Standardizing as a Breakthrough

Alcatel-Lucent locations find peace of mind at each spot

Alcatel-Lucent, a leader in products and innovations in IP and cloud networking as well as ultra-broadband fixed and wireless access, is responsible for countless breakthroughs that have shaped the networking and communications industry. Alcatel, whose headquarters were based in Plano, Texas, purchased Lucent in 2006, whose headquarters were located in Murray Hill, N.J. Lucent had standardized on AMAG Technology’s Symmetry Global access control system prior to the merger. Once Alcatel analyzed the system, they quickly made the decision to standardize the Americas region on Symmetry Global.

Geographic Dispersion

Alcatel-Lucent’s security is divided into three regions: Americas, Asia-Pacific (APAC) and Europe, Middle East and Africa (EMEA). The Americas region, which includes 60 locations, is the most standardized of the three regions. Of the 60 locations throughout the United States, 29 sites or 98 percent of the locations with access control are using Symmetry access control system. Alcatel-Lucent installs access control in facilities with more than 25 doors. Nearly half of the facilities have more than 25 doors, including the big locations in Plano, Murray Hill and Naperville, Ill., which have 2,000 employees each.

Each individual site monitors its own security, but receives support from one of the three large locations. Plano, Murray Hill and Naperville employ their own security staff with a 24-hour security operation in place. Each location has its own server; in fact, Naperville is the main data center for the United States. Plano supports offices located in the South and West; Murray Hill supports most sites in the North and on the East Coast; and Naperville supports the northern sites.

The geographic dispersion of servers provides built-in disaster recovery. Alcatel- Lucent did not want one server or a hot redundant server at one location. By spreading out geographically, if a server fails in Plano, for example, it won’t affect Murray Hill and Naperville.

The Plano location houses the only central command center and has the ability to network into the Murray Hill and Naperville locations, allowing them to provide back-up security and support if necessary. Symmetry Global monitoring allows security officers to pull up Murray Hill and Naperville on two different screens and monitor what is occurring. If the Murray Hill local security team cannot respond quickly enough to an alarm, the alarm will roll over to the Plano location. The Plano security team can visually see the alarm and assist. Plano also monitors 15 to 20 locations where there is not a security team in place.

Badging Operation

Prior to the merger, Lucent outsourced their badging operation. It was the job of Alcatel-Lucent’s Kert Keller, security manager, North America, to standardize the company and get the new system in place.

The Plano location had been handling Alcatel’s badging operations all along. After analyzing the needs of the now merged company, it was determined that the Plano office, complete with its control center and full security team, could manage the badging for the United States and Latin America. This also included protecting the corporate executive offices, finance departments and executive group for senior leadership. Approximately 25,000 employees and non-employees, including contractors and vendors who need access, carry a card. By using this system, Alcatel-Lucent now saves approximately $200,000 a year on badging operations.

The consolidation fit with Alcatel-Lucent’s Centralized Services Model, which is run from the Plano office. Centralized Services determines corporate security standards and how to operate security most effectively.

Best Practices

Several security best practices are mandated to meet Alcatel-Lucent’s Centralized Services Model.

The access control software mainly secures Alcatel-Lucent’s many research and development locations where new products are developed. This includes Bell Labs, which has made scientific discoveries, created powerful technologies and built the world’s most advanced and reliable networks. Several different product lines and divisions develop products in these labs, including 3G and 4G wireless equipment, core routing equipment for ultra-high speed broadband and the services that accompany it.

The company follows the centric circle design model and secures the outer perimeter with general access control card readers. Access restrictions increase when moving towards the center of the buildings. The data centers use card and fingerprint readers or card and palm geometry readers, depending on the location for increased access; but, they may use smart cards for network log-ins in the future. If the decision is made to move forward, they will roll out a smart card with biometric on the card. This method of security is preferred because the owner of the card is the owner of their own biometric, which eliminates privacy issues.

Symmetry graphical maps allow the security teams to create a dynamic map of each facility. When an alarm sounds, the graphical map displays the alarm location, providing a quick, easy and real-time display of the area in alarm. Security officers can click on the graphical map to allow immediate access.

Alcatel-Lucent plans to install the Symmetry Global Card Handler. The server will sit on top of the Plano, Naperville and Murray Hill servers and combine the three databases into one database, simplifying the badge creation process. For example, badging staff can program card information and assign access to all three locations and only need to enter the information into the database one time.

Eventually, all three regions may standardize on AMAG’s Symmetry Global access control system, and Keller is planning to integrate their video management system.

“Symmetry Global met all of Alcatel-Lucent’s security requirements,” Keller said. “The graphic feature allows the security team to easily locate and manage alarms. It’s easy to program, yet still has all the features we needed in an access control system.”

This article originally appeared in the September 2014 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3