SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Copyright © 2014 CNL Software. All rights reserved.
IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.
IPSecurityCenterisasoftwarebasedintegrationandmanagement
platform,whichconnectsdisparatesecuritysystemssuchasradar,
analytics, PIDS, GPS tracking, GIS mapping and video surveillance;
aggregating intelligence allows organizations to react faster and
more precisely to incidents. IPSecurityCenter provides operators
with real-time situation awareness, through a common operating
picture (COP) and following an alert, alarm or trigger presents
step by step process guidance, ensuring complete compliance to
organizational security policies.
The Challenge
According to research by Washington State University,prior to the
terrorist attacks on September 11, 2001, the common perception
of transportation security was controlling theft and reducing
contraband such as drugs, illegal immigrants, and exports of
stolen vehicles and machinery. Post 9/11 transportation security
was transformed to assessing threats of possible terrorist attacks
on or through our supply chain systems. Ports, coasts, and
waterways are lined with military installations, nuclear power
plants, oil refineries, fuel tanks, pipelines, chemical plants, and
major cities with dense populations (U.S.H.R., 2004).
Internationally, port security is governed by rules issued by the
International Maritime Organization and its 2002 International
Ship and Port Facility Security Code. Additionally, programs
such as the Container Security Initiative and the Customs Trade
Partnership against Terrorism have become de facto global port
security programs.
Faced with these responsibilities and increasing governance
port Command and Control (C2) centers constantly monitor
their perimeter and critical assets using disparate systems such
as radar, video surveillance, access control, fence protection
systems, microwave sensors and video analytics to detect
activity that requires an immediate response by their security
teams. Add to this the numerous everyday false alarm triggers
such as authorized personnel, maintenance contractors, security
patrols and wildlife; the C2 center is continuously flooded with
alarms and alerts.
Responding to all of these events is unfeasible, so to verify each
incident a method of efficiently aggregating intelligence from all
systems and sensors is required.
The inability to distinguish real incidents from false alarms
significantlyreducesoperationalefficiency,reducespreparedness
and increases response times, leading to unacceptable security
risks in critical infrastructure protection environments.
When an alarm is received by the C2 center, an operator needs
to act fast and decisively. Numerous disparate systems mean
operators require extensive ongoing training on each process
relating to each alarm type. Additionally, responses vary
depending on the time, date, historic alarm data and perceived
threat level, so a method of allowing dynamic policies to be
created and enforced is absolutely essential.
The Integrated Solution
Port Security by its very nature, requires those responsible to
have complete situational awareness at all times as risks to their
facilities constantly changes and can have catastrophic effects far
beyond their site perimeter.
Ports typically have a centralized security facility with a range of
systems in place to monitor and manage security risks. To respond
and deal with the wide range of potential security risks, they
deploy response units each with differing capabilities. Integrating
all identification systems allows the immediate verification of all
incidents, greatly increasing their preparedness to respond to
real security threats with the appropriate resources.
Integrating all identification
systems allows the immediate
verification of all incidents, greatly
increasing their preparedness to
respond.
“
“
IPSecurityCenterTM
PSIM Enhancing Port Security
Includes the protection of the seaports themselves, the protection of travellers,
the inspection of cargo moving through the ports and maritime security.
About CNL Software
CNL Software is a world leader in developing Physical Security
Information Management (PSIM) software. Its award winning
technology is deployed to secure cities, critical resources and
global commerce. CNL Software’s solutions sit at the heart of
some of the largest, most complex and ground-breaking security
integration and business value initiatives in the world. Their
work with leading organizations is helping to shape the future
of security by offering thought leadership on key issues such as
energy reduction, process compliance and business advantage in
converged environments.
For more information please visit www.cnlsoftware.com
The Value Proposition
Providing a completely integrated security system,
IPSecurityCenter effectively manages all security resources,
systemsandpeopleandwillallowoperatorstohavethenecessary
level of real time awareness and emergency preparedness.
Organizations can utilize existing systems rather than replacing
their security estate, ensuring a cost effective way to achieve this.
IPSecurityCenter works with the leading security systems
in the market today and CNL Software’s technology alliance
partnerships (TAP) ensures a future proof off-the-shelf solution
to this complex integration challenge. Unlike other custom-made
integrations, IPSecurityCenter integrates bidirectionally at an
application and database level, exposing full functionality and a
complete audit trail for any reporting or investigation purposes.
Its intelligent workflow allows complex SOPs to be commissioned
and enforced for compliance and reduced operational risk.
Increased Situational Awareness
•	Common Operating Picture COP) for all security operatives
•	All security assets displayed in a Common Operating Picture
•	Aggregated intelligence for real time verification of alarms
Improved Efficiencies
•	Reduction in false alarms
•	Prioritization of the most appropriate security resources
•	Guide response teams using both audio and visual intelligence
•	Reduced training requirements
Reduced Response Time
•	Increased Emergency Preparedness
•	Live feedback from response teams for faster escalation
•	Dynamic guidance based on time, date, historic alarm data
and threat level
Risk Mitigation and Compliance
•	Supports HA/DR capabilities
•	Ensure SOPs are adhered to
•	Complete audit trail for reporting and investigation
•	Post event data fusion, allows tracking of information for
analysis and reporting to prevent future incidents
MSG-409-714
Radar
•	 Monitor traffic in radar
range
•	 Navigation information
•	 Weather system
monitoring
•	 Hazard warning
Port Security
•	 Land and water perimeter protection
•	 Authorized personnel & vessel access
•	 Vehicle and vessel recognition
•	 Mobile cargo inspection
GPS Tracking
•	 Freight tracking
•	 Container tracking
•	 Vessel tracking
•	 Perimeter breach
•	 Arrival & departure
notifications
•	 On board sensors
GIS Mapping
•	 Real time vessel tracking
•	 Spill response
•	 Shipping channel monitoring
•	 Incident tracking
The copyright in all material is owned by CNL Software or by CNL Software’s licensor(s). None of the material may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in
any form or by any means, including, but not limited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of CNL Software or the copyright owner.

Weitere ähnliche Inhalte

Was ist angesagt?

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
Merlin Govender
 
PMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterPMCD Fall 2015 Newsletter
PMCD Fall 2015 Newsletter
Sandeep Raju
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09
pladott11
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Symantec
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 

Was ist angesagt? (20)

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Manual psim
Manual psimManual psim
Manual psim
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
PMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterPMCD Fall 2015 Newsletter
PMCD Fall 2015 Newsletter
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
 

Ähnlich wie IPSecurityCenterTM PSIM Enhancing Port Security

Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
Chris Young
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
Russell Publishing
 
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdfCANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
walterzamprogno1
 
Maritime Surveillance PG24 MTR Sept 15 ARTICLE ONLY
Maritime Surveillance PG24 MTR Sept 15 ARTICLE ONLYMaritime Surveillance PG24 MTR Sept 15 ARTICLE ONLY
Maritime Surveillance PG24 MTR Sept 15 ARTICLE ONLY
Marianne Molchan
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 

Ähnlich wie IPSecurityCenterTM PSIM Enhancing Port Security (20)

CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Strengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdfStrengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdf
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Global 2-2016-en
Global 2-2016-enGlobal 2-2016-en
Global 2-2016-en
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer Magazine
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdfCANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
Defentect cbrn threat_detection system
Defentect cbrn threat_detection systemDefentect cbrn threat_detection system
Defentect cbrn threat_detection system
 
Maritime Surveillance PG24 MTR Sept 15 ARTICLE ONLY
Maritime Surveillance PG24 MTR Sept 15 ARTICLE ONLYMaritime Surveillance PG24 MTR Sept 15 ARTICLE ONLY
Maritime Surveillance PG24 MTR Sept 15 ARTICLE ONLY
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

IPSecurityCenterTM PSIM Enhancing Port Security

  • 1. Copyright © 2014 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners. IPSecurityCenterisasoftwarebasedintegrationandmanagement platform,whichconnectsdisparatesecuritysystemssuchasradar, analytics, PIDS, GPS tracking, GIS mapping and video surveillance; aggregating intelligence allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time situation awareness, through a common operating picture (COP) and following an alert, alarm or trigger presents step by step process guidance, ensuring complete compliance to organizational security policies. The Challenge According to research by Washington State University,prior to the terrorist attacks on September 11, 2001, the common perception of transportation security was controlling theft and reducing contraband such as drugs, illegal immigrants, and exports of stolen vehicles and machinery. Post 9/11 transportation security was transformed to assessing threats of possible terrorist attacks on or through our supply chain systems. Ports, coasts, and waterways are lined with military installations, nuclear power plants, oil refineries, fuel tanks, pipelines, chemical plants, and major cities with dense populations (U.S.H.R., 2004). Internationally, port security is governed by rules issued by the International Maritime Organization and its 2002 International Ship and Port Facility Security Code. Additionally, programs such as the Container Security Initiative and the Customs Trade Partnership against Terrorism have become de facto global port security programs. Faced with these responsibilities and increasing governance port Command and Control (C2) centers constantly monitor their perimeter and critical assets using disparate systems such as radar, video surveillance, access control, fence protection systems, microwave sensors and video analytics to detect activity that requires an immediate response by their security teams. Add to this the numerous everyday false alarm triggers such as authorized personnel, maintenance contractors, security patrols and wildlife; the C2 center is continuously flooded with alarms and alerts. Responding to all of these events is unfeasible, so to verify each incident a method of efficiently aggregating intelligence from all systems and sensors is required. The inability to distinguish real incidents from false alarms significantlyreducesoperationalefficiency,reducespreparedness and increases response times, leading to unacceptable security risks in critical infrastructure protection environments. When an alarm is received by the C2 center, an operator needs to act fast and decisively. Numerous disparate systems mean operators require extensive ongoing training on each process relating to each alarm type. Additionally, responses vary depending on the time, date, historic alarm data and perceived threat level, so a method of allowing dynamic policies to be created and enforced is absolutely essential. The Integrated Solution Port Security by its very nature, requires those responsible to have complete situational awareness at all times as risks to their facilities constantly changes and can have catastrophic effects far beyond their site perimeter. Ports typically have a centralized security facility with a range of systems in place to monitor and manage security risks. To respond and deal with the wide range of potential security risks, they deploy response units each with differing capabilities. Integrating all identification systems allows the immediate verification of all incidents, greatly increasing their preparedness to respond to real security threats with the appropriate resources. Integrating all identification systems allows the immediate verification of all incidents, greatly increasing their preparedness to respond. “ “ IPSecurityCenterTM PSIM Enhancing Port Security Includes the protection of the seaports themselves, the protection of travellers, the inspection of cargo moving through the ports and maritime security.
  • 2. About CNL Software CNL Software is a world leader in developing Physical Security Information Management (PSIM) software. Its award winning technology is deployed to secure cities, critical resources and global commerce. CNL Software’s solutions sit at the heart of some of the largest, most complex and ground-breaking security integration and business value initiatives in the world. Their work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as energy reduction, process compliance and business advantage in converged environments. For more information please visit www.cnlsoftware.com The Value Proposition Providing a completely integrated security system, IPSecurityCenter effectively manages all security resources, systemsandpeopleandwillallowoperatorstohavethenecessary level of real time awareness and emergency preparedness. Organizations can utilize existing systems rather than replacing their security estate, ensuring a cost effective way to achieve this. IPSecurityCenter works with the leading security systems in the market today and CNL Software’s technology alliance partnerships (TAP) ensures a future proof off-the-shelf solution to this complex integration challenge. Unlike other custom-made integrations, IPSecurityCenter integrates bidirectionally at an application and database level, exposing full functionality and a complete audit trail for any reporting or investigation purposes. Its intelligent workflow allows complex SOPs to be commissioned and enforced for compliance and reduced operational risk. Increased Situational Awareness • Common Operating Picture COP) for all security operatives • All security assets displayed in a Common Operating Picture • Aggregated intelligence for real time verification of alarms Improved Efficiencies • Reduction in false alarms • Prioritization of the most appropriate security resources • Guide response teams using both audio and visual intelligence • Reduced training requirements Reduced Response Time • Increased Emergency Preparedness • Live feedback from response teams for faster escalation • Dynamic guidance based on time, date, historic alarm data and threat level Risk Mitigation and Compliance • Supports HA/DR capabilities • Ensure SOPs are adhered to • Complete audit trail for reporting and investigation • Post event data fusion, allows tracking of information for analysis and reporting to prevent future incidents MSG-409-714 Radar • Monitor traffic in radar range • Navigation information • Weather system monitoring • Hazard warning Port Security • Land and water perimeter protection • Authorized personnel & vessel access • Vehicle and vessel recognition • Mobile cargo inspection GPS Tracking • Freight tracking • Container tracking • Vessel tracking • Perimeter breach • Arrival & departure notifications • On board sensors GIS Mapping • Real time vessel tracking • Spill response • Shipping channel monitoring • Incident tracking The copyright in all material is owned by CNL Software or by CNL Software’s licensor(s). None of the material may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not limited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of CNL Software or the copyright owner.