SlideShare uma empresa Scribd logo
1 de 15
Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information Management
within Physical Security
CNL Software
Slide 2 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Security has traditionally been seen as isolated from business
objectives
• This is now changing, security being required to work more with
business
• The security challenge is greater than ever, with increasingly
mobile workforces and mounting pressure for cost reductions
• Technology is aiding both existing challenges and supporting the
transition of security into other areas of business
• It is allowing security to do more with less people
• As a result security issues need to move to “C Level” and the
suppliers need to provide business solutions with IT like
technology to justify their inclusion at Board Level
Security is a business with serious challenges…
The Business of Security
Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Grudge purchase
• Event driven
• Incompatible technology systems, on
own network
• Security undervalued
• Security isolated from other areas of
business
• Fear that greater integration would
compromise security, particularly IT
Traditional View
Realigning Security Objectives
Organisation Objectives
Security
Objectives
Slide 4 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Security touches so many elements within
a business
• It warrants understanding at “C” level and
throughout the business
• Security is adding greater operational
value at lower cost
• Security is an integral part of supply chain
• Protect and maintain
• Security is an integral part of HR
• Access is pretty universal
• Security is an integral part of marketing
• Security data can be used is many cases to
improve business results
• Security and Facilities are finding a lot of
common ground
• All facilities boil also down to sensors
Evolving View – Users Ready – Suppliers are Lagging*
Realigning Security Objectives
Organisation Objectives
Security
Objectives
* = CNL view of suppliers
Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
As security moves to Board level
- a problem arises with the need for a change in approach
Realigning Security Objectives
Security decisions
C level decisions
What do we
need to get
this business
issue fixed
How do I get them
to buy a new
CCTV system?
Slide 6 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• More and more data being generated by an increasing number of
security and facilities applications
• The need is to convert these vast amounts of data in useable
intelligence that provide business advantage
• Greater reliance on analytics as more is required from less
people, less focus on hardware
• Convergence of physical and logical security, requires a holistic
approach – IT and security have to work together at tackling
business issues
• Technology alone can not bring change, it needs to be led by IT
methodology to reduce cost, reduce risk and improve efficiencies
• Solving tough business issues will be led by those who understand
how to use the data available
Why do we need Information Management in Physical Security?
Information Management is Key
Slide 7 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Managing information overload
Information Management is Key
Quality of
Response
Volume of
Data
Information
Management
Slide 8 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information into Business Intelligence
Real-time situation awareness - Know what is happening before anyone else
Collaboration - Fuel the exchange of ideas within and outside of security
Advanced visualization - Bring trends and ideas to life in the best format
Evidence retrieval - Gather, distribute and share intelligence rapidly
Unified reporting - Create reports that change organisational behavior
Risk analysis - Understand how and where risk affect your organisation
Dashboards - Manage, monitor & measure department performance
Slide 9 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Following a huge over haul of the British Transport Police security
infrastructure for the 2012 Olympics, some significant operations
saving were identified and achieved
Challenge
• BTP are required to respond to ‘One Unders’, individuals who commit
suicide on the train lines and currently costs rail operators £ millions in
journey disruptions
• This previously took as much as half a day and involved heavy police costs
to discover whether it is an accident, homicide or suicide
Solution
• Security is now using visual data from a common operating picture to verify
incidents and to collect evidence, drastically reducing the time needed to
get the lines back up and running
Result
• It is now taking less than two hours to resolve, and is saving millions in both
policing time and journey disruptions
Example – Responding to ‘One Unders’
Improving Efficiencies and Reducing Cost
Slide 10 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Major IT company has 110,000 employees in it’s Bangalore campus
Challenge
• The company cannot attract and retain the best talent without providing
safe and reliable travel for these workers
• To accommodate this, the company operates 2,500 busses
• Lone female employees are judged at particular risk on these busses
Solution
• Security teams are now using vehicle tracking systems, coupled GPRS
systems, on-board access control and panic alarms
• Security is immediately alerted when a vehicle is speeding, off route or
stopped in route for a prolonged period of time
• Alerts are prioritized if single females are travelling on the bus, identified
via the ACS system – live video from the bus is immediately available
Result
• Ensures staff safety, improves moral and makes each member feel
valued, particularly female members
Example – Protecting Female Passengers in India
Combining HR & Security Operations
Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Global IT company with over 26 locations in the UK
Challenge
• Costs included 24/7/365 security teams and office space in most
locations, these were expensive and growing annually
Solution
• They centralised all UK locations into a single National Operation Centre –
ACS, CCTV, Intruder and Fire Systems
• The number of control rooms reduced from fourteen to just one!
Results
• Drastically reduction in the number of security personnel
• Overall the ROI in security investment was reached in less than 18 months
• Opportunities to add even greater ROI from future data centre
monitoring, access compliance and improved SOPs
• A platform to build a global security shield
Example - Reducing Security Teams and Footprint
Reducing Man Guarding Costs
Slide 12 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Connecting multiple systems around the globe to create one information based “Shield”
Reducing cost, improving efficiency and bringing greater visibility to the entire operation with
the ability to hand off operations to another center whenever needed
The Future - Global Security Shield
Slide 13 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Frost & Sullivan: Global Physical Security Information
Management Market – 28 June 2012
• http://www.frost.com/prod/servlet/press-
release.pag?docid=263099957
• IMS Research: What is PSIM software? - 1 December 2010
• http://imsresearch.com/news-events/press-
template.php?pr_id=1779
• Imperial Capital: PSIM Opens Up the Industry – September 2010
• http://www.cnlsoftware.com/media/whitePapers/PSIM_White_Paper
(September_2010).pdf
Further Reading
Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: info@cnlsoftware.com
marketing@cnlsoftware.com
training@cnlsoftware.com
CNL Software
CNL House, Lansbury Estate
Lower Guildford Road
Knaphill
Surrey, GU21 2EP
United Kingdom
Tel. +44 (0) 1483 48 00 88
CNL Software
11715 Fox Road
Suite 400-190
Indianapolis
IN 46236
USA
Tel. +1 317 522 0313
Contact Details
Slide 15 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: info@cnlsoftware.com
marketing@cnlsoftware.com
training@cnlsoftware.com
CNL Software
CNL House, Lansbury Estate
Lower Guildford Road
Knaphill
Surrey, GU21 2EP
United Kingdom
Tel. +44 (0) 1483 48 00 88
CNL Software
11715 Fox Road
Suite 400-190
Indianapolis
IN 46236
USA
Tel. +1 317 522 0313
Contact Details

Mais conteúdo relacionado

Mais procurados

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachSridhar Karnam
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 

Mais procurados (20)

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Manual psim
Manual psimManual psim
Manual psim
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 

Semelhante a CNL Software PSIM Presentation - Information Management within Physical Security

Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceMarketingArrowECS_CZ
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Amazon Web Services
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 

Semelhante a CNL Software PSIM Presentation - Information Management within Physical Security (20)

Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...Considerations for Moving Your Enterprise Mission Critical Applications to th...
Considerations for Moving Your Enterprise Mission Critical Applications to th...
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 

Último

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

CNL Software PSIM Presentation - Information Management within Physical Security

  • 1. Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Information Management within Physical Security CNL Software
  • 2. Slide 2 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Security has traditionally been seen as isolated from business objectives • This is now changing, security being required to work more with business • The security challenge is greater than ever, with increasingly mobile workforces and mounting pressure for cost reductions • Technology is aiding both existing challenges and supporting the transition of security into other areas of business • It is allowing security to do more with less people • As a result security issues need to move to “C Level” and the suppliers need to provide business solutions with IT like technology to justify their inclusion at Board Level Security is a business with serious challenges… The Business of Security
  • 3. Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Grudge purchase • Event driven • Incompatible technology systems, on own network • Security undervalued • Security isolated from other areas of business • Fear that greater integration would compromise security, particularly IT Traditional View Realigning Security Objectives Organisation Objectives Security Objectives
  • 4. Slide 4 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Security touches so many elements within a business • It warrants understanding at “C” level and throughout the business • Security is adding greater operational value at lower cost • Security is an integral part of supply chain • Protect and maintain • Security is an integral part of HR • Access is pretty universal • Security is an integral part of marketing • Security data can be used is many cases to improve business results • Security and Facilities are finding a lot of common ground • All facilities boil also down to sensors Evolving View – Users Ready – Suppliers are Lagging* Realigning Security Objectives Organisation Objectives Security Objectives * = CNL view of suppliers
  • 5. Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com As security moves to Board level - a problem arises with the need for a change in approach Realigning Security Objectives Security decisions C level decisions What do we need to get this business issue fixed How do I get them to buy a new CCTV system?
  • 6. Slide 6 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • More and more data being generated by an increasing number of security and facilities applications • The need is to convert these vast amounts of data in useable intelligence that provide business advantage • Greater reliance on analytics as more is required from less people, less focus on hardware • Convergence of physical and logical security, requires a holistic approach – IT and security have to work together at tackling business issues • Technology alone can not bring change, it needs to be led by IT methodology to reduce cost, reduce risk and improve efficiencies • Solving tough business issues will be led by those who understand how to use the data available Why do we need Information Management in Physical Security? Information Management is Key
  • 7. Slide 7 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Managing information overload Information Management is Key Quality of Response Volume of Data Information Management
  • 8. Slide 8 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Information into Business Intelligence Real-time situation awareness - Know what is happening before anyone else Collaboration - Fuel the exchange of ideas within and outside of security Advanced visualization - Bring trends and ideas to life in the best format Evidence retrieval - Gather, distribute and share intelligence rapidly Unified reporting - Create reports that change organisational behavior Risk analysis - Understand how and where risk affect your organisation Dashboards - Manage, monitor & measure department performance
  • 9. Slide 9 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Following a huge over haul of the British Transport Police security infrastructure for the 2012 Olympics, some significant operations saving were identified and achieved Challenge • BTP are required to respond to ‘One Unders’, individuals who commit suicide on the train lines and currently costs rail operators £ millions in journey disruptions • This previously took as much as half a day and involved heavy police costs to discover whether it is an accident, homicide or suicide Solution • Security is now using visual data from a common operating picture to verify incidents and to collect evidence, drastically reducing the time needed to get the lines back up and running Result • It is now taking less than two hours to resolve, and is saving millions in both policing time and journey disruptions Example – Responding to ‘One Unders’ Improving Efficiencies and Reducing Cost
  • 10. Slide 10 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Major IT company has 110,000 employees in it’s Bangalore campus Challenge • The company cannot attract and retain the best talent without providing safe and reliable travel for these workers • To accommodate this, the company operates 2,500 busses • Lone female employees are judged at particular risk on these busses Solution • Security teams are now using vehicle tracking systems, coupled GPRS systems, on-board access control and panic alarms • Security is immediately alerted when a vehicle is speeding, off route or stopped in route for a prolonged period of time • Alerts are prioritized if single females are travelling on the bus, identified via the ACS system – live video from the bus is immediately available Result • Ensures staff safety, improves moral and makes each member feel valued, particularly female members Example – Protecting Female Passengers in India Combining HR & Security Operations
  • 11. Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Global IT company with over 26 locations in the UK Challenge • Costs included 24/7/365 security teams and office space in most locations, these were expensive and growing annually Solution • They centralised all UK locations into a single National Operation Centre – ACS, CCTV, Intruder and Fire Systems • The number of control rooms reduced from fourteen to just one! Results • Drastically reduction in the number of security personnel • Overall the ROI in security investment was reached in less than 18 months • Opportunities to add even greater ROI from future data centre monitoring, access compliance and improved SOPs • A platform to build a global security shield Example - Reducing Security Teams and Footprint Reducing Man Guarding Costs
  • 12. Slide 12 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Connecting multiple systems around the globe to create one information based “Shield” Reducing cost, improving efficiency and bringing greater visibility to the entire operation with the ability to hand off operations to another center whenever needed The Future - Global Security Shield
  • 13. Slide 13 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Frost & Sullivan: Global Physical Security Information Management Market – 28 June 2012 • http://www.frost.com/prod/servlet/press- release.pag?docid=263099957 • IMS Research: What is PSIM software? - 1 December 2010 • http://imsresearch.com/news-events/press- template.php?pr_id=1779 • Imperial Capital: PSIM Opens Up the Industry – September 2010 • http://www.cnlsoftware.com/media/whitePapers/PSIM_White_Paper (September_2010).pdf Further Reading
  • 14. Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Web: www.cnlsoftware.com Email: info@cnlsoftware.com marketing@cnlsoftware.com training@cnlsoftware.com CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 CNL Software 11715 Fox Road Suite 400-190 Indianapolis IN 46236 USA Tel. +1 317 522 0313 Contact Details
  • 15. Slide 15 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Web: www.cnlsoftware.com Email: info@cnlsoftware.com marketing@cnlsoftware.com training@cnlsoftware.com CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 CNL Software 11715 Fox Road Suite 400-190 Indianapolis IN 46236 USA Tel. +1 317 522 0313 Contact Details