top of page
CNL Banner.jpg

Securing Assets:

The PSIM advantage.

 

We help armed forces achieve their integrated base defense goals, at home and around the world: simplifying integration, increasing situational awareness and promoting quicker responses

OUR CAPABILITIES

Data intelligence, situational awareness, and rapid and effective decision support are critical to physical security and force protection mission excellence and the operational effectiveness of armed forces security personnel. Armed forces around the world need to seamlessly integrate their various physical security and force protection subsystems and sensor technologies.

 

Tasked with base protection, they need to swiftly and accurately assess and appropriately react to incidents in accordance with established operational policies and procedures, in all threat conditions. Their challenge is to analyse, correlate, and manage the vast amounts of data that today’s security technologies produce.

PHYSICAL SECURITY AND FORCE PROTECTION SUBSYSTEM AND SENSOR INTEGRATION AS A STRATEGIC ENTERPRISE ASSET

Control Centre has been accredited to some of the highest and most recognised armed forces cybersecurity standards.   It is used by armed forces security personnel and command staff responsible for executing physical security and force protection missions as a force multiplier to reduce troop-to-task functions. Control Centre’s federated system architecture facilitates additional operational efficiencies, delivers regional and/or global awareness and insight, and ensures operational consistency and high availability at the base level.

 

Control Centre also monitors and displays the status of software processes, PSIM system hardware, network connection, and subsystems using fully configurable dashboards and by generating alarms when certain system performance thresholds are not met. In addition, Control Centre helps ensure optimal operator performance by monitoring, reporting, and dashboarding relevant operator activity and metrics to identify knowledge gaps and training opportunities.

ARMED FORCES USING CONTROL CENTRE BENEFIT FROM:

  • Open, standards-based, scalable, and secure architecture, providing the flexibility to efficiently add, upgrade, and remove and replace subsystems when new technology becomes available

  • Industry-standard interfaces supporting hundreds of subsystem and sensor technologies out-of-the-box, maximizing the use of existing subsystems and sensors, promoting openness, and preventing vendor lock-in

  • Toolkit approach that enables a high degree of Human Machine Interfaces (HMI) tailoring, pre- and post-installation, making costly and often time-consuming software development unnecessary and providing flexibility to efficiently adapt to regulatory, policy and threat level change

SAMPLE ARMED FORCES INTEGRATED TECHNOLOGIES

CNL Armed Forces Icons.jpg

Integration into a single platform

Bring your cameras, access card readers, security gates, BMS and IoT devices into a single platform that allows you to easily receive alerts, assess, create actions, resolve and report.

CNL Dashboard.jpg

WHAT IS PSIM?

WHAT:

Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.

 

HOW:

It collects and correlates events from existing disparate security devices and information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations.

 

WHY:

PSIM integration enables numerous organisational benefits, including increased control, improved situational awareness, and management reporting. Ultimately, these solutions allow organisations to reduce costs through improved efficiency and to improve security through increased intelligence.

 

FEATURES OF PSIM PLATFORMS:

A complete PSIM software system has six key capabilities that help to distinguish it from other forms of integration:

  1. Collection – Device management independent software collects data from any number of disparate security devices or systems.

  2. Analysis – The system analyses and correlates the data, events and alarms to identify the real situations and their priority.

  3. Verification – PSIM software presents the relevant situation information in a quick and easily-digestible format for an operator to verify the situation.

  4. Resolution – The system provides standard operating procedures (SOPs), step-by-step instructions based on best practices and an organisation's policies, and tools to resolve the situation.

  5. Reporting – The PSIM software tracks all the information and steps for compliance reporting, training, and potentially, in-depth investigative analysis.

  6. Audit trail – The PSIM also monitors how each operator interacts with the system, tracks any manual changes to security systems, and calculates reaction times for each event.

 

WHAT PSIM DOES:

Beyond the time-saving and efficiency benefits of automation, PSIM enables modern business processes that are essential to any modern security department. For organisations, this includes regular reports, incident logs, continuous process improvement initiatives, training drills, system healthcare checks, and much more.

 

VERIFICATION OF THREATS:

Many of the alarms and alerts that come into the security environment are not really threats. These need to be prioritised according to risk, such as time of day, location of personnel, and a whole range of other critical factors. ‘Dynamic alarm management’ is required to find the ‘hot’ ones which indicate that some action may need to be taken. Connected systems and automation of processes such as key personnel alerting, video verification, and Service Level Agreements (SLA) will help to enable situational awareness and ensure alarms/alerts are followed up quickly and in a relevant manner.

 

CREATING CENTRALISED SECURITY:

PSIM is enabling companies such as yours to create centralised security infrastructures, some of the advantages this provides includes:

  • Complete situational awareness

  • Consistent levels of security across all sites, so no weak links

  • Cost reductions through reduced manned guards

  • Cost reductions through fewer control rooms

  • Better use of remote monitoring

  • Reports and dashboards covering the entire security estate

 

EXTRACTING SECURITY RETURN ON INVESTMENT (ROI):

PSIM has become the perfect catalyst for this transition from systems, which are reliant on constant monitoring and input by security personnel to information-based systems that proactively manage the increasing volume of information in the control room. To further drive value from the security departments of a company, PSIM data mining and analytic capabilities can be utilised to create highly specialised reports for other department heads.

bottom of page