Standardizing as a Breakthrough

Alcatel-Lucent locations find peace of mind at each spot

Alcatel-Lucent, a leader in products and innovations in IP and cloud networking as well as ultra-broadband fixed and wireless access, is responsible for countless breakthroughs that have shaped the networking and communications industry. Alcatel, whose headquarters were based in Plano, Texas, purchased Lucent in 2006, whose headquarters were located in Murray Hill, N.J. Lucent had standardized on AMAG Technology’s Symmetry Global access control system prior to the merger. Once Alcatel analyzed the system, they quickly made the decision to standardize the Americas region on Symmetry Global.

Geographic Dispersion

Alcatel-Lucent’s security is divided into three regions: Americas, Asia-Pacific (APAC) and Europe, Middle East and Africa (EMEA). The Americas region, which includes 60 locations, is the most standardized of the three regions. Of the 60 locations throughout the United States, 29 sites or 98 percent of the locations with access control are using Symmetry access control system. Alcatel-Lucent installs access control in facilities with more than 25 doors. Nearly half of the facilities have more than 25 doors, including the big locations in Plano, Murray Hill and Naperville, Ill., which have 2,000 employees each.

Each individual site monitors its own security, but receives support from one of the three large locations. Plano, Murray Hill and Naperville employ their own security staff with a 24-hour security operation in place. Each location has its own server; in fact, Naperville is the main data center for the United States. Plano supports offices located in the South and West; Murray Hill supports most sites in the North and on the East Coast; and Naperville supports the northern sites.

The geographic dispersion of servers provides built-in disaster recovery. Alcatel- Lucent did not want one server or a hot redundant server at one location. By spreading out geographically, if a server fails in Plano, for example, it won’t affect Murray Hill and Naperville.

The Plano location houses the only central command center and has the ability to network into the Murray Hill and Naperville locations, allowing them to provide back-up security and support if necessary. Symmetry Global monitoring allows security officers to pull up Murray Hill and Naperville on two different screens and monitor what is occurring. If the Murray Hill local security team cannot respond quickly enough to an alarm, the alarm will roll over to the Plano location. The Plano security team can visually see the alarm and assist. Plano also monitors 15 to 20 locations where there is not a security team in place.

Badging Operation

Prior to the merger, Lucent outsourced their badging operation. It was the job of Alcatel-Lucent’s Kert Keller, security manager, North America, to standardize the company and get the new system in place.

The Plano location had been handling Alcatel’s badging operations all along. After analyzing the needs of the now merged company, it was determined that the Plano office, complete with its control center and full security team, could manage the badging for the United States and Latin America. This also included protecting the corporate executive offices, finance departments and executive group for senior leadership. Approximately 25,000 employees and non-employees, including contractors and vendors who need access, carry a card. By using this system, Alcatel-Lucent now saves approximately $200,000 a year on badging operations.

The consolidation fit with Alcatel-Lucent’s Centralized Services Model, which is run from the Plano office. Centralized Services determines corporate security standards and how to operate security most effectively.

Best Practices

Several security best practices are mandated to meet Alcatel-Lucent’s Centralized Services Model.

The access control software mainly secures Alcatel-Lucent’s many research and development locations where new products are developed. This includes Bell Labs, which has made scientific discoveries, created powerful technologies and built the world’s most advanced and reliable networks. Several different product lines and divisions develop products in these labs, including 3G and 4G wireless equipment, core routing equipment for ultra-high speed broadband and the services that accompany it.

The company follows the centric circle design model and secures the outer perimeter with general access control card readers. Access restrictions increase when moving towards the center of the buildings. The data centers use card and fingerprint readers or card and palm geometry readers, depending on the location for increased access; but, they may use smart cards for network log-ins in the future. If the decision is made to move forward, they will roll out a smart card with biometric on the card. This method of security is preferred because the owner of the card is the owner of their own biometric, which eliminates privacy issues.

Symmetry graphical maps allow the security teams to create a dynamic map of each facility. When an alarm sounds, the graphical map displays the alarm location, providing a quick, easy and real-time display of the area in alarm. Security officers can click on the graphical map to allow immediate access.

Alcatel-Lucent plans to install the Symmetry Global Card Handler. The server will sit on top of the Plano, Naperville and Murray Hill servers and combine the three databases into one database, simplifying the badge creation process. For example, badging staff can program card information and assign access to all three locations and only need to enter the information into the database one time.

Eventually, all three regions may standardize on AMAG’s Symmetry Global access control system, and Keller is planning to integrate their video management system.

“Symmetry Global met all of Alcatel-Lucent’s security requirements,” Keller said. “The graphic feature allows the security team to easily locate and manage alarms. It’s easy to program, yet still has all the features we needed in an access control system.”

This article originally appeared in the September 2014 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.