Date post: | 07-Nov-2014 |
Category: |
Technology |
Upload: | adlan-hussain |
View: | 489 times |
Download: | 4 times |
Slide 1 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
IPSecurityCenter™PSIM for Energy, Oil & Gas
2014
Slide 2 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Physical Security Information Management (PSIM) is software that provides a platform and applications designed to integrate multiple, disparate security applications and devices, allowing management of an entire enterprise through one comprehensive user interface. That user interface can be quickly, cost effectively customized to meet the exact requirement of each and every user.
A complete PSIM software system has six key capabilities:• Event Collection• Analysis• Verification• Resolution• Reporting• Audit trail
What is PSIM?
PSIM Defined
Slide 3 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
The Evolution of PSIM
Traditional Security Operations Centers Command and Control Centers
Proprietary
Silos, Isolated Systems
Limited Safety, Security and Integration
Reactive, Error Prone, Poor Visibility & Control
Functional Data Only
Disparate Systems with Minimal Communication
Open Standards
Integrated and Interoperable Systems
Integrated Safety and Security Compliant
Proactive, Strategic, Managed and Predictive
Real-time Information, Optimized
Communication between Existing and New Systems
Without PSIM With PSIMSource: Frost & Sullivan
Slide 4 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
CNL Software's IPSecurityCenter PSIM solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world.
• US: Washington DC protecting over 5.4 MILLION citizens
• UK: Protecting over 2.2 BILLION passenger journeys per year
• South Africa: Securing over 3,000KM of pipelines protecting over 16 BILLION liters of fuel
• India: Protecting over 110,000 employees and tracking over 2,500 corporate vehicles
• US & Canada: Largest single PSIM installation to date protecting over 375 US office locations
• UK: Fortune 20 company securing over 20,000 employees over 26 locations
• India & Sri Lanka: Protecting over 73,000 employees
• Kuwait: Protecting over 10 MILLION barrels of oil a day
IPSecurityCenter™ - World Leading PSIM Software
CNL Software
Slide 5 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
• PSIM software based integration and management platform• Connects and manages disparate building and security technologies and
processes• Provides operators with real-time Situational Awareness• Gives a Common Operating Picture (COP) for all security operative• Presents step by step process guidance• Ensures complete compliance to security policies
IPSecurityCenter™
CNL Software
Slide 6 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Integrated Approach
IPSecurityCenter™
IPSecurityCenter works with the largest number of manufacturer systems allowing maximum use of legacy equipment
CCTV Surveillance
Access Control
Site & MachinerySecurity
Distribution Network Security
Fire,Gas,Chemical Detection
PerimeterSecurity
Health & Safety Systems
Slide 7 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Information Aggregation
IPSecurityCenter™
GIS MappingSurface
Detect
Aggregated Visual
Intelligence
Visualize
Operator GuidanceInterface
Resolve
Access ControlPerimeter
Structural Monitoring
CCTV SurveillanceNoise & Vibration
SensorsHealth & Safety
Slide 8 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Ensuring the highest staff, visitor, equipment and product safety using an increasing number of sensors, systems and data creates it own challenges:• Increased cost of running multiple control centers• Time and effort to manage disparate systems across multiple platforms• Hundreds of opportunities for false alarms• No way of quickly verifying alarms• Ensuring security staff follow common procedures to different responses
required dependant on time, date, historic alarm data and threat level
• All of this can lead to: • Reduced operational effectiveness• Undermined security infrastructure
Operational Issues
Energy, Oil & Gas Security
Slide 9 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Integrates entire estate of existing security assets & sensors• Integrates multiple disparate solutions• Develops a centralized Command and Control infrastructure• Increases situational awareness• Significantly reduces costs of manned guarding• Seamlessly deploy new technologies that support risk reduction and
promote a more secure environment• Remove technology dependencies on specific products and vendors,
reducing costs
Resolved with IPSecurityCenter™
Energy, Oil & Gas Security Operational Issues:
Slide 10 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
• Completely customisable, presenting the right information, to the right people, at the right time
• Event driven switching of layouts created by activity/incidents/triggers/timeouts• Display of video with other information sources to create dashboards and incident Centres• Automatic escalation from one display to another
• Distributed intelligence
• Audience / event specific presentation
• Workflow created from a range of system & operator inputs
Resolved with IPSecurityCenter™ cont.
Energy, Oil & Gas Security Operational Issues:
Slide 11 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
2
IPSecurityCenter™ instantly confirms that this is not a false alarm by aggregating data such as time of day, location of security teams, routine maintenance schedules etc. It also prioritizes the alarm based on security risk.
10: 02: 18
4
A breach is identified, the operator is prompted to confirm the incident from a provided list. “Fence Breach” is selected prompting the GPS tracking and GIS mapping to automatically highlight the nearest response team to the incident. Instant communication is enabled with them using on screen controls for radio and SMS messaging. Live video from the vehicle is fed back to Control.
10: 02: 34
7
On screen guidance instructs the operator to evacuate the facility. Integrated controls allow automated crisis communications messages to be delivered via the internal audio system, SMS messaging, VoIP, and via screens in communal areas. The operator uses CCTV and radio communications with the fire marshal to confirm when this has been completed.
10: 04: 28
5
Control has constant communications and live video to allow real-time guidance to manage the response team according to standard operating procedures (SOPs).
The incident is rapidly resolved using these SOPs which ensure compliance to organizational and government instigated policies for risk mitigation and future auditing purposes. An incident report is automatically generated and the incident is recorded for future process improvements and ongoing risk analysis.
END
3The nearest camera automatically pans to the location of the alarm to allow visual verification. IPSecurityCenter’s on-screen Process Guidance asks the operator to verify the incident using this live video.
10: 02: 23
START
1
An alarm is triggered at the facility.
10: 02: 12
6
A package is found. Emergency services are called to assist in resolving the situation, live video means an accurate description can be given, allowing the correct emergency service resources to be sent.
10: 04: 15
10: 02: 36
Energy, Oil & Gas Security Scenario
Slide 12 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Auto Camera Display
Perimeter Alarm Example
Automatic display of 3
nearest static cameras
PTZ cameras moves to preset
Perimeter intrusion event
Slide 13 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Suspicious Behaviour
Analytics Alarm Example
Event image from analytics engine with
tripwire
Playback controls for review of incident
Slide 14 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
False Alarm
Process Guidance Example
Consistent resolution form with field validation
Slide 15 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Energy, Oil & Gas Integration Capability
IPSecurityCenter™
HAZARD MONITORING• Structural monitoring• Thermal imaging cameras• Explosives handling• Fire suppression systems• Hazardous gases &• chemical monitoring
PERSONNEL SECURITY• Health monitoring• Photo badging• Incident tracking• Emergency evacuation
management
SECURITY• Perimeter fence protection• Microwave sensors• CCTV video & acoustic
surveillance• GPS transportation
monitoring• Machinery and asset
security
ENVIRONMENTAL CONTROL• Ground & water control
systems• Noise & vibration sensors• Temperature & ventilation
monitoring• Waste management• Safe storage of dangerous
materials
Slide 16 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
• PSIM is here and is solving the complex challenges of Energy, Oil & Gas security
• Leverage your existing investment; positioning yourself for the unknown• Migrate from data overload to relevant information• Take advantage of ability to integrate beyond your assets to encompass
complementary public/private partnerships
Summary
CNL Software
Slide 17 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Customer Examples
Slide 18 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Sample Technology Partners
Slide 19 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
CNL SoftwareIPSecurityCenter™ Case Studies
Slide 20 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Energy, Oil & Gas, Kuwait
• Integrates discrete security sub systems into a single centralized ‐control environment with remote bi-directional communication to: • CCTV, Access Control, Intruder Detection Systems, Vehicle Barriers
and Blockers, GPS Tracking, Radio Telecommunications (TETRA), Intercoms, Ground and Sea Surveillance RADAR
• Rationalisation of maintenance• Consolidation of training & reporting overheads
Protecting 10 million barrels of oil a day at a critical port-based oil facility responsible for the refining of a large proportion of Kuwait’s oil supply.
Critical National Infrastructure
Command and Control Center, standardizing and simplifying security operations within the Tank Farm by integrating currently available security equipment/systems and enabling the seamless future deployment of compatible security technologies.
Slide 21 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Energy, Oil & Gas, South Africa
• Seamless integration and analysis of information from traditional physical security devices and systems
• Real-time data to enable situation resolution• Situation management including, data collection, verification,
analysis, resolution and tracking• Maintaining a unified operation console and practices• Functionality is easily customisable, configurable and can be
modified according to varying operational needs
Security for over 3,000 km of pipelines protecting over 16 billion liters of fuel and over 450 million cubic meters of gases.
Critical National Infrastructure
Providing SMS, email and telephony communication in order to deliver vital information to selected response teams and stakeholders ensuring that changes to the security status and threats are available immediately.
Slide 22 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Energy, Oil & Gas, United States
• Securing facility over CCTV, access control, perimeter intrusion detection and radar
• Integration to Mass Notification Solutions (MNS); broadcasting real-time information during an emergency Comprehensive situational awareness and management
• Optimizing situation planning, training, and response to security situations and life safety emergencies
• Archive management system for record keeping and debriefing
Tank farm facility refining petroleum products securing a crude oil capacity of just over 100,000 barrels per day and 5 million tons yearly.
Critical National Infrastructure
A comprehensive situational management system to optimize situation planning, training, and response to security situations and life safety emergencies at the Plant and Tank Farm Facility.
Slide 23 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Mining, South Africa
• Expanding existing CCTV video surveillance capability while optimizing investment in legacy technologies such as: • access control, physical alarm systems, SCADA, perimeter intrusion
detection, video analytics, body scanners
• Prevention and detection of theft by illegal and legal miners• Data collection for reporting, forensic investigation and evidence
gathering• Access control monitoring is a major factor in the health and
safety compliance policy
One of the world’s largest mining companies requiring real-time situation awareness, guiding the response teams over vast areas both above and below ground.
Mining
“The cost of the IPSecurityCenter™ solution versus the estimated savings in preventing theft was a good security investment for the organization.” Jurie Engelbreg, Operations Director at e-Thele
Slide 24 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Transport Law Enforcement, United Kingdom
• Common platform integrating:• 55,000+ cameras, 21 video server devices, 7,000 locations, 25 video
wall monitors, 40 operator workstations
• Increased operational efficiency and reduced costs• 50% reduction in time taken to obtain footage• Faster detection of criminal activity• 100s of criminals brought to justice with evidence secured by the
system
Protecting over 2.2 billion passenger journeys each year, centralizing monitoring and storage capability for forensic data.
Transportation & Law Enforcement
“With some great technical wizardry, we’re able to bring these (disparate) cameras together, send that information to officers and we’re seeing our crime rates go lower.” Andy Trotter, Chief Constable
Slide 25 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Container Shipping Port, United States
• Physical security surveillance and detection systems monitor harbor activities and access to port security, vessel traffic, coastal surveillance, safety, and commercial data
• Secure command and control center integrating technologies, such as:• Video surveillance, intelligent radar, automatic identification system
base stations, patrol boat tracking, interoperable communications and web services
Container port-configured enhanced waterside perimeter security security protecting over 2 million tons of vessel, truck and rail cargo shipments a year.
Transportation and Distribution
“The system is multi-mission oriented and delivers defined information to numerous local and federal organizations including the US Coast Guard and Department of Homeland Security.” Security Division, CRGT
Slide 26 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Washington DC HSEMA, United States
• Integration includes over 5,000+ CCTV cameras from district agencies including: • Homeland Security Emergency Management Agency, Metropolitan
Police Department, Department of Transportation's (DDOT), Protective Service Division's (PSD), District of Columbia Public Schools (DCPS)
• Also integrates ShotSpotter Audio Analytic Gunshot Detection System
• Supports the city’s public safety planning efforts for special events requiring interagency coordination
City-wide CCTV integration providing situational awareness protecting over 5.5 million citizens and 17.9 million visitors each year.
Safe Cities
The DC VIPS program will create a unified control center where all of the security requirements of multiple agencies within the Greater Washington area can be managed and processed.
Slide 27 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Wikipedia - Physical Security Information Management
• http://en.wikipedia.org/wiki/Physical_Security_Information_Management
LinkedIn Physical Security Information Management (PSIM) Group
• http://www.linkedin.com/groups?home=&gid=2162880&trk=anet_ug_hm
CNL Software Press Releases
• http://www.cnlsoftware.com/latestNews.php
CNL Software Downloads: whitepapers, articles, solutions guides, reports
• http://www.cnlsoftware.com/downloads.php
Additional Online Resources
Further Information
Slide 28 Confidential Information. © 2014 CNL Software. All Rights Reserved. www.cnlsoftware.com
Web: www.cnlsoftware.com
Email: [email protected]
CNL SoftwareCNL House, Lansbury EstateLower Guildford RoadKnaphillSurrey, GU21 2EPUnited KingdomTel. +44 (0) 1483 48 00 88
CNL Software 11715 Fox RoadSuite 400-190IndianapolisIN 46236USATel. +1 317 522 0313
Contact Details