cnl software psim presentation - information management within physical security
DESCRIPTION
Security is a business with serious challenges… Security has traditionally been seen as isolated from business objectives This is now changing, security being required to work more with business The security challenge is greater than ever, with increasingly mobile workforces and mounting pressure for cost reductions Technology is aiding both existing challenges and supporting the transition of security into other areas of business It is allowing security to do more with less people As a result security issues need to move to “C Level” and the suppliers need to provide business solutions with IT like technology to justify their inclusion at Board LevelTRANSCRIPT
Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information Management within Physical Security
CNL Software
Slide 2 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Security has traditionally been seen as isolated from business objectives
• This is now changing, security being required to work more with business
• The security challenge is greater than ever, with increasingly mobile workforces and mounting pressure for cost reductions
• Technology is aiding both existing challenges and supporting the transition of security into other areas of business
• It is allowing security to do more with less people• As a result security issues need to move to “C Level” and the
suppliers need to provide business solutions with IT like technology to justify their inclusion at Board Level
Security is a business with serious challenges…
The Business of Security
Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Grudge purchase• Event driven• Incompatible technology systems, on
own network• Security undervalued• Security isolated from other areas of
business• Fear that greater integration would
compromise security, particularly IT
Traditional View
Realigning Security Objectives
Organisation Objectives
SecurityObjectives
Slide 4 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Security touches so many elements within a business
• It warrants understanding at “C” level and throughout the business
• Security is adding greater operational value at lower cost
• Security is an integral part of supply chain• Protect and maintain
• Security is an integral part of HR• Access is pretty universal
• Security is an integral part of marketing• Security data can be used is many cases to
improve business results
• Security and Facilities are finding a lot of common ground
• All facilities boil also down to sensors
Evolving View – Users Ready – Suppliers are Lagging*
Realigning Security Objectives
Organisation Objectives
SecurityObjectives
* = CNL view of suppliers
Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
As security moves to Board level - a problem arises with the need for a change in approach
Realigning Security Objectives
Security decisions
C level decisions
What do we need to get
this business issue fixed
How do I get them to buy a new CCTV
system?
Slide 6 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• More and more data being generated by an increasing number of security and facilities applications
• The need is to convert these vast amounts of data in useable intelligence that provide business advantage
• Greater reliance on analytics as more is required from less people, less focus on hardware
• Convergence of physical and logical security, requires a holistic approach – IT and security have to work together at tackling business issues
• Technology alone can not bring change, it needs to be led by IT methodology to reduce cost, reduce risk and improve efficiencies
• Solving tough business issues will be led by those who understand how to use the data available
Why do we need Information Management in Physical Security?
Information Management is Key
Slide 7 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Managing information overload
Information Management is Key
Quality of Response
Volume of Data
Information Management
Slide 8 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information into Business Intelligence
Real-time situation awareness - Know what is happening before anyone else
Collaboration - Fuel the exchange of ideas within and outside of security
Advanced visualization - Bring trends and ideas to life in the best format
Evidence retrieval - Gather, distribute and share intelligence rapidly
Unified reporting - Create reports that change organisational behavior
Risk analysis - Understand how and where risk affect your organisation
Dashboards - Manage, monitor & measure department performance
Slide 9 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Following a huge over haul of the British Transport Police security infrastructure for the 2012 Olympics, some significant operations saving were identified and achieved
Challenge• BTP are required to respond to ‘One Unders’, individuals who commit
suicide on the train lines and currently costs rail operators £ millions in journey disruptions
• This previously took as much as half a day and involved heavy police costs to discover whether it is an accident, homicide or suicide
Solution• Security is now using visual data from a common operating picture to verify
incidents and to collect evidence, drastically reducing the time needed to get the lines back up and running
Result• It is now taking less than two hours to resolve, and is saving millions in both
policing time and journey disruptions
Example – Responding to ‘One Unders’
Improving Efficiencies and Reducing Cost
Slide 10 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Major IT company has 110,000 employees in it’s Bangalore campus
Challenge• The company cannot attract and retain the best talent without providing
safe and reliable travel for these workers • To accommodate this, the company operates 2,500 busses• Lone female employees are judged at particular risk on these busses
Solution• Security teams are now using vehicle tracking systems, coupled GPRS
systems, on-board access control and panic alarms• Security is immediately alerted when a vehicle is speeding, off route or
stopped in route for a prolonged period of time• Alerts are prioritized if single females are travelling on the bus, identified
via the ACS system – live video from the bus is immediately available
Result• Ensures staff safety, improves moral and makes each member feel valued,
particularly female members
Example – Protecting Female Passengers in India
Combining HR & Security Operations
Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Global IT company with over 26 locations in the UK
Challenge• Costs included 24/7/365 security teams and office space in most locations,
these were expensive and growing annually
Solution• They centralised all UK locations into a single National Operation Centre –
ACS, CCTV, Intruder and Fire Systems• The number of control rooms reduced from fourteen to just one!
Results• Drastically reduction in the number of security personnel• Overall the ROI in security investment was reached in less than 18 months• Opportunities to add even greater ROI from future data centre monitoring,
access compliance and improved SOPs• A platform to build a global security shield
Example - Reducing Security Teams and Footprint
Reducing Man Guarding Costs
Slide 12 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Connecting multiple systems around the globe to create one information based “Shield”Reducing cost, improving efficiency and bringing greater visibility to the entire operation with
the ability to hand off operations to another center whenever needed
The Future - Global Security Shield
Slide 13 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Frost & Sullivan: Global Physical Security Information Management Market – 28 June 2012
• http://www.frost.com/prod/servlet/press-release.pag?docid=263099957
• IMS Research: What is PSIM software? - 1 December 2010• http://imsresearch.com/news-events/press-template.php?
pr_id=1779
• Imperial Capital: PSIM Opens Up the Industry – September 2010• http://www.cnlsoftware.com/media/whitePapers/PSIM_White_Paper
(September_2010).pdf
Further Reading
Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: [email protected]
CNL SoftwareCNL House, Lansbury EstateLower Guildford RoadKnaphillSurrey, GU21 2EPUnited KingdomTel. +44 (0) 1483 48 00 88
CNL Software 11715 Fox RoadSuite 400-190IndianapolisIN 46236USATel. +1 317 522 0313
Contact Details
Slide 15 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: [email protected]
CNL SoftwareCNL House, Lansbury EstateLower Guildford RoadKnaphillSurrey, GU21 2EPUnited KingdomTel. +44 (0) 1483 48 00 88
CNL Software 11715 Fox RoadSuite 400-190IndianapolisIN 46236USATel. +1 317 522 0313
Contact Details