SlideShare une entreprise Scribd logo
1  sur  26
Safe Cities

    Washington DC, United States
    City-wide CCTV integration providing situational awareness
    protecting over 5.5 million citizens and 17.9 million visitors
    each year.

    •     Integration includes over 5,000+ CCTV cameras from district
          agencies including:
           •   Homeland Security Emergency Management Agency,
               Metropolitan Police Department, Department of
               Transportation's (DDOT), Protective Service Division's (PSD),
               District of Columbia Public Schools (DCPS)
    •     Also integrates ShotSpotter Audio Analytic Gunshot
          Detection System
    •     Supports the city’s public safety planning efforts for special
          events requiring interagency coordination

  The program will create a unified control center where all of the security
  requirements of multiple agencies within the Greater Washington area can be
  managed and processed.


Slide 1                             Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Safe Cities

    City of Atlanta, United States
    ‘Operation Shield’ - a public/private partnership CCTV
    center protecting over 5.2 million citizens & 35 million
    visitors a year.

    •     Integrating existing video surveillance cameras owned by
          private business partners, monitored at a central location
    •     Currently integrated:
           •   Atlanta Police Department (APD), Courts, Corrections,
               Protective Services, CNN Center, Coca-Cola
    •     Next steps:
           •   Atlanta Public Schools, Atlanta International Airport,
               Watershed, Metro Atlanta Rapid Transit Authority



  “The PSIM solution allows APD to cost-effectively integrate the existing camera
  networks and leverage the investments already made to reduce crime and make
  Atlanta a safer city.”
     Grant Hawkins, VP of Programs and Strategic Projects, Atlanta Police Foundation


Slide 2                             Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Safe Cities & Law Enforcement

    Greater Manchester Police, UK
    One of the largest law enforcement forces in the United
    Kingdom, protecting 2.6 million residents and 8 million
    visitors each year.

    •     Public/private integration of CCTV feeds from cameras
          including:
           •   Manchester International Airport
           •   Manchester City Council and Trafford Council
           •   Manchester City Soccer Stadium
           •   Radisson Edwardian Hotel
           •   Force fixed and rotary wing aircraft, heli-tele
           •   Mobile CCTV vans
           •   Body warn cameras and mobile evidence gatherers


  Surveillance and Intelligence gathering for highest level security event in the UK
  after the G8 Summit, plus increased public protection and rapid police response at
  major occasions, such as the UEFA Cup final.


Slide 3                              Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Homeland Security & Law Enforcement

    Law Enforcement, Middle East
    A single Common Operating Platform (COP) for mission
    critical security systems across operators with varying roles
    and permission levels.

    •     CCTV expansion project utilizing existing video surveillance
          infrastructure
    •     Leveraging significant investment in legacy platforms e.g.
           •   DVRs, GIS mapping, Computer Aided Dispatch (CAD),
               video analytics technologies
    •     Enforcing Standard Operating Procedures (SOPs) for
          response to incidents
    •     Interface with the external CCTV systems including public
          and private sector parties (e.g. Public Works, Municipalities)

  "IPSecurityCenter has exceeded our high expectations in every way… what we have
  been most impressed by has been the flexibility and customizability provided by the
  software according to user needs and integrated sub-systems".
                                             Security Sales Consultant at Smart Cube


Slide 4                           Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation & Law Enforcement

    Transport Law Enforcement, United Kingdom
    Protecting over 2.2 billion passenger journeys each year,
    centralizing monitoring and storage capability for forensic
    data.

    •     Common platform integrating:
           •   55,000+ cameras, 21 video server devices, 7,000 locations,
               25 video wall monitors, 40 operator workstations
    •     Increased operational efficiency and reduced costs
    •     50% reduction in time taken to obtain footage
    •     Faster detection of criminal activity
    •     100s of criminals brought to justice with evidence secured
          by the system



  “With some great technical wizardry, we’re able to bring these (disparate) cameras
  together, send that information to officers and we’re seeing our crime rates go
  lower.”                                               Andy Trotter, Chief Constable


Slide 5                            Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation

    Transport Network, United Kingdom
    Integrating 8,000+ cameras protecting over one billion
    passengers a year, with around three and a half million
    journeys made each day, on 11 lines serving 270 stations.

    •     Using standards and standardised architectures to minimise
          the variety and number of assets to provide services
    •     Designed for obsolescence, and low cost of ownership
    •     Providing images to the users where they need them
    •     Providing access to recorded video as users need them
    •     Staff are more mobile and need access to CCTV outside of
          the control room




  “Dependable and affordable, services, applications and communication networks
  that convey the right information to the right people, machines and places at the
  right time in order for the best decisions or actions to be taken.”


Slide 6                         Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation

    Washington Metropolitan Area Transit Authority, US

    One of the largest rail transit, bus and paratransit services
    in the US protecting over 341 million city-wide passenger
    trips each year.

    •     Includes rail stations, bus stations, maintenance garages,
          parking garages and other commercial buildings
    •     86 rail stations each with a custom interface
    •     Centrally managed without changing the existing security
          systems’ functionality
    •     Displays alarms from security subsystems based on
          predefined policies and business logic
    •     Has the same user interface for alarms generated regardless
          of alarm type or originating system

  “We have a lot of disparate systems that need to be interconnected. With the
  introduction of PSIM technology, we can now view all security and business systems
  on one integrated platform.”
                   Marshall Epler, Deputy Chief Engineer of Communications, WMATA


Slide 7                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation
    Washington State Department of Transportation,
    Ferries Division (WSF), United States
    The largest ferry system in the U.S. and fourth largest in
    the world; annually transporting more than 22 million
    riders including 10 million vehicles.

    •     Working with the Washington State Patrol, U.S. Coast Guard
          and U.S. Customs and Border Protection
    •     Managing access control, alarm and sensor events, analog
          and digital video surveillance and cameras at approximately
          43 WSF sites
    •     Integrating high definition video, management systems,
          maps/Geospatial solution
    •     Access control systems to meet Transportation Workers
          Information Clearance (TWIC) compliance


  Integrating security systems will allow the immediate verification of any incidents,
  greatly increasing preparedness to respond to potential threats withing land-based
  perimeters and beyond.


Slide 8                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation and Distribution

    Citywide Port Security, United States
    Protecting a multi-billion dollar maritime industry
    including ports & terminals, ferry operations, government
    services, recreational & commercial boating.

    •     Common platform with central monitoring and storage
          capability to share video data
    •     Increased operational efficiency leading to reduced costs
    •     Integration of new technologies allows faster detection of
          incidents
    •     Aggregation of intelligence from multiple systems for
          increased situation awareness
    •     High levels of emergency preparedness



  Interface with 4 independent marine facility closed circuit television systems to
  enable centralized display and management



Slide 9                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation and Distribution

    Container Shipping Port, United States
    Centralized operational control securing 2 port locations
    with 4 terminals specializing in handling container, reefer,
    breakbulk, agri-bulk & RoRo cargoes.

    •      Centralized control of CCTV and access control assets
           providing complete visibility and control of the entire
           security operation
    •      Integrating Radar assets including vessel tracking and
           monitoring of restricted port zones
    •      Monitoring port users requiring a Transportation Worker
           Identification Credential (TWIC), visitors and escorts
    •      Simplified role based GUI and permissions, ensuring exact,
           consistent and measurable responses


  “Allowing the transfer of data needed to support real-time situational awareness,
  as well as the sharing of event data and automated response procedures among
  multiple agencies.”                                        Security Division, CRGT


Slide 10                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation and Distribution

    Container Shipping Port, United States
    Container port-configured enhanced waterside perimeter
    security security protecting over 2 million tons of vessel,
    truck and rail cargo shipments a year.

    •      Physical security surveillance and detection systems
           monitor harbor activities and access to port security, vessel
           traffic, coastal surveillance, safety, and commercial data
    •      Secure command and control center integrating
           technologies, such as:
            •   Video surveillance, intelligent radar, automatic identification
                system base stations, patrol boat tracking, interoperable
                communications and web services




  “The system is multi-mission oriented and delivers defined information to numerous
  local and federal organizations including the US Coast Guard and Department of
  Homeland Security.”                                          Security Division, CRGT


Slide 11                             Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Transportation and Distribution

    Container Shipping Port, United States
    Video surveillance for specialized shipping terminals;
    protecting port employees and visitors as well as over
    35 million tons of cargo each year.

    •      1 central Data Center as the master site with capabilities to
           operate client workstations and secondary storage at 4
           distributed Command Centers
    •      Providing geographical map display with graphic icons
           representing alerts according to their approximate
           geographic location
    •      Integrated radar management system through which
           individual radar based alarms can trigger event driven video
           operations


  Improving security awareness and enhancing the ability of governmental/private
  entities to prevent, detect, interdict, and rapidly respond to and recover from
  terrorist acts or other “all hazard” events along the River, its adjacent communities,
  facilities, plus key critical assets within the area’s transportation infrastructure.


Slide 12                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Corporate Enterprise

    Fortune 20 Corporation, United States & Canada
    Protecting over 100,000 employees across more than 375
    locations; one of the largest and most comprehensive
    PSIM deployments in the world today.

    •      Bringing on board disparate security systems, multiple
           command and control centers plus numerous procedures
           and processes
    •      Reduced number of Command and Control Centers by 90%
    •      Automated incident response
    •      All local alerts immediately routed via IPSecurityCenter™
           directly to guards’ phones/email
    •      Eliminates massive amounts of alarms in the Command and
           Control Centers; only see escalated local alarms


  IPSecurityCenter™ offers the capacity to modify and/or add new SOPs based on
  evolving threat assessments, the ability to add new security systems as required
  and has a GUI that is easy for security officers to navigate.


Slide 13                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Corporate Enterprise

    IBM, UK
    Consolidated 26 locations across operations in the UK,
    moving from 17 security centers down to one centrally
    managed command and control center.

    •      Enables convergence of IT and physical security initiatives
    •      Measurable rapid ROI and on-going cost reduction from
           analysis of trends e.g. SLA violations, false alarms
    •      Automated incident response with conformance to security
           policies and SOPs
    •      Complete device & sensor integration, extending useful life
           of legacy products
    •      Platform for integration of additional valuable technologies,
           e.g. analytics


  "We estimate our R.O.I. will be less than 18 months. The solution will provide the
  business with operational flexibility I never imagined possible."
                Thom Williamson, Manager Security Operations, IBM Corporation, UK


Slide 14                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Corporate Enterprise

    Global Corporate, India & Sri Lanka
    Centrally manage corporate security including CCTV and
    access control systems protecting over 130,000 employees
    in 13 locations throughout India & Sri Lanka.

    •      Centralised control of CCTV and Access Control assets
           providing complete visibility and control of the entire
           security operation
    •      Pre-defined standard operating procedures (SOP)
           optimising decision making and policy compliance
    •      Pre-defined reports and charts bringing risk assessment and
           budgetary control into the security environment
    •      Seamless integration of new technologies while preserving
           a high level of original investment



  Simplified role based user interface and permissions, ensuring exact, consistent and
  measurable responses whilst significantly reducing training overheads.



Slide 15                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Corporate Enterprise

    Corporate Enterprise, India
    Protecting over 110,000 employees over 44 campuses and
    tracking over 2,500 corporate vehicles, ensuring the safety
    of its most valuable assets, its people and property.

    •      Centralized video management system with distributed
           architecture for video recording, storage and live viewing
    •      Integration of GPS based vehicle tracking with GIS maps
    •      Audio communication and vehicle immobilization from
           Command and Control System
    •      Improved efficiency of operations, reducing operating costs
           (OPEX)
    •      Integration with Building Management Systems (BMS)




Slide 16                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Corporate Enterprise

    Corporate Enterprise, India
    Centralized security operation for an international financial
    services organization protecting over 7,000+ employees
    across 3 city locations.

    •      Unifying disparate security and safety systems
    •      Centralised operation for the management of access control
           badge alarms, door alarms, video analytics alarms, fire
           alarms, intruder alarms
    •      Collation and management of all system violations and
           events into a prioritized, color-coded alarm stack
    •      Operator guidance through to resolution displaying
           intelligent contextual information and instructions




  Post event, each alarm action and response issued can be reported upon and
  displayed giving compliance and audit across all system events.



Slide 17                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Corporate Enterprise

    Engineering Corporate, UK
    Engineering consultancy protecting over 600 professional
    engineers, consultants and staff at its engineering, design,
    development and testing Headquarters.

    •      CCTV and alarm monitoring in workshops handling gasoline,
           diesel, gaseous fuel and lubricants
    •      Common operation procedures for handling alerts due to
           engine shut down, gas and/or fire
    •      Out of office fire alerts sent by text/phone to emergency
           response teams
    •      Also integrating fence detection, intruder, panic and
           building management system alarms



  Working with hazardous materials including engine fuels and lubricants means that
  the organization understands the need to respond to potential life and business
  threatening alerts immediately to ensure the safety of staff, visitors and assets.


Slide 18                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Critical National Infrastructure

    Cleveland Water, United States
    Cleveland Water Department is the 8th largest water
    facility in the US, supplying services to 397,000+ residential
    and 14,800+ commercial customers.

    •      Owned and operated by the City of Cleveland, the security
           project is sponsored by the Cleveland Division of Police
    •      Manufacturer and device independent integration
    •      Advanced crisis management capability
    •      Automated response management
    •      Consolidated alarm management and prioritization
    •      Event driven management and audit reports




  IPSecurityCenter™ was chosen because of its scalability - the solution has the
  potential to integrate public/private security systems that could turn the project
  from CNI at Cleveland Water to a multi organization Safe City program.


Slide 19                         Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Critical National Infrastructure

    Energy, Oil & Gas, United States
    Tank farm facility refining petroleum products securing a
    crude oil capacity of just over 100,000 barrels per day and
    5 million tons yearly.

    •      Securing facility over CCTV, access control, perimeter
           intrusion detection and radar
    •      Integration to Mass Notification Solutions (MNS);
           broadcasting real-time information during an emergency
           Comprehensive situational awareness and management
    •      Optimizing situation planning, training, and response to
           security situations and life safety emergencies
    •      Archive management system for record keeping and
           debriefing


  A comprehensive situational management system to optimize situation planning,
  training, and response to security situations and life safety emergencies at the Plant
  and Tank Farm Facility.


Slide 20                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Critical National Infrastructure

    Energy, Oil & Gas, Kuwait
    Protecting 10 million barrels of oil a day at a critical port-
    based oil facility responsible for the refining of a large
    proportion of Kuwait’s oil supply.

    •      Integrates discrete security sub‐systems into a single
           centralized control environment with remote bi-directional
           communication to:
            •   CCTV, Access Control, Intruder Detection Systems, Vehicle
                Barriers and Blockers, GPS Tracking, Radio Telecommunications
                (TETRA), Intercoms, Ground and Sea Surveillance RADAR
    •      Rationalisation of maintenance
    •      Consolidation of training & reporting overheads




  Command and Control Center, standardizing and simplifying security operations
  within the Tank Farm by integrating currently available security equipment/systems
  and enabling the seamless future deployment of compatible security technologies.


Slide 21                            Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Critical National Infrastructure

    Energy, Oil & Gas, South Africa
    Security for over 3,000 km of pipelines protecting over 16
    billion liters of fuel and over 450 million cubic meters of
    gases.

    •      Seamless integration and analysis of information from
           traditional physical security devices and systems
    •      Real-time data to enable situation resolution
    •      Situation management including, data collection,
           verification, analysis, resolution and tracking
    •      Maintaining a unified operation console and practices
    •      Functionality is easily customisable, configurable and can be
           modified according to varying operational needs



  Providing SMS, email and telephony communication in order to deliver vital
  information to selected response teams and stakeholders ensuring that changes to
  the security status and threats are available immediately.


Slide 22                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Mining

    Mining, South Africa
    One of the world’s largest mining companies requiring real-
    time situation awareness, guiding the response teams over
    vast areas both above and below ground.

    •      Expanding existing CCTV video surveillance capability while
           optimizing investment in legacy technologies such as:
            •   access control, physical alarm systems, SCADA, perimeter
                intrusion detection, video analytics, body scanners
    •      Prevention and detection of theft by illegal and legal miners
    •      Data collection for reporting, forensic investigation and
           evidence gathering
    •      Access control monitoring is a major factor in the health
           and safety compliance policy


  “The cost of the IPSecurityCenter™ solution versus the estimated savings in
  preventing theft was a good security investment for the organization.”
  Jurie Engelbreg, Operations Director at e-Thele


Slide 23                            Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Airport & Retail

    Delhi Duty Free
    Securing 30,000sq ft. of retail space within the sixth-
    largest airport in the world, with 34 million passengers a
    year.

    •      Centralized management of security infrastructure
    •      Develop effective strategies to combat theft, shrinkage and
           internal fraud
    •      Integration of live and archive CCTV feeds, access control
           and Point of Sale (PoS) sub-systems
    •      Pre‐‐defined reports and charts providing clear
           understanding/visibility to the security management team
    •      Supports the use of technologies including video analytics
           and Electronic Article Surveillance (EAS)


  Simple to use GUI which makes it easy for the retail operator to navigate and be in
  control of all the end-points while providing situational awareness to enable quick
  decision making.


Slide 24                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Retail

    Retail Chain, South Africa
    Central management of security systems and BMS for a
    114,000 m² warehousing, refrigeration and distribution
    center handling in excess of 50,000 line items.

    •      Reduced shrinkage and theft through effective maintenance
           of security and BMS systems
    •      Protecting fresh produce and perishables from spoiling by
           monitoring generators and refrigeration
    •      Weigh bridge monitoring online and offline status
    •      Monitoring the status of security systems such at fence
           detection and CCTV
    •      Any system fault alarms sends alerts to the maintenance
           team for immediate response

  A camera that goes down or a weigh bridge that is turned off opens up a window of
  opportunity for theft, by monitoring the state of security systems and reporting
  problems to maintenance the organization is able to respond immediately to fix the
  problem; limiting potential losses.


Slide 25                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com
Education

    Queens University Belfast, UK
    Protecting 17,000+ students and 3,500+ staff studying and
    working across a campus covering more than 250
    buildings.

    •      Remote bi-directional communication to the University’s
           Fire, CCTV, Access Control, Intruder Alarm systems
    •      Integrating security policies and providing advanced
           situational awareness across the whole campus
    •      Optimised use of security resources offering longer life for
           legacy systems
    •      Productivity gains by managing more locations with existing
           personnel
    •      Increased student confidence in University safety


  A centralised campus based Command and Control Centre operating in a
  metropolitan area and integrating more than 250 sites and devices covering CCTV,
  access control, fire, BMS and intruder systems.


Slide 26                          Confidential Information. © 2013 CNL Software. All Rights Reserved.   www.cnlsoftware.com

Contenu connexe

Tendances

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Embedded world 2019 - Cellular IoT device lifecycle management
Embedded world 2019 - Cellular IoT device lifecycle managementEmbedded world 2019 - Cellular IoT device lifecycle management
Embedded world 2019 - Cellular IoT device lifecycle managementGuillaume Djourabtchi
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the EnterpriseJaco Nel
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019Grid Dynamics
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh DefenderTed Jurca
 

Tendances (20)

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Embedded world 2019 - Cellular IoT device lifecycle management
Embedded world 2019 - Cellular IoT device lifecycle managementEmbedded world 2019 - Cellular IoT device lifecycle management
Embedded world 2019 - Cellular IoT device lifecycle management
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Immix PSIM for the Enterprise
Immix PSIM for the EnterpriseImmix PSIM for the Enterprise
Immix PSIM for the Enterprise
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
 

Similaire à CNL Software IPSecurityCenter Case Studies Presentation 0113

Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
A brief Introduction on Video surveillance Technology
A brief Introduction on Video surveillance TechnologyA brief Introduction on Video surveillance Technology
A brief Introduction on Video surveillance TechnologyAneesh Suresh
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Peter Ashley
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesConnected Futures
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
7x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 0427157x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 042715Destiny Heimbecker
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorEuropean Services Institute
 
I80 Smart Corridor Project
I80 Smart Corridor ProjectI80 Smart Corridor Project
I80 Smart Corridor ProjectMahesh Mahajan
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFAChristopher Born
 
Intelligent transportation system
Intelligent transportation systemIntelligent transportation system
Intelligent transportation systemKunalPolkundwar
 
CVIS Project - Christer Larsson, Makewave
CVIS Project - Christer Larsson, MakewaveCVIS Project - Christer Larsson, Makewave
CVIS Project - Christer Larsson, Makewavemfrancis
 
Applying internet of things on the maritime sector
Applying internet of things on the maritime sectorApplying internet of things on the maritime sector
Applying internet of things on the maritime sectorsally sanhory
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemWilliam Roberts
 

Similaire à CNL Software IPSecurityCenter Case Studies Presentation 0113 (20)

Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
A brief Introduction on Video surveillance Technology
A brief Introduction on Video surveillance TechnologyA brief Introduction on Video surveillance Technology
A brief Introduction on Video surveillance Technology
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
7x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 0427157x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 042715
 
Case studies Safe Cities
Case studies Safe CitiesCase studies Safe Cities
Case studies Safe Cities
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
I80 Smart Corridor Project
I80 Smart Corridor ProjectI80 Smart Corridor Project
I80 Smart Corridor Project
 
03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA03-02-15 SENTIGUARD PresentationFA
03-02-15 SENTIGUARD PresentationFA
 
Intelligent transportation system
Intelligent transportation systemIntelligent transportation system
Intelligent transportation system
 
CVIS Project - Christer Larsson, Makewave
CVIS Project - Christer Larsson, MakewaveCVIS Project - Christer Larsson, Makewave
CVIS Project - Christer Larsson, Makewave
 
Applying internet of things on the maritime sector
Applying internet of things on the maritime sectorApplying internet of things on the maritime sector
Applying internet of things on the maritime sector
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
30ian2009 sun
30ian2009 sun30ian2009 sun
30ian2009 sun
 

Dernier

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Dernier (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

CNL Software IPSecurityCenter Case Studies Presentation 0113

  • 1. Safe Cities Washington DC, United States City-wide CCTV integration providing situational awareness protecting over 5.5 million citizens and 17.9 million visitors each year. • Integration includes over 5,000+ CCTV cameras from district agencies including: • Homeland Security Emergency Management Agency, Metropolitan Police Department, Department of Transportation's (DDOT), Protective Service Division's (PSD), District of Columbia Public Schools (DCPS) • Also integrates ShotSpotter Audio Analytic Gunshot Detection System • Supports the city’s public safety planning efforts for special events requiring interagency coordination The program will create a unified control center where all of the security requirements of multiple agencies within the Greater Washington area can be managed and processed. Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 2. Safe Cities City of Atlanta, United States ‘Operation Shield’ - a public/private partnership CCTV center protecting over 5.2 million citizens & 35 million visitors a year. • Integrating existing video surveillance cameras owned by private business partners, monitored at a central location • Currently integrated: • Atlanta Police Department (APD), Courts, Corrections, Protective Services, CNN Center, Coca-Cola • Next steps: • Atlanta Public Schools, Atlanta International Airport, Watershed, Metro Atlanta Rapid Transit Authority “The PSIM solution allows APD to cost-effectively integrate the existing camera networks and leverage the investments already made to reduce crime and make Atlanta a safer city.” Grant Hawkins, VP of Programs and Strategic Projects, Atlanta Police Foundation Slide 2 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 3. Safe Cities & Law Enforcement Greater Manchester Police, UK One of the largest law enforcement forces in the United Kingdom, protecting 2.6 million residents and 8 million visitors each year. • Public/private integration of CCTV feeds from cameras including: • Manchester International Airport • Manchester City Council and Trafford Council • Manchester City Soccer Stadium • Radisson Edwardian Hotel • Force fixed and rotary wing aircraft, heli-tele • Mobile CCTV vans • Body warn cameras and mobile evidence gatherers Surveillance and Intelligence gathering for highest level security event in the UK after the G8 Summit, plus increased public protection and rapid police response at major occasions, such as the UEFA Cup final. Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 4. Homeland Security & Law Enforcement Law Enforcement, Middle East A single Common Operating Platform (COP) for mission critical security systems across operators with varying roles and permission levels. • CCTV expansion project utilizing existing video surveillance infrastructure • Leveraging significant investment in legacy platforms e.g. • DVRs, GIS mapping, Computer Aided Dispatch (CAD), video analytics technologies • Enforcing Standard Operating Procedures (SOPs) for response to incidents • Interface with the external CCTV systems including public and private sector parties (e.g. Public Works, Municipalities) "IPSecurityCenter has exceeded our high expectations in every way… what we have been most impressed by has been the flexibility and customizability provided by the software according to user needs and integrated sub-systems". Security Sales Consultant at Smart Cube Slide 4 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 5. Transportation & Law Enforcement Transport Law Enforcement, United Kingdom Protecting over 2.2 billion passenger journeys each year, centralizing monitoring and storage capability for forensic data. • Common platform integrating: • 55,000+ cameras, 21 video server devices, 7,000 locations, 25 video wall monitors, 40 operator workstations • Increased operational efficiency and reduced costs • 50% reduction in time taken to obtain footage • Faster detection of criminal activity • 100s of criminals brought to justice with evidence secured by the system “With some great technical wizardry, we’re able to bring these (disparate) cameras together, send that information to officers and we’re seeing our crime rates go lower.” Andy Trotter, Chief Constable Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 6. Transportation Transport Network, United Kingdom Integrating 8,000+ cameras protecting over one billion passengers a year, with around three and a half million journeys made each day, on 11 lines serving 270 stations. • Using standards and standardised architectures to minimise the variety and number of assets to provide services • Designed for obsolescence, and low cost of ownership • Providing images to the users where they need them • Providing access to recorded video as users need them • Staff are more mobile and need access to CCTV outside of the control room “Dependable and affordable, services, applications and communication networks that convey the right information to the right people, machines and places at the right time in order for the best decisions or actions to be taken.” Slide 6 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 7. Transportation Washington Metropolitan Area Transit Authority, US One of the largest rail transit, bus and paratransit services in the US protecting over 341 million city-wide passenger trips each year. • Includes rail stations, bus stations, maintenance garages, parking garages and other commercial buildings • 86 rail stations each with a custom interface • Centrally managed without changing the existing security systems’ functionality • Displays alarms from security subsystems based on predefined policies and business logic • Has the same user interface for alarms generated regardless of alarm type or originating system “We have a lot of disparate systems that need to be interconnected. With the introduction of PSIM technology, we can now view all security and business systems on one integrated platform.” Marshall Epler, Deputy Chief Engineer of Communications, WMATA Slide 7 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 8. Transportation Washington State Department of Transportation, Ferries Division (WSF), United States The largest ferry system in the U.S. and fourth largest in the world; annually transporting more than 22 million riders including 10 million vehicles. • Working with the Washington State Patrol, U.S. Coast Guard and U.S. Customs and Border Protection • Managing access control, alarm and sensor events, analog and digital video surveillance and cameras at approximately 43 WSF sites • Integrating high definition video, management systems, maps/Geospatial solution • Access control systems to meet Transportation Workers Information Clearance (TWIC) compliance Integrating security systems will allow the immediate verification of any incidents, greatly increasing preparedness to respond to potential threats withing land-based perimeters and beyond. Slide 8 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 9. Transportation and Distribution Citywide Port Security, United States Protecting a multi-billion dollar maritime industry including ports & terminals, ferry operations, government services, recreational & commercial boating. • Common platform with central monitoring and storage capability to share video data • Increased operational efficiency leading to reduced costs • Integration of new technologies allows faster detection of incidents • Aggregation of intelligence from multiple systems for increased situation awareness • High levels of emergency preparedness Interface with 4 independent marine facility closed circuit television systems to enable centralized display and management Slide 9 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 10. Transportation and Distribution Container Shipping Port, United States Centralized operational control securing 2 port locations with 4 terminals specializing in handling container, reefer, breakbulk, agri-bulk & RoRo cargoes. • Centralized control of CCTV and access control assets providing complete visibility and control of the entire security operation • Integrating Radar assets including vessel tracking and monitoring of restricted port zones • Monitoring port users requiring a Transportation Worker Identification Credential (TWIC), visitors and escorts • Simplified role based GUI and permissions, ensuring exact, consistent and measurable responses “Allowing the transfer of data needed to support real-time situational awareness, as well as the sharing of event data and automated response procedures among multiple agencies.” Security Division, CRGT Slide 10 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 11. Transportation and Distribution Container Shipping Port, United States Container port-configured enhanced waterside perimeter security security protecting over 2 million tons of vessel, truck and rail cargo shipments a year. • Physical security surveillance and detection systems monitor harbor activities and access to port security, vessel traffic, coastal surveillance, safety, and commercial data • Secure command and control center integrating technologies, such as: • Video surveillance, intelligent radar, automatic identification system base stations, patrol boat tracking, interoperable communications and web services “The system is multi-mission oriented and delivers defined information to numerous local and federal organizations including the US Coast Guard and Department of Homeland Security.” Security Division, CRGT Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 12. Transportation and Distribution Container Shipping Port, United States Video surveillance for specialized shipping terminals; protecting port employees and visitors as well as over 35 million tons of cargo each year. • 1 central Data Center as the master site with capabilities to operate client workstations and secondary storage at 4 distributed Command Centers • Providing geographical map display with graphic icons representing alerts according to their approximate geographic location • Integrated radar management system through which individual radar based alarms can trigger event driven video operations Improving security awareness and enhancing the ability of governmental/private entities to prevent, detect, interdict, and rapidly respond to and recover from terrorist acts or other “all hazard” events along the River, its adjacent communities, facilities, plus key critical assets within the area’s transportation infrastructure. Slide 12 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 13. Corporate Enterprise Fortune 20 Corporation, United States & Canada Protecting over 100,000 employees across more than 375 locations; one of the largest and most comprehensive PSIM deployments in the world today. • Bringing on board disparate security systems, multiple command and control centers plus numerous procedures and processes • Reduced number of Command and Control Centers by 90% • Automated incident response • All local alerts immediately routed via IPSecurityCenter™ directly to guards’ phones/email • Eliminates massive amounts of alarms in the Command and Control Centers; only see escalated local alarms IPSecurityCenter™ offers the capacity to modify and/or add new SOPs based on evolving threat assessments, the ability to add new security systems as required and has a GUI that is easy for security officers to navigate. Slide 13 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 14. Corporate Enterprise IBM, UK Consolidated 26 locations across operations in the UK, moving from 17 security centers down to one centrally managed command and control center. • Enables convergence of IT and physical security initiatives • Measurable rapid ROI and on-going cost reduction from analysis of trends e.g. SLA violations, false alarms • Automated incident response with conformance to security policies and SOPs • Complete device & sensor integration, extending useful life of legacy products • Platform for integration of additional valuable technologies, e.g. analytics "We estimate our R.O.I. will be less than 18 months. The solution will provide the business with operational flexibility I never imagined possible." Thom Williamson, Manager Security Operations, IBM Corporation, UK Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 15. Corporate Enterprise Global Corporate, India & Sri Lanka Centrally manage corporate security including CCTV and access control systems protecting over 130,000 employees in 13 locations throughout India & Sri Lanka. • Centralised control of CCTV and Access Control assets providing complete visibility and control of the entire security operation • Pre-defined standard operating procedures (SOP) optimising decision making and policy compliance • Pre-defined reports and charts bringing risk assessment and budgetary control into the security environment • Seamless integration of new technologies while preserving a high level of original investment Simplified role based user interface and permissions, ensuring exact, consistent and measurable responses whilst significantly reducing training overheads. Slide 15 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 16. Corporate Enterprise Corporate Enterprise, India Protecting over 110,000 employees over 44 campuses and tracking over 2,500 corporate vehicles, ensuring the safety of its most valuable assets, its people and property. • Centralized video management system with distributed architecture for video recording, storage and live viewing • Integration of GPS based vehicle tracking with GIS maps • Audio communication and vehicle immobilization from Command and Control System • Improved efficiency of operations, reducing operating costs (OPEX) • Integration with Building Management Systems (BMS) Slide 16 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 17. Corporate Enterprise Corporate Enterprise, India Centralized security operation for an international financial services organization protecting over 7,000+ employees across 3 city locations. • Unifying disparate security and safety systems • Centralised operation for the management of access control badge alarms, door alarms, video analytics alarms, fire alarms, intruder alarms • Collation and management of all system violations and events into a prioritized, color-coded alarm stack • Operator guidance through to resolution displaying intelligent contextual information and instructions Post event, each alarm action and response issued can be reported upon and displayed giving compliance and audit across all system events. Slide 17 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 18. Corporate Enterprise Engineering Corporate, UK Engineering consultancy protecting over 600 professional engineers, consultants and staff at its engineering, design, development and testing Headquarters. • CCTV and alarm monitoring in workshops handling gasoline, diesel, gaseous fuel and lubricants • Common operation procedures for handling alerts due to engine shut down, gas and/or fire • Out of office fire alerts sent by text/phone to emergency response teams • Also integrating fence detection, intruder, panic and building management system alarms Working with hazardous materials including engine fuels and lubricants means that the organization understands the need to respond to potential life and business threatening alerts immediately to ensure the safety of staff, visitors and assets. Slide 18 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 19. Critical National Infrastructure Cleveland Water, United States Cleveland Water Department is the 8th largest water facility in the US, supplying services to 397,000+ residential and 14,800+ commercial customers. • Owned and operated by the City of Cleveland, the security project is sponsored by the Cleveland Division of Police • Manufacturer and device independent integration • Advanced crisis management capability • Automated response management • Consolidated alarm management and prioritization • Event driven management and audit reports IPSecurityCenter™ was chosen because of its scalability - the solution has the potential to integrate public/private security systems that could turn the project from CNI at Cleveland Water to a multi organization Safe City program. Slide 19 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 20. Critical National Infrastructure Energy, Oil & Gas, United States Tank farm facility refining petroleum products securing a crude oil capacity of just over 100,000 barrels per day and 5 million tons yearly. • Securing facility over CCTV, access control, perimeter intrusion detection and radar • Integration to Mass Notification Solutions (MNS); broadcasting real-time information during an emergency Comprehensive situational awareness and management • Optimizing situation planning, training, and response to security situations and life safety emergencies • Archive management system for record keeping and debriefing A comprehensive situational management system to optimize situation planning, training, and response to security situations and life safety emergencies at the Plant and Tank Farm Facility. Slide 20 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 21. Critical National Infrastructure Energy, Oil & Gas, Kuwait Protecting 10 million barrels of oil a day at a critical port- based oil facility responsible for the refining of a large proportion of Kuwait’s oil supply. • Integrates discrete security sub‐systems into a single centralized control environment with remote bi-directional communication to: • CCTV, Access Control, Intruder Detection Systems, Vehicle Barriers and Blockers, GPS Tracking, Radio Telecommunications (TETRA), Intercoms, Ground and Sea Surveillance RADAR • Rationalisation of maintenance • Consolidation of training & reporting overheads Command and Control Center, standardizing and simplifying security operations within the Tank Farm by integrating currently available security equipment/systems and enabling the seamless future deployment of compatible security technologies. Slide 21 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 22. Critical National Infrastructure Energy, Oil & Gas, South Africa Security for over 3,000 km of pipelines protecting over 16 billion liters of fuel and over 450 million cubic meters of gases. • Seamless integration and analysis of information from traditional physical security devices and systems • Real-time data to enable situation resolution • Situation management including, data collection, verification, analysis, resolution and tracking • Maintaining a unified operation console and practices • Functionality is easily customisable, configurable and can be modified according to varying operational needs Providing SMS, email and telephony communication in order to deliver vital information to selected response teams and stakeholders ensuring that changes to the security status and threats are available immediately. Slide 22 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 23. Mining Mining, South Africa One of the world’s largest mining companies requiring real- time situation awareness, guiding the response teams over vast areas both above and below ground. • Expanding existing CCTV video surveillance capability while optimizing investment in legacy technologies such as: • access control, physical alarm systems, SCADA, perimeter intrusion detection, video analytics, body scanners • Prevention and detection of theft by illegal and legal miners • Data collection for reporting, forensic investigation and evidence gathering • Access control monitoring is a major factor in the health and safety compliance policy “The cost of the IPSecurityCenter™ solution versus the estimated savings in preventing theft was a good security investment for the organization.” Jurie Engelbreg, Operations Director at e-Thele Slide 23 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 24. Airport & Retail Delhi Duty Free Securing 30,000sq ft. of retail space within the sixth- largest airport in the world, with 34 million passengers a year. • Centralized management of security infrastructure • Develop effective strategies to combat theft, shrinkage and internal fraud • Integration of live and archive CCTV feeds, access control and Point of Sale (PoS) sub-systems • Pre‐‐defined reports and charts providing clear understanding/visibility to the security management team • Supports the use of technologies including video analytics and Electronic Article Surveillance (EAS) Simple to use GUI which makes it easy for the retail operator to navigate and be in control of all the end-points while providing situational awareness to enable quick decision making. Slide 24 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 25. Retail Retail Chain, South Africa Central management of security systems and BMS for a 114,000 m² warehousing, refrigeration and distribution center handling in excess of 50,000 line items. • Reduced shrinkage and theft through effective maintenance of security and BMS systems • Protecting fresh produce and perishables from spoiling by monitoring generators and refrigeration • Weigh bridge monitoring online and offline status • Monitoring the status of security systems such at fence detection and CCTV • Any system fault alarms sends alerts to the maintenance team for immediate response A camera that goes down or a weigh bridge that is turned off opens up a window of opportunity for theft, by monitoring the state of security systems and reporting problems to maintenance the organization is able to respond immediately to fix the problem; limiting potential losses. Slide 25 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 26. Education Queens University Belfast, UK Protecting 17,000+ students and 3,500+ staff studying and working across a campus covering more than 250 buildings. • Remote bi-directional communication to the University’s Fire, CCTV, Access Control, Intruder Alarm systems • Integrating security policies and providing advanced situational awareness across the whole campus • Optimised use of security resources offering longer life for legacy systems • Productivity gains by managing more locations with existing personnel • Increased student confidence in University safety A centralised campus based Command and Control Centre operating in a metropolitan area and integrating more than 250 sites and devices covering CCTV, access control, fire, BMS and intruder systems. Slide 26 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com