We've all watched a three-dimensional (3D) film at one point or another. The technology is defined as something having three-dimensions, i.e. width, length and space. And while the technology in the raw sense has not transcended into the electronic security space per say, a number of technology developers and manufacturers, software providers and integrators are applying the concept of 3D to their business practices. And for systems integrators, leveraging 3D software technologies will allow them to simplify their installations through operational, benefits, allowing them to provide a different type of value-add service to their customer.
Check Point Software Technologies, Redwood City, Calif., is one software development company that uses this multi-dimensional approach to its business practices and solutions.
"The term '3D' is well-understood-we don't have to explain what it is and we can leverage that identity to articulate a conversation that we want to have around security," explained John Vecchi, head of global product marketing for the company. "We are using the term '3D' metaphorically. For us, 3D security is a vision-it's a concept and a blueprint. And security needs to become more of this type of blueprint whereby it's made up of three critical categories, and those are the three dimensions we talk about-people, policy and enforcement."
Vecchi attributed the idea behind this concept to numerous internal discussions as to the critical element that company policies uphold and the disparate environment that many businesses are faced with. Check Point's 3D security concept enables organizations to transform security into a business process by integrating the three dimensions.
"3D is the starting point," said Vecchi. "It's how we say, 'look, security is changing. It's ridiculously complex. There are way too many point products which end up making you more insecure than secure. It's not seamless or secure. Policies are disparate, they are not well-understood and they are not well-aligned to your business needs.' 3D is a way for us to say that security needs to move to be automated, it needs to be a process, it needs to be more seamless and has to involve people. And folks that I've talked to are ready for security to change-they know it has to," Vecchi continued.
Check Point's R75 is a network security solution that implements elements of this multi-dimensional approach. Based on its software blade architecture, it enables customers to extend the firewall into a multi-function and multi-dimensional gateway that consolidates protection into a single, unified solution. Check Point R75 works off of four new software blades for application control, identity awareness, data loss prevention and mobile access. This enables businesses to gain greater visibility and control over data, Web 2.0 applications, and mobile access-bringing organizations multi-dimensional security in a single, integrated solution.
A step above GUIs
Feeling Software's Omnipresence 3D is another platform that goes beyond traditional solutions in delivering improved situational awareness and faster response to emergencies, confirmed Christian Laforte, president, Feeling Software, Montreal. The company's platform is a 3D surveillance visualization tool which also serves as an advanced Command & Control (PSIM) system for applications with complex security and safety needs. Omnipresence 3D provides a common monitoring and alarm platform for multiple security and safety systems, including CCTV, fire, access control and other third-party systems.
"It's extremely beneficial for end-users and integrators alike," said Laforte. "All we ask of our integrators is that they understand the high-end market and have good project management skills. We can handle the 3D aspects for them-convert their 2D floor plans into realistic 3D models-introduce them to 3D content creation partners or train them on how to do it themselves using standard off-the-shelf tools. We will support whatever equipment the end-user or integrator wants us to. They don't have to worry about eventually ending up with incompatible systems or poorly integrated ones," he explained.