SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
www.cnlsoftware.com
CNL Software White Paper
PSIM: Why Should I Be Interested?
February 2012
What is PSIM?
Physical Security Information Management (PSIM)
software enables security departments to manage an
enterprise’s exposure to security risk. It is designed to
aid decision making and deployment planning within an
organization.
Within physical security operations it has been widely
accepted that critical information from numerous sources
is left to system operators to interpret and act upon
consistently and correctly. Most end users have video
surveillance, access control and building management
systems. These systems are not integrated together and
work independently with no communication with other
systems in the ecosystem.
Security breaches and challenges
Following several large security breaches, such as 9/11
and 7/7, security professionals have recognized the need
bring together this information in a format that can be
visualized and distributed. As a result the security industry
is now in transition; moving from disparate systems to
integrated and interoperable systems.
Whilst system integration might not seem much of a
challenge in the world of IT where standards have been
around for decades, the physical security world has been
much slower to adapt to change. This means a large
number of organizations are using lots of systems in their
control room which cannot work with each other.
How does PSIM help?
Firstly, PSIM provides an of the shelf platform to manage
all of these systems, including both legacy systems and
new technology, by connecting them together through a
single interface. This is far more cost effective than other
forms of integration such as bespoke turnkey solutions
offered by some integrators.
Secondly, it uses workflow technology to provide
operators with guidance and intelligence for situation
management. This enforces all policies, increases
effectiveness and provides evidence of compliance for
auditing and risk mitigation. For example it can perform
intuitive prioritization and escalation according to a range
of predetermined criteria that might include chronology,
location, priority and prevailing threat.
PSIM: Why Should I Be Interested?
February 2012 Confidential © 2012 CNL Software Page 1
How does PSIM differ from other forms of
integration?
Several studies have been carried out in this area by
research companies including Frost and Sullivan and
IMS, which have highlighted some of the features that
distinguish a PSIM solution from other physical security
and event management products. These key points define
a PSIM product, and have been collated below;
Open Platform: It provides easy integration with a
variety of systems from leading manufacturers. It is
therefore essential that the PSIM vendor is not tied to any
manufacturer of the underlying systems.
Data Collection: Device level information is collected
from all connected systems. It should provide the ability
to integrate events and alarms from these systems along
with information such as time and geography, allowing it
to automatically identify situations and then dynamically
update them as they unfold.
Data Aggregation: The PSIM software should have the
ability to evaluate the information that is gathered to
identify and priorities real incidents and situations.
Visualization and Collaboration: It should provide the
ability to visualize a situation as is evolves and to share
this intelligence with response teams, ensuring responses
are fast and appropriate.
Geospatial Engine: Dynamically locating and creating
relationships between devices, people and assets
relationshipsisessential.Forexample,itmayautomatically
identify the nearest cameras to a situation’s address or
locate the security person closest to a medical emergency.
This should offer the ability to displays situations, devices,
people and alarms—and shows what is happening in
real time within a given situation or globally across all
situations.
Incident Resolution: The PSIM system software should
facilitate the presentation of logically displayed and
clearly communicated actions. It should enforce standard
operating procedures to an operator, along with the
information, tools, and contact information needed for
resolution—all within a single user interface. It should
provide a set of easy-to-use visual tools to generate
policies that are automatically imported into the system
for use in the identification and resolution of situations.
February 2012 Confidential © 2012 CNL Software Page 2
About CNL Software
CNL Software is a world leader and global provider
of Physical Security Information Management (PSIM)
software, designed for complete Integrated Situation
Management. Our award winning PSIM technology is
deployed to secure major cities, critical infrastructure and
global commerce. CNL’s software sits at the heart of some
of the largest, most complex and ground-breaking security
integration projects in the world. Our work with leading
organizations is helping to shape the future of security by
offering thought leadership on key issues such as asset
protection, energy reduction, process compliance and
business advantage in converged physical environments.
About IPSecurityCenterTM
IPSecurityCenter is the ultimate PSIM software based
integration and management platform. It connects and
manages disparate building and security technologies
such as video surveillance, life critical systems, radar,
analytics, HVAC, PIDS, GPS tracking and GIS mapping.
Through aggregating intelligence from these systems, it
allows organizations to react faster and more precisely
to incidents. IPSecurityCenter provides operators with
real-time Situational Awareness through a Common
Operating Picture (COP) and following an alert, alarm or
event presents step by step process guidance, ensuring
complete compliance to security policies.
Need more information?
For more information on PSIM and how it benefit your
organisation visit www.cnlsoftware.com
Reporting: All activity should be monitored, including all
operator actions, to aid compliance management, provide
training scenarios and as an auditable record of activity
subsequent to a security incident. It should gather all
information (videos, alarms, audio), actions taken, and
results into one folder for compliance and investigative
analysis or post situation training.
Modular Platform: It should dynamically adapt to
changes in devices, configurations, situations, policies,
and reporting while the system is running and support a
distributed architecture for high availability and disaster
recovery.
Are all PSIM solutions the same?
There are several true PSIM vendors in the market place
who have been deploying their PSIM solutions for more
than five years now. These vendors are several versions
in to the development of their software, giving them vital
experience that only comes from successfully deploying a
number of large scale installations. This has enabled them
to understand the challenges and create products that are
mature enough to meet the wide number of applications
seen in PSIM today.
Unfortunately, there are also a large number of companies
who are now marketing their old products under the PSIM
banner; which is creating confusion in the market place as
these products do not have many of the features essential
to a PSIM solution.
True PSIM solutions have become more sophisticated,
emphasizing added organization value through hardened
security and increased efficiency or reduced ongoing
costs. The crucial factor being that the customer can
decide what their priorities are and implement all or just a
few modules of a PSIM according to their unique situation.
This flexibility is key when selecting a PSIM solution.
Organizations should research the product and ensure
the PSIM solution is future-proof and can adapt to the
organization’s changing security needs. This will reduce
the risk of purchasing a system that will need replacing if
the organization’s circumstances change a few years down
the line.
PSIM: Why Should I Be Interested?
www.cnlsoftware.com
Copyright © 2012 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.
Contact Us
CNL Software USA
11715 Fox Road, Suite 400-190
Indianapolis, IN 46236 USA
Tel: +1.317.522.0313
CNL Software UK
CNL House, Lower Guildford Road
Knaphill, Surrey, GU21 2EP, UK
Tel: +44 (0)1483 480088
Email : info@cnlsoftware.com
MWP/501/0212

Weitere ähnliche Inhalte

Was ist angesagt?

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 

Was ist angesagt? (20)

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
PSIM for Healthcare
PSIM for HealthcarePSIM for Healthcare
PSIM for Healthcare
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 

Ähnlich wie PSIM: Why Should I Be Interested? - Key Benefits of PSIM Explained

Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management marketRishabhJain1113
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 
Superior Situational Awareness - PSIM (Physical Security Information Management)
Superior Situational Awareness - PSIM (Physical Security Information Management)Superior Situational Awareness - PSIM (Physical Security Information Management)
Superior Situational Awareness - PSIM (Physical Security Information Management)Matryx Consulting Pty Ltd
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterpriseVidSys, Inc.
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Actionable insights
Actionable insightsActionable insights
Actionable insightsTim Youm
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09pladott11
 
Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management Uwe Berger
 

Ähnlich wie PSIM: Why Should I Be Interested? - Key Benefits of PSIM Explained (20)

Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management market
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Superior Situational Awareness - PSIM (Physical Security Information Management)
Superior Situational Awareness - PSIM (Physical Security Information Management)Superior Situational Awareness - PSIM (Physical Security Information Management)
Superior Situational Awareness - PSIM (Physical Security Information Management)
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 
Cybersecurity automation
Cybersecurity automationCybersecurity automation
Cybersecurity automation
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
14 june
14 june14 june
14 june
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09
 
Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management
 

Kürzlich hochgeladen

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

PSIM: Why Should I Be Interested? - Key Benefits of PSIM Explained

  • 1. www.cnlsoftware.com CNL Software White Paper PSIM: Why Should I Be Interested? February 2012
  • 2. What is PSIM? Physical Security Information Management (PSIM) software enables security departments to manage an enterprise’s exposure to security risk. It is designed to aid decision making and deployment planning within an organization. Within physical security operations it has been widely accepted that critical information from numerous sources is left to system operators to interpret and act upon consistently and correctly. Most end users have video surveillance, access control and building management systems. These systems are not integrated together and work independently with no communication with other systems in the ecosystem. Security breaches and challenges Following several large security breaches, such as 9/11 and 7/7, security professionals have recognized the need bring together this information in a format that can be visualized and distributed. As a result the security industry is now in transition; moving from disparate systems to integrated and interoperable systems. Whilst system integration might not seem much of a challenge in the world of IT where standards have been around for decades, the physical security world has been much slower to adapt to change. This means a large number of organizations are using lots of systems in their control room which cannot work with each other. How does PSIM help? Firstly, PSIM provides an of the shelf platform to manage all of these systems, including both legacy systems and new technology, by connecting them together through a single interface. This is far more cost effective than other forms of integration such as bespoke turnkey solutions offered by some integrators. Secondly, it uses workflow technology to provide operators with guidance and intelligence for situation management. This enforces all policies, increases effectiveness and provides evidence of compliance for auditing and risk mitigation. For example it can perform intuitive prioritization and escalation according to a range of predetermined criteria that might include chronology, location, priority and prevailing threat. PSIM: Why Should I Be Interested? February 2012 Confidential © 2012 CNL Software Page 1 How does PSIM differ from other forms of integration? Several studies have been carried out in this area by research companies including Frost and Sullivan and IMS, which have highlighted some of the features that distinguish a PSIM solution from other physical security and event management products. These key points define a PSIM product, and have been collated below; Open Platform: It provides easy integration with a variety of systems from leading manufacturers. It is therefore essential that the PSIM vendor is not tied to any manufacturer of the underlying systems. Data Collection: Device level information is collected from all connected systems. It should provide the ability to integrate events and alarms from these systems along with information such as time and geography, allowing it to automatically identify situations and then dynamically update them as they unfold. Data Aggregation: The PSIM software should have the ability to evaluate the information that is gathered to identify and priorities real incidents and situations. Visualization and Collaboration: It should provide the ability to visualize a situation as is evolves and to share this intelligence with response teams, ensuring responses are fast and appropriate. Geospatial Engine: Dynamically locating and creating relationships between devices, people and assets relationshipsisessential.Forexample,itmayautomatically identify the nearest cameras to a situation’s address or locate the security person closest to a medical emergency. This should offer the ability to displays situations, devices, people and alarms—and shows what is happening in real time within a given situation or globally across all situations. Incident Resolution: The PSIM system software should facilitate the presentation of logically displayed and clearly communicated actions. It should enforce standard operating procedures to an operator, along with the information, tools, and contact information needed for resolution—all within a single user interface. It should provide a set of easy-to-use visual tools to generate policies that are automatically imported into the system for use in the identification and resolution of situations.
  • 3. February 2012 Confidential © 2012 CNL Software Page 2 About CNL Software CNL Software is a world leader and global provider of Physical Security Information Management (PSIM) software, designed for complete Integrated Situation Management. Our award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. CNL’s software sits at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage in converged physical environments. About IPSecurityCenterTM IPSecurityCenter is the ultimate PSIM software based integration and management platform. It connects and manages disparate building and security technologies such as video surveillance, life critical systems, radar, analytics, HVAC, PIDS, GPS tracking and GIS mapping. Through aggregating intelligence from these systems, it allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time Situational Awareness through a Common Operating Picture (COP) and following an alert, alarm or event presents step by step process guidance, ensuring complete compliance to security policies. Need more information? For more information on PSIM and how it benefit your organisation visit www.cnlsoftware.com Reporting: All activity should be monitored, including all operator actions, to aid compliance management, provide training scenarios and as an auditable record of activity subsequent to a security incident. It should gather all information (videos, alarms, audio), actions taken, and results into one folder for compliance and investigative analysis or post situation training. Modular Platform: It should dynamically adapt to changes in devices, configurations, situations, policies, and reporting while the system is running and support a distributed architecture for high availability and disaster recovery. Are all PSIM solutions the same? There are several true PSIM vendors in the market place who have been deploying their PSIM solutions for more than five years now. These vendors are several versions in to the development of their software, giving them vital experience that only comes from successfully deploying a number of large scale installations. This has enabled them to understand the challenges and create products that are mature enough to meet the wide number of applications seen in PSIM today. Unfortunately, there are also a large number of companies who are now marketing their old products under the PSIM banner; which is creating confusion in the market place as these products do not have many of the features essential to a PSIM solution. True PSIM solutions have become more sophisticated, emphasizing added organization value through hardened security and increased efficiency or reduced ongoing costs. The crucial factor being that the customer can decide what their priorities are and implement all or just a few modules of a PSIM according to their unique situation. This flexibility is key when selecting a PSIM solution. Organizations should research the product and ensure the PSIM solution is future-proof and can adapt to the organization’s changing security needs. This will reduce the risk of purchasing a system that will need replacing if the organization’s circumstances change a few years down the line. PSIM: Why Should I Be Interested?
  • 4. www.cnlsoftware.com Copyright © 2012 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners. Contact Us CNL Software USA 11715 Fox Road, Suite 400-190 Indianapolis, IN 46236 USA Tel: +1.317.522.0313 CNL Software UK CNL House, Lower Guildford Road Knaphill, Surrey, GU21 2EP, UK Tel: +44 (0)1483 480088 Email : info@cnlsoftware.com MWP/501/0212