THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer...

30
www.cnlsoſtware.com THE ULTIMATE GUIDE TO PSIM

Transcript of THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer...

Page 1: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

www.cnlsoftware.com

THE ULTIMATE GUIDE TO PSIM

Page 2: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

2

Table of ContentsIntroduction ................................................................................................................................................................. 3

PSIM defined ............................................................................................................................................................... 6

Features of PSIM platforms ......................................................................................................................................... 7

PSIM in the News ........................................................................................................................................................ 8

What PSIM is NOT ..................................................................................................................................................... 10

What PSIM does ........................................................................................................................................................ 11

So WHO uses PSIM? .................................................................................................................................................. 13

Case Study: City of Atlanta ........................................................................................................................................ 14

PSIM the story so far… .............................................................................................................................................. 16

What is creating the need for PSIM? ........................................................................................................................ 17

Where does the ROI of PSIM live? ............................................................................................................................ 18

What do customers say about PSIM? ....................................................................................................................... 19

Case Study: IBM UK ................................................................................................................................................... 20

What does PSIM replace? ......................................................................................................................................... 22

Relationship to VMS .................................................................................................................................................. 23

Relationship to ACS ................................................................................................................................................... 24

Relationship to IT-based Security .............................................................................................................................. 25

Advanced PSIM .......................................................................................................................................................... 26

Keith Bloodworth, CEO - CNL Software ..................................................................................................................... 28

The big question, is PSIM for you? ........................................................................................................................... 29

Page 3: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

3

IntroductionSecurity should sit at the heart of every business, after all what is the point of creating a valuable enterprise with staff, property, goods and services if someone can just take them from you? In reality security is a grudge purchase for many businesses.

Physical Security Information Management or simply PSIM (pronounced p’-sim) is a relatively new technology enabling companies to streamline, automate, and measure security tasks and workflows to increase operational efficiency and reduce ongoing security costs.

Page 4: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

4

‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate to you what PSIM is and how it can help your organization. It will also show you: how to select the right PSIM system for your needs and what investments are required for success.

It will also explain: • WhyPSIMissoimportantrightnow• How PSIM differs from other technologies such as Video Management

Systems(VMS)andAccessControlSystems(ACS)• ThecommonfeaturesandadvancedfunctionsofPSIMproducts• Howtobuildasolidbusinesscaseandconvinceinternalstakeholderstoact• ThefutureofPSIM

We have also included exercises that you can use to discern whether your company is ready for PSIM; how it will help you increase your effectiveness and help you attain your other security goals.

We hope this guide will be your ticket to a new world of more effective and efficient security management.

Why read this ‘Guide to PSIM’?

Page 5: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

5

A quick test for you…These questions will help you to understand your knowledge of PSIM

1. Do you currently have the ability to verify alarms and alerts using live video?

2. Is this video able to move to capture the sensor point automatically?

3. Are you able to drag and drop the next nearest cameras to verify the extent of the incident?

4. Are you able to reach into other systems such as access control to understand how many people this incident may affect?

5. Are you able to add workflow to ensure operatives follow the correct procedures to handle this alarm and minimise disruption to your business?

6. Are you able to communicate to all response personnel automatically to alert them of the nature of the incident?

7. Are you able to look at detailed maps helping to navigate emergency responders?

8. Are you able to use your Access Control System at muster points to ensure all staff are evacuated safely?

9. Are you recording every click, action and camera viewed by the operator for a detailed post incident audit?

If you have answered yes to all of the above, congratulations you have understood the power of PSIM and have a fantastic security management system. If not, read on...

Page 6: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

6

WHAT: Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.

HOW:It collects and correlates events from existing disparate security devices and information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations.

WHY:PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.

A complete PSIM software system has six key capabilities:Collection,Analysis,Verification,Resolution,Reporting,AuditTrail

PSIM defined

Page 7: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

7

Features of PSIM platformsA complete PSIM software system has six key capabilities that help to distinguish it from other forms of integration:

1. Collection - Device management independent software collects data fromany number of disparate security devices or systems.

2. Analysis- The system analyzes and correlates the data, events and alarmsto identify the real situations and their priority.

3. Verification - PSIM software presents the relevant situation information ina quick and easily-digestible format for an operator to verify the situation.

4. Resolution - The system provides Standard Operating Procedures (SOPs),step-by-step instructions based on best practices and an organization’spolicies, and tools to resolve the situation.

5. Reporting - The PSIM software tracks all the information and steps forcompliance reporting, training and potentially, in-depth investigativeanalysis.

6. Audit trail - The PSIM also monitors how each operator interacts withthe system, tracks any manual changes to security systems and calculatesreaction times for each event.

Page 8: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

8

CCTVonTrackAgainstTerrorProfessionalSecurityMagazine

“...from somemajor transport hubs, suchas Euston, St PancrasandKingsCross,theBTPCCTVhubcanaccessmultiplefeedsoverdedicated routes. From some TOCs, the BTP gets a single viewfromasinglecamera.Inotherwords,asDCCCrowthersaid,theforcehasdifficultyintegratingdifferentCCTVsystems.Infact,headded,theUKtransportsystemisincrediblydisorganisedintermsofthewayCCTVisrolledout.ATOCmightownmultiplesystemsandmight buy the cheapest CCTV or the best available at thetime.HowdoesBTPthenbringsuchCCTVintoasingleplatform?The force has worked with the Physical Security InformationManagement (PSIM) software company CNL, helped in budgettermsbythe2012Olympics.

Next,phasethree,istobringinmoresystems,‘totrytoovercometheselegacyissues.WearecurrentlyexploringcloudtechnologyaswellaslookingatmovingaroundandprocessingCCTVonanincident management basis’. That may mean viewing CCTV asanincidenthappens,orforinvestigationafteranevent,perhapssendingCCTVtoapoliceofficerinaninterviewroom.”

PSIM in the NewsAerial & ground surveillance secure events from all angles a&s Magazine

“The recent spike in threats at large-scale events such as the terrorist bombing at the Boston Marathon, the violent double murder at the Confederations Cup in Brazil, and the bomb discovered in the bathroom near the proximity of a shrine in Sao Paulo prior to Pope Francis’ scheduled visit is emphasizing the dire need of high security at large-scale events. Surveillance has always been an excruciatingly important aspect of ensuring security. Robots, drones, tethered balloons – previously strictly limited to military usage, advanced surveillance technologies are increasingly being deployed at large-scale events. Different methods of surveillance are also being reinvented to address pre-existing issues such as providing full and clear coverage in a widely spanned area...

...while VMS can provide security providers with situational awareness, PSIM is an all encompassing solution that not only provides situational awareness, but event management as well. PSIM acts as a platform that enables users to efficiently leverage people and technology to manage occurring incidents. If something were to occur, the PSIM will set off a chain of actions to address the situation.”

Page 9: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

9

PSIMOrchestratesaCoordinatedResponsea&sMagazine

“...PSIMisdesignedasaconvergedplatform,presentingthemostrelevant informationandadvisingthebestcourseofaction inacrisis.Itrequiresanetworkedenvironmentforintegrationbetweendisparatesystems.However, subsystems integration isnotwhatPSIM about. It is about the concept of operations and, mostimportantly, how to manage incidents. PSIM involves ongoingdevelopmenttoensureitmeetsuserneeds.Suchprocessesrequirecustomizationandtime.

While system integrators,PSIMvendorsandmanufacturers canwork together to tackle technical challenges, it is the clients’responsibilitytoestablishtheirSOPs.PSIMsoftwarewillnottellanenterprisewhatitshoulddountilanorganizationdefinesitsgoalsandleveragethesoftwaretoachievethoseobjectives.SuccessfulimplementationsofPSIMrelynot juston subsystem integrationandnetworkconfiguration,butalsooneffectivecommunicationthroughoutanorganization.”

STE Security Innovation Awards Silver Medal:Technology Makeover - SecurityInfoWatch

“...we have a lot of disparate systems that need to be interconnected,” Epler says. “With the introduction of PSIM technology, we can now view all security and business systems on one integrated platform.”

CNL Software’s IPSecurityCenter platform gives the authority real-time situational awareness at the Security Operations Control Center. Some of the older systems as well as the newly deployed systems are combined onto one platform giving the authority total control of all operations.

“It is truly command-and-control,” DeStefano says. “The PSIM came in because it’s more than just video and CBRNE (Chemical, Biological, Radiological, Nuclear and high-yield Explosives) detection — there’s also access control, a fire detection system, and there’s some integration with their train control system, for example.”

“Here’s a scenario,” DeStefano continues. “Let’s say a chemical or biological weapon is released, and the agent is detected thru the CBRNE system. That alert is immediately picked up by the PSIM system, which pulls up the video, and a task force or other response is dispatched (from the command center). At the same time, the PSIM system communicates with the train control system and stops any train from pulling into that station. That’s how the system was envisioned to work.”

Page 10: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

10

What PSIM is NOTWe have talked about what PSIM is... now we need to cover what it is not:

1. A fancy name for a VMS or ACS system Not even, close. As the term suggests, PSIM encompasses all aspects of physical security - from bollards and barriers to social media monitoring to video analytics. What’s more, PSIM combines focused capabilities from your video systems, human resource systems, sensors, and other systems to create something that is more than the sum of the parts. That means you get insight that can improve every security decision you ever make!

2. A way to watch your security teams Like anything else, PSIM technology delivers results based on how you use it. Yes, it can be misused for monitoring in a bad way. But it can also be used for creating insightful but unobtrusive security across your entire organization.

3. A solution that only benefits SecurityYes, the security department benefits from PSIM technology. Although, a high-quality PSIM software solution ultimately is about increasing intelligence across an organization. When you think about it, that is how things should be.

4. A PSIM solution that delivers value without effort If only you could just buy PSIM technology, then sit back and watch the results produce themselves. Unfortunately not! PSIM is not a panacea by itself. Delivery requires the support of a comprehensive strategy that integrates the right processes, people, content, data, and more. In other words, success is not guaranteed. Want to know what it takes? We will cover that later.

X

Page 11: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

11

Beyond the time-saving and efficiency benefits of automation, PSIM enables modern business processes that are essential to any modern security department. For organizations, this includes regular reports, incident logs, continuous process improvement initiatives, training drills, system healthcare checks, and much more.

Verification of ThreatsMany of the alarms and alerts that come into you security environment are not really threats. These need to be prioritized according to risk, such as time of day, location of personnel and a whole range of other critical factors. You also need “dynamic alarm management” to find the “hot” ones that indicate that they need you take some action.

Once you have identified an alarm as “hot,” you will want to make sure security follows up quickly and in a relevant manner. You will, therefore, need integration with all connected systems and automation of processes such as key personnel alerting, video verification, and Service Level Agreements (SLA).

Creating Centralized Security PSIM is enabling companies such as yours to create centralized security infrastructures, some of the advantages this provides includes:• Consistentlevelsofsecurityacrossallsites,sonoweaklinks• Costreductionsthroughreducedmannedguards• Costreductionsthroughfewercontrolrooms• Betteruseofremotemonitoring• Reportsanddashboardscoveringtheentiresecurityestate

What PSIM does

Page 12: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

12

Extracting Security ROIPSIM has become the perfect catalyst for this transition from systems, which are reliant on constant monitoring and input by security personnel to information-based systems which proactively manage the increasing volume of information in the control room. To further drive value from the security departments of a company, PSIM data mining and analytic capabilities can be utilized to create highly specialized reports for other department heads.

For example, to enforce vendor compliance with drug tests and site safety, the HR department can access video data from a camera on a loading dock combined with a truck gate card reader that is normally used by the security department.

The facility manager can use that same data to monitor safety procedures for internal staff while loading the truck and verifying that the operator loading the truck is current on his equipment operation license. This trend is set to grow, as more security infrastructure becomes IP based and products become available to allow them to talk to other business systems.

What PSIM does continued...

Page 13: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

13

So WHO uses PSIM?A wide range of organization use PSIM today, they operate across both public and private organizations and vary in size. One point unites all of these organizations; they understand security is not an option and must deliver for them. Some of the key verticals are;

Critical Infrastructure• Roads&RailNetworks• Ports&Airports• Utilities• Energy,Oil&Gas• Mining

Corporate Enterprise • ITproviders• Banking&Finance• Retail&Distribution• Manufacturing• Pharmaceutical

Public Safety• Police&Lawenforcement• HomelandSecurity• BorderSecurity• Transportation• PublicEvents

Page 14: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

14

Case Study: City of AtlantaThe ChallengesEnsuring the safety and security of citizens and visitors is key to the success and progress of any city. This is especially true for Atlanta, one of the most multi-cultural cities in the U.S., which is attracting investment from across the globe. As with any large city, Atlanta is becoming more reliant on the use of visual intelligence to enable improved situational awareness, which helps to identify and resolve security incidents faster and more incisively.

Over the years, the City of Atlanta has invested in a number of surveillance systems to provide law enforcement and other public safety professionals with visual intelligence, well before first responders arrive on scene. Recently, the City upgraded aging analog cameras to digital, and moved from leased line to wireless backhaul. Historically, these systems had all operated independently and had been located across a wide geography.

The SolutionAtlanta approached this challenge by launching Operation Shield in 2007, through the Atlanta Security Council. Operation Shield is a three-pronged security program designed to leverage existing infrastructure (cameras and radio communications) through engaging the private sector and various government agencies. The most recent development in Operation Shield has been the establishment of a centralized Video Integration Center (VIC) by the City of Atlanta Police Department. The VIC is a rapidly-developing surveillance network which provides 24/7 real time crime prevention, emergency preparedness and heightened response capability throughout the City.

To protect citizens, commerce and infrastructure, the City needed to be confident that the tools and technologies selected had been proven within the Safe City framework. They selected CNL Software’s IPSecurityCenter as the command and control platform as it was deployed in the largest and most complex Safe City projects in the world.

IPSecurityCenter works by connecting the diverse range of systems into the operating platform, ensuring operators do not need to learn the underlying technology, allowing them to focus on the situations that are occurring.

Page 15: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

15

The system has given the Atlanta Police Department the capability to integrate public and private video systems, video with computer aided dispatch (CAD), into an integrated suite of emergency dispatch applications allowing call takers and dispatchers to manage incident information more efficiently.

The BenefitsCrime, by its nature, has significant costs to any city - Its costs are far greater than the direct costs associated with policing. Some of the key cost reductions resulting from the IPSecurityCenter solution include reducing policing costs through greater efficiency, reduced overall crime levels, increased incarceration rates and faster prosecution through the courts and legal system.

IPSecurityCenter also offers other involved agencies significant capital cost savings because, by tapping into the VIC, they do not need to bring their own infrastructure to levels of tools and technologies now provided by the VIC. The ability to access video from private enterprise furthers the attractiveness of the return on investment for the system.

Dave Wilkinson, President and CEO, Atlanta Police Foundation commented “We are leveraging the private sector investment in cameras and infrastructure – making Operation Shield a unique model - allowing the Atlanta Police Department, at a substantially lower cost, to keep citizens and visitors safe.”

As with any enterprise level system, there is a constant need to increase the system, in terms of the number of users, geographic coverage and new functionality. IPSecurityCenter allows an easy migration path to incorporate new technologies such as gunshot detection systems, tracking systems and smart video (like LPR) and analytics – all helping to enable greater intelligence driven policing.

IPSecurityCenter offers integration capability allowing Atlanta to lead the way in intelligent policing. It provides the City with the framework needed to reach both public and private systems, soon it will also allow Atlanta to make material improvements in areas of public safety other than crime, such as flood plain monitoring and fire and other emergency services, making Atlanta a Safer City.

Facts and Figures• 2,000policeofficers• 8,376squaremiles• 36,241victimsofCrimein2011• 35MILLIONvisitorsperyear• OverfiveMILLION resident in

Metropolitanarea• 9thlargestmetroareainU.S.

Page 16: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

16

PSIM the story so far…So where PSIM start and what are the trends we are seeing?

Within physical security operations, it has been widely accepted that critical information from numerous sources is left to system operators to interpret and act upon consistently and correctly. Most end users have video surveillance, access control and building management systems. These systems are not integrated together and work independently with no communication with other systems in the ecosystem.

Following several large security breaches, such as 9/11, security professionals recognized the need bring together this information in a format that can be visualized and distributed. As a result, the security industry is now in transition: moving from disparate systems to integrated and interoperable systems.

Page 17: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

17

What is creating the need for PSIM? The one thing the security industry agrees on is that there is and will be greater use of intelligence within the control room. This is being driven by costs and advances in technology. If security is to do more and have less people, it needs to get smart about how it uses technology.

• End user focus is onwhat they can do betterwith the data/knowledgetheyalreadyhave-requiresmakinggreateruseofcriticalmetadataandcorporatesystems

• LargescaleprojectslookingtoPSIMtoprovidethe“smarts”inandoutofthecontrolroom

• Greaterneedforsecuritytodomorethanjustsecureasite• Theaveragenumberofsystemsdeployedinacontrolroomisincreasing• Needforbettervisualizationandreportingofincidentsandtrends

Page 18: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

18

Where does the ROI of PSIM live? The ROI for PSIM varies greatly depending on how it is applied and the vertical segment it is being used within.

Opportunities for ROI across all sectors can be divided into groups based on when they are going to provide a return. Some of these are provided below;

Page 19: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

19

What do customers say about PSIM?

“CNL Software consolidated 26 locations across ouroperationsintheUnitedKingdom.Wearemovingfrom17command&controlcentresdowntoone.WeestimateourR.O.I.willbelessthan18months.Thesolutionwillprovidethebusinesswithoperationalflexibility Inever imaginedpossible.”Thom Williamson — Manager Security Operations, IBM Corporation, United Kingdom

Page 20: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

20

Case Study: IBM UKThe ChallengesIBM and its brand name are globally recognized as a leading US company. Whilst this brand recognition has obvious benefits, the flip side to this is IBM is an easily identifiable target for individual’s intent on damaging the US and its perceived assets.

The challenge was to provide IBM with a method of ensuring consistent levels of security across its 26 locations in the UK. IBM needed to ensure better visibility of threats to all of their sites, assets and people. The solution was required to rationalize the number of control rooms, which would generate a rapid return on investment, provide improved efficiency and reduce on-going costs.

IBM wanted to proactively identify trends and irregularities across all the locations, allowing actions to be taken to reduce business risks. They had a number of unconnected systems from a variety of manufacturers over these sites totaling more than 700 security devices. They wanted to reduce redundancy in these security systems, maximizing the investment they had already made. Finally, the solution needed to be easy to use, ensuring even during a major incident operators were still able to easily navigate and utilize all of its features.

The SolutionIBM selected IPSecurityCenter as a platform for their security solution. The solution was exceptional, and was selected as a Finalist by an independent expert panel in the Security Excellence Awards 2008.

Firstly, IBM realized the only way to achieve their goals was to create a centralised command and control centre, which integrated their entire physical security infrastructure including: access control, CCTV, intruder detection and fire alarm inputs across all locations. Centralizing the security management would allow them to maintain a consistent level of security across all locations. All of the information from the sub system would be collected in this centralized management system

All of the resulting data needed to be presented in an easy to use interface, ensuring only relevant information was displayed when required. This was presented on individual operator workstations and a strategically placed video wall.

Page 21: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

21

Management required detailed reports for strategic decisions; this was catered for by the customizable reporting within IPSecurityCenter.

As increasing efficiency was part of the brief, routine tasks were automatically scheduled whether hourly, daily, weekly or monthly, which also eliminated human error. Additionally IPSecurityCenter enabled the transfer of all paper based policies into automated operator guidance, which improved efficiency and ensured consistent responses to incidents and events.

The BenefitsIPSecurityCenter has helped IBM convert the information from all their security systems into visual intelligence, which leads to improved situational awareness for all security staff.

The workflows within IPSecurityCenter have helped the security staff to provide faster and more effective responses to incident and events, which has resulted in a reduced level of interruptions to business. The trend analysis has helped the security team identify frequently occurring incidents, allowing management to add resources to reduce these.

IBM has seen an ROI on their investment within just 18 months, this is just actual savings. A price cannot be put on the increased level of security at all of the IBM sites; a single security breach could cause untold damage both financially and to the IBM brand. The impact would affect both customer trust and investor confidence.

Key Benefits• ReducedSecurityRisks• IncreasedSituationAwareness• CentralizedControl• ReducedCosts• PolicyCompliance• OperatorGuidance• RemovedVendorDependency

Page 22: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

22

What does PSIM offer in the way of command and control/situation management capabilities that video management systems (VMS) and access control systems (ACS) don’t, especially when the latter are IP-based and can be integrated?

Full security management system integration using a PSIM platform is very different from simply connecting disparate systems using a VMS or an ACS. Whether from business unit acquisitions or a desire to move toward a centralization of corporate services, progressive companies are facing the business decision of how to bring disparate systems together into a single, unified, integrated security management platform. The biggest obstacle is typically a multitude of different systems which give acceptable service at the local level, but due to the intentional proprietary nature of these systems, it is almost impossible to bring all of these systems together into a single system. Most security equipment manufacturers have made interoperability through a common GUI almost impossible.

Companies are looking to combine their existing security systems, expand with their chosen brand, and slowly replace failed components with that chosen brand. The optimum platform for this is the PSIM platform. Unfortunately, there is currently no universally accepted term for what a PSIM is and what it isn’t. It is surprising how far some VMS and ACS companies are willing to stretch the description so as to add “PSIM” to their product labels.

What does PSIM replace?

Page 23: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

23

Relationship to VMSSome Video Management System (VMS) vendors are positioning themselves against PSIM by calling it a custom, expensive solution for high-end, high-security needs. How accurate is that perception of PSIM’s applicability?

PSIM creates business value by levelling proprietary physical security systems and bringing security operations in line with other business systems. This in turn allows physical security to interact with other business systems and take its place within corporate governance. This is functionality that VMS integration simply cannot provide.

A VMS has limited use; typically it is purchased as a system to prevent security problems. In reality, the value that it provides is to help piece together the chain of events after a security incident has taken place. Video analytics have promised to make surveillance systems more proactive. In practice, these software and hardware additions have been greatly oversold in their capabilities. Even those VMS whose users have attained an acceptable level of functionality with their video analytic systems do not have the tools to integrate into the company’s key operational business needs.

Page 24: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

24

When you talk about PSIM as a solution for integrating disparate physical Access Control Systems (ACS), how can or does PSIM address the issue of multiple physical credentials within an organization?

PSIM software integrates data at a database level, so it can work with a headquarters database as a single point of contact to update credentials for multiple ACS. This ensures corporation-wide identity management that works both efficiently and securely.

There are instances where PSIM software is used to integrate ACS from multiple manufacturers, across multiple facilities. One badge will allow an individual to gain access to all buildings, irrespective of what ACS may be in use. Without the software, the end-user would have no choice but to replace the access control systems in some of these buildings, which would cost significantly more money and cause much more inconvenience during the cutover phase. The reason for this is simple; access control vendors rarely share their SDKs and APIs with their competitors. Their goal is to sell their proprietary software and hardware, not to integrate with other access control systems.

Relationship to ACS

Page 25: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

25

Relationship to IT-based SecurityHow might PSIM solutions interact with IT-based security solutions like SIEM to provide a comprehensive view of enterprise security? How interested are customers and/or prospects in achieving such a view?

PSIM has the ability to use standard IT connectivity such as ODBC to integrate with other business systems such as SIEM, Tivoli, SAP, and a host of HR Systems. This enables organizations to create holistic solutions providing enterprise-wide integrated security systems for Enterprise Risk Management solutions. Examples include Enterprise Single Sign On (E-SSO), On boarding and Off boarding, physical and logical alarm management, and hardening of physical and logical security posture.

Largely, drivers for the adoption of this technology include the hardening of security for compliance to industry regulation and increasing risk associated with operating in certain industries such as critical national infrastructure, pharmacological, biotechnology and finance.

Creating solutions between physical security, logical security and building management systems allows an organization to prove and enforce compliance to evolving standards such as HIPAA, Sarbanes Oxley, and HSPD-12, which requires having these intelligent systems in place.

M&A activity, corporate social responsibility, and green issues as drivers of PSIM technology in the corporate space. This has been a catalyst for converged solutions, which make greater use of technology for enterprise wide security management, focusing on reducing security operational expenditure.

Page 26: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

26

Advanced PSIMPowerful Authentication and Permissions Systems: PSIM software is designed to integrate into corporate authentication policies using corporate IT standards. This ensures a consistent level of security across the organization, regardless of system, operator, or user. An additional advantage is that a PSIM can offer administrable role-based permissions which help enforce corporate compliance and complete a full security, safety, and HR program management system.

High Availability/Disaster Recovery: Well designed PSIM solutions allow organisations to build high levels of resilience for five nines, giving 99.999 percent of uptime. In a command and control facility, down time of any type for any reason is unacceptable, even for routine maintenance. Many are surprised, often at the worst of times, that their security system has several single points of failure.

Process Guidance and Intelligent Workflow: A significant added value of PSIM is its ability to guide an operator through the process of managing alarms, whether they are from a fire alarm system, an access control system, video content analytics, etc. This is typically done to ensure security operations comply with processes in line with enterprise risk management, or that are needed to ensure compliance with regulatory bodies. Often the need to enforce regulatory compliance is the key value driver of a PSIM solution; this is also a feature missing from most ACS and VMS platforms.

Page 27: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

27

Advanced PSIM continued...Management Reporting and Integration of Business Systems: A true PSIM is based around adding business value; its ability to link into other business systems allowing it to increase overall business performance. Business speed and incident impact are now too far reaching to keep important situational data down at the operational level. In-depth and specialized reporting can be easily generated using simple built-in tools. Management reports can be automated and sent out to relevant individuals by e-mail. Generally, end-users create different levels of reports for different levels of management.

For example a shift supervisor would receive relevant reports on his shift, a security manager would receive overall security performance and incident based reports, and a CISO would receive high level KPI-based reports. To further drive value from the security system out to other departments of a company, PSIM data mining and analytic capabilities can be utilized to create highly specialized reports for other department heads. For example, video data from a camera on a loading dock combined with a truck gate card reader normally used by the security department can be used by the headquarters department to enforce vendor compliance with drug tests and site safety induction currency.

The facility manager can use that same data to monitor his internal staff’s safety procedures while loading the truck and verifying that the operator loading the truck is current on his equipment operation license.

Page 28: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

28

Keith Bloodworth, CEO - CNL SoftwareA well deployed PSIM will help an organization well beyond just physical security.

We have seen organizations starting to move focus more on linking PSIM with Business Intelligence.

For example we have deployed a PSIM system where 2,500 buses are monitoring using GPS tracking and mapping. The organization has integrated access control at the bus door, so they know exactly who is using the bus service. Now this can be developed further to use the GPS tracking to ensure the bus does not go off route not only for the security of people and assets, but at the same can be used to monitor and manage the efficiency of the bus service.

Another example is video data from a camera on the loading dock of a port combined with a truck gate card reader normally monitored by the security department can be used by the HR department to enforce vendor compliance with drug tests and site safety induction currency. The facility manager can use that same data to monitor his internal staff’s safety procedures while loading the truck and verifying that the operator loading the truck is current on his equipment operation license.

This trend is set to grow, as more security infrastructure becomes IP based and products become available to allow them to talk to other business systems. It is all part of the converged environments we are living in.

More and more organizations are finding that the real value lies not in the hardware or the device they are using, but in the software that is pulling everything together. Devices whether security or non-security are simply “soft sensors”, but pull them together with data streams, apply some intelligence and suddenly you have the ability to make better business decisions.

Organizations across the globe are trying hard to be more efficient, and are looking to technology to provide part of the solution. It is a great time to be an innovative software company.

Page 29: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

29

The big question, is PSIM for you?

To interpret your results, add your scores together. • Ifyouscoredover35,you’rereadyforPSIM.• Ifyouscoredbetween20–35,youaremovinginthatdirection.YoushouldconsidergettingstartedwithPSIMverysoon.• Ifyouscoredunder20,youmaynotbereadyforPSIMquiteyet.Butthatdoesn’tmeanyoucan’tmakepreparations!

Regardless of your score, there is good news! Where you are now is exactly where you need to be in order to get more from your security investment. So why not contact us to take the next step to a secure future with CNL Software. Email [email protected] today!

Factor Disagree Agree1 2 3 4 5

Our security processes are complicated. They involve multiple people with security and facilities.We have a number of different systems which perform different tasks. These vary from site to site.Our company requires more insight into the value that our Security investment is delivering.Our security team is small and covers a large geographic area. It is difficult to respond to all incidents.It would be impossible to respond to every alarm we generate.We use contracted security services and are finding that we have a high turnover of contracted staff.We would improve the perception of security if we were able to play a bigger role within other areas of the business.We already use most or all, of the capabilities of our current security teams. There is very little room for greater efficiency.Security within our organization is very reactive.Much of the site specific information and processes live within paper based manuals and in the minds of key security personnel.

Page 30: THE ULTIMATE GUIDE TO PSIM - CNL Software · ‘The Ultimate Guide to PSIM’ is designed to answer any questions you have about this essential enabling technology. It will demonstrate

www.cnlsoftware.com

Copyright © 2018 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.

About CNL Software

CNL Software is a world leader and global provider of Physical Security Information Management (PSIM) software, designed for complete Integrated Situation Management. Our award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. CNL Software’s solutions sits at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage in converged physical environments.

About IPSecurityCenterTM

IPSecurityCenter is the ultimate PSIM software based integration and management platform. It connects and manages disparate building and security technologies such as video surveillance, life critical systems, radar, analytics, HVAC, PIDS, GPS tracking and GIS mapping. Through aggregating intelligence from these systems, it allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time Situational Awareness through a Common Operating Picture (COP) and following an alert, alarm or event presents step by step process guidance, ensuring complete compliance to security policies.

CNL Software UKBuilding 11, Watchmoor Park, Camberley GU15 3YLTel: 01276 587400

CNL Software, Inc. 21750 Red Rum Dr. Suite 117. Ashburn, VA 20147 Tel: +1.317.522.0313

Email : [email protected]

Contact Us