THE ULTIMATE GUIDE TO PSIM www.cnlsoftware.com Table of Contents Introduction.................................................................................................................................................................. 3 PSIM defined................................................................................................................................................................ 6 Features of PSIM platforms.......................................................................................................................................... 7 PSIM in the News......................................................................................................................................................... 8 What PSIM is NOT...................................................................................................................................................... 10 What PSIM does......................................................................................................................................................... 11 So WHO uses PSIM?................................................................................................................................................... 13 Case Study: City of Atlanta......................................................................................................................................... 14 PSIM the story so far…............................................................................................................................................... 16 What is creating the need for PSIM? ......................................................................................................................... 17 Where does the ROI of PSIM live? . ........................................................................................................................... 18 What do customers say about PSIM? ........................................................................................................................ 19 Case Study: IBM UK.................................................................................................................................................... 20 What does PSIM replace?.......................................................................................................................................... 22 Relationship to VMS................................................................................................................................................... 23 Relationship to ACS.................................................................................................................................................... 24 Relationship to IT-based Security............................................................................................................................... 25 Advanced PSIM........................................................................................................................................................... 26 Keith Bloodworth, CEO - CNL Software...................................................................................................................... 28 The big question, is PSIM for you? ............................................................................................................................ 29 2 Introduction Security should sit at the heart of every business, after all what is the point of creating a valuable enterprise with staff, property, goods and services if someone can just take them from you? In reality security is a grudge purchase for many businesses. Physical Security Information Management or simply PSIM (pronounced p’-sim) is a relatively new technology enabling companies to streamline, automate, and measure security tasks and workflows to increase operational efficiency and reduce ongoing security costs. 3 Why read this ‘Guide to PSIM’? ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate to you what PSIM is and how it can help your organization. It will also show you: how to select the right PSIM system for your needs and what investments are required for success. It will also explain: • Why PSIM is so important right now • How PSIM differs from other technologies such as Video Management Systems (VMS) and Access Control Systems (ACS) • The common features and advanced functions of PSIM products • How to build a solid business case and convince internal stakeholders to act • The future of PSIM We have also included exercises that you can use to discern whether your company is ready for PSIM; how it will help you increase your effectiveness and help you attain your other security goals. We hope this guide will be your ticket to a new world of more effective and efficient security management. 4 A quick test for you… These questions will help you to understand your knowledge of PSIM 1. Do you currently have the ability to verify alarms and alerts using live video? 2. Is this video able to move to capture the sensor point automatically? 3. Are you able to drag and drop the next nearest cameras to verify the extent of the incident? 4. Are you able to reach into other systems such as access control to understand how many people this incident may affect? 5. Are you able to add workflow to ensure operatives follow the correct procedures to handle this alarm and minimise disruption to your business? 6. Are you able to communicate to all response personnel automatically to alert them of the nature of the incident? 7. Are you able to look at detailed maps helping to navigate emergency responders? 8. Are you able to use your Access Control System at muster points to ensure all staff are evacuated safely? 9. Are you recording every click, action and camera viewed by the operator for a detailed post incident audit? If you have answered yes to all of the above, congratulations you have understood the power of PSIM and have a fantastic security management system. If not, read on... 5 PSIM defined WHAT: Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. HOW: It collects and correlates events from existing disparate security devices and information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations. WHY: PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence. A complete PSIM software system has six key capabilities: Collection, Analysis, Verification, Resolution, Reporting, Audit Trail 6 Features of PSIM platforms A complete PSIM software system has six key capabilities that help to distinguish it from other forms of integration: 1. Collection - Device management independent software collects data from any number of disparate security devices or systems. 2. Analysis - The system analyzes and correlates the data, events and alarms to identify the real situations and their priority. 3. Verification - PSIM software presents the relevant situation information in a quick and easily-digestible format for an operator to verify the situation. 4. Resolution - The system provides Standard Operating Procedures (SOPs), step-by-step instructions based on best practices and an organization’s policies, and tools to resolve the situation. 5. Reporting - The PSIM software tracks all the information and steps for compliance reporting, training and potentially, in-depth investigative analysis. 6. Audit trail - The PSIM also monitors how each operator interacts with the system, tracks any manual changes to security systems and calculates reaction times for each event. 7 PSIM in the News Aerial & ground surveillance secure events from all angles a&s Magazine “The recent spike in threats at large-scale events such as the terrorist bombing at the Boston Marathon, the violent double murder at the Confederations Cup in Brazil, and the bomb discovered in the bathroom near the proximity of a shrine in S?o Paulo prior to Pope Francis’ scheduled visit is emphasizing the dire need of high security at large-scale events. Surveillance has always been an excruciatingly important aspect of ensuring security. Robots, drones, tethered balloons – previously strictly limited to military usage, advanced surveillance technologies are increasingly being deployed at large-scale events. Different methods of surveillance are also being reinvented to address preexisting issues such as providing full and clear coverage in a widely spanned area... ...while VMS can provide security providers with situational awareness, PSIM is an all encompassing solution that not only provides situational awareness, but event management as well. PSIM acts as a platform that enables users to efficiently leverage people and technology to manage occurring incidents. If something were to occur, the PSIM will set off a chain of actions to address the situation.” 8 CCTV on Track Against Terror Professional Security Magazine “...from some major transport hubs, such as Euston, St Pancras and Kings Cross, the BTP CCTV hub can access multiple feeds over dedicated routes. From some TOCs, the BTP gets a single view from a single camera. In other words, as DCC Crowther said, the force has difficulty integrating different CCTV systems. In fact, he added, the UK transport system is incredibly disorganised in terms of the way CCTV is rolled out. A TOC might own multiple systems and might buy the cheapest CCTV or the best available at the time. How does BTP then bring such CCTV into a single platform? The force has worked with the Physical Security Information Management (PSIM) software company CNL, helped in budget terms by the 2012 Olympics. Next, phase three, is to bring in more systems, ‘to try to overcome these legacy issues. We are currently exploring cloud technology as well as looking at moving around and processing CCTV on an incident management basis’. That may mean viewing CCTV as an incident happens, or for investigation after an event, perhaps sending CCTV to a police officer in an interview room.” STE Security Innovation Awards Silver Medal: Technology Makeover - SecurityInfoWatch “...we have a lot of disparate systems that need to be interconnected,” Epler says. “With the introduction of PSIM technology, we can now view all security and business systems on one integrated platform.” CNL Software’s IPSecurityCenter platform gives the authority realtime situational awareness at the Security Operations Control Center. Some of the older systems as well as the newly deployed systems are combined onto one platform giving the authority total control of all operations. “It is truly command-and-control,” DeStefano says. “The PSIM came in because it’s more than just video and CBRNE (Chemical, Biological, Radiological, Nuclear and high-yield Explosives) detection — there’s also access control, a fire detection system, and there’s some integration with their train control system, for example.” “Here’s a scenario,” DeStefano continues. “Let’s say a chemical or biological weapon is released, and the agent is detected thru the CBRNE system. That alert is immediately picked up by the PSIM system, which pulls up the video, and a task force or other response is dispatched (from the command center). At the same time, the PSIM system communicates with the train control system and stops any train from pulling into that station. That’s how the system was envisioned to work.” PSIM Orchestrates a Coordinated Response a&s Magazine “...PSIM is designed as a converged platform, presenting the most relevant information and advising the best course of action in a crisis. It requires a networked environment for integration between disparate systems. However, subsystems integration is not what PSIM about. It is about the concept of operations and, most importantly, how to manage incidents. PSIM involves ongoing development to ensure it meets user needs. Such processes require customization and time. While system integrators, PSIM vendors and manufacturers can work together to tackle technical challenges, it is the clients’ responsibility to establish their SOPs. PSIM software will not tell an enterprise what it should do until an organization defines its goals and leverage the software to achieve those objectives. Successful implementations of PSIM rely not just on subsystem integration and network configuration, but also on effective communication throughout an organization.” 9 What PSIM is NOT We have talked about what PSIM is... now we need to cover what it is not: 1. A fancy name for a VMS or ACS system Not even, close. As the term suggests, PSIM encompasses all aspects of physical security - from bollards and barriers to social media monitoring to video analytics. What’s more, PSIM combines focused capabilities from your video systems, human resource systems, sensors, and other systems to create something that is more than the sum of the parts. That means you get insight that can improve every security decision you ever make! 2. A way to watch your security teams Like anything else, PSIM technology delivers results based on how you use it. Yes, it can be misused for monitoring in a bad way. But it can also be used for creating insightful but unobtrusive security across your entire organization. 3. A solution that only benefits Security Yes, the security department benefits from PSIM technology. Although, a highquality PSIM software solution ultimately is about increasing intelligence across an organization. When you think about it, that is how things should be. 4. A PSIM solution that delivers value without effort If only you could just buy PSIM technology, then sit back and watch the results produce themselves. Unfortunately not! PSIM is not a panacea by itself. Delivery requires the support of a comprehensive strategy that integrates the right processes, people, content, data, and more. In other words, success is not guaranteed. Want to know what it takes? We will cover that later. 10 X What PSIM does Beyond the time-saving and efficiency benefits of automation, PSIM enables modern business processes that are essential to any modern security department. For organizations, this includes regular reports, incident logs, continuous process improvement initiatives, training drills, system healthcare checks, and much more. Verification of Threats Many of the alarms and alerts that come into you security environment are not really threats. These need to be prioritized according to risk, such as time of day, location of personnel and a whole range of other critical factors. You also need “dynamic alarm management” to find the “hot” ones that indicate that they need you take some action. Once you have identified an alarm as “hot,” you will want to make sure security follows up quickly and in a relevant manner. You will, therefore, need integration with all connected systems and automation of processes such as key personnel alerting, video verification, and Service Level Agreements (SLA). Creating Centralized Security PSIM is enabling companies such as yours to create centralized security infrastructures, some of the advantages this provides includes: • Consistent levels of security across all sites, so no weak links • • • • Cost reductions through reduced manned guards Cost reductions through fewer control rooms Better use of remote monitoring Reports and dashboards covering the entire security estate 11 What PSIM does continued... Extracting Security ROI PSIM has become the perfect catalyst for this transition from systems, which are reliant on constant monitoring and input by security personnel to informationbased systems which proactively manage the increasing volume of information in the control room. To further drive value from the security departments of a company, PSIM data mining and analytic capabilities can be utilized to create highly specialized reports for other department heads. For example, to enforce vendor compliance with drug tests and site safety, the HR department can access video data from a camera on a loading dock combined with a truck gate card reader that is normally used by the security department. The facility manager can use that same data to monitor safety procedures for internal staff while loading the truck and verifying that the operator loading the truck is current on his equipment operation license. This trend is set to grow, as more security infrastructure becomes IP based and products become available to allow them to talk to other business systems. 12 So WHO uses PSIM? A wide range of organization use PSIM today, they operate across both public and private organizations and vary in size. One point unites all of these organizations; they understand security is not an option and must deliver for them. Some of the key verticals are; Critical Infrastructure • Roads & Rail Networks • Ports & Airports • Utilities • Energy, Oil & Gas • Mining Corporate Enterprise • IT providers • Banking & Finance • Retail & Distribution • Manufacturing • Pharmaceutical Public Safety • Police & Law enforcement • Homeland Security • Border Security • Transportation • Public Events 13 Case Study: City of Atlanta The Challenges Ensuring the safety and security of citizens and visitors is key to the success and progress of any city. This is especially true for Atlanta, one of the most multi-cultural cities in the U.S., which is attracting investment from across the globe. As with any large city, Atlanta is becoming more reliant on the use of visual intelligence to enable improved situational awareness, which helps to identify and resolve security incidents faster and more incisively. Over the years, the City of Atlanta has invested in a number of surveillance systems to provide law enforcement and other public safety professionals with visual intelligence, well before first responders arrive on scene. Recently, the City upgraded aging analog cameras to digital, and moved from leased line to wireless backhaul. Historically, these systems had all operated independently and had been located across a wide geography. The Solution Atlanta approached this challenge by launching Operation Shield in 2007, through the Atlanta Security Council. Operation Shield is a threepronged security program designed to leverage existing infrastructure (cameras and radio communications) through engaging the private sector and various government agencies. The most recent development in Operation Shield has been the establishment of a centralized Video Integration Center (VIC) by the City of Atlanta Police Department. The VIC is a rapidly-developing surveillance network which provides 24/7 real time crime prevention, emergency preparedness and heightened response capability throughout the City. To protect citizens, commerce and infrastructure, the City needed to be confident that the tools and technologies selected had been proven within the Safe City framework. They selected CNL Software’s IPSecurityCenter as the command and control platform as it was deployed in the largest and most complex Safe City projects in the world. IPSecurityCenter works by connecting the diverse range of systems into the operating platform, ensuring operators do not need to learn the underlying technology, allowing them to focus on the situations that are occurring. 14 The system has given the Atlanta Police Department the capability to integrate public and private video systems, video with computer aided dispatch (CAD), into an integrated suite of emergency dispatch applications allowing call takers and dispatchers to manage incident information more efficiently. Facts and Figures • 2,000 police officers • 8,376 square miles • 36,241 victims of Crime in 2011 • 35 MILLION visitors per year • Over five MILLION resident in Metropolitan area • 9th largest metro area in U.S. The Benefits Crime, by its nature, has significant costs to any city - Its costs are far greater than the direct costs associated with policing. Some of the key cost reductions resulting from the IPSecurityCenter solution include reducing policing costs through greater efficiency, reduced overall crime levels, increased incarceration rates and faster prosecution through the courts and legal system. IPSecurityCenter also offers other involved agencies significant capital cost savings because, by tapping into the VIC, they do not need to bring their own infrastructure to levels of tools and technologies now provided by the VIC. The ability to access video from private enterprise furthers the attractiveness of the return on investment for the system. Dave Wilkinson, President and CEO, Atlanta Police Foundation commented “We are leveraging the private sector investment in cameras and infrastructure – making Operation Shield a unique model - allowing the Atlanta Police Department, at a substantially lower cost, to keep citizens and visitors safe.” As with any enterprise level system, there is a constant need to increase the system, in terms of the number of users, geographic coverage and new functionality. IPSecurityCenter allows an easy migration path to incorporate new technologies such as gunshot detection systems, tracking systems and smart video (like LPR) and analytics – all helping to enable greater intelligence driven policing. IPSecurityCenter offers integration capability allowing Atlanta to lead the way in intelligent policing. It provides the City with the framework needed to reach both public and private systems, soon it will also allow Atlanta to make material improvements in areas of public safety other than crime, such as flood plain monitoring and fire and other emergency services, making Atlanta a Safer City. 15 PSIM the story so far… So where PSIM start and what are the trends we are seeing? Within physical security operations, it has been widely accepted that critical information from numerous sources is left to system operators to interpret and act upon consistently and correctly. Most end users have video surveillance, access control and building management systems. These systems are not integrated together and work independently with no communication with other systems in the ecosystem. Following several large security breaches, such as 9/11, security professionals recognized the need bring together this information in a format that can be visualized and distributed. As a result, the security industry is now in transition: moving from disparate systems to integrated and interoperable systems. 16 What is creating the need for PSIM? The one thing the security industry agrees on is that there is and will be greater use of intelligence within the control room. This is being driven by costs and advances in technology. If security is to do more and have less people, it needs to get smart about how it uses technology. • End user focus is on what they can do better with the data/knowledge they already have - requires making greater use of critical meta data and corporate systems • Large scale projects looking to PSIM to provide the “smarts” in and out of the control room • Greater need for security to do more than just secure a site • The average number of systems deployed in a control room is increasing • Need for better visualization and reporting of incidents and trends 17 Where does the ROI of PSIM live? The ROI for PSIM varies greatly depending on how it is applied and the vertical segment it is being used within. Opportunities for ROI across all sectors can be divided into groups based on when they are going to provide a return. Some of these are provided below; 18 What do customers say about PSIM? “CNL Software consolidated 26 locations across our operations in the United Kingdom. We are moving from 17 command & control centres down to one. We estimate our R.O.I. will be less than 18 months. The solution will provide the business with operational flexibility I never imagined possible.” Thom Williamson — Manager Security Operations, IBM Corporation, United Kingdom 19 Case Study: IBM UK The Challenges IBM and its brand name are globally recognized as a leading US company. Whilst this brand recognition has obvious benefits, the flip side to this is IBM is an easily identifiable target for individual’s intent on damaging the US and its perceived assets. The challenge was to provide IBM with a method of ensuring consistent levels of security across its 26 locations in the UK. IBM needed to ensure better visibility of threats to all of their sites, assets and people. The solution was required to rationalize the number of control rooms, which would generate a rapid return on investment, provide improved efficiency and reduce on-going costs. IBM wanted to proactively identify trends and irregularities across all the locations, allowing actions to be taken to reduce business risks. They had a number of unconnected systems from a variety of manufacturers over these sites totaling more than 700 security devices. They wanted to reduce redundancy in these security systems, maximizing the investment they had already made. Finally, the solution needed to be easy to use, ensuring even during a major incident operators were still able to easily navigate and utilize all of its features. The Solution IBM selected IPSecurityCenter as a platform for their security solution. The solution was exceptional, and was selected as a Finalist by an independent expert panel in the Security Excellence Awards 2008. Firstly, IBM realized the only way to achieve their goals was to create a centralised command and control centre, which integrated their entire physical security infrastructure including: access control, CCTV, intruder detection and fire alarm inputs across all locations. Centralizing the security management would allow them to maintain a consistent level of security across all locations. All of the information from the sub system would be collected in this centralized management system All of the resulting data needed to be presented in an easy to use interface, ensuring only relevant information was displayed when required. This was presented on individual operator workstations and a strategically placed video wall. 20 Management required detailed reports for strategic decisions; this was catered for by the customizable reporting within IPSecurityCenter. Key Benefits • Reduced Security Risks • Increased Situation Awareness • Centralized Control • Reduced Costs • Policy Compliance • Operator Guidance • Removed Vendor Dependency As increasing efficiency was part of the brief, routine tasks were automatically scheduled whether hourly, daily, weekly or monthly, which also eliminated human error. Additionally IPSecurityCenter enabled the transfer of all paper based policies into automated operator guidance, which improved efficiency and ensured consistent responses to incidents and events. The Benefits IPSecurityCenter has helped IBM convert the information from all their security systems into visual intelligence, which leads to improved situational awareness for all security staff. The workflows within IPSecurityCenter have helped the security staff to provide faster and more effective responses to incident and events, which has resulted in a reduced level of interruptions to business. The trend analysis has helped the security team identify frequently occurring incidents, allowing management to add resources to reduce these. IBM has seen an ROI on their investment within just 18 months, this is just actual savings. A price cannot be put on the increased level of security at all of the IBM sites; a single security breach could cause untold damage both financially and to the IBM brand. The impact would affect both customer trust and investor confidence. 21 What does PSIM replace? What does PSIM offer in the way of command and control/situation management capabilities that video management systems (VMS) and access control systems (ACS) don’t, especially when the latter are IP-based and can be integrated? Full security management system integration using a PSIM platform is very different from simply connecting disparate systems using a VMS or an ACS. Whether from business unit acquisitions or a desire to move toward a centralization of corporate services, progressive companies are facing the business decision of how to bring disparate systems together into a single, unified, integrated security management platform. The biggest obstacle is typically a multitude of different systems which give acceptable service at the local level, but due to the intentional proprietary nature of these systems, it is almost impossible to bring all of these systems together into a single system. Most security equipment manufacturers have made interoperability through a common GUI almost impossible. Companies are looking to combine their existing security systems, expand with their chosen brand, and slowly replace failed components with that chosen brand. The optimum platform for this is the PSIM platform. Unfortunately, there is currently no universally accepted term for what a PSIM is and what it isn’t. It is surprising how far some VMS and ACS companies are willing to stretch the description so as to at “PSIM” to their product labels. 22 Relationship to VMS Some Video Management System (VMS) vendors are positioning themselves against PSIM by calling it a custom, expensive solution for high-end, highsecurity needs. How accurate is that perception of PSIM’s applicability? PSIM creates business value by levelling proprietary physical security systems and bringing security operations in line with other business systems. This in turn allows physical security to interact with other business systems and take its place within corporate governance. This is functionality that VMS integration simply cannot provide. A VMS has limited use; typically it is purchased as a system to prevent security problems. In reality, the value that it provides is to help piece together the chain of events after a security incident has taken place. Video analytics have promised to make surveillance systems more proactive. In practice, these software and hardware additions have been greatly oversold in their capabilities. Even those VMS whose users have attained an acceptable level of functionality with their video analytic systems do not have the tools to integrate into the company’s key operational business needs. 23 Relationship to ACS When you talk about PSIM as a solution for integrating disparate physical Access Control Systems (ACS), how can or does PSIM address the issue of multiple physical credentials within an organization? PSIM software integrates data at a database level, so it can work with a headquarters database as a single point of contact to update credentials for multiple ACS. This ensures corporation-wide identity management that works both efficiently and securely. There are instances where PSIM software is used to integrate ACS from multiple manufacturers, across multiple facilities. One badge will allow an individual to gain access to all buildings, irrespective of what ACS may be in use. Without the software, the end-user would have no choice but to replace the access control systems in some of these buildings, which would cost significantly more money and cause much more inconvenience during the cutover phase. The reason for this is simple; access control vendors rarely share their SDKs and APIs with their competitors. Their goal is to sell their proprietary software and hardware, not to integrate with other access control systems. 24 Relationship to IT-based Security How might PSIM solutions interact with IT-based security solutions like SIEM to provide a comprehensive view of enterprise security? How interested are customers and/or prospects in achieving such a view? PSIM has the ability to use standard IT connectivity such as ODBC to integrate with other business systems such as SIEM, Tivoli, SAP, and a host of HR Systems. This enables organizations to create holistic solutions providing enterprisewide integrated security systems for Enterprise Risk Management solutions. Examples include Enterprise Single Sign On (E-SSO), On boarding and Off boarding, physical and logical alarm management, and hardening of physical and logical security posture. Largely, drivers for the adoption of this technology include the hardening of security for compliance to industry regulation and increasing risk associated with operating in certain industries such as critical national infrastructure, pharmacological, biotechnology and finance. Creating solutions between physical security, logical security and building management systems allows an organization to prove and enforce compliance to evolving standards such as HIPAA, Sarbanes Oxley, and HSPD-12, which requires having these intelligent systems in place. M&A activity, corporate social responsibility, and green issues as drivers of PSIM technology in the corporate space. This has been a catalyst for converged solutions, which make greater use of technology for enterprise wide security management, focusing on reducing security operational expenditure. 25 Advanced PSIM Powerful Authentication and Permissions Systems: PSIM software is designed to integrate into corporate authentication policies using corporate IT standards. This ensures a consistent level of security across the organization, regardless of system, operator, or user. An additional advantage is that a PSIM can offer administrable role-based permissions which help enforce corporate compliance and complete a full security, safety, and HR program management system. High Availability/Disaster Recovery: Well designed PSIM solutions allow organisations to build high levels of resilience for five nines, giving 99.999 percent of uptime. In a command and control facility, down time of any type for any reason is unacceptable, even for routine maintenance. Many are surprised, often at the worst of times, that their security system has several single points of failure. Process Guidance and Intelligent Workflow: A significant added value of PSIM is its ability to guide an operator through the process of managing alarms, whether they are from a fire alarm system, an access control system, video content analytics, etc. This is typically done to ensure security operations comply with processes in line with enterprise risk management, or that are needed to ensure compliance with regulatory bodies. Often the need to enforce regulatory compliance is the key value driver of a PSIM solution; this is also a feature missing from most ACS and VMS platforms. 26 Advanced PSIM continued... Management Reporting and Integration of Business Systems: A true PSIM is based around adding business value; its ability to link into other business systems allowing it to increase overall business performance. Business speed and incident impact are now too far reaching to keep important situational data down at the operational level. In-depth and specialized reporting can be easily generated using simple built-in tools. Management reports can be automated and sent out to relevant individuals by e-mail. Generally, end-users create different levels of reports for different levels of management. For example a shift supervisor would receive relevant reports on his shift, a security manager would receive overall security performance and incident based reports, and a CISO would receive high level KPI-based reports. To further drive value from the security system out to other departments of a company, PSIM data mining and analytic capabilities can be utilized to create highly specialized reports for other department heads. For example, video data from a camera on a loading dock combined with a truck gate card reader normally used by the security department can be used by the headquarters department to enforce vendor compliance with drug tests and site safety induction currency. The facility manager can use that same data to monitor his internal staff’s safety procedures while loading the truck and verifying that the operator loading the truck is current on his equipment operation license. 27 Keith Bloodworth, CEO - CNL Software A well deployed PSIM will help an organization well beyond just physical security. We have seen organizations starting to move focus more on linking PSIM with Business Intelligence. For example we have deployed a PSIM system where 2,500 buses are monitoring using GPS tracking and mapping. The organization has integrated access control at the bus door, so they know exactly who is using the bus service. Now this can be developed further to use the GPS tracking to ensure the bus does not go off route not only for the security of people and assets, but at the same can be used to monitor and manage the efficiency of the bus service. Another example is video data from a camera on the loading dock of a port combined with a truck gate card reader normally monitored by the security department can be used by the HR department to enforce vendor compliance with drug tests and site safety induction currency. The facility manager can use that same data to monitor his internal staff’s safety procedures while loading the truck and verifying that the operator loading the truck is current on his equipment operation license. This trend is set to grow, as more security infrastructure becomes IP based and products become available to allow them to talk to other business systems. It is all part of the converged environments we are living in. More and more organizations are finding that the real value lies not in the hardware or the device they are using, but in the software that is pulling everything together. Devices whether security or non-security are simply “soft sensors”, but pull them together with data streams, apply some intelligence and suddenly you have the ability to make better business decisions. Organizations across the globe are trying hard to be more efficient, and are looking to technology to provide part of the solution. It is a great time to be an innovative software company. 28 The big question, is PSIM for you? Factor Disagree 1 2 3 Agree 4 5 Our security processes are complicated. They involve multiple people with security and facilities. We have a number of different systems which perform different tasks. These vary from site to site. Our company requires more insight into the value that our Security investment is delivering. Our security team is small and covers a large geographic area. It is difficult to respond to all incidents. It would be impossible to respond to every alarm we generate. We use contracted security services and are finding that we have a high turnover of contracted staff. We would improve the perception of security if we were able to play a bigger role within other areas of the business. We already use most or all, of the capabilities of our current security teams. There is very little room for greater efficiency. Security within our organization is very reactive. Much of the site specific information and processes live within paper based manuals and in the minds of key security personnel. To interpret your results, add your scores together. • If you scored over 35, you’re ready for PSIM. • If you scored between 20 – 35, you are moving in that direction. You should consider getting started with PSIM very soon. • If you scored under 20, you may not be ready for PSIM quite yet. But that doesn’t mean you can’t make preparations! Regardless of your score, there is good news! Where you are now is exactly where you need to be in order to get more from your security investment. So why not contact us to take the next step to a secure future with CNL Software. Email info@cnlsoftware.com today! 29 About CNL Software About IPSecurityCenterTM CNL Software is a world leader and global provider of Physical Security Information Management (PSIM) software, designed for complete Integrated Situation Management. Our award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. CNL Software’s solutions sits at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage in converged physical environments. IPSecurityCenter is the ultimate PSIM software based integration and management platform. It connects and manages disparate building and security technologies such as video surveillance, life critical systems, radar, analytics, HVAC, PIDS, GPS tracking and GIS mapping. Through aggregating intelligence from these systems, it allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time Situational Awareness through a Common Operating Picture (COP) and following an alert, alarm or event presents step by step process guidance, ensuring complete compliance to security policies. Contact Us CNL Software Americas 11715 Fox Road, Suite 400-190 Indianapolis, IN 46236 USA Tel: +1.317.522.0313 CNL Software UK CNL House, Lower Guildford Road Knaphill, Surrey, GU21 2EP, UK Tel: +44 (0)1483 480088 Email : info@cnlsoftware.com www.cnlsoftware.com Copyright © 2013 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.