more AP6003 network controllers per office but only one AEpu per ten offices,” Rommens says. “Although having one AEpu per office is costlier, availability is more sure with the AP4803x and it offers more long-term advantages. It means each office is prepared for expansion of its access control or the addition of other security functionalities.” Proxy offices roll-out. Joris de Greve, Head of Security at ING Belgium. in place. The other option was to expand the centralized AEOS system that was already up at headquarters and regional offices to include access control at the branch offices. The latter offered the major advantage of being able to connect all branch offices to one central database, while retaining the ability to delegate responsibility for authorizations to lower-level security management layers. Other benefits of this option included its system architecture, the proven stability of the system for large numbers of offices and cardholders, the system’s scalability and flexibility, the native IP controllers’ ability to communi cate peer-to-peer and bypass the server, and the system’s redundant facilities and security (failsafe, switching servers, etc.). Flexible and extra secure. The factor that clinched the deal was that AEOS allowed for decentralized management of separate units and the use of entrance filters. This meant local offices could be authorized to manage their own security without access to other offices’ data, Joris de Greve explains. “The bank’s security structure is based on central access to buildings and central facilitation of technical solutions, but decentralized security and access responsibility per zone. Therefore, the system must allow us to cluster cardholders into groups with different authorizations. AEOS supports this.” 30 “Another factor was ING’s requirement that authorizations not be assigned to a badge, but to a cardholder,” adds Rommens. ”This builds in extra security: cardholders who lose or forget their badge are issued a replacement while the original badge is invalidated. This guarantees there are no unaccounted-for, authorized badges ‘floating around’.” Decentralized approach. ING combines centralized and decentralized policies. Overall security policy is set at top headquarters; security manage ment there decides who is authorized to manage accounts and which authorizations may be assigned. This is part of the bank’s security structure. We ask ING Belgium Security Manager De Greve to illustrate. “For example, the Milan office uses a server in Belgium and the technical facilities provided by central security management. However, the management in Milan are in full control of who is allowed access to their building and when,” he says. User training is also decentralized. There are some 500 administrators, all of whom were trained internally and decentrally. AEOS enables this flexibility. Because AEOS is web-based, interventions are simply and swiftly carried out. ING BE has two different types of offices: Proxy offices where all money is distributed by ATMs and Full Service where staff behind counters provide service. In both types of branches local staff is present and mobile specialists are available to respond to specific needs or questions customers may have. Nedap is currently installing AEOS at the 800 Belgian branch offices at an approximate rate of nine offices per week. Peter Rommens explains how the roll-out is being organized logistically: Security is based on central access to buildings and central facilitation of technical solutions, however local offices can be authorized to manage their own security without access to other offices’ data. “In preparation for installation, ING centrally creates the appropriate authorizations in AEOS. Then, Nedap’s business partner defines the configuration and uploads this to the controller. This means on-site installation is quick; once the controller is connected and deployed, the system is up and running.” “AEOS enables flexibility. Because AEOS is webbased, interventions are simply and swiftly carried out.” Proxy offices are defined as individual access control zones. Each office has its own profiles defining who is allowed access and on what basis. Proxy offices are secured with readers and a key replacement badge. The alarm system runs separately from the access control system. The badge only provides access, while arming and disarming the alarm system requires identification. In line with existing policy, if an unauthorized person finds a badge and tries to use it when the office is empty, this sets off an alarm. If a person tries to use a stray badge when the office is manned, he or she is immediately exposed by staff (social control). “Badges are also blocked based on expiry date or end of contract because in general the fewer badges in circulation and the fewer people with access, the smaller the security risk,” says De Greve. 31 Key figures. L icense for 25,000 badges, 1,000+ access points Oracle DB application server Backup server Test server Linked with HR database (Peoplesoft) for importing data Use of rule engine to automatically change authorizations Hardware AP4803 + Convexs/Invexs readers Locker Management supports Getronics’ New World of Work. In October 2010, Getronics BeLux relocated and introduced a radical improvement in working conditions. From then on, employees could work whenever they wanted to, and wherever was most convenient, as long as they delivered results. The new approach clearly had consequences for security and access. When the clean desk policy went into action and all drawer units were eliminated, employees needed a new place to store their belongings. Enter Nedap Locker Management. By Elles te Boome-Harbers Picture: as clean desk policy is a part of the NWOW, employees need a place to store their belongings. 35 Getronics pioneered flexible office space with the “New World of Work” (NWOW). This meant desks were no longer dedicated to a person, but to a task. The result was a strict clean desk policy. To guarantee full flexibility, all drawer units were banned. However, everyone still needed a locker to store their own office supplies and personal effects. Getronics felt traditional lockers would be inflexible, and managing physical keys difficult and time-consuming. Security Manager Patrick De Waen sought a more sophisticated and convenient solution. He remembered once using an RFID wristband to open a swimming pool locker and asked the architect designing the new Getronics building to explore the feasibility of this solution. This is how Getronics found Nedap Locker Management. Intuitive locker management. Getronics’ experience with the lockers has been entirely positive. Employees find them easy and intuitive to use, so acceptance is widespread. One of Nedap Locker Management’s strengths is that it allows for dynamic locker management. Getronics opted for this functionality even though in practice employees use the lockers as personal lockers (static). Security concept. NWOW is based on trust once people are in the building. Security follows a three-tier concept. At level A (the macro environment), people have free access to registration and reception; at level B (meso environment), visitors are issued clearly recognizable badges and may not move around unaccompanied. Anyone without a badge or walking alone with a visitor badge is approached by security. At level C (micro level), security is aimed at controlling the use of systems, such as printers and lockers. These three levels are not integrated, but they do recognize the same badge. Acceptance. When Getronics became one of the first companies in Belgium to implement NWOW, employees rapidly embraced the system. Getronics invested heavily in change manage ment to make the transition smooth. People were properly prepared and the implementation was well-planned. Employees were moved to the new premises in groups of 100. Implementation of NWOW is based on three equally important pillars: facilities, IT and company culture. 36 Dedicated hosts gave groups of employees tours of the new facilities. NWOW coaches introduced the changes in IT, demonstrating all the new technologies. Company culture was a tougher nut to crack. It took management time to accept the loss of visual control over people. Middle management changed as people were judged on results rather than hours put in. As a result, working from home is now perfectly acceptable. Net results. NWOW is sustainable. Printing at the office is down drastically because so many people work from home and prefer to carry a USB stick rather than a stack of paper. Getronics has been using 30% less paper since October 2010. The new building is 25% smaller than the old building, at 6,000 m². Getronics employs 300–350 people, but currently has 240 desks. And yet, employees feel they have more room. If all 350 employees were to show up at once, desk space would be scarce, but since the move occupancy has averaged 50–60%, leaving room to spare. There are 300–350 lockers, so everyone can have a personal storage space. Since October 2010, the lockers have functioned without a hitch. The building is open from 6 a.m. to 10 p.m. Access outside these hours is possible in exceptional cases and with special permission. Getronics has organized work space into clusters. Although no one is obliged to sit with their own division, many tend to do so, since it makes sharing information easier. Employees in consulting and marketing tend to mingle more and are least tied to a fixed place. Future. In the future, Getronics’ micro-level security regime could be developed further by expanding locker management to filing cabinets. Other possible changes include further reduction of desk space and expansion of conference rooms. This way the building becomes more like a meeting venue than office space. Picture: in case employees forget which locker they used, they can track their locker at the terminal. 39 AEOS Intrusion: world’s most effective intrusion solution whether stand-alone or integrated. Whether used as a stand-alone application or integrated into an existing AEOS security system, AEOS Intrusion has great benefits. This new functionality can run on the same controller used for access control and video management, and boasts vast scalability of zones, areas and users. AEOS Intrusion is an functionality that can either be used as a stand-alone application or integrated into existing AEOS security systems. The stand-alone version is based on the Intrusion Base Panel, which is configured by means of the integrated web browser and/or by XML import. An Invexs reader with keypad and LCD display (Intrusion LCD keypad reader) is used to operate the system, i.e. arm and disarm the panel, handle alarms, call up the log file, change settings, etc. Integrated. As an AEOS-integrated option, the Intrusion functionality can be run through the Intrusion Base Panel, but also through other AEpus. AEOS Intrusion can run on the same controller as AEOS access control and video management. This means functionalities can be combined locally, which reduces cost of ownership. User data and access rights are centrally managed and distributed. This way the system is always up to date, which significantly reduces risk. AEOS By René Waenink Picture: the Intrusion Base Panel is EN50131-1, Grade 3 certified. Intrusion is unparalleled in terms of scalability. It is easy to add more buildings, locations and countries. Alarms can be monitored and dealt with in the web-based AEOS Graphical Alarm Handler. All events and users are stored in the same database. This makes interpreting events easier and faster and providing proof of infractions more reliable. An added benefit of using the Graphical Alarm Handler is that it provides a perfect overview of alarm points, and allows users to operate the system on screen. Technical information. A new PCB was developed for the handling of detectors and batteries. This AEpack-compatible AP3006 board controls any connected detectors and outputs, monitors the battery status, monitors and powers sensors and communicates with the Intrusion LCD keypad reader. The AP3006 is built into the Intrusion Base Panel, the Intrusion Extension Panel and the Intrusion I/O unit. The AEOS The stand-alone version is based on the Intrusion Base Panel. Also the AEOS-integrated option can be run through this panel. Intrusion Base Panel, the Intrusion Extension Panel, the Intrusion I/O units and the Intrusion LCD keypad reader all comply with the European EN50131-1 grade 3 standard, as do all components used in these devices. The Base Panel can be expanded by a maximum of 31 Extension Panels and/or Intrusion I/O Units. All Panels include a power supply and battery monitoring. The AP3006 has 16 inputs, which can accommodate most commonly-used sensors. Because the End of Line (EOL) resistor value for each input is freely definable, it is possible to distinguish on one input on the AP3006 between the various between detector statuses, namely detector present, detector not present (tampering), short circuit in the detector connection, masking, and alarm event. 40 The AP3006 has four short-circuit and overloadprotected 12VDC outputs for powering the sensors, and several freely definable outputs: x relays with NO – COM – NC clean contacts, not 2 protected 8 x open collector outputs a truly global solution that can be used across buildings, countries and continents Intrusion zones are directly connected to AEOS EN 50131-1, Grade 3 certified Unlimited scalability of zones, areas and users Central management of users, PIN codes and biometric identification Alarms can be monitored and dealt with in the web-based AEOS Graphical Alarm Handler. 43 Boost your security solution. There’s a famous saying in English: “If it ain’t broken, don’t fix it”. So why would Nedap replace the processor board in our AEOS Processor Units (AEpus)? The answer is simple: to create an even more powerful product which can handle access control, intrusion detection and video management simultaneously. The increase of memory and speed are a real bonus. The processor board is the heart of the AEOS Processor Unit (AEpu). All intelligence, such as authorizations, business logics and time schedules, resides in the processor board on this AEpu. That is why replacing a processor board is not something Nedap takes lightly. Such a change can have great impact on AEOS products. Besides, AEOS software must be able to run on both old and new boards. And at the same time the hardware must be capable of handling the new processor board, for which it might need an upgrade. Big improvements. Since Nedap first launched AEOS in 2000, several changes in the processor board have been made. The main effect of these changes, aside from increased memory and performance, was that the number of connectable AEpacks was doubled, resulting in more functionality. By René Waenink Picture: the new processor board increases speed and memory of the AEOS security solution. The most recent upgrade, in March 2011, was to an AX8008 processor board. The main benefits from this upgrade are: Faster start-up and improved performance, especially on AEpus with large, complicated configurations and a great amount of data. RAM increased from 64 MB to 256 MB, flash memory increased from 128/ 512 MB to 2 GB and performance speed from 266 MHz to 800 MHz. More data storage capacity. Storage capacity is roughly doubled, compared to the previous board. Increased temporary storage capacity of events on the AEpu. Default storage capacity is 10,000 events, but can be increased to 1,000,000. Tests have shown that the board can handle 100,000 cardholders using four entrances. Even 100,000 cardholders using eight entrances works, depending on the type of cardholders and number of events, for example. Tests with 250,000 carriers on one AEpu, using one entrance, showed that it took the AEpu only 25 minutes to reload and authorize all 250,000 cardholders. 45 Connecting wireless locks to AEOS: the cost efficient solution. Wireless locking solutions are a fast-growing market. They replace mechanical locks in doors which are out of reach of wired access control systems. Both online and offline wireless locks can now be integrated into AEOS. This provides maximum flexibility in controlling doors at optimal investment. Wireless battery-operated locks are very cost effective, mainly because installation costs are low. When wireless locks are connected to an online access control system, more doors can be controlled and wireless locks can meet higher security needs. Offline data-on-card locks. A wireless lock reads authorizations from a card and unlocks when the stored data indicates that access is to be granted at that specific door. These authorizations are programmed in a method similar to that in online access control. The locks can also write event data on the card. This means the system can monitor events at doors when the cards are read by an online card R/W unit. Data communication with the locks using ‘network-on-card’ cards offers similar functionality to what is found in online access control. However this information is not real-time. By Anton Kuip Picture: electronic cylinders are a good solution when ease of installation and low initial costs are important. Online wireless locks. Online wireless locks (OWL) have an RF communication link to an RF communication device that in turn has a wired serial or IP connection to the host system. To save energy and increase battery life, RF communication is not continuous, but triggered by certain events. This may limit real-time communication and create small delays. Escutcheon. Almost all wireless lock manufacturers offer two models, escutcheon and cylinder. The escutcheon model is the most convenient model in use; users merely need to present their card and access is granted. The door is opened by pushing the handle downwards. Normally, only the door latch is controlled, but the dead bolt can also be activated to secure the door. For normal access control, where the door needs to be locked permanently, an escutcheon is the most appropriate solution. Extra features can be added, such as scheduled unlock or a toggle function. Cylinder. Electronic cylinders are a good solution when ease of installation and low initial costs are important. Most mechanical cylinders can simply be replaced by electronic versions. After presenting a card at the reader in the cylinder, the knob can be turned and the deadbolt is released. The door opens by pushing the handle downwards or turning the knob further, depending on the mechanical lock used. Normally the door stays unlocked until it is locked by means of the same procedure. Cylinders are a good alternative to mechanical keys for low traffic doors. Offline lock system connected to AEOS. Wireless lock systems can be connected to AEOS in various ways, depending on the type of lock used. An offline lock system (OLS) stays strictly separate from AEOS. The only connection between the two systems is at database level. Once both systems are installed and set up, offline lock information (i.e. names and addresses of offline locks, time zones, etc.) is sent from the offline lock system to AEOS. Each lock receives setup information from the OLS by means of a portable programming device or laptop; the lock does not have a wired or wireless connection with the system. The reader in the lock reads authorizations from cards presented. Online wireless lock system connected to AEOS. The wireless locks (cylinder, escutcheon) have a RF connection to AEOS making them an integral part of the system. When a card is presented at the reader in the wireless lock, the number is sent to the RF communication device and forwarded over IP or a serial connection to the AEOS door controller. If the cardholder is authorized to enter, an unlock message is sent back via the communication device to the wireless lock and the door is unlocked. OWLS-AEOS configuration OLS encoder OLS-AEOS configuration Offline authorizations are programmed in the AEOS system just like authorizations for online doors are programmed. AEOS then forwards the authorization data to the OLS database. Initial authorizations are written on a card by the card encoder unit connected to the offline system PC. To change authorizations or extend the validity of a card, one or more 46 R/W units which are connected to the offline system, can be installed in a central location or at the entrances. These units update the cards automatically when presented. Events generated by the OLS, e.g. battery status, are visible in AEOS. Setup software is available to program the initial technical data in the wireless locks. The wireless communication device must be in close proximity to the locks (max. several meters). The exact distance depends on type of product and brand, and may also vary in practice due to radio interference and environmental conditions. One RF communication device can control one or more locks and is connected to AEOS via a serial or IP connection. The RF communication is based on an IEEE 802.15.4 (2.4 GHz) radio standard and adapted to the low power requirements of wireless locks. Encryption requirements are fulfilled using an AEOS encryption standard. Picture: for normal access control, where the door needs to be locked permanently, an escutcheon is the most appropriate solution. 49 Nedap opens the door to key management. Electronic access control systems have revolutionized the way organizations control the vital doors on their premises. Thanks to wireless electronic locks, they can also manage most of the less critical doors on site at reasonable cost. But there will always be a need for conventional locks and keys too, and managing these is just as important. ............ ............ Organizations that use both electronic access control and conventional keys can integrate the two by using Nedap’s AEOS security management system. AEOS makes integration simple. Each mechanical key is permanently attached to an electronic key fob containing an RFID chip. The key and attached key fob are stored in an electronically accessible key cabinet. When a cardholder who is authorized to handle a key presents a badge, the key cabinet door opens. Each key fob is assigned a specific slot within the key cabinet. The fob and its attached key stay locked in place until released by an authorized user. Meanwhile, the other key fobs in the cabinet remain locked in their own slots. Key management in AEOS. By Anton Kuip All key cabinets are connected over an IP connection to AEOS, via a server which controls the cabinets. The key cabinet software is used for programming key names and key groups which AEOS uses to assign authorizations to AEOS cardholders. AEOS access control allows for the creation of templates, similar to door access templates. Picture: each key with its electronic fob remains locked in place until released by an authorized user. These are created before key authorizations are assigned to a person. Keys can only be assigned for an unlimited period. Day/time schedules do not apply. Time limits. When an organization needs to impose time limits to the use of keys, an extra AEOS reader-controller can be installed next to the cabinet. This makes it possible to program day/time schedules for each user, so that users can unlock the cabinet when they need to collect or return keys. But of course, this means that outside of the programmed day/time schedules, the keys cannot be collected or returned. So, to ensure keys are returned on time, an exit reader can be installed to prevent anyone leaving the building without having brought back their assigned key. All events generated by the key management system – the collection and return of keys – are recorded and stored in AEOS. Invexs 190: versatile, extremeweather reader with keypad. Some card readers are made to withstand extreme weather conditions, some have key pads to enter PINs with, some can be mounted directly onto metal door frames without losing detection distance. Very few combine these features. Nedap’s Invexs 190 is one of the few. By René Waenink The Invexs 190 was specifically built for use in Scandinavia and the Middle East. This means that the 190 can withstand both extremely low and extremely high temperatures. It operates flawlessy at -20ºC as well as +55ºC. Like all Nedap readers, this latest addition to the successful Invexs series is stylish, smart and versatile. In typical Nedap fashion, we have made sure the reader is ready for the future. Its card technology is software upgradable, either through AEOS, or, when not AEOS-connected, by means of a configuration card. The 190 can be configured to different protocols and reads a variety of cards (Nedap, Mifare, Mifare Plus and DESFire EV1) so clients can store credentials in a mixed pool, if desired. The Invexs 190 is also ready to meet extremely strict security standards, such as those maintained in government institutions. For this purpose, it includes a SAM socket into which a Secure Access Module (SAM) can be slotted for key storage and execution of highly secure encryption algorithms. 51 Technical specifications. IP65 protection Operating temperature -20º to 55ºC Storage temperature -30º to 65ºC Relative humidity 10–93%, non-condensing Keypad (optional) SAM socket Tamper Switch Inputs 4 x open collector, beeper and 3 LEDs Communication: RS485 (Encrypted AEOS or Plain Protocol, user-definable) Wiegand Data 0 and Data 1 (depends on configuration) RF Modulator (120 kHz for AX1014 or AB350) 55 Hardware built to last: threeyear warranty. Nedap Security Management increased its warranty on newly purchased hardware products from one to three years. This gesture towards our customers is also a clear statement to the security industry. Nedap has been developing and manufacturing its own range of hardware for as long as it has been developing its security management platform. “We have always believed we can only guarantee true innovation, quality and full utilization of our software’s potential by building hardware to our own high standards in quality, technology and design. Only then can customers truly benefit from our innovative approach. When we say we believe in quality and performance, we mean business; to prove it we raised our standard warranty on hardware* from 12 to 36 months” says Hans Schipper, managing director of Nedap Security Management. By Erica Meijer “Our controllers, antennas and readers are high-quality products, made in our own factory in the Netherlands. This extended warranty, provided at no additional cost to our customers, emphasizes the real value of our products,” he continues. “It provides end users with trouble-free ownership and better control of total costs.” Arjan Bouter, sales director for Nedap Security Management, adds: “The three-year warranty is not only a gesture towards our customers, it is also a statement to the industry. Our products are superior in quality, design and technology.” The extended warranty on Nedap hardware emphasizes the real value of these products. * The new warranty applies to all Nedap hardware (including readers, antennas, controllers and AEpacks) with the exception of cards and key fobs. Security Redefined