SlideShare a Scribd company logo
Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information Management
within Physical Security
CNL Software
Slide 2 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Security has traditionally been seen as isolated from business
objectives
• This is now changing, security being required to work more with
business
• The security challenge is greater than ever, with increasingly
mobile workforces and mounting pressure for cost reductions
• Technology is aiding both existing challenges and supporting the
transition of security into other areas of business
• It is allowing security to do more with less people
• As a result security issues need to move to “C Level” and the
suppliers need to provide business solutions with IT like
technology to justify their inclusion at Board Level
Security is a business with serious challenges…
The Business of Security
Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Grudge purchase
• Event driven
• Incompatible technology systems, on
own network
• Security undervalued
• Security isolated from other areas of
business
• Fear that greater integration would
compromise security, particularly IT
Traditional View
Realigning Security Objectives
Organisation Objectives
Security
Objectives
Slide 4 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Security touches so many elements within
a business
• It warrants understanding at “C” level and
throughout the business
• Security is adding greater operational
value at lower cost
• Security is an integral part of supply chain
• Protect and maintain
• Security is an integral part of HR
• Access is pretty universal
• Security is an integral part of marketing
• Security data can be used is many cases to
improve business results
• Security and Facilities are finding a lot of
common ground
• All facilities boil also down to sensors
Evolving View – Users Ready – Suppliers are Lagging*
Realigning Security Objectives
Organisation Objectives
Security
Objectives
* = CNL view of suppliers
Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
As security moves to Board level
- a problem arises with the need for a change in approach
Realigning Security Objectives
Security decisions
C level decisions
What do we
need to get
this business
issue fixed
How do I get them
to buy a new
CCTV system?
Slide 6 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• More and more data being generated by an increasing number of
security and facilities applications
• The need is to convert these vast amounts of data in useable
intelligence that provide business advantage
• Greater reliance on analytics as more is required from less
people, less focus on hardware
• Convergence of physical and logical security, requires a holistic
approach – IT and security have to work together at tackling
business issues
• Technology alone can not bring change, it needs to be led by IT
methodology to reduce cost, reduce risk and improve efficiencies
• Solving tough business issues will be led by those who understand
how to use the data available
Why do we need Information Management in Physical Security?
Information Management is Key
Slide 7 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Managing information overload
Information Management is Key
Quality of
Response
Volume of
Data
Information
Management
Slide 8 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information into Business Intelligence
Real-time situation awareness - Know what is happening before anyone else
Collaboration - Fuel the exchange of ideas within and outside of security
Advanced visualization - Bring trends and ideas to life in the best format
Evidence retrieval - Gather, distribute and share intelligence rapidly
Unified reporting - Create reports that change organisational behavior
Risk analysis - Understand how and where risk affect your organisation
Dashboards - Manage, monitor & measure department performance
Slide 9 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Following a huge over haul of the British Transport Police security
infrastructure for the 2012 Olympics, some significant operations
saving were identified and achieved
Challenge
• BTP are required to respond to ‘One Unders’, individuals who commit
suicide on the train lines and currently costs rail operators £ millions in
journey disruptions
• This previously took as much as half a day and involved heavy police costs
to discover whether it is an accident, homicide or suicide
Solution
• Security is now using visual data from a common operating picture to verify
incidents and to collect evidence, drastically reducing the time needed to
get the lines back up and running
Result
• It is now taking less than two hours to resolve, and is saving millions in both
policing time and journey disruptions
Example – Responding to ‘One Unders’
Improving Efficiencies and Reducing Cost
Slide 10 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Major IT company has 110,000 employees in it’s Bangalore campus
Challenge
• The company cannot attract and retain the best talent without providing
safe and reliable travel for these workers
• To accommodate this, the company operates 2,500 busses
• Lone female employees are judged at particular risk on these busses
Solution
• Security teams are now using vehicle tracking systems, coupled GPRS
systems, on-board access control and panic alarms
• Security is immediately alerted when a vehicle is speeding, off route or
stopped in route for a prolonged period of time
• Alerts are prioritized if single females are travelling on the bus, identified
via the ACS system – live video from the bus is immediately available
Result
• Ensures staff safety, improves moral and makes each member feel
valued, particularly female members
Example – Protecting Female Passengers in India
Combining HR & Security Operations
Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Global IT company with over 26 locations in the UK
Challenge
• Costs included 24/7/365 security teams and office space in most
locations, these were expensive and growing annually
Solution
• They centralised all UK locations into a single National Operation Centre –
ACS, CCTV, Intruder and Fire Systems
• The number of control rooms reduced from fourteen to just one!
Results
• Drastically reduction in the number of security personnel
• Overall the ROI in security investment was reached in less than 18 months
• Opportunities to add even greater ROI from future data centre
monitoring, access compliance and improved SOPs
• A platform to build a global security shield
Example - Reducing Security Teams and Footprint
Reducing Man Guarding Costs
Slide 12 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Connecting multiple systems around the globe to create one information based “Shield”
Reducing cost, improving efficiency and bringing greater visibility to the entire operation with
the ability to hand off operations to another center whenever needed
The Future - Global Security Shield
Slide 13 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Frost & Sullivan: Global Physical Security Information
Management Market – 28 June 2012
• http://www.frost.com/prod/servlet/press-
release.pag?docid=263099957
• IMS Research: What is PSIM software? - 1 December 2010
• http://imsresearch.com/news-events/press-
template.php?pr_id=1779
• Imperial Capital: PSIM Opens Up the Industry – September 2010
• http://www.cnlsoftware.com/media/whitePapers/PSIM_White_Paper
(September_2010).pdf
Further Reading
Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: info@cnlsoftware.com
marketing@cnlsoftware.com
training@cnlsoftware.com
CNL Software
CNL House, Lansbury Estate
Lower Guildford Road
Knaphill
Surrey, GU21 2EP
United Kingdom
Tel. +44 (0) 1483 48 00 88
CNL Software
11715 Fox Road
Suite 400-190
Indianapolis
IN 46236
USA
Tel. +1 317 522 0313
Contact Details
Slide 15 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: info@cnlsoftware.com
marketing@cnlsoftware.com
training@cnlsoftware.com
CNL Software
CNL House, Lansbury Estate
Lower Guildford Road
Knaphill
Surrey, GU21 2EP
United Kingdom
Tel. +44 (0) 1483 48 00 88
CNL Software
11715 Fox Road
Suite 400-190
Indianapolis
IN 46236
USA
Tel. +1 317 522 0313
Contact Details

More Related Content

PDF
CNL Software - IPSecurityCenter Presentation
PDF
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
PPTX
CNL Software - PSIM for Energy, Oil & Gas
PDF
PSIM: Why Should I Be Interested?
PDF
The Ultimate Guide to PSIM - Introduction
PDF
IPSecurityCenterTM PSIM Enhancing Port Security
PPTX
PSIM for Healthcare
PDF
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software - IPSecurityCenter Presentation
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software - PSIM for Energy, Oil & Gas
PSIM: Why Should I Be Interested?
The Ultimate Guide to PSIM - Introduction
IPSecurityCenterTM PSIM Enhancing Port Security
PSIM for Healthcare
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security

What's hot (20)

PDF
Vidsys Physical Security Information Management (PSIM) solution
PPTX
CNL Software IPSecurityCenter Case Studies Presentation 0113
PDF
PPTX
Gartner technologies for Infosec 2014-2015
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PDF
Aensis Advanced Cybersecurity Solutions
PDF
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PPTX
Governance fail security fail
PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PPTX
Extending QRadar’s reach and simplifying incident response with BigFix
PDF
Cutting Through the Software License Jungle: Stay Safe and Control Costs
PDF
BMC - Response to the SolarWinds Breach/Malware
PPT
MDM is not Enough - Parmelee
PDF
IBM Insight 2015 - Security Sessions Roadmap
PPTX
Stay out of headlines for non compliance or data breach
PDF
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
PPTX
4 Ways to Build your Immunity to Cyberthreats
PDF
Gpc case study_eng_0221
PDF
Nist.sp.800 37r2
Vidsys Physical Security Information Management (PSIM) solution
CNL Software IPSecurityCenter Case Studies Presentation 0113
Gartner technologies for Infosec 2014-2015
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Aensis Advanced Cybersecurity Solutions
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Governance fail security fail
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
Extending QRadar’s reach and simplifying incident response with BigFix
Cutting Through the Software License Jungle: Stay Safe and Control Costs
BMC - Response to the SolarWinds Breach/Malware
MDM is not Enough - Parmelee
IBM Insight 2015 - Security Sessions Roadmap
Stay out of headlines for non compliance or data breach
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
4 Ways to Build your Immunity to Cyberthreats
Gpc case study_eng_0221
Nist.sp.800 37r2
Ad

Similar to CNL Software PSIM Presentation - Information Management within Physical Security (20)

PDF
Mergers and Acquisition Security - Areas of Interest
PDF
2015 Secureworld_effectively_managing_information_risk
PPTX
Introduction to Information security ppt
PPTX
Introduction to Information security ppt
PDF
1. Security and Risk Management
PPTX
A guide to Sustainable Cyber Security
PDF
Case study financial_services
PDF
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PDF
1. Security and Risk Management
PPTX
ISM-CS5750-01.pptx
DOCX
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
DOCX
Discuss how a successful organization should have the followin.docx
DOCX
Discuss how a successful organization should have the followin.docx
PPTX
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
PPT
is_1_Introduction to Information Security
PPTX
Retail Excellence Ireland - Cyber Threats 2015 Overview
PDF
Security Awareness
PPTX
D1 security and risk management v1.62
Mergers and Acquisition Security - Areas of Interest
2015 Secureworld_effectively_managing_information_risk
Introduction to Information security ppt
Introduction to Information security ppt
1. Security and Risk Management
A guide to Sustainable Cyber Security
Case study financial_services
CNIT 125: Ch 2. Security and Risk Management (Part 1)
1. Security and Risk Management
ISM-CS5750-01.pptx
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
Dealing with Information Security, Risk Management & Cyber Resilience
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
is_1_Introduction to Information Security
Retail Excellence Ireland - Cyber Threats 2015 Overview
Security Awareness
D1 security and risk management v1.62
Ad

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
A comparative analysis of optical character recognition models for extracting...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4

CNL Software PSIM Presentation - Information Management within Physical Security

  • 1. Slide 1 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Information Management within Physical Security CNL Software
  • 2. Slide 2 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Security has traditionally been seen as isolated from business objectives • This is now changing, security being required to work more with business • The security challenge is greater than ever, with increasingly mobile workforces and mounting pressure for cost reductions • Technology is aiding both existing challenges and supporting the transition of security into other areas of business • It is allowing security to do more with less people • As a result security issues need to move to “C Level” and the suppliers need to provide business solutions with IT like technology to justify their inclusion at Board Level Security is a business with serious challenges… The Business of Security
  • 3. Slide 3 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Grudge purchase • Event driven • Incompatible technology systems, on own network • Security undervalued • Security isolated from other areas of business • Fear that greater integration would compromise security, particularly IT Traditional View Realigning Security Objectives Organisation Objectives Security Objectives
  • 4. Slide 4 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Security touches so many elements within a business • It warrants understanding at “C” level and throughout the business • Security is adding greater operational value at lower cost • Security is an integral part of supply chain • Protect and maintain • Security is an integral part of HR • Access is pretty universal • Security is an integral part of marketing • Security data can be used is many cases to improve business results • Security and Facilities are finding a lot of common ground • All facilities boil also down to sensors Evolving View – Users Ready – Suppliers are Lagging* Realigning Security Objectives Organisation Objectives Security Objectives * = CNL view of suppliers
  • 5. Slide 5 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com As security moves to Board level - a problem arises with the need for a change in approach Realigning Security Objectives Security decisions C level decisions What do we need to get this business issue fixed How do I get them to buy a new CCTV system?
  • 6. Slide 6 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • More and more data being generated by an increasing number of security and facilities applications • The need is to convert these vast amounts of data in useable intelligence that provide business advantage • Greater reliance on analytics as more is required from less people, less focus on hardware • Convergence of physical and logical security, requires a holistic approach – IT and security have to work together at tackling business issues • Technology alone can not bring change, it needs to be led by IT methodology to reduce cost, reduce risk and improve efficiencies • Solving tough business issues will be led by those who understand how to use the data available Why do we need Information Management in Physical Security? Information Management is Key
  • 7. Slide 7 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Managing information overload Information Management is Key Quality of Response Volume of Data Information Management
  • 8. Slide 8 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Information into Business Intelligence Real-time situation awareness - Know what is happening before anyone else Collaboration - Fuel the exchange of ideas within and outside of security Advanced visualization - Bring trends and ideas to life in the best format Evidence retrieval - Gather, distribute and share intelligence rapidly Unified reporting - Create reports that change organisational behavior Risk analysis - Understand how and where risk affect your organisation Dashboards - Manage, monitor & measure department performance
  • 9. Slide 9 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Following a huge over haul of the British Transport Police security infrastructure for the 2012 Olympics, some significant operations saving were identified and achieved Challenge • BTP are required to respond to ‘One Unders’, individuals who commit suicide on the train lines and currently costs rail operators £ millions in journey disruptions • This previously took as much as half a day and involved heavy police costs to discover whether it is an accident, homicide or suicide Solution • Security is now using visual data from a common operating picture to verify incidents and to collect evidence, drastically reducing the time needed to get the lines back up and running Result • It is now taking less than two hours to resolve, and is saving millions in both policing time and journey disruptions Example – Responding to ‘One Unders’ Improving Efficiencies and Reducing Cost
  • 10. Slide 10 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Major IT company has 110,000 employees in it’s Bangalore campus Challenge • The company cannot attract and retain the best talent without providing safe and reliable travel for these workers • To accommodate this, the company operates 2,500 busses • Lone female employees are judged at particular risk on these busses Solution • Security teams are now using vehicle tracking systems, coupled GPRS systems, on-board access control and panic alarms • Security is immediately alerted when a vehicle is speeding, off route or stopped in route for a prolonged period of time • Alerts are prioritized if single females are travelling on the bus, identified via the ACS system – live video from the bus is immediately available Result • Ensures staff safety, improves moral and makes each member feel valued, particularly female members Example – Protecting Female Passengers in India Combining HR & Security Operations
  • 11. Slide 11 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Global IT company with over 26 locations in the UK Challenge • Costs included 24/7/365 security teams and office space in most locations, these were expensive and growing annually Solution • They centralised all UK locations into a single National Operation Centre – ACS, CCTV, Intruder and Fire Systems • The number of control rooms reduced from fourteen to just one! Results • Drastically reduction in the number of security personnel • Overall the ROI in security investment was reached in less than 18 months • Opportunities to add even greater ROI from future data centre monitoring, access compliance and improved SOPs • A platform to build a global security shield Example - Reducing Security Teams and Footprint Reducing Man Guarding Costs
  • 12. Slide 12 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Connecting multiple systems around the globe to create one information based “Shield” Reducing cost, improving efficiency and bringing greater visibility to the entire operation with the ability to hand off operations to another center whenever needed The Future - Global Security Shield
  • 13. Slide 13 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com • Frost & Sullivan: Global Physical Security Information Management Market – 28 June 2012 • http://www.frost.com/prod/servlet/press- release.pag?docid=263099957 • IMS Research: What is PSIM software? - 1 December 2010 • http://imsresearch.com/news-events/press- template.php?pr_id=1779 • Imperial Capital: PSIM Opens Up the Industry – September 2010 • http://www.cnlsoftware.com/media/whitePapers/PSIM_White_Paper (September_2010).pdf Further Reading
  • 14. Slide 14 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Web: www.cnlsoftware.com Email: info@cnlsoftware.com marketing@cnlsoftware.com training@cnlsoftware.com CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 CNL Software 11715 Fox Road Suite 400-190 Indianapolis IN 46236 USA Tel. +1 317 522 0313 Contact Details
  • 15. Slide 15 Confidential Information. © 2013 CNL Software. All Rights Reserved. www.cnlsoftware.com Web: www.cnlsoftware.com Email: info@cnlsoftware.com marketing@cnlsoftware.com training@cnlsoftware.com CNL Software CNL House, Lansbury Estate Lower Guildford Road Knaphill Surrey, GU21 2EP United Kingdom Tel. +44 (0) 1483 48 00 88 CNL Software 11715 Fox Road Suite 400-190 Indianapolis IN 46236 USA Tel. +1 317 522 0313 Contact Details