ELV - ISMS

MULTI-LAYER PHYSICAL INTEGRATED SECURITY SYSTEM

Multi-layered integrated security system

MULTI-LAYER PHYSICAL INTEGRATED SECURITY SYSTEM (Multi-layered Integrated Physical Security System) is a comprehensive security solution, combining multiple layers of physical and technological protection to ensure maximum safety for the protected area - often applied in data centers, critical infrastructure, government buildings or industrial zones.

A multi-layered physical security system is a coordinated combination of different layers of protection – from the outside in – with advanced security technologies, helping to detect, prevent and respond quickly to any potential threats.

 

Multi-layer physical security Data center security is one of the core requirements to ensure the safety of information assets and IT infrastructure equipment. An effective security system is often deployed according to the defense-in-depth model, including many layers of protection from the outside in.

Applicable standards

  • ISO/IEC 27001, 27002: Information security management, including physical security.
  • TIA-942Data center design standards, with security regulations.
  • Uptime Institute (Tier levels): Yêu cầu về an ninh tăng dần theo Tier.

Below are the main descriptor classes:

1. Perimeter Security

  • Security fence: Build a solid fence around the data center.
  • Security gate and vehicle control: There is an entry/exit control station with barriers, number plate recognition system (ANPR), and control of people and vehicles.
  • Outdoor CCTV Camera: Monitor entire perimeter 24/7.
  • Motion sensor, vibration sensor: Detects unusual intrusion at fences or nearby areas.

2. Building Access Control Layer

  • Reception hall with security guard: Check documents and identity of arriving guests.
  • Magnetic card and biometric access doors: Only authorized people are allowed to enter.
  • Mantrap / airlock: A buffer room between two doors, allowing only one person to enter at a time to prevent tailgating.
  • Cameras in hallways and walkways: Track people moving around the building.

3. Data Hall Security

  • Computer room doors have independent access control: Using magnetic cards or biometrics.
  • Access logs: Record details of time and people entering/exiting.
  • Surveillance camera in machine room: Continuous recording, long-term storage.
  • Allow access only to authorized technicians and personnel.

4. Micro-Segmentation

  • Individually Locked Rack Cabinets: Server cabinets with physical or electronic locks.
  • Individual device monitoring: Vibration sensors, open cabinet door sensors can be integrated.
  • Seal unused I/O ports: Restrict physical access to network ports, USB ports.

5. Monitoring & Response Layer

  • Security Operation Center (SOC): Monitor images, alarms, access events.
  • Alarm system (intrusion alarm): Detects unauthorized intrusion.
  • SIEM/SOAR System Integration: Combine physical and network monitoring for rapid incident response.
  • Coordinate with security forces and police when necessary.

ELV and ISMS Products and Solutions

ELV - ISMS

ISMS is the integration and centralized management of systems: 

hệ thống điện an ninh
Hệ thống An ninh tích hợp ISMS
  • Access Control System, Turnstile, Mantrap Door, Revolving Door 
  • Hệ thống camera quan sát 
  • Visitor Access Management System 
  • Alarm System, Patrol 
  • Perimeter Intrusion Detection System 
  • Parking Lot Management System 
  • Intercom System, Video door phone 

ISMS It is a system developed for centralized management, nhiều lớp, remote monitoring and control, internal and perimeter security across multiple layers, and integration with other security systems in critical facilities such as data centers, factories, hospitals, airports, office buildings, and high-end residential complexes. 

The principle of ISMS is based on the IoT platform utilizing Ethernet TCP/IP, which is a key open standard for LAN/WAN networks in industrial applications, supporting speeds of 10/100BaseT. This allows for the use of existing cabling infrastructure, providing fast system response, emergency updates, and efficient data exchange. It supports the transmission of large video files, images, and alerts, as well as the communication interface between the server and other subsystems. This optimizes the operation and centralized management of all security systems on a unified platform.

The use of an integrated system for centralized monitoring, management, and control ensures: 

  • The system's operations will be carried out automatically to the maximum extent possible, minimizing manual intervention. 
  • The system will operate faster and respond to alarms more accurately. 
  • All processes of events will be easily searchable and identified. 
  • Easy and quick training for security personnel and maintenance staff. 
  • The system will provide a convenient, safe, and user-friendly environment. 

Access Control System, Lane Gate, Security Turnstile 

hệ thống kiểm soát người được ủy quyền
Access Control System, Lane Gate, Security Turnstile

The access control system is a system that controls authorized individuals and records the entry and exit data in an area for security management purposes. Authorized individuals cannot unlock doors or devices unless they have been verified by the following factors: 

  • RFID card (Anti-copying card technology) 
  • PIN (Password) 
  • Fingerprint, Facial recognition, or Dynamic QR code (Dynamic QR code) 
Hệ thống quản lý khách truy cập
Access Control System, Lane Gate, Security Turnstile

High-security access can be compatible with other security systems, including CCTV, access control, and turnstiles, etc. To check the list of entries and exits in an area, recorded images at the time of an incident can be reviewed or pre-authorization can be set using the Access Management System.  

High-security gates are security gates used in critical areas to control access (such as data centers, high-security zones, etc.) High-security gates are cylindrical in shape, with interlocking doors. Only one person can enter at a time. The technology of high-security gates involves four verification processes: 

Hệ thống nhận diện khuôn mặt
Card Reader Using Dynamic QR Code Technology
  • One Zone
  • Two Zone Contact Mat 
  • Weight Sensor
  • Stereo Vision 3D camera

The level of security depends on the organization’s needs. Higher security typically comes with slower access speed. Fingerprint scanners, facial recognition, and QR code identification systems can be integrated to enhance security. 

Turnstiles or pedestrian gates are security systems designed to restrict access to specific areas or buildings. Entry is only allowed for authorized individuals. The system can be integrated with card readers, facial recognition, QR code scanners, and other identification technologies.

Currently, buildings or organized offices often install lane gate systems to ensure the safety of unauthorized individuals entering the building, except for business or meeting purposes. Individuals are required to declare information and be photographed before entering the building, and the system can record each entry and exit. 

There are various types of turnstiles such as Flap Barrier, Swing, Slide, or Full Height, etc., depending on the function or can be modified based on the structure, area, and interior design of the building. 

kiểm soát ra vào an ninh
Access Control System, Lane Gate, Security Turnstile

Security surveillance camera system 

giải pháp Camera quan sát an ninh
Security surveillance camera system

 

We provide integrated security surveillance camera solutions through a range of high-quality and reliable products, complying with strict regulations, while offering special services and continuous support. 

Ensuring reliability: Our security cameras meet all installation requirements and are tested by our technical team to ensure compatibility and optimization. 

Faster feedback: With quick search options and the ability to access videos rapidly and intuitively, new users can be trained quickly and operate immediately. 

Cybersecurity compliance: Our camera solutions adhere to regulations, security standards, and network security of organizations such as GSA and NDAA. 

Perimeter Intrusion Detection System 

Cơ chế hoạt động của hệ thống phát hiện xâm nhập
Perimeter Intrusion Detection System

 

Perimeter Intrusion Detection System (PID), commonly referred to as an intrusion prevention system, is a system designed to detect external intrusions. The perimeter intrusion detection system is installed around the area where intrusion detection is needed, suitable for private, government, or large state-owned enterprises that are closed and restricted to authorized personnel. The operation mechanism of the perimeter intrusion detection system is divided into three main types, suitable for large and challenging-to-monitor areas such as factories, data centers, schools, warehouses, and power or chemical plants. 

The type of PID technology must be chosen according to its function. In the design of a perimeter security system, the use of PID is a crucial part in identifying and responding to intrusion behavior. 

And other Extra-low voltage and Security systems such as: Parking management system, Visitor access management system, Intercom system (Video door phone), etc.

ELV and ISMS Products and Solutions