SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
IPSecurityCenter™ PSIM from CNL Software 
IPSecurityCenter™ PSIM 
CNL Software
Slide 2Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•CNL Software's IPSecurityCenter PSIM solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. 
•Kuwait: Protecting over barrels of oil a month 
•Middle East: protecting over citizens countrywide 
•UAE: protecting over citizens citywide 
•US: Washington DC protecting over citizens 
•UK: Protecting over passenger journeys per year 
•South Africa: Securing over of pipelines protecting over liters of fuel 
•India: Protecting over employees and tracking over corporate vehicles 
•US & Canada: Largest single PSIM installation to date protecting over US office locations 
CNL Software
Slide 3Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•PhysicalSecurityInformationManagement(PSIM)issoftwarethatprovidesaplatformandapplicationsdesignedtointegratemultiple,disparatesecurityapplicationsanddevices,allowingmanagementofanentireenterprisethroughonecomprehensiveuserinterface.Thatuserinterfacecanbequickly,costeffectivelycustomizedtomeettheexactrequirementofeachandeveryuser. 
•A complete PSIM software system has six key capabilities: 
•Event Collection 
•Analysis 
•Verification 
•Resolution 
•Reporting 
•Audit trail 
What is PSIM?
IPSecurityCenter™ PSIM from CNL Software 
Slide 4Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Traditional Security Operations Centers 
Command and Control Centers 
Proprietary 
Silos, Isolated Systems 
Limited Safety, Security and Integration 
Reactive, Error Prone, Poor Visibility & Control 
Functional Data Only 
Disparate Systems with Minimal Communication 
Open Standards 
Integrated and Interoperable Systems 
Integrated Safety and Security Compliant 
Proactive, Strategic, Managed and Predictive 
Real-time Information, Optimized 
Communication between Existing and New Systems 
Without PSIM 
With PSIM 
Source: Frost & Sullivan
Slide 5Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•PSIM software based integration and management platform 
•An enterprise software solution that connects and correlates information from disparate security and business management systems 
•Aggregates volumes of unmanageable data into useable, actionable information 
•Provides operators with real-time Situational Awareness 
•Gives a Common Operating Picture (COP) for all security operative 
•Presents step-by-step process guidance 
•Ensures complete compliance to security policies 
•Delivers intelligence to the right person at the right time 
•Allows the use of best of breed technologies 
•Offers product brand independence 
IPSecurityCenter™ a leading PSIM product
IPSecurityCenter™ PSIM from CNL Software 
Slide 6Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Integrated Approach 
IPSecurityCenter™works with the largest number of manufacturer systems allowing maximum use of legacy equipment 
Behavior Pattern Analytics 
Communication & Notification Systems 
CCTV 
Fire, Alarm Systems, BMS 
Access Control 
Personal Attack &Panic AlarmSystems 
Perimeter Intrusion Detection
Slide 7Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•Integrate your entire estate of existing security assets & sensors 
•Integrate multiple disparate solutions 
•Develop a centralized Command and Control infrastructure 
•Increase situational awareness 
•Significantly reduce costs of manned guarding 
•Seamlessly deploy new technologies that support risk reduction and promote a more secure environment 
•Remove technology dependencies on specific products and vendors, reducing costs 
Integration cont.
IPSecurityCenter™ PSIM from CNL Software 
“At a time of crisis, an individuals ability to make the right decision is significantly undermined.”
IPSecurityCenter™ PSIM from CNL Software 
Slide 9Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Real Time Policy / Configuration Management 
•Enforce security & facilities policies and standard operating procedures 
•Advanced operator guidance delivers the appropriate response to specific incidents 
•Automated event management, response & escalation procedures 
•Significantly reduce exposure to corporate liabilities 
•Detailed reporting engine provides complete audit trail of all events and incidents managed by the system
IPSecurityCenter™ PSIM from CNL Software 
Slide 10Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Real Time Policy / Configuration Management 
Process Guidance 
GIS responding to actions from the process guidance –as the Operator would see
IPSecurityCenter™ PSIM from CNL Software 
Slide 11Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Process Guidance & Crisis Management Scenario 
2 
IPSecurityCenter™ instantly confirms that this is not a false alarm by aggregating data such as time of day, location of security teams, routine maintenance schedules etc. It also prioritizes the alarm based on security risk. 
4 
A breach is identified, the operator is prompted to confirm the incident from a provided list. Instant communication is enabled with them using on screen controls for radio and SMS messaging. 
5 
The incident is rapidly resolved using these SOPs which ensure compliance to organizational and government instigated policies for risk mitigation and future auditing purposes. An incident report is automatically generated and the incident is recorded for future process improvements and ongoing risk analysis. 
END 
3 
The nearest camera automatically pans to the location of the alarm to allow visual verification. IPSecurityCenter’son-screen Process Guidance asks the operator to verify the incident using this live video. 
START 
1 
An alarm is triggered at the facility. 
Control has constant communications and live video to allow real-time guidance to manage the response team according to standard operating procedures (SOPs).
IPSecurityCenter™ PSIM from CNL Software 
Slide 12Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Correlation and Verification 
Alarm from PIDS and analytics system 
Playback controls for review of incident 
Nearest cameras shown 
Nearest cameras shown
IPSecurityCenter™ PSIM from CNL Software 
Slide 13Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Visualization 
•Completely customisable, presenting the right information, to the right people, at the right time 
•Event driven switching of layouts created by activity/incidents/triggers/timeouts 
•Display of video with other information sources to create dashboards and incident Centers 
•Automatic escalation from one display to another 
•Distributed intelligence 
•Audience / event specific presentation 
•Workflow created from a range of system & operator inputs 
•CCTV, Access Control, Intruder, Fire, BMS, ANPR, GPS
IPSecurityCenter™ PSIM from CNL Software 
Slide 14Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
A Rules-based Workflow for Response 
•IPSecurityCenter allows the creation of complex workflows using the control similar to Microsoft Visio 
•Allows easy update as process and policies change
IPSecurityCenter™ PSIM from CNL Software 
Slide 15Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
User Interface Editor -Original Fire Alarm Process Guidance 
Sequences ShortenedNEW STEPREQUIRED
IPSecurityCenter™ PSIM from CNL Software 
Slide 16Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
User Interface Editor 
•WYSIWIG 
•Drag & Drop 
•Link to workflow 
•No restart required 
Sequences ShortenedENTERNEW STEPDETAILS
IPSecurityCenter™ PSIM from CNL Software 
Slide 17Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
User Interface Editor -New Fire Alarm Process Guidance 
Sequences ShortenedNEW STEP ADDED
Slide 18Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•Business intelligence tool for management reporting 
•Complete customisation for optimised reporting 
•Automatic schedule hourly, daily, weekly, monthly 
•Complete audit trail, trend analysis of events and security systems 
•Complete visibility of all incidents and events across multiple locations 
•Effective risk management in a changing environment 
•Target budget against risk 
•Open database provides information to: 
•3rd party applications 
•contact center 
•ticketing 
Management Reporting
Slide 19Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•Software-driven integration of all security applications 
•Integration of existing and future technologies 
•Fast development of customer & application specific graphical user interfaces 
•Evidence gathering & visualization from multiple security resources, live & recorded 
•Compliance –Policies –Procedures 
•Crisis Management 
•Management Reporting / Business Intelligence 
•Rapid deployment –Rapid Return On Investment 
•Managing a “holistic” security policy across an enterprise IT infrastructure with “real time” flexibility 
For The New Security World…
IPSecurityCenter™ PSIM from CNL Software 
Slide 20Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Return on Investment (ROI) 
In addition to security, returns can be made in other such as; 
•Accident litigation –reduced litigation opportunities via improved video intelligence to support investigations 
•Marketing –use security assets to better understand customer behaviour and purchasing patterns 
Removal of vendor lock-in 
Manned guarding reduction 
Reduced floor space needed 
Maximise use of legacy systems 
Improve supplier negotiation 
Reduce frequency of incidents 
Reduce impact of incidents 
Reduce training costs 
Optimise staff efficiency 
Minimise litigation opportunities 
Increase reporting efficiencies 
Target spend against risks 
"CNLconsolidated26locationsacrossouroperationsintheUnitedKingdom.Wearemovingfrom17command&controlcentresdowntoone.WeestimateourR.O.I.willbelessthan18months.ThesolutionwillprovidethebusinesswithoperationalflexibilityIneverimaginedpossible.“ThomWilliamson,ManagerSecurityOperations,IBMCorporation,UnitedKingdom
Slide 21Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
IPSecurityCenter™ PSIM from CNL Software 
•Manage all elements of security infrastructure 
•Remove vendor dependencies 
•Manage changing risks & increase situational awareness 
•Ensure compliance to global security policies 
•Deliver visual intelligence to point of need 
•Provide a pro-active security environment 
•Exploit new technologies –analytics, bio-metrics 
•Significantly reduce operational costs 
Strategic Value
IPSecurityCenter™ PSIM from CNL Software 
Slide 22Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Trends in PSIM 
Circa 2001 
Aggregating disparate systems under a Common User Interface 
Common Operating Picture 
Circa 2006 
Introduction of automating security process guidance, incident response, security policies, SOP 
Situational Awareness 
Circa 2008/9 
Consolidating and leveraging business data to drive business improvement 
Business Improvement Analytics 
2011 
KPIsand key performance barometers exposed in accessible, at a glance formats i.e. dashboards 
Enhanced Data Visualization 
2013 → 
Using new technology to reduce capital expense and enable sites to quickly expand capacity on demand 
Cloud Based PSIM 
PSIM 
arrives
IPSecurityCenter™ PSIM from CNL Software 
Slide 23Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Complete Integration: Security, Facilities & Energy 
Security & Access Control 
•Electronic Access Control 
•CCTV / Surveillance 
•Alarm / Intrusion 
Lighting 
•Sensing / Controlling 
•Day Lighting / Blinds / Shutters 
HVAC 
•Sensors & Controllers 
•Chillers 
•Pumps 
•Air Handling Units 
SIEM 
•Logical Security Systems 
Enterprise Applications 
•Time & Attendance 
•Asset Management 
•Human Resources 
Fire & Safety 
•Monitoring, Detection and Suppression 
Energy Management & Monitoring 
•Utility monitoring, management 
•HVAC, water, gas, lighting, power 
IPSecurityCenter™ 
Security & Access Control 
HVAC 
SIEM 
Enterprise Applications 
Fire & Safety 
Lighting 
Energy Mgmt. & Monitoring 
Enterprise and SaaS Models
IPSecurityCenter™ PSIM from CNL Software 
Slide 24Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com
IPSecurityCenter™ PSIM from CNL Software 
Slide 25Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com 
Additional Online Resources 
•Wikipedia -Physical Security Information Management 
•http://en.wikipedia.org/wiki/Physical_security_information_management 
•PSIM for Mass Transit Public Safety and Security –BTP Video 
•https://www.youtube.com/watch?v=7FGr-mfbNok 
•LinkedIn Physical Security Information Management (PSIM) Group 
•http://www.linkedin.com/groups/Physical-Security-Information-Management-PSIM-2162880/about 
•CNL Software Press Releases 
•http://www.cnlsoftware.com/news/latest-news 
•CNL Software Videos 
•https://www.youtube.com/user/CNLSoftware/videos
IPSecurityCenter™ PSIM from CNL Software 
CNL Software 
CNL House, Lansbury Estate 
Lower Guildford Road 
Knaphill 
Surrey, GU21 2EP 
United Kingdom 
Tel. +44 (0) 1483 48 00 88 
Contact Details 
CNL Software 
21730 Red Rum Dr. 
Suite 112 
Ashburn 
VA 20147 
UnitedStates 
Tel. +1 317 522 0313 
Web:www.cnlsoftware.com 
Email: info@cnlsoftware.com 
CNL Software 
P.O. Box 34938 
Dubai 
United Arab Emirates

Contenu connexe

Tendances (20)

influenza virus
influenza virusinfluenza virus
influenza virus
 
Opportunistic coccidian parasites
Opportunistic coccidian parasitesOpportunistic coccidian parasites
Opportunistic coccidian parasites
 
Vibrio cholera
Vibrio choleraVibrio cholera
Vibrio cholera
 
Lab 9 -toxoplasmosis
Lab 9  -toxoplasmosisLab 9  -toxoplasmosis
Lab 9 -toxoplasmosis
 
Paracoccidioidomycosis
ParacoccidioidomycosisParacoccidioidomycosis
Paracoccidioidomycosis
 
The neisseriae
The neisseriaeThe neisseriae
The neisseriae
 
E. histolytica
E. histolyticaE. histolytica
E. histolytica
 
Streptococcus pneumonia
Streptococcus pneumoniaStreptococcus pneumonia
Streptococcus pneumonia
 
Techniques of diagnostic Mycology- 5 hours
Techniques of diagnostic Mycology- 5 hoursTechniques of diagnostic Mycology- 5 hours
Techniques of diagnostic Mycology- 5 hours
 
Spirochetes ii
Spirochetes iiSpirochetes ii
Spirochetes ii
 
Onchocerca volvulus
Onchocerca volvulusOnchocerca volvulus
Onchocerca volvulus
 
Yersinia & pasteurella
Yersinia & pasteurellaYersinia & pasteurella
Yersinia & pasteurella
 
Toxoplasma gondii
Toxoplasma gondiiToxoplasma gondii
Toxoplasma gondii
 
Filaria part 1
Filaria part 1Filaria part 1
Filaria part 1
 
Mycetoma
MycetomaMycetoma
Mycetoma
 
Vibrio
VibrioVibrio
Vibrio
 
Trichinella spiralis
Trichinella  spiralisTrichinella  spiralis
Trichinella spiralis
 
Sputum sample processing.pptx
Sputum sample processing.pptxSputum sample processing.pptx
Sputum sample processing.pptx
 
Spirochaetes treponema, borrelia & leptospira
Spirochaetes  treponema, borrelia & leptospiraSpirochaetes  treponema, borrelia & leptospira
Spirochaetes treponema, borrelia & leptospira
 
Pathogenic Gram-Negative Cocci
Pathogenic Gram-Negative CocciPathogenic Gram-Negative Cocci
Pathogenic Gram-Negative Cocci
 

En vedette

CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasAdlan Hussain
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA Adlan Hussain
 
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and Consciousness
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and ConsciousnessDan Faggella - TEDx Slides 2015 - Artificial intelligence and Consciousness
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and ConsciousnessDaniel Faggella
 
Cognitive architecture
Cognitive architectureCognitive architecture
Cognitive architectureHasam Panezai
 
Simulated Annealing
Simulated AnnealingSimulated Annealing
Simulated AnnealingJoy Dutta
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 

En vedette (6)

CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & GasCNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
 
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and Consciousness
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and ConsciousnessDan Faggella - TEDx Slides 2015 - Artificial intelligence and Consciousness
Dan Faggella - TEDx Slides 2015 - Artificial intelligence and Consciousness
 
Cognitive architecture
Cognitive architectureCognitive architecture
Cognitive architecture
 
Simulated Annealing
Simulated AnnealingSimulated Annealing
Simulated Annealing
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 

Similaire à CNL Software - IPSecurityCenter Presentation

How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systemsevatjohnson
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityAdlan Hussain
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldMark Nunnikhoven
 
Cloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillanceCloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillancenitishjambo
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?Adlan Hussain
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Splunk
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys, Inc.
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​Zoho Corporation
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems ManagementSecPod Technologies
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 

Similaire à CNL Software - IPSecurityCenter Presentation (20)

PSIM for Healthcare
PSIM for HealthcarePSIM for Healthcare
PSIM for Healthcare
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Cloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillanceCloud based remote monitoring and surveillance
Cloud based remote monitoring and surveillance
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
 
SIEM
SIEMSIEM
SIEM
 
ASPEN Brochure
ASPEN BrochureASPEN Brochure
ASPEN Brochure
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
SECHEIM_TRADING
SECHEIM_TRADINGSECHEIM_TRADING
SECHEIM_TRADING
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

CNL Software - IPSecurityCenter Presentation

  • 1. IPSecurityCenter™ PSIM from CNL Software IPSecurityCenter™ PSIM CNL Software
  • 2. Slide 2Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •CNL Software's IPSecurityCenter PSIM solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. •Kuwait: Protecting over barrels of oil a month •Middle East: protecting over citizens countrywide •UAE: protecting over citizens citywide •US: Washington DC protecting over citizens •UK: Protecting over passenger journeys per year •South Africa: Securing over of pipelines protecting over liters of fuel •India: Protecting over employees and tracking over corporate vehicles •US & Canada: Largest single PSIM installation to date protecting over US office locations CNL Software
  • 3. Slide 3Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •PhysicalSecurityInformationManagement(PSIM)issoftwarethatprovidesaplatformandapplicationsdesignedtointegratemultiple,disparatesecurityapplicationsanddevices,allowingmanagementofanentireenterprisethroughonecomprehensiveuserinterface.Thatuserinterfacecanbequickly,costeffectivelycustomizedtomeettheexactrequirementofeachandeveryuser. •A complete PSIM software system has six key capabilities: •Event Collection •Analysis •Verification •Resolution •Reporting •Audit trail What is PSIM?
  • 4. IPSecurityCenter™ PSIM from CNL Software Slide 4Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Traditional Security Operations Centers Command and Control Centers Proprietary Silos, Isolated Systems Limited Safety, Security and Integration Reactive, Error Prone, Poor Visibility & Control Functional Data Only Disparate Systems with Minimal Communication Open Standards Integrated and Interoperable Systems Integrated Safety and Security Compliant Proactive, Strategic, Managed and Predictive Real-time Information, Optimized Communication between Existing and New Systems Without PSIM With PSIM Source: Frost & Sullivan
  • 5. Slide 5Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •PSIM software based integration and management platform •An enterprise software solution that connects and correlates information from disparate security and business management systems •Aggregates volumes of unmanageable data into useable, actionable information •Provides operators with real-time Situational Awareness •Gives a Common Operating Picture (COP) for all security operative •Presents step-by-step process guidance •Ensures complete compliance to security policies •Delivers intelligence to the right person at the right time •Allows the use of best of breed technologies •Offers product brand independence IPSecurityCenter™ a leading PSIM product
  • 6. IPSecurityCenter™ PSIM from CNL Software Slide 6Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Integrated Approach IPSecurityCenter™works with the largest number of manufacturer systems allowing maximum use of legacy equipment Behavior Pattern Analytics Communication & Notification Systems CCTV Fire, Alarm Systems, BMS Access Control Personal Attack &Panic AlarmSystems Perimeter Intrusion Detection
  • 7. Slide 7Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •Integrate your entire estate of existing security assets & sensors •Integrate multiple disparate solutions •Develop a centralized Command and Control infrastructure •Increase situational awareness •Significantly reduce costs of manned guarding •Seamlessly deploy new technologies that support risk reduction and promote a more secure environment •Remove technology dependencies on specific products and vendors, reducing costs Integration cont.
  • 8. IPSecurityCenter™ PSIM from CNL Software “At a time of crisis, an individuals ability to make the right decision is significantly undermined.”
  • 9. IPSecurityCenter™ PSIM from CNL Software Slide 9Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Real Time Policy / Configuration Management •Enforce security & facilities policies and standard operating procedures •Advanced operator guidance delivers the appropriate response to specific incidents •Automated event management, response & escalation procedures •Significantly reduce exposure to corporate liabilities •Detailed reporting engine provides complete audit trail of all events and incidents managed by the system
  • 10. IPSecurityCenter™ PSIM from CNL Software Slide 10Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Real Time Policy / Configuration Management Process Guidance GIS responding to actions from the process guidance –as the Operator would see
  • 11. IPSecurityCenter™ PSIM from CNL Software Slide 11Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Process Guidance & Crisis Management Scenario 2 IPSecurityCenter™ instantly confirms that this is not a false alarm by aggregating data such as time of day, location of security teams, routine maintenance schedules etc. It also prioritizes the alarm based on security risk. 4 A breach is identified, the operator is prompted to confirm the incident from a provided list. Instant communication is enabled with them using on screen controls for radio and SMS messaging. 5 The incident is rapidly resolved using these SOPs which ensure compliance to organizational and government instigated policies for risk mitigation and future auditing purposes. An incident report is automatically generated and the incident is recorded for future process improvements and ongoing risk analysis. END 3 The nearest camera automatically pans to the location of the alarm to allow visual verification. IPSecurityCenter’son-screen Process Guidance asks the operator to verify the incident using this live video. START 1 An alarm is triggered at the facility. Control has constant communications and live video to allow real-time guidance to manage the response team according to standard operating procedures (SOPs).
  • 12. IPSecurityCenter™ PSIM from CNL Software Slide 12Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Correlation and Verification Alarm from PIDS and analytics system Playback controls for review of incident Nearest cameras shown Nearest cameras shown
  • 13. IPSecurityCenter™ PSIM from CNL Software Slide 13Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Visualization •Completely customisable, presenting the right information, to the right people, at the right time •Event driven switching of layouts created by activity/incidents/triggers/timeouts •Display of video with other information sources to create dashboards and incident Centers •Automatic escalation from one display to another •Distributed intelligence •Audience / event specific presentation •Workflow created from a range of system & operator inputs •CCTV, Access Control, Intruder, Fire, BMS, ANPR, GPS
  • 14. IPSecurityCenter™ PSIM from CNL Software Slide 14Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com A Rules-based Workflow for Response •IPSecurityCenter allows the creation of complex workflows using the control similar to Microsoft Visio •Allows easy update as process and policies change
  • 15. IPSecurityCenter™ PSIM from CNL Software Slide 15Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com User Interface Editor -Original Fire Alarm Process Guidance Sequences ShortenedNEW STEPREQUIRED
  • 16. IPSecurityCenter™ PSIM from CNL Software Slide 16Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com User Interface Editor •WYSIWIG •Drag & Drop •Link to workflow •No restart required Sequences ShortenedENTERNEW STEPDETAILS
  • 17. IPSecurityCenter™ PSIM from CNL Software Slide 17Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com User Interface Editor -New Fire Alarm Process Guidance Sequences ShortenedNEW STEP ADDED
  • 18. Slide 18Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •Business intelligence tool for management reporting •Complete customisation for optimised reporting •Automatic schedule hourly, daily, weekly, monthly •Complete audit trail, trend analysis of events and security systems •Complete visibility of all incidents and events across multiple locations •Effective risk management in a changing environment •Target budget against risk •Open database provides information to: •3rd party applications •contact center •ticketing Management Reporting
  • 19. Slide 19Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •Software-driven integration of all security applications •Integration of existing and future technologies •Fast development of customer & application specific graphical user interfaces •Evidence gathering & visualization from multiple security resources, live & recorded •Compliance –Policies –Procedures •Crisis Management •Management Reporting / Business Intelligence •Rapid deployment –Rapid Return On Investment •Managing a “holistic” security policy across an enterprise IT infrastructure with “real time” flexibility For The New Security World…
  • 20. IPSecurityCenter™ PSIM from CNL Software Slide 20Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Return on Investment (ROI) In addition to security, returns can be made in other such as; •Accident litigation –reduced litigation opportunities via improved video intelligence to support investigations •Marketing –use security assets to better understand customer behaviour and purchasing patterns Removal of vendor lock-in Manned guarding reduction Reduced floor space needed Maximise use of legacy systems Improve supplier negotiation Reduce frequency of incidents Reduce impact of incidents Reduce training costs Optimise staff efficiency Minimise litigation opportunities Increase reporting efficiencies Target spend against risks "CNLconsolidated26locationsacrossouroperationsintheUnitedKingdom.Wearemovingfrom17command&controlcentresdowntoone.WeestimateourR.O.I.willbelessthan18months.ThesolutionwillprovidethebusinesswithoperationalflexibilityIneverimaginedpossible.“ThomWilliamson,ManagerSecurityOperations,IBMCorporation,UnitedKingdom
  • 21. Slide 21Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com IPSecurityCenter™ PSIM from CNL Software •Manage all elements of security infrastructure •Remove vendor dependencies •Manage changing risks & increase situational awareness •Ensure compliance to global security policies •Deliver visual intelligence to point of need •Provide a pro-active security environment •Exploit new technologies –analytics, bio-metrics •Significantly reduce operational costs Strategic Value
  • 22. IPSecurityCenter™ PSIM from CNL Software Slide 22Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Trends in PSIM Circa 2001 Aggregating disparate systems under a Common User Interface Common Operating Picture Circa 2006 Introduction of automating security process guidance, incident response, security policies, SOP Situational Awareness Circa 2008/9 Consolidating and leveraging business data to drive business improvement Business Improvement Analytics 2011 KPIsand key performance barometers exposed in accessible, at a glance formats i.e. dashboards Enhanced Data Visualization 2013 → Using new technology to reduce capital expense and enable sites to quickly expand capacity on demand Cloud Based PSIM PSIM arrives
  • 23. IPSecurityCenter™ PSIM from CNL Software Slide 23Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Complete Integration: Security, Facilities & Energy Security & Access Control •Electronic Access Control •CCTV / Surveillance •Alarm / Intrusion Lighting •Sensing / Controlling •Day Lighting / Blinds / Shutters HVAC •Sensors & Controllers •Chillers •Pumps •Air Handling Units SIEM •Logical Security Systems Enterprise Applications •Time & Attendance •Asset Management •Human Resources Fire & Safety •Monitoring, Detection and Suppression Energy Management & Monitoring •Utility monitoring, management •HVAC, water, gas, lighting, power IPSecurityCenter™ Security & Access Control HVAC SIEM Enterprise Applications Fire & Safety Lighting Energy Mgmt. & Monitoring Enterprise and SaaS Models
  • 24. IPSecurityCenter™ PSIM from CNL Software Slide 24Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com
  • 25. IPSecurityCenter™ PSIM from CNL Software Slide 25Confidential Information. © 2014 CNL Software. All Rights Reserved.www.cnlsoftware.com Additional Online Resources •Wikipedia -Physical Security Information Management •http://en.wikipedia.org/wiki/Physical_security_information_management •PSIM for Mass Transit Public Safety and Security –BTP Video •https://www.youtube.com/watch?v=7FGr-mfbNok •LinkedIn Physical Security Information Management (PSIM) Group •http://www.linkedin.com/groups/Physical-Security-Information-Management-PSIM-2162880/about •CNL Software Press Releases •http://www.cnlsoftware.com/news/latest-news •CNL Software Videos •https://www.youtube.com/user/CNLSoftware/videos
  • 26. IPSecurityCenter™ PSIM from CNL Software CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 Contact Details CNL Software 21730 Red Rum Dr. Suite 112 Ashburn VA 20147 UnitedStates Tel. +1 317 522 0313 Web:www.cnlsoftware.com Email: info@cnlsoftware.com CNL Software P.O. Box 34938 Dubai United Arab Emirates