SlideShare una empresa de Scribd logo
1 de 28
IPSecurityCenter™
PSIM for Healthcare Security

Slide 1

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
PSIM Defined
What is PSIM?
Physical Security Information Management (PSIM) is software that provides a
platform and applications designed to integrate multiple, disparate security
applications and devices, allowing management of an entire enterprise through one
comprehensive user interface. That user interface can be quickly, cost effectively
customized to meet the exact requirement of each and every user.

A complete PSIM software system has six key capabilities:
•
•
•
•
•
•

Slide 2

Event Collection
Analysis
Verification
Resolution
Reporting
Audit trail

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Physical Security Information Management
Traditional Security Operations Centers

Command and Control Centers

Proprietary

Open Standards

Silos, Isolated Systems

Integrated and Interoperable Systems

Limited Safety, Security and Integration

Integrated Safety and Security Compliant

Reactive, Error Prone, Poor Visibility & Control

Proactive, Strategic, Managed and Predictive

Functional Data Only

Real-time Information, Optimized

Disparate Systems with Minimal Communication

Communication between Existing and New Systems

Without PSIM

With PSIM

Source: Frost & Sullivan

Slide 3

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
CNL Software
IPSecurityCenter™ - World Leading PSIM Software
CNL Software's IPSecurityCenter PSIM solutions sit at the heart of some of the largest,
most complex and ground-breaking security integration projects in the world.
•

US: Washington DC protecting over

•

UK: Protecting over

•

South Africa: Securing over

•

India: Protecting over

•

US & Canada: Largest single PSIM installation to date protecting over

•

UK: Fortune 20 company securing over

•

India & Sri Lanka: Protecting over

•

Kuwait: Protecting over

Slide 4

citizens

passenger journeys per year
of pipelines protecting over

liters of fuel

employees and tracking over

employees over

corporate vehicles
US office locations

locations

employees

barrels of oil a day

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
CNL Software
IPSecurityCenter™
•

PSIM software based integration and management platform

•

Connects and manages disparate building and security
technologies and processes

•

Provides operators with real-time Situational Awareness

•

Gives a Common Operating Picture (COP) for all security operative

•

Presents step by step process guidance

•

Ensures complete compliance to security policies

Slide 5

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
IPSecurityCenter™
Integrated Approach
IPSecurityCenter works with the largest number of manufacturer systems allowing
maximum use of legacy equipment including:

CCTV

Slide 6

BMS

Tagging

Fire, Alarm
Systems

Access Control

Confidential Information. © 2013 CNL Software. All Rights Reserved.

Display

Analytics

www.cnlsoftware.com
IPSecurityCenter™
Information Aggregation

Access

BMS

Tagging

Fire

CCTV

Parking Lots

Asset
Mapping
Surface

Operator
Guidance
Interface

Detect
Slide 7

Aggregated
Visual
Intelligence

Visualize

Resolve

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Healthcare Security
The Healthcare Challenge
•

The security challenge includes:
•
•
•

•

The International Association for Healthcare Security and Safety
(IAHSS) stresses that the primary concern of every healthcare
security department is to:
•
•
•
•

Slide 8

Maintaining the safety of patients and staff
The protection and inspection of medicines and medical equipment
Security of facilities including buildings and parking lots.

provide for the safety and welfare of everyone in the facility and on
campus
create a sense of security so that patients and visitors find the facility
to be open and inviting and choose it for their healthcare
focus on the needs and concerns of workers so the workforce finds
the institution to be an employer/workplace of choice
balance the creation of an open and inviting impression with the
safeguards and protocols that ensure a safe environment for all

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Healthcare Security
Security Issues
•

Today healthcare security has to face:
•
•
•
•
•
•

•

Complex medical centers requiring different security approaches including:
•
•
•

•

Large medical centers with many community-based facilities
Outpatient centers
Care in the community

Hospital growth, mergers and acquisition can bring with it:
•
•
•

Slide 9

Increased instances of theft and waste
Violent behavior towards staff and other patients
General vandalism
Corporate espionage
Theft of research information and intellectual property
Threat of terrorism

Legacy equipment
Disparate systems
Multiple operating procedures

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Healthcare Security
Security Operational Issues
•

Ensuring the highest patient, staff, medicines and equipment safety using an
increasing number of sensors, systems and data creates it own challenges:
•
•
•
•
•

•

All of this can lead to:
•
•

Slide 10

Increased cost of running multiple control centers
Time and effort to manage disparate systems across multiple platforms
Hundreds of opportunities for false alarms
No way of quickly verifying alarms
Ensuring security staff follow common procedures to different responses required
dependant on time, date, historic alarm data and threat level

Reduced operational effectiveness
Undermined security infrastructure

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Healthcare Security Operational Issues:
Resolved with IPSecurityCenter™
•

Integrates entire estate of existing security assets & sensors

•

Integrates multiple disparate solutions, removing technology
dependencies on specific products and vendors

•

Develops a centralized Command and Control infrastructure

•

Increases situational awareness

•

Seamlessly deploy new technologies that support risk reduction
and promote a more secure environment

Slide 11

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Healthcare Security Operational Issues:
Resolved with IPSecurityCenter™ cont.
•

Completely customisable, presenting the right information, to the
right people, in real time

•

Event driven switching of layouts created by
activity/incidents/triggers/timeouts

•

Display of video with other information sources to create
dashboards and incident centres
•

•

Automatic escalation from one display to another
•
•

•

Slide 12

Highlight repeat incidents
Distributed intelligence
Audience / event specific presentation

Workflow created from a range of system & operator inputs

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
The ROI
Strategic Value
•

Return on Investment
•
•
•

•

Improve operation efficiency. For example:
•
•

•

Video analytics or RFID tagging

Reduced training costs
•

Slide 13

Incremental migration path for aging assets
Integration of both analog and IP technologies

Support the use of new technologies i.e.
•

•

Centralized monitoring of security and BMS systems by security personnel
Life safety system alerts automatically escalated to a nurses station

Extending the life of security assets i.e.
•
•

•

Contribute to the provision of quality care
Protecting the reputation of the organization
Maintaining good public and employee relationships

Only one system for security operators to learn
Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Process Guidance & Crisis Management
IPSecurityCenter™

IPSecurityCenter™ receives an alarm from the waiting room of a hospital clinic

1
The nearest camera automatically pans to the location of the alarm

2

IPSecurityCenter’s on-screen Process Guidance asks the operator to instantly verify the incident using
live video

3

Thesecurity risk is identified, the operator is prompted to confirm theteam, ensuringthe provided list
A Control Center has constant communications with the response incident from real-time guidance
to manage the incident based on standard operating procedures (SOPs)

4

The incident is rapidly resolved using these SOPs which ensure compliance to organizational and
government instigated policies for risk mitigation
An incident report is automatically generated

Slide 14

Confidential Information. © 2013 CNL Software. All Rights Reserved.

END

www.cnlsoftware.com
Analytics Alarm Example
Suspicious behaviour

Playback controls for
review of incident

Slide 15

Event image from
analytics engine

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Perimeter Alarm Example
Auto camera display

PTZ cameras
moves to
preset

Perimeter intrusion
event
Automatic
display of 3
nearest static
cameras

Slide 16

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Process Guidance Example
False Alarm

Consistent resolution form
with field validation

Slide 17

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
IPSecurityCenter™
Other Healthcare Integration Capability

FACILITY
BMS
Fire alarms
Perimeter security
Heating & ventilation
Parking lot
management

Slide 18

Reception
Management
CCTV surveillance
Facial recognition
Video analytics
Waiting times

Security
Access control
RFID patient tagging
Drugs management
Secure wards

EMPLOYEES &
CONTRACT STAFF
Access control and
badging
Time & attendance
Linked to HR system

Confidential Information. © 2013 CNL Software. All Rights Reserved.

BUSINESS
Theft prevention
Asset protection
Statistics and reporting
Public information and
marketing

www.cnlsoftware.com
IPSecurityCenter™ PSIM Solution
Summary
•

Software-driven integration of all security applications

•

Integration of existing and future technologies

•

Fast development of customer & application specific graphical
user interfaces

•

Evidence gathering & visualization from multiple security
resources, live & recorded

•

Compliance – Policies – Procedures

•

Crisis Management

•

Management Reporting / Business Intelligence

•

Rapid deployment – Rapid Return On Investment

•

Managing a “holistic” security policy across an enterprise IT
infrastructure with “real time” flexibility

Slide 19

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Case Studies

Slide 20

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Safe Cities
Washington DC HSEMA, United States
City-wide CCTV integration providing situational awareness
protecting over 5.5 million citizens and 17.9 million visitors
each year.
•

Integration includes over 5,000+ CCTV cameras from district
agencies including:
•

Homeland Security Emergency Management Agency,
Metropolitan Police Department, Department of Transportation's (DDOT),
Protective Service Division's (PSD), District of Columbia Public Schools (DCPS)

•

Also integrates ShotSpotter Audio Analytic Gunshot Detection System

•

Supports the city’s public safety planning efforts for special events
requiring interagency coordination

The DC VIPS program will create a unified control center where all of the security
requirements of multiple agencies within the Greater Washington area can be
managed and processed.

Slide 21

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Safe Cities & Law Enforcement
Greater Manchester Police, UK
One of the largest law enforcement forces in the United
Kingdom, protecting 2.6 million residents and 8 million
visitors each year.
•

Public/private integration of CCTV feeds from cameras
including:
•
•
•
•
•
•
•

Manchester International Airport
Manchester City Council and Trafford Council
Manchester City Soccer Stadium
Radisson Edwardian Hotel
Force fixed and rotary wing aircraft, heli-tele
Mobile CCTV vans
Body warn cameras and mobile evidence gatherers

Surveillance and Intelligence gathering for highest level security event in the UK
after the G8 Summit, plus increased public protection and rapid police response at
major occasions, such as the UEFA Cup final.

Slide 22

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Corporate Enterprise
Engineering Corporate, UK
Engineering consultancy protecting over 600 professional
engineers, consultants, staff and intellectual property at its
engineering, design, development and testing HQ.
•

CCTV and alarm monitoring in workshops handling gasoline,
diesel, gaseous fuel and lubricants

•

Common operation procedures for handling alerts due to
engine shut down, gas and/or fire

•

Out of office fire alerts sent by text/phone to emergency
response teams

•

Also integrating fence detection, intruder, panic and
building management system alarms

Working with hazardous materials including engine fuels and lubricants means that
the organization understands the need to respond to potential life and business
threatening alerts immediately to ensure the safety of staff, visitors and assets.

Slide 23

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Retail
Retail Chain, South Africa
Central management of security systems and BMS for a
114,000 m² warehousing, refrigeration and distribution
center handling in excess of 50,000 line items.
•

Reduced shrinkage and theft through effective maintenance
of security and BMS systems

•

Protecting fresh produce and perishables from spoiling by
monitoring generators and refrigeration

•

Weigh bridge monitoring online and offline status

•

Monitoring the status of security systems such at fence
detection and CCTV

•

Any system fault alarms sends alerts to the maintenance

A camera that goes down or response
team for immediate a weigh bridge that is turned off opens up a window of
opportunity for theft, by monitoring the state of security systems and reporting
problems to maintenance the organization is able to respond immediately to fix the
problem; limiting potential losses.
Slide 24

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Education
Queens University Belfast, UK
Protecting 17,000+ students and 3,500+ staff studying and
working across a campus covering more than 250
buildings.
•

Remote bi-directional communication to the University’s
Fire, CCTV, Access Control, Intruder Alarm systems

•

Integrating security policies and providing advanced
situational awareness across the whole campus

•

Optimised use of security resources offering longer life for
legacy systems

•

Productivity gains by managing more locations with existing
personnel

Increased student confidence in University safety
A• centralised campus based Command and Control Centre operating in a
metropolitan area and integrating more than 250 sites and devices covering CCTV,
access control, fire, BMS and intruder systems.

Slide 25

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Further Information
Additional Online Resources
Wikipedia - Physical Security Information Management
•

http://en.wikipedia.org/wiki/Physical_Security_Information_Management

PSIM for Mass Transit Public Safety and Security – BTP Video
•

http://www.youtube.com/watch?v=7FGr-mfbNok&feature=channel&list=UL

LinkedIn Physical Security Information Management (PSIM) Group
•

http://www.linkedin.com/groups?home=&gid=2162880&trk=anet_ug_hm

CNL Software Press Releases
•

http://www.cnlsoftware.com/latestNews.php

CNL Software Downloads: whitepapers, articles, solutions guides, reports
•
Slide 26

http://www.cnlsoftware.com/downloads.php
Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
References
•

Hospital and Healthcare Security - By Russell Colling, Tony W York

•

International Association for Healthcare Security and Safety (IAHSS)
•

•

The Joint Commission
•

Slide 27

www.iahss.org

www.jointcommission.org

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com
Contact Details
CNL Software
11715 Fox Road
Suite 400-190
Indianapolis
IN 46236
USA
Tel. +1 317 522 0313

CNL Software
CNL House, Lansbury Estate
Lower Guildford Road
Knaphill
Surrey, GU21 2EP
United Kingdom
Tel. +44 (0) 1483 48 00 88

Web:

www.cnlsoftware.com

Email:

info@cnlsoftware.com
marketing@cnlsoftware.com
training@cnlsoftware.com

Slide 28

Confidential Information. © 2013 CNL Software. All Rights Reserved.

www.cnlsoftware.com

Más contenido relacionado

La actualidad más candente

CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityAdlan Hussain
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentationdanphilpott
 
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceSébastien Roques
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security ManagementChristophe Briguet
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell YouHelpSystems
 
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsEnclaveSecurity
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systemsSaiful Chowdhury
 

La actualidad más candente (20)

CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Manual psim
Manual psimManual psim
Manual psim
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controlsPrioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systems
 

Similar a PSIM for Healthcare

Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyEnclaveSecurity
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systemsevatjohnson
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsHuntsman Security
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) SecurityComputer Aid, Inc
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationJoe Hessmiller
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
emea-unification-e-book.pdf
emea-unification-e-book.pdfemea-unification-e-book.pdf
emea-unification-e-book.pdfkhaledhassan
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerJoe Hessmiller
 

Similar a PSIM for Healthcare (20)

Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) Security
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
111.pptx
111.pptx111.pptx
111.pptx
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
emea-unification-e-book.pdf
emea-unification-e-book.pdfemea-unification-e-book.pdf
emea-unification-e-book.pdf
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

PSIM for Healthcare

  • 1. IPSecurityCenter™ PSIM for Healthcare Security Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 2. PSIM Defined What is PSIM? Physical Security Information Management (PSIM) is software that provides a platform and applications designed to integrate multiple, disparate security applications and devices, allowing management of an entire enterprise through one comprehensive user interface. That user interface can be quickly, cost effectively customized to meet the exact requirement of each and every user. A complete PSIM software system has six key capabilities: • • • • • • Slide 2 Event Collection Analysis Verification Resolution Reporting Audit trail Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 3. Physical Security Information Management Traditional Security Operations Centers Command and Control Centers Proprietary Open Standards Silos, Isolated Systems Integrated and Interoperable Systems Limited Safety, Security and Integration Integrated Safety and Security Compliant Reactive, Error Prone, Poor Visibility & Control Proactive, Strategic, Managed and Predictive Functional Data Only Real-time Information, Optimized Disparate Systems with Minimal Communication Communication between Existing and New Systems Without PSIM With PSIM Source: Frost & Sullivan Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 4. CNL Software IPSecurityCenter™ - World Leading PSIM Software CNL Software's IPSecurityCenter PSIM solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. • US: Washington DC protecting over • UK: Protecting over • South Africa: Securing over • India: Protecting over • US & Canada: Largest single PSIM installation to date protecting over • UK: Fortune 20 company securing over • India & Sri Lanka: Protecting over • Kuwait: Protecting over Slide 4 citizens passenger journeys per year of pipelines protecting over liters of fuel employees and tracking over employees over corporate vehicles US office locations locations employees barrels of oil a day Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 5. CNL Software IPSecurityCenter™ • PSIM software based integration and management platform • Connects and manages disparate building and security technologies and processes • Provides operators with real-time Situational Awareness • Gives a Common Operating Picture (COP) for all security operative • Presents step by step process guidance • Ensures complete compliance to security policies Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 6. IPSecurityCenter™ Integrated Approach IPSecurityCenter works with the largest number of manufacturer systems allowing maximum use of legacy equipment including: CCTV Slide 6 BMS Tagging Fire, Alarm Systems Access Control Confidential Information. © 2013 CNL Software. All Rights Reserved. Display Analytics www.cnlsoftware.com
  • 7. IPSecurityCenter™ Information Aggregation Access BMS Tagging Fire CCTV Parking Lots Asset Mapping Surface Operator Guidance Interface Detect Slide 7 Aggregated Visual Intelligence Visualize Resolve Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 8. Healthcare Security The Healthcare Challenge • The security challenge includes: • • • • The International Association for Healthcare Security and Safety (IAHSS) stresses that the primary concern of every healthcare security department is to: • • • • Slide 8 Maintaining the safety of patients and staff The protection and inspection of medicines and medical equipment Security of facilities including buildings and parking lots. provide for the safety and welfare of everyone in the facility and on campus create a sense of security so that patients and visitors find the facility to be open and inviting and choose it for their healthcare focus on the needs and concerns of workers so the workforce finds the institution to be an employer/workplace of choice balance the creation of an open and inviting impression with the safeguards and protocols that ensure a safe environment for all Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 9. Healthcare Security Security Issues • Today healthcare security has to face: • • • • • • • Complex medical centers requiring different security approaches including: • • • • Large medical centers with many community-based facilities Outpatient centers Care in the community Hospital growth, mergers and acquisition can bring with it: • • • Slide 9 Increased instances of theft and waste Violent behavior towards staff and other patients General vandalism Corporate espionage Theft of research information and intellectual property Threat of terrorism Legacy equipment Disparate systems Multiple operating procedures Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 10. Healthcare Security Security Operational Issues • Ensuring the highest patient, staff, medicines and equipment safety using an increasing number of sensors, systems and data creates it own challenges: • • • • • • All of this can lead to: • • Slide 10 Increased cost of running multiple control centers Time and effort to manage disparate systems across multiple platforms Hundreds of opportunities for false alarms No way of quickly verifying alarms Ensuring security staff follow common procedures to different responses required dependant on time, date, historic alarm data and threat level Reduced operational effectiveness Undermined security infrastructure Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 11. Healthcare Security Operational Issues: Resolved with IPSecurityCenter™ • Integrates entire estate of existing security assets & sensors • Integrates multiple disparate solutions, removing technology dependencies on specific products and vendors • Develops a centralized Command and Control infrastructure • Increases situational awareness • Seamlessly deploy new technologies that support risk reduction and promote a more secure environment Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 12. Healthcare Security Operational Issues: Resolved with IPSecurityCenter™ cont. • Completely customisable, presenting the right information, to the right people, in real time • Event driven switching of layouts created by activity/incidents/triggers/timeouts • Display of video with other information sources to create dashboards and incident centres • • Automatic escalation from one display to another • • • Slide 12 Highlight repeat incidents Distributed intelligence Audience / event specific presentation Workflow created from a range of system & operator inputs Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 13. The ROI Strategic Value • Return on Investment • • • • Improve operation efficiency. For example: • • • Video analytics or RFID tagging Reduced training costs • Slide 13 Incremental migration path for aging assets Integration of both analog and IP technologies Support the use of new technologies i.e. • • Centralized monitoring of security and BMS systems by security personnel Life safety system alerts automatically escalated to a nurses station Extending the life of security assets i.e. • • • Contribute to the provision of quality care Protecting the reputation of the organization Maintaining good public and employee relationships Only one system for security operators to learn Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 14. Process Guidance & Crisis Management IPSecurityCenter™ IPSecurityCenter™ receives an alarm from the waiting room of a hospital clinic 1 The nearest camera automatically pans to the location of the alarm 2 IPSecurityCenter’s on-screen Process Guidance asks the operator to instantly verify the incident using live video 3 Thesecurity risk is identified, the operator is prompted to confirm theteam, ensuringthe provided list A Control Center has constant communications with the response incident from real-time guidance to manage the incident based on standard operating procedures (SOPs) 4 The incident is rapidly resolved using these SOPs which ensure compliance to organizational and government instigated policies for risk mitigation An incident report is automatically generated Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. END www.cnlsoftware.com
  • 15. Analytics Alarm Example Suspicious behaviour Playback controls for review of incident Slide 15 Event image from analytics engine Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 16. Perimeter Alarm Example Auto camera display PTZ cameras moves to preset Perimeter intrusion event Automatic display of 3 nearest static cameras Slide 16 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 17. Process Guidance Example False Alarm Consistent resolution form with field validation Slide 17 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 18. IPSecurityCenter™ Other Healthcare Integration Capability FACILITY BMS Fire alarms Perimeter security Heating & ventilation Parking lot management Slide 18 Reception Management CCTV surveillance Facial recognition Video analytics Waiting times Security Access control RFID patient tagging Drugs management Secure wards EMPLOYEES & CONTRACT STAFF Access control and badging Time & attendance Linked to HR system Confidential Information. © 2013 CNL Software. All Rights Reserved. BUSINESS Theft prevention Asset protection Statistics and reporting Public information and marketing www.cnlsoftware.com
  • 19. IPSecurityCenter™ PSIM Solution Summary • Software-driven integration of all security applications • Integration of existing and future technologies • Fast development of customer & application specific graphical user interfaces • Evidence gathering & visualization from multiple security resources, live & recorded • Compliance – Policies – Procedures • Crisis Management • Management Reporting / Business Intelligence • Rapid deployment – Rapid Return On Investment • Managing a “holistic” security policy across an enterprise IT infrastructure with “real time” flexibility Slide 19 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 20. Case Studies Slide 20 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 21. Safe Cities Washington DC HSEMA, United States City-wide CCTV integration providing situational awareness protecting over 5.5 million citizens and 17.9 million visitors each year. • Integration includes over 5,000+ CCTV cameras from district agencies including: • Homeland Security Emergency Management Agency, Metropolitan Police Department, Department of Transportation's (DDOT), Protective Service Division's (PSD), District of Columbia Public Schools (DCPS) • Also integrates ShotSpotter Audio Analytic Gunshot Detection System • Supports the city’s public safety planning efforts for special events requiring interagency coordination The DC VIPS program will create a unified control center where all of the security requirements of multiple agencies within the Greater Washington area can be managed and processed. Slide 21 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 22. Safe Cities & Law Enforcement Greater Manchester Police, UK One of the largest law enforcement forces in the United Kingdom, protecting 2.6 million residents and 8 million visitors each year. • Public/private integration of CCTV feeds from cameras including: • • • • • • • Manchester International Airport Manchester City Council and Trafford Council Manchester City Soccer Stadium Radisson Edwardian Hotel Force fixed and rotary wing aircraft, heli-tele Mobile CCTV vans Body warn cameras and mobile evidence gatherers Surveillance and Intelligence gathering for highest level security event in the UK after the G8 Summit, plus increased public protection and rapid police response at major occasions, such as the UEFA Cup final. Slide 22 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 23. Corporate Enterprise Engineering Corporate, UK Engineering consultancy protecting over 600 professional engineers, consultants, staff and intellectual property at its engineering, design, development and testing HQ. • CCTV and alarm monitoring in workshops handling gasoline, diesel, gaseous fuel and lubricants • Common operation procedures for handling alerts due to engine shut down, gas and/or fire • Out of office fire alerts sent by text/phone to emergency response teams • Also integrating fence detection, intruder, panic and building management system alarms Working with hazardous materials including engine fuels and lubricants means that the organization understands the need to respond to potential life and business threatening alerts immediately to ensure the safety of staff, visitors and assets. Slide 23 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 24. Retail Retail Chain, South Africa Central management of security systems and BMS for a 114,000 m² warehousing, refrigeration and distribution center handling in excess of 50,000 line items. • Reduced shrinkage and theft through effective maintenance of security and BMS systems • Protecting fresh produce and perishables from spoiling by monitoring generators and refrigeration • Weigh bridge monitoring online and offline status • Monitoring the status of security systems such at fence detection and CCTV • Any system fault alarms sends alerts to the maintenance A camera that goes down or response team for immediate a weigh bridge that is turned off opens up a window of opportunity for theft, by monitoring the state of security systems and reporting problems to maintenance the organization is able to respond immediately to fix the problem; limiting potential losses. Slide 24 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 25. Education Queens University Belfast, UK Protecting 17,000+ students and 3,500+ staff studying and working across a campus covering more than 250 buildings. • Remote bi-directional communication to the University’s Fire, CCTV, Access Control, Intruder Alarm systems • Integrating security policies and providing advanced situational awareness across the whole campus • Optimised use of security resources offering longer life for legacy systems • Productivity gains by managing more locations with existing personnel Increased student confidence in University safety A• centralised campus based Command and Control Centre operating in a metropolitan area and integrating more than 250 sites and devices covering CCTV, access control, fire, BMS and intruder systems. Slide 25 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 26. Further Information Additional Online Resources Wikipedia - Physical Security Information Management • http://en.wikipedia.org/wiki/Physical_Security_Information_Management PSIM for Mass Transit Public Safety and Security – BTP Video • http://www.youtube.com/watch?v=7FGr-mfbNok&feature=channel&list=UL LinkedIn Physical Security Information Management (PSIM) Group • http://www.linkedin.com/groups?home=&gid=2162880&trk=anet_ug_hm CNL Software Press Releases • http://www.cnlsoftware.com/latestNews.php CNL Software Downloads: whitepapers, articles, solutions guides, reports • Slide 26 http://www.cnlsoftware.com/downloads.php Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 27. References • Hospital and Healthcare Security - By Russell Colling, Tony W York • International Association for Healthcare Security and Safety (IAHSS) • • The Joint Commission • Slide 27 www.iahss.org www.jointcommission.org Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
  • 28. Contact Details CNL Software 11715 Fox Road Suite 400-190 Indianapolis IN 46236 USA Tel. +1 317 522 0313 CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 Web: www.cnlsoftware.com Email: info@cnlsoftware.com marketing@cnlsoftware.com training@cnlsoftware.com Slide 28 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com