the ultimate guide to psim

THE ULTIMATE GUIDE TO PSIM
www.cnlsoftware.com
Table of Contents
Introduction.................................................................................................................................................................. 3
PSIM defined................................................................................................................................................................ 6
Features of PSIM platforms.......................................................................................................................................... 7
PSIM in the News......................................................................................................................................................... 8
What PSIM is NOT...................................................................................................................................................... 10
What PSIM does......................................................................................................................................................... 11
So WHO uses PSIM?................................................................................................................................................... 13
Case Study: City of Atlanta......................................................................................................................................... 14
PSIM the story so far…............................................................................................................................................... 16
What is creating the need for PSIM? ......................................................................................................................... 17
Where does the ROI of PSIM live? . ........................................................................................................................... 18
What do customers say about PSIM? ........................................................................................................................ 19
Case Study: IBM UK.................................................................................................................................................... 20
What does PSIM replace?.......................................................................................................................................... 22
Relationship to VMS................................................................................................................................................... 23
Relationship to ACS.................................................................................................................................................... 24
Relationship to IT-based Security............................................................................................................................... 25
Advanced PSIM........................................................................................................................................................... 26
Keith Bloodworth, CEO - CNL Software...................................................................................................................... 28
The big question, is PSIM for you? ............................................................................................................................ 29
2
Introduction
Security should sit at the heart of every business, after all what is the point
of creating a valuable enterprise with staff, property, goods and services if
someone can just take them from you? In reality security is a grudge purchase
for many businesses.
Physical Security Information Management or simply PSIM (pronounced
p’-sim) is a relatively new technology enabling companies to streamline,
automate, and measure security tasks and workflows to increase operational
efficiency and reduce ongoing security costs.
3
Why read this ‘Guide to PSIM’?
‘The Ultimate Guide to PSIM’ is designed to answer any questions you
have about this essential enabling technology. It will demonstrate to you what
PSIM is and how it can help your organization. It will also show you: how to
select the right PSIM system for your needs and what investments are required
for success.
It will also explain:
• Why PSIM is so important right now
• How PSIM differs from other technologies such as Video Management
Systems (VMS) and Access Control Systems (ACS)
• The common features and advanced functions of PSIM products
• How to build a solid business case and convince internal stakeholders to act
• The future of PSIM
We have also included exercises that you can use to discern whether your
company is ready for PSIM; how it will help you increase your effectiveness and
help you attain your other security goals.
We hope this guide will be your ticket to a new world of more effective and
efficient security management.
4
A quick test for you…
These questions will help you to understand your knowledge of PSIM
1. Do you currently have the ability to verify alarms and alerts using live video?
2. Is this video able to move to capture the sensor point automatically?
3. Are you able to drag and drop the next nearest cameras to verify the extent
of the incident?
4. Are you able to reach into other systems such as access control to
understand how many people this incident may affect?
5. Are you able to add workflow to ensure operatives follow the correct
procedures to handle this alarm and minimise disruption to your business?
6. Are you able to communicate to all response personnel automatically to
alert them of the nature of the incident?
7. Are you able to look at detailed maps helping to navigate emergency
responders?
8. Are you able to use your Access Control System at muster points to ensure
all staff are evacuated safely?
9. Are you recording every click, action and camera viewed by the operator
for a detailed post incident audit?
If you have answered yes to all of the above, congratulations you have understood
the power of PSIM and have a fantastic security management system.
If not, read on...
5
PSIM defined
WHAT:
Physical security information management (PSIM) is a category of software
that provides a platform and applications created by middleware developers,
designed to integrate multiple unconnected security applications and devices
and control them through one comprehensive user interface.
HOW:
It collects and correlates events from existing disparate security devices and
information systems (video, access control, sensors, analytics, networks,
building systems, etc.) to empower personnel to identify and proactively resolve
situations.
WHY:
PSIM integration enables numerous organizational benefits, including increased
control, improved situation awareness and management reporting. Ultimately,
these solutions allow organizations to reduce costs through improved efficiency
and to improve security through increased intelligence.
A complete PSIM software system has six key capabilities:
Collection, Analysis, Verification, Resolution, Reporting, Audit Trail
6
Features of PSIM platforms
A complete PSIM software system has six key capabilities that help to distinguish
it from other forms of integration:
1. Collection - Device management independent software collects data from
any number of disparate security devices or systems.
2. Analysis - The system analyzes and correlates the data, events and alarms
to identify the real situations and their priority.
3. Verification - PSIM software presents the relevant situation information in
a quick and easily-digestible format for an operator to verify the situation.
4. Resolution - The system provides Standard Operating Procedures (SOPs),
step-by-step instructions based on best practices and an organization’s
policies, and tools to resolve the situation.
5. Reporting - The PSIM software tracks all the information and steps for
compliance reporting, training and potentially, in-depth investigative
analysis.
6. Audit trail - The PSIM also monitors how each operator interacts with
the system, tracks any manual changes to security systems and calculates
reaction times for each event.
7
PSIM in the News
Aerial & ground surveillance secure events from all angles
a&s Magazine
“The recent spike in threats at large-scale events such as the
terrorist bombing at the Boston Marathon, the violent double
murder at the Confederations Cup in Brazil, and the bomb
discovered in the bathroom near the proximity of a shrine in
S?o Paulo prior to Pope Francis’ scheduled visit is emphasizing
the dire need of high security at large-scale events. Surveillance
has always been an excruciatingly important aspect of ensuring
security. Robots, drones, tethered balloons – previously strictly
limited to military usage, advanced surveillance technologies
are increasingly being deployed at large-scale events. Different
methods of surveillance are also being reinvented to address preexisting issues such as providing full and clear coverage in a widely
spanned area...
...while VMS can provide security providers with situational
awareness, PSIM is an all encompassing solution that not only
provides situational awareness, but event management as
well. PSIM acts as a platform that enables users to efficiently
leverage people and technology to manage occurring incidents. If
something were to occur, the PSIM will set off a chain of actions
to address the situation.”
8
CCTV on Track Against Terror
Professional Security Magazine
“...from some major transport hubs, such as Euston, St Pancras
and Kings Cross, the BTP CCTV hub can access multiple feeds over
dedicated routes. From some TOCs, the BTP gets a single view
from a single camera. In other words, as DCC Crowther said, the
force has difficulty integrating different CCTV systems. In fact, he
added, the UK transport system is incredibly disorganised in terms
of the way CCTV is rolled out. A TOC might own multiple systems
and might buy the cheapest CCTV or the best available at the
time. How does BTP then bring such CCTV into a single platform?
The force has worked with the Physical Security Information
Management (PSIM) software company CNL, helped in budget
terms by the 2012 Olympics.
Next, phase three, is to bring in more systems, ‘to try to overcome
these legacy issues. We are currently exploring cloud technology
as well as looking at moving around and processing CCTV on an
incident management basis’. That may mean viewing CCTV as
an incident happens, or for investigation after an event, perhaps
sending CCTV to a police officer in an interview room.”
STE Security Innovation Awards Silver Medal:
Technology Makeover - SecurityInfoWatch
“...we have a lot of disparate systems that need to be
interconnected,” Epler says. “With the introduction of PSIM
technology, we can now view all security and business systems on
one integrated platform.”
CNL Software’s IPSecurityCenter platform gives the authority realtime situational awareness at the Security Operations Control
Center. Some of the older systems as well as the newly deployed
systems are combined onto one platform giving the authority
total control of all operations.
“It is truly command-and-control,” DeStefano says. “The PSIM
came in because it’s more than just video and CBRNE (Chemical,
Biological, Radiological, Nuclear and high-yield Explosives)
detection — there’s also access control, a fire detection system,
and there’s some integration with their train control system, for
example.”
“Here’s a scenario,” DeStefano continues. “Let’s say a chemical
or biological weapon is released, and the agent is detected thru
the CBRNE system. That alert is immediately picked up by the
PSIM system, which pulls up the video, and a task force or other
response is dispatched (from the command center). At the same
time, the PSIM system communicates with the train control system
and stops any train from pulling into that station. That’s how the
system was envisioned to work.”
PSIM Orchestrates a Coordinated Response
a&s Magazine
“...PSIM is designed as a converged platform, presenting the most
relevant information and advising the best course of action in a
crisis. It requires a networked environment for integration between
disparate systems. However, subsystems integration is not what
PSIM about. It is about the concept of operations and, most
importantly, how to manage incidents. PSIM involves ongoing
development to ensure it meets user needs. Such processes require
customization and time.
While system integrators, PSIM vendors and manufacturers can
work together to tackle technical challenges, it is the clients’
responsibility to establish their SOPs. PSIM software will not tell an
enterprise what it should do until an organization defines its goals
and leverage the software to achieve those objectives. Successful
implementations of PSIM rely not just on subsystem integration
and network configuration, but also on effective communication
throughout an organization.”
9
What PSIM is NOT
We have talked about what PSIM is... now we need to cover what it is not:
1. A fancy name for a VMS or ACS system
Not even, close. As the term suggests, PSIM encompasses all aspects of
physical security - from bollards and barriers to social media monitoring to
video analytics. What’s more, PSIM combines focused capabilities from your
video systems, human resource systems, sensors, and other systems to create
something that is more than the sum of the parts. That means you get insight
that can improve every security decision you ever make!
2. A way to watch your security teams
Like anything else, PSIM technology delivers results based on how you use it.
Yes, it can be misused for monitoring in a bad way. But it can also be used for
creating insightful but unobtrusive security across your entire organization.
3. A solution that only benefits Security
Yes, the security department benefits from PSIM technology. Although, a highquality PSIM software solution ultimately is about increasing intelligence across
an organization. When you think about it, that is how things should be.
4. A PSIM solution that delivers value without effort
If only you could just buy PSIM technology, then sit back and watch the results
produce themselves. Unfortunately not! PSIM is not a panacea by itself.
Delivery requires the support of a comprehensive strategy that integrates the
right processes, people, content, data, and more. In other words, success is not
guaranteed. Want to know what it takes? We will cover that later.
10
X
What PSIM does
Beyond the time-saving and efficiency benefits of automation, PSIM enables
modern business processes that are essential to any modern security
department. For organizations, this includes regular reports, incident logs,
continuous process improvement initiatives, training drills, system healthcare
checks, and much more.
Verification of Threats
Many of the alarms and alerts that come into you security environment are not
really threats. These need to be prioritized according to risk, such as time of day,
location of personnel and a whole range of other critical factors. You also need
“dynamic alarm management” to find the “hot” ones that indicate that they
need you take some action.
Once you have identified an alarm as “hot,” you will want to make sure security
follows up quickly and in a relevant manner. You will, therefore, need integration
with all connected systems and automation of processes such as key personnel
alerting, video verification, and Service Level Agreements (SLA).
Creating Centralized Security
PSIM is enabling companies such as yours to create centralized security
infrastructures, some of the advantages this provides includes:
• Consistent levels of security across all sites, so no weak links
•
•
•
•
Cost reductions through reduced manned guards
Cost reductions through fewer control rooms
Better use of remote monitoring
Reports and dashboards covering the entire security estate
11
What PSIM does continued...
Extracting Security ROI
PSIM has become the perfect catalyst for this transition from systems, which are
reliant on constant monitoring and input by security personnel to informationbased systems which proactively manage the increasing volume of information
in the control room. To further drive value from the security departments of a
company, PSIM data mining and analytic capabilities can be utilized to create
highly specialized reports for other department heads.
For example, to enforce vendor compliance with drug tests and site safety,
the HR department can access video data from a camera on a loading dock
combined with a truck gate card reader that is normally used by the security
department.
The facility manager can use that same data to monitor safety procedures for
internal staff while loading the truck and verifying that the operator loading the
truck is current on his equipment operation license. This trend is set to grow, as
more security infrastructure becomes IP based and products become available
to allow them to talk to other business systems.
12
So WHO uses PSIM?
A wide range of organization use PSIM today, they operate across both public and private organizations and vary in
size. One point unites all of these organizations; they understand security is not an option and must deliver for them.
Some of the key verticals are;
Critical Infrastructure
• Roads & Rail Networks
• Ports & Airports
• Utilities
• Energy, Oil & Gas
• Mining
Corporate Enterprise
• IT providers
• Banking & Finance
• Retail & Distribution
• Manufacturing
• Pharmaceutical
Public Safety
• Police & Law enforcement
• Homeland Security
• Border Security
• Transportation
• Public Events
13
Case Study: City of Atlanta
The Challenges
Ensuring the safety and security of citizens and visitors is key to the success and progress of any
city. This is especially true for Atlanta, one of the most multi-cultural cities in the U.S., which is
attracting investment from across the globe. As with any large city, Atlanta is becoming more
reliant on the use of visual intelligence to enable improved situational awareness, which helps to identify and resolve security incidents
faster and more incisively.
Over the years, the City of Atlanta has invested in a number of surveillance systems to provide law enforcement and other public safety
professionals with visual intelligence, well before first responders arrive on scene. Recently, the City upgraded aging analog cameras to
digital, and moved from leased line to wireless backhaul. Historically, these systems had all operated independently and had been located
across a wide geography.
The Solution
Atlanta approached this challenge by launching Operation Shield in 2007, through the Atlanta Security Council. Operation Shield is a threepronged security program designed to leverage existing infrastructure (cameras and radio communications) through engaging the private
sector and various government agencies. The most recent development in Operation Shield has been the establishment of a centralized
Video Integration Center (VIC) by the City of Atlanta Police Department. The VIC is a rapidly-developing surveillance network which provides
24/7 real time crime prevention, emergency preparedness and heightened response capability throughout the City.
To protect citizens, commerce and infrastructure, the City needed to be confident that the tools and technologies selected had been proven
within the Safe City framework. They selected CNL Software’s IPSecurityCenter as the command and control platform as it was deployed in
the largest and most complex Safe City projects in the world.
IPSecurityCenter works by connecting the diverse range of systems into the operating platform, ensuring operators do not need to learn the
underlying technology, allowing them to focus on the situations that are occurring.
14
The system has given the Atlanta Police Department the capability to integrate public and private
video systems, video with computer aided dispatch (CAD), into an integrated suite of emergency
dispatch applications allowing call takers and dispatchers to manage incident information more
efficiently.
Facts and Figures
• 2,000 police officers
• 8,376 square miles
• 36,241 victims of Crime in 2011
• 35 MILLION visitors per year
• Over five MILLION resident in
Metropolitan area
• 9th largest metro area in U.S.
The Benefits
Crime, by its nature, has significant costs to any city - Its costs are far greater than the direct costs associated with policing. Some of the key
cost reductions resulting from the IPSecurityCenter solution include reducing policing costs through greater efficiency, reduced overall crime
levels, increased incarceration rates and faster prosecution through the courts and legal system.
IPSecurityCenter also offers other involved agencies significant capital cost savings because, by tapping into the VIC, they do not need to
bring their own infrastructure to levels of tools and technologies now provided by the VIC. The ability to access video from private enterprise
furthers the attractiveness of the return on investment for the system.
Dave Wilkinson, President and CEO, Atlanta Police Foundation commented “We are leveraging the private sector investment in cameras and
infrastructure – making Operation Shield a unique model - allowing the Atlanta Police Department, at a substantially lower cost, to keep
citizens and visitors safe.”
As with any enterprise level system, there is a constant need to increase the system, in terms of the number of users, geographic coverage
and new functionality. IPSecurityCenter allows an easy migration path to incorporate new technologies such as gunshot detection systems,
tracking systems and smart video (like LPR) and analytics – all helping to enable greater intelligence driven policing.
IPSecurityCenter offers integration capability allowing Atlanta to lead the way in intelligent policing. It provides the City with the framework
needed to reach both public and private systems, soon it will also allow Atlanta to make material improvements in areas of public safety
other than crime, such as flood plain monitoring and fire and other emergency services, making Atlanta a Safer City.
15
PSIM the story so far…
So where PSIM start and what are the trends we are seeing?
Within physical security operations, it has been widely accepted that critical information from numerous sources is
left to system operators to interpret and act upon consistently and correctly. Most end users have video surveillance,
access control and building management systems. These systems are not integrated together and work independently
with no communication with other systems in the ecosystem.
Following several large security breaches, such as 9/11, security professionals recognized the need bring together this
information in a format that can be visualized and distributed. As a result, the security industry is now in transition:
moving from disparate systems to integrated and interoperable systems.
16
What is creating the need for PSIM?
The one thing the security industry agrees on is that there is and will be greater
use of intelligence within the control room. This is being driven by costs and
advances in technology. If security is to do more and have less people, it needs
to get smart about how it uses technology.
• End user focus is on what they can do better with the data/knowledge
they already have - requires making greater use of critical meta data and
corporate systems
• Large scale projects looking to PSIM to provide the “smarts” in and out of
the control room
• Greater need for security to do more than just secure a site
• The average number of systems deployed in a control room is increasing
• Need for better visualization and reporting of incidents and trends
17
Where does the ROI of PSIM live?
The ROI for PSIM varies greatly depending on how it is applied and the vertical segment it is being used within.
Opportunities for ROI across all sectors can be divided into groups based on when they are going to provide a return.
Some of these are provided below;
18
What do customers say about PSIM?
“CNL Software consolidated 26 locations across our
operations in the United Kingdom. We are moving from 17
command & control centres down to one. We estimate our
R.O.I. will be less than 18 months. The solution will provide
the business with operational flexibility I never imagined
possible.”
Thom Williamson — Manager Security Operations, IBM Corporation, United Kingdom
19
Case Study: IBM UK
The Challenges
IBM and its brand name are globally recognized as a leading US company. Whilst this brand
recognition has obvious benefits, the flip side to this is IBM is an easily identifiable target for
individual’s intent on damaging the US and its perceived assets.
The challenge was to provide IBM with a method of ensuring consistent levels of security across its 26 locations in the UK. IBM needed
to ensure better visibility of threats to all of their sites, assets and people. The solution was required to rationalize the number of control
rooms, which would generate a rapid return on investment, provide improved efficiency and reduce on-going costs.
IBM wanted to proactively identify trends and irregularities across all the locations, allowing actions to be taken to reduce business risks.
They had a number of unconnected systems from a variety of manufacturers over these sites totaling more than 700 security devices. They
wanted to reduce redundancy in these security systems, maximizing the investment they had already made. Finally, the solution needed to
be easy to use, ensuring even during a major incident operators were still able to easily navigate and utilize all of its features.
The Solution
IBM selected IPSecurityCenter as a platform for their security solution. The solution was exceptional, and was selected as a Finalist by an
independent expert panel in the Security Excellence Awards 2008.
Firstly, IBM realized the only way to achieve their goals was to create a centralised command and control centre, which integrated their entire
physical security infrastructure including: access control, CCTV, intruder detection and fire alarm inputs across all locations. Centralizing the
security management would allow them to maintain a consistent level of security across all locations. All of the information from the sub
system would be collected in this centralized management system
All of the resulting data needed to be presented in an easy to use interface, ensuring only relevant information was displayed when required.
This was presented on individual operator workstations and a strategically placed video wall.
20
Management required detailed reports for strategic decisions; this was catered for by the
customizable reporting within IPSecurityCenter.
Key Benefits
• Reduced Security Risks
• Increased Situation Awareness
• Centralized Control
• Reduced Costs
• Policy Compliance
• Operator Guidance
• Removed Vendor Dependency
As increasing efficiency was part of the brief, routine tasks were automatically scheduled whether
hourly, daily, weekly or monthly, which also eliminated human error. Additionally IPSecurityCenter enabled the transfer of all paper based
policies into automated operator guidance, which improved efficiency and ensured consistent responses to incidents and events.
The Benefits
IPSecurityCenter has helped IBM convert the information from all their security systems into visual intelligence, which leads to improved
situational awareness for all security staff.
The workflows within IPSecurityCenter have helped the security staff to provide faster and more effective responses to incident and events,
which has resulted in a reduced level of interruptions to business. The trend analysis has helped the security team identify frequently
occurring incidents, allowing management to add resources to reduce these.
IBM has seen an ROI on their investment within just 18 months, this is just actual savings. A price cannot be put on the increased level of
security at all of the IBM sites; a single security breach could cause untold damage both financially and to the IBM brand. The impact would
affect both customer trust and investor confidence.
21
What does PSIM replace?
What does PSIM offer in the way of command and control/situation
management capabilities that video management systems (VMS) and access
control systems (ACS) don’t, especially when the latter are IP-based and can
be integrated?
Full security management system integration using a PSIM platform is very
different from simply connecting disparate systems using a VMS or an
ACS. Whether from business unit acquisitions or a desire to move toward a
centralization of corporate services, progressive companies are facing the
business decision of how to bring disparate systems together into a single,
unified, integrated security management platform. The biggest obstacle is
typically a multitude of different systems which give acceptable service at the
local level, but due to the intentional proprietary nature of these systems, it is
almost impossible to bring all of these systems together into a single system.
Most security equipment manufacturers have made interoperability through a
common GUI almost impossible.
Companies are looking to combine their existing security systems, expand with
their chosen brand, and slowly replace failed components with that chosen
brand. The optimum platform for this is the PSIM platform. Unfortunately,
there is currently no universally accepted term for what a PSIM is and what
it isn’t. It is surprising how far some VMS and ACS companies are willing to
stretch the description so as to at “PSIM” to their product labels.
22
Relationship to VMS
Some Video Management System (VMS) vendors are positioning themselves
against PSIM by calling it a custom, expensive solution for high-end, highsecurity needs. How accurate is that perception of PSIM’s applicability?
PSIM creates business value by levelling proprietary physical security systems
and bringing security operations in line with other business systems. This in
turn allows physical security to interact with other business systems and take its
place within corporate governance. This is functionality that VMS integration
simply cannot provide.
A VMS has limited use; typically it is purchased as a system to prevent security
problems. In reality, the value that it provides is to help piece together the chain
of events after a security incident has taken place. Video analytics have promised
to make surveillance systems more proactive. In practice, these software and
hardware additions have been greatly oversold in their capabilities. Even those
VMS whose users have attained an acceptable level of functionality with their
video analytic systems do not have the tools to integrate into the company’s key
operational business needs.
23
Relationship to ACS
When you talk about PSIM as a solution for integrating disparate physical
Access Control Systems (ACS), how can or does PSIM address the issue of
multiple physical credentials within an organization?
PSIM software integrates data at a database level, so it can work with a
headquarters database as a single point of contact to update credentials for
multiple ACS. This ensures corporation-wide identity management that works
both efficiently and securely.
There are instances where PSIM software is used to integrate ACS from multiple
manufacturers, across multiple facilities. One badge will allow an individual to
gain access to all buildings, irrespective of what ACS may be in use. Without the
software, the end-user would have no choice but to replace the access control
systems in some of these buildings, which would cost significantly more money
and cause much more inconvenience during the cutover phase. The reason for
this is simple; access control vendors rarely share their SDKs and APIs with their
competitors. Their goal is to sell their proprietary software and hardware, not
to integrate with other access control systems.
24
Relationship to IT-based Security
How might PSIM solutions interact with IT-based security solutions like SIEM
to provide a comprehensive view of enterprise security? How interested are
customers and/or prospects in achieving such a view?
PSIM has the ability to use standard IT connectivity such as ODBC to integrate
with other business systems such as SIEM, Tivoli, SAP, and a host of HR Systems.
This enables organizations to create holistic solutions providing enterprisewide integrated security systems for Enterprise Risk Management solutions.
Examples include Enterprise Single Sign On (E-SSO), On boarding and Off
boarding, physical and logical alarm management, and hardening of physical
and logical security posture.
Largely, drivers for the adoption of this technology include the hardening of
security for compliance to industry regulation and increasing risk associated
with operating in certain industries such as critical national infrastructure,
pharmacological, biotechnology and finance.
Creating solutions between physical security, logical security and building
management systems allows an organization to prove and enforce compliance
to evolving standards such as HIPAA, Sarbanes Oxley, and HSPD-12, which
requires having these intelligent systems in place.
M&A activity, corporate social responsibility, and green issues as drivers of
PSIM technology in the corporate space. This has been a catalyst for converged
solutions, which make greater use of technology for enterprise wide security
management, focusing on reducing security operational expenditure.
25
Advanced PSIM
Powerful Authentication and Permissions Systems:
PSIM software is designed to integrate into corporate authentication policies
using corporate IT standards. This ensures a consistent level of security
across the organization, regardless of system, operator, or user. An additional
advantage is that a PSIM can offer administrable role-based permissions which
help enforce corporate compliance and complete a full security, safety, and HR
program management system.
High Availability/Disaster Recovery:
Well designed PSIM solutions allow organisations to build high levels of
resilience for five nines, giving 99.999 percent of uptime. In a command and
control facility, down time of any type for any reason is unacceptable, even for
routine maintenance. Many are surprised, often at the worst of times, that their
security system has several single points of failure.
Process Guidance and Intelligent Workflow:
A significant added value of PSIM is its ability to guide an operator through
the process of managing alarms, whether they are from a fire alarm system,
an access control system, video content analytics, etc. This is typically done to
ensure security operations comply with processes in line with enterprise risk
management, or that are needed to ensure compliance with regulatory bodies.
Often the need to enforce regulatory compliance is the key value driver of a
PSIM solution; this is also a feature missing from most ACS and VMS platforms.
26
Advanced PSIM continued...
Management Reporting and Integration of Business Systems:
A true PSIM is based around adding business value; its ability to link into other
business systems allowing it to increase overall business performance. Business
speed and incident impact are now too far reaching to keep important situational
data down at the operational level. In-depth and specialized reporting can
be easily generated using simple built-in tools. Management reports can be
automated and sent out to relevant individuals by e-mail. Generally, end-users
create different levels of reports for different levels of management.
For example a shift supervisor would receive relevant reports on his shift, a
security manager would receive overall security performance and incident based
reports, and a CISO would receive high level KPI-based reports. To further drive
value from the security system out to other departments of a company, PSIM
data mining and analytic capabilities can be utilized to create highly specialized
reports for other department heads. For example, video data from a camera
on a loading dock combined with a truck gate card reader normally used by the
security department can be used by the headquarters department to enforce
vendor compliance with drug tests and site safety induction currency.
The facility manager can use that same data to monitor his internal staff’s safety
procedures while loading the truck and verifying that the operator loading the
truck is current on his equipment operation license.
27
Keith Bloodworth, CEO - CNL Software
A well deployed PSIM will help an organization well beyond just physical security.
We have seen organizations starting to move focus more on linking PSIM with Business
Intelligence.
For example we have deployed a PSIM system where 2,500 buses are monitoring using GPS tracking and mapping. The organization has
integrated access control at the bus door, so they know exactly who is using the bus service. Now this can be developed further to use the
GPS tracking to ensure the bus does not go off route not only for the security of people and assets, but at the same can be used to monitor
and manage the efficiency of the bus service.
Another example is video data from a camera on the loading dock of a port combined with a truck gate card reader normally monitored by
the security department can be used by the HR department to enforce vendor compliance with drug tests and site safety induction currency.
The facility manager can use that same data to monitor his internal staff’s safety procedures while loading the truck and verifying that the
operator loading the truck is current on his equipment operation license.
This trend is set to grow, as more security infrastructure becomes IP based and products become available to allow them to talk to other
business systems. It is all part of the converged environments we are living in.
More and more organizations are finding that the real value lies not in the hardware or the device they are using, but in the software that is
pulling everything together. Devices whether security or non-security are simply “soft sensors”, but pull them together with data streams,
apply some intelligence and suddenly you have the ability to make better business decisions.
Organizations across the globe are trying hard to be more efficient, and are looking to technology to provide part of the solution. It is a great
time to be an innovative software company.
28
The big question, is PSIM for you?
Factor
Disagree
1
2
3
Agree
4
5
Our security processes are complicated. They involve multiple people with security
and facilities.
We have a number of different systems which perform different tasks. These vary
from site to site.
Our company requires more insight into the value that our Security investment is
delivering.
Our security team is small and covers a large geographic area. It is difficult to
respond to all incidents.
It would be impossible to respond to every alarm we generate.
We use contracted security services and are finding that we have a high turnover of
contracted staff.
We would improve the perception of security if we were able to play a bigger role
within other areas of the business.
We already use most or all, of the capabilities of our current security teams. There
is very little room for greater efficiency.
Security within our organization is very reactive.
Much of the site specific information and processes live within paper based
manuals and in the minds of key security personnel.
To interpret your results, add your scores together.
• If you scored over 35, you’re ready for PSIM.
• If you scored between 20 – 35, you are moving in that direction. You should consider getting started with PSIM very soon.
• If you scored under 20, you may not be ready for PSIM quite yet. But that doesn’t mean you can’t make preparations!
Regardless of your score, there is good news! Where you are now is exactly where you need to be in order to get more from your security
investment. So why not contact us to take the next step to a secure future with CNL Software. Email info@cnlsoftware.com today!
29
About CNL Software
About IPSecurityCenterTM
CNL Software is a world leader and global provider of Physical
Security Information Management (PSIM) software, designed for
complete Integrated Situation Management. Our award winning
PSIM technology is deployed to secure major cities, critical
infrastructure and global commerce. CNL Software’s solutions sits at
the heart of some of the largest, most complex and ground-breaking
security integration projects in the world. Our work with leading
organizations is helping to shape the future of security by offering
thought leadership on key issues such as asset protection, energy
reduction, process compliance and business advantage in converged
physical environments.
IPSecurityCenter is the ultimate PSIM software based integration
and management platform. It connects and manages disparate
building and security technologies such as video surveillance, life
critical systems, radar, analytics, HVAC, PIDS, GPS tracking and GIS
mapping. Through aggregating intelligence from these systems, it
allows organizations to react faster and more precisely to incidents.
IPSecurityCenter provides operators with real-time Situational
Awareness through a Common Operating Picture (COP) and following
an alert, alarm or event presents step by step process guidance,
ensuring complete compliance to security policies.
Contact Us
CNL Software Americas
11715 Fox Road, Suite 400-190
Indianapolis, IN 46236 USA
Tel: +1.317.522.0313
CNL Software UK
CNL House, Lower Guildford Road
Knaphill, Surrey, GU21 2EP, UK
Tel: +44 (0)1483 480088
Email : info@cnlsoftware.com
www.cnlsoftware.com
Copyright © 2013 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.