Transition to a new quality level of protection

The class of PSIM-systems

Physical Security Information Manage

INTEGRATION PLATFORM

The class of PSIM-systems

Transition to a new quality level of protection

Physical Security Information Manage

INTEGRATION PLATFORM

HOW DOES ESM WORK?

Stage 1
Information collection
from isolated systems

HOW DOES ESM WORK?

Stage 1
Information collection
from isolated systems

Video surveillance (CCTV)
and analytics

circle1circle1_hov

Perimeter
protection

circle2circle2_hov

Fire and security
alert alarms

circle3circle3_hov

ACS

circle4circle4_hov

Building management
systems (BMS)

circle5circle5_hov
Stage 2
Data analysis
for determining the veracity of events
Stage 3
Incident response
control
Stage 2
Data analysis
for determining the veracity of events
Stage 3
Incident response
control

c.1c.1a

INSTRUCTIONS

c.2c.2a

AUTOMATIC NOTIFICATION

c.4c.3a

CONTROL AND MONITORING

c.1c.1a

INSTRUCTIONS

c.2c.2a

AUTOMATIC NOTIFICATION

c.4c.3a

CONTROL AND MONITORING

c.1c.1a

INSTRUCTIONS

c.2c.2a

AUTOMATIC NOTIFICATION

c.4c.3a

CONTROL AND MONITORING

Stage 4
Analytics

Collecting evidentiary database
and automatic reporting;

Analyzing the efficiency of
measures taken
Stage 4
Analytics

Collecting evidentiary database
and automatic reporting

Analyzing the efficiency of
measures taken

ЕSМ NEGATES TYPICAL FLAWS
IN TRADITIONAL SECURITY SYSTEMS

THE LACK OF INTEGRATION
BETWEEN LOOSELY KNIT
SECURITY SUBSYSTEMS

The lack of any unified security concept; technical devices in themselves do not ensure security.

A LARGE NUMBER OF WARNINGS
FROM VARIOUS SUBSYSTEMS

A true security threat can be missed by the operator.

THE HUMAN FACTOR

People are the weakest part of the technological system, since they are prone to mistakes.

A lesser dependency on the
competences and physical
condition of employees
A higher degree of
security automation
A quicker response
to a threat
Compliance with the
requirements of the law
Real-time information
about the level of
security at a facility
A lesser dependency on the
competences and physical
condition of employees
A higher degree of
security automation
A quicker response
to a threat
Compliance with the
requirements of the law
Real-time information
about the level of
security at a facility

Learn more about the ESM Technologies for Safety Management