Enviar búsqueda
Cargar
PSIM for Healthcare
•
Descargar como PPTX, PDF
•
3 recomendaciones
•
2,187 vistas
Adlan Hussain
Seguir
PSIM for Healthcare
Leer menos
Leer más
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 28
Descargar ahora
Recomendados
The Ultimate Guide to PSIM - Introduction
The Ultimate Guide to PSIM - Introduction
Adlan Hussain
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
Adlan Hussain
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
Adlan Hussain
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
Adlan Hussain
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
Adlan Hussain
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
Adlan Hussain
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
Adlan Hussain
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
VidSys, Inc.
Recomendados
The Ultimate Guide to PSIM - Introduction
The Ultimate Guide to PSIM - Introduction
Adlan Hussain
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
Adlan Hussain
CNL Software - PSIM for Energy, Oil & Gas
CNL Software - PSIM for Energy, Oil & Gas
Adlan Hussain
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
Adlan Hussain
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
Adlan Hussain
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
Adlan Hussain
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
Adlan Hussain
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
VidSys, Inc.
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
Adlan Hussain
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
Manual psim
Manual psim
Wilder Samo Castillo
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
IBM Security
DojoSec FISMA Presentation
DojoSec FISMA Presentation
danphilpott
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
Sébastien Roques
Evolution of Security Management
Evolution of Security Management
Christophe Briguet
System Security Plans 101
System Security Plans 101
Donald E. Hester
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
Lisa Niles
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
Merlin Govender
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
HelpSystems
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
EnclaveSecurity
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
Jose Luis Garcia Rodriguez
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Lisa Niles
Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
1. safety instrumented systems
1. safety instrumented systems
Saiful Chowdhury
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
EnclaveSecurity
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
evatjohnson
Más contenido relacionado
La actualidad más candente
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
Adlan Hussain
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
Manual psim
Manual psim
Wilder Samo Castillo
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
IBM Security
DojoSec FISMA Presentation
DojoSec FISMA Presentation
danphilpott
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
Sébastien Roques
Evolution of Security Management
Evolution of Security Management
Christophe Briguet
System Security Plans 101
System Security Plans 101
Donald E. Hester
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
Lisa Niles
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
Merlin Govender
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
HelpSystems
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
EnclaveSecurity
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
Jose Luis Garcia Rodriguez
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
Lisa Niles
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Lisa Niles
Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
1. safety instrumented systems
1. safety instrumented systems
Saiful Chowdhury
La actualidad más candente
(20)
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Manual psim
Manual psim
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
DojoSec FISMA Presentation
DojoSec FISMA Presentation
Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
Evolution of Security Management
Evolution of Security Management
System Security Plans 101
System Security Plans 101
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
Prioritizing an audit program using the 20 critical controls
Prioritizing an audit program using the 20 critical controls
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Nist.sp.800 37r2
Nist.sp.800 37r2
1. safety instrumented systems
1. safety instrumented systems
Similar a PSIM for Healthcare
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
EnclaveSecurity
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
evatjohnson
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
Intland Software GmbH
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
Huntsman Security
Automation of Information (Cyber) Security
Automation of Information (Cyber) Security
Computer Aid, Inc
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
Joe Hessmiller
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
3GDR
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
3GDR
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
Security management concepts and principles
Security management concepts and principles
Divya Tiwari
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
IT Network marcus evans
Many products-no-security (1)
Many products-no-security (1)
SecPod Technologies
111.pptx
111.pptx
JESUNPK
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
security and system mainatance
security and system mainatance
Kudzi Chikwatu
emea-unification-e-book.pdf
emea-unification-e-book.pdf
khaledhassan
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
Joe Hessmiller
Similar a PSIM for Healthcare
(20)
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
Automation of Information (Cyber) Security
Automation of Information (Cyber) Security
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Security management concepts and principles
Security management concepts and principles
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Many products-no-security (1)
Many products-no-security (1)
111.pptx
111.pptx
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
security and system mainatance
security and system mainatance
emea-unification-e-book.pdf
emea-unification-e-book.pdf
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
Último
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Último
(20)
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
PSIM for Healthcare
1.
IPSecurityCenter™ PSIM for Healthcare
Security Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
2.
PSIM Defined What is
PSIM? Physical Security Information Management (PSIM) is software that provides a platform and applications designed to integrate multiple, disparate security applications and devices, allowing management of an entire enterprise through one comprehensive user interface. That user interface can be quickly, cost effectively customized to meet the exact requirement of each and every user. A complete PSIM software system has six key capabilities: • • • • • • Slide 2 Event Collection Analysis Verification Resolution Reporting Audit trail Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
3.
Physical Security Information
Management Traditional Security Operations Centers Command and Control Centers Proprietary Open Standards Silos, Isolated Systems Integrated and Interoperable Systems Limited Safety, Security and Integration Integrated Safety and Security Compliant Reactive, Error Prone, Poor Visibility & Control Proactive, Strategic, Managed and Predictive Functional Data Only Real-time Information, Optimized Disparate Systems with Minimal Communication Communication between Existing and New Systems Without PSIM With PSIM Source: Frost & Sullivan Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
4.
CNL Software IPSecurityCenter™ -
World Leading PSIM Software CNL Software's IPSecurityCenter PSIM solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. • US: Washington DC protecting over • UK: Protecting over • South Africa: Securing over • India: Protecting over • US & Canada: Largest single PSIM installation to date protecting over • UK: Fortune 20 company securing over • India & Sri Lanka: Protecting over • Kuwait: Protecting over Slide 4 citizens passenger journeys per year of pipelines protecting over liters of fuel employees and tracking over employees over corporate vehicles US office locations locations employees barrels of oil a day Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
5.
CNL Software IPSecurityCenter™ • PSIM software
based integration and management platform • Connects and manages disparate building and security technologies and processes • Provides operators with real-time Situational Awareness • Gives a Common Operating Picture (COP) for all security operative • Presents step by step process guidance • Ensures complete compliance to security policies Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
6.
IPSecurityCenter™ Integrated Approach IPSecurityCenter works
with the largest number of manufacturer systems allowing maximum use of legacy equipment including: CCTV Slide 6 BMS Tagging Fire, Alarm Systems Access Control Confidential Information. © 2013 CNL Software. All Rights Reserved. Display Analytics www.cnlsoftware.com
7.
IPSecurityCenter™ Information Aggregation Access BMS Tagging Fire CCTV Parking Lots Asset Mapping Surface Operator Guidance Interface Detect Slide
7 Aggregated Visual Intelligence Visualize Resolve Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
8.
Healthcare Security The Healthcare
Challenge • The security challenge includes: • • • • The International Association for Healthcare Security and Safety (IAHSS) stresses that the primary concern of every healthcare security department is to: • • • • Slide 8 Maintaining the safety of patients and staff The protection and inspection of medicines and medical equipment Security of facilities including buildings and parking lots. provide for the safety and welfare of everyone in the facility and on campus create a sense of security so that patients and visitors find the facility to be open and inviting and choose it for their healthcare focus on the needs and concerns of workers so the workforce finds the institution to be an employer/workplace of choice balance the creation of an open and inviting impression with the safeguards and protocols that ensure a safe environment for all Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
9.
Healthcare Security Security Issues • Today
healthcare security has to face: • • • • • • • Complex medical centers requiring different security approaches including: • • • • Large medical centers with many community-based facilities Outpatient centers Care in the community Hospital growth, mergers and acquisition can bring with it: • • • Slide 9 Increased instances of theft and waste Violent behavior towards staff and other patients General vandalism Corporate espionage Theft of research information and intellectual property Threat of terrorism Legacy equipment Disparate systems Multiple operating procedures Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
10.
Healthcare Security Security Operational
Issues • Ensuring the highest patient, staff, medicines and equipment safety using an increasing number of sensors, systems and data creates it own challenges: • • • • • • All of this can lead to: • • Slide 10 Increased cost of running multiple control centers Time and effort to manage disparate systems across multiple platforms Hundreds of opportunities for false alarms No way of quickly verifying alarms Ensuring security staff follow common procedures to different responses required dependant on time, date, historic alarm data and threat level Reduced operational effectiveness Undermined security infrastructure Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
11.
Healthcare Security Operational
Issues: Resolved with IPSecurityCenter™ • Integrates entire estate of existing security assets & sensors • Integrates multiple disparate solutions, removing technology dependencies on specific products and vendors • Develops a centralized Command and Control infrastructure • Increases situational awareness • Seamlessly deploy new technologies that support risk reduction and promote a more secure environment Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
12.
Healthcare Security Operational
Issues: Resolved with IPSecurityCenter™ cont. • Completely customisable, presenting the right information, to the right people, in real time • Event driven switching of layouts created by activity/incidents/triggers/timeouts • Display of video with other information sources to create dashboards and incident centres • • Automatic escalation from one display to another • • • Slide 12 Highlight repeat incidents Distributed intelligence Audience / event specific presentation Workflow created from a range of system & operator inputs Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
13.
The ROI Strategic Value • Return
on Investment • • • • Improve operation efficiency. For example: • • • Video analytics or RFID tagging Reduced training costs • Slide 13 Incremental migration path for aging assets Integration of both analog and IP technologies Support the use of new technologies i.e. • • Centralized monitoring of security and BMS systems by security personnel Life safety system alerts automatically escalated to a nurses station Extending the life of security assets i.e. • • • Contribute to the provision of quality care Protecting the reputation of the organization Maintaining good public and employee relationships Only one system for security operators to learn Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
14.
Process Guidance &
Crisis Management IPSecurityCenter™ IPSecurityCenter™ receives an alarm from the waiting room of a hospital clinic 1 The nearest camera automatically pans to the location of the alarm 2 IPSecurityCenter’s on-screen Process Guidance asks the operator to instantly verify the incident using live video 3 Thesecurity risk is identified, the operator is prompted to confirm theteam, ensuringthe provided list A Control Center has constant communications with the response incident from real-time guidance to manage the incident based on standard operating procedures (SOPs) 4 The incident is rapidly resolved using these SOPs which ensure compliance to organizational and government instigated policies for risk mitigation An incident report is automatically generated Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. END www.cnlsoftware.com
15.
Analytics Alarm Example Suspicious
behaviour Playback controls for review of incident Slide 15 Event image from analytics engine Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
16.
Perimeter Alarm Example Auto
camera display PTZ cameras moves to preset Perimeter intrusion event Automatic display of 3 nearest static cameras Slide 16 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
17.
Process Guidance Example False
Alarm Consistent resolution form with field validation Slide 17 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
18.
IPSecurityCenter™ Other Healthcare Integration
Capability FACILITY BMS Fire alarms Perimeter security Heating & ventilation Parking lot management Slide 18 Reception Management CCTV surveillance Facial recognition Video analytics Waiting times Security Access control RFID patient tagging Drugs management Secure wards EMPLOYEES & CONTRACT STAFF Access control and badging Time & attendance Linked to HR system Confidential Information. © 2013 CNL Software. All Rights Reserved. BUSINESS Theft prevention Asset protection Statistics and reporting Public information and marketing www.cnlsoftware.com
19.
IPSecurityCenter™ PSIM Solution Summary • Software-driven
integration of all security applications • Integration of existing and future technologies • Fast development of customer & application specific graphical user interfaces • Evidence gathering & visualization from multiple security resources, live & recorded • Compliance – Policies – Procedures • Crisis Management • Management Reporting / Business Intelligence • Rapid deployment – Rapid Return On Investment • Managing a “holistic” security policy across an enterprise IT infrastructure with “real time” flexibility Slide 19 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
20.
Case Studies Slide 20 Confidential
Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
21.
Safe Cities Washington DC
HSEMA, United States City-wide CCTV integration providing situational awareness protecting over 5.5 million citizens and 17.9 million visitors each year. • Integration includes over 5,000+ CCTV cameras from district agencies including: • Homeland Security Emergency Management Agency, Metropolitan Police Department, Department of Transportation's (DDOT), Protective Service Division's (PSD), District of Columbia Public Schools (DCPS) • Also integrates ShotSpotter Audio Analytic Gunshot Detection System • Supports the city’s public safety planning efforts for special events requiring interagency coordination The DC VIPS program will create a unified control center where all of the security requirements of multiple agencies within the Greater Washington area can be managed and processed. Slide 21 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
22.
Safe Cities &
Law Enforcement Greater Manchester Police, UK One of the largest law enforcement forces in the United Kingdom, protecting 2.6 million residents and 8 million visitors each year. • Public/private integration of CCTV feeds from cameras including: • • • • • • • Manchester International Airport Manchester City Council and Trafford Council Manchester City Soccer Stadium Radisson Edwardian Hotel Force fixed and rotary wing aircraft, heli-tele Mobile CCTV vans Body warn cameras and mobile evidence gatherers Surveillance and Intelligence gathering for highest level security event in the UK after the G8 Summit, plus increased public protection and rapid police response at major occasions, such as the UEFA Cup final. Slide 22 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
23.
Corporate Enterprise Engineering Corporate,
UK Engineering consultancy protecting over 600 professional engineers, consultants, staff and intellectual property at its engineering, design, development and testing HQ. • CCTV and alarm monitoring in workshops handling gasoline, diesel, gaseous fuel and lubricants • Common operation procedures for handling alerts due to engine shut down, gas and/or fire • Out of office fire alerts sent by text/phone to emergency response teams • Also integrating fence detection, intruder, panic and building management system alarms Working with hazardous materials including engine fuels and lubricants means that the organization understands the need to respond to potential life and business threatening alerts immediately to ensure the safety of staff, visitors and assets. Slide 23 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
24.
Retail Retail Chain, South
Africa Central management of security systems and BMS for a 114,000 m² warehousing, refrigeration and distribution center handling in excess of 50,000 line items. • Reduced shrinkage and theft through effective maintenance of security and BMS systems • Protecting fresh produce and perishables from spoiling by monitoring generators and refrigeration • Weigh bridge monitoring online and offline status • Monitoring the status of security systems such at fence detection and CCTV • Any system fault alarms sends alerts to the maintenance A camera that goes down or response team for immediate a weigh bridge that is turned off opens up a window of opportunity for theft, by monitoring the state of security systems and reporting problems to maintenance the organization is able to respond immediately to fix the problem; limiting potential losses. Slide 24 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
25.
Education Queens University Belfast,
UK Protecting 17,000+ students and 3,500+ staff studying and working across a campus covering more than 250 buildings. • Remote bi-directional communication to the University’s Fire, CCTV, Access Control, Intruder Alarm systems • Integrating security policies and providing advanced situational awareness across the whole campus • Optimised use of security resources offering longer life for legacy systems • Productivity gains by managing more locations with existing personnel Increased student confidence in University safety A• centralised campus based Command and Control Centre operating in a metropolitan area and integrating more than 250 sites and devices covering CCTV, access control, fire, BMS and intruder systems. Slide 25 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
26.
Further Information Additional Online
Resources Wikipedia - Physical Security Information Management • http://en.wikipedia.org/wiki/Physical_Security_Information_Management PSIM for Mass Transit Public Safety and Security – BTP Video • http://www.youtube.com/watch?v=7FGr-mfbNok&feature=channel&list=UL LinkedIn Physical Security Information Management (PSIM) Group • http://www.linkedin.com/groups?home=&gid=2162880&trk=anet_ug_hm CNL Software Press Releases • http://www.cnlsoftware.com/latestNews.php CNL Software Downloads: whitepapers, articles, solutions guides, reports • Slide 26 http://www.cnlsoftware.com/downloads.php Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
27.
References • Hospital and Healthcare
Security - By Russell Colling, Tony W York • International Association for Healthcare Security and Safety (IAHSS) • • The Joint Commission • Slide 27 www.iahss.org www.jointcommission.org Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
28.
Contact Details CNL Software 11715
Fox Road Suite 400-190 Indianapolis IN 46236 USA Tel. +1 317 522 0313 CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 Web: www.cnlsoftware.com Email: info@cnlsoftware.com marketing@cnlsoftware.com training@cnlsoftware.com Slide 28 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Descargar ahora