Transition to a new quality level of protection

The class of PSIM-systems

Physical Security Information Manage

INTEGRATION PLATFORM

The class of PSIM-systems

Transition to a new quality level of protection

Physical Security Information Manage

INTEGRATION PLATFORM

ENTERPRISE SECURITY MANAGER (ESM)

Integration platform for creating security management systems for enterprises with increased security
requirements. The ESM software integrates all security subsystems into a single
complex and manages the situation on the scale of the entire facility: it allows you to quickly receive a signal,
assess the criticality of the threat, select a counteraction scenario, track the results of the incident and
assess the effectiveness of the actions taken.

ADVANTAGES OF THE SOFTWARE

Implementation of regulations 
and instructions of the 
company by 100%

Rapid 
response 
to 
security threats

Ensure 
the safety of all 
sites. The result is the 
elimination of weak 
links

Compliance with 
legal 
requirements

Informing the manager about the state of the enterprise’s security online

Broad integration opportunities

COMPOSITION AND FUNCTIONALITY

ESM is an open, cross-platform solution that can integrate any system from different vendors. The product is the upper level of management of a complex of security systems.

Maintain integration is: to preserve existing security systems and easily connect them to a new set of systems (the customer does not need to change everything that is already installed); operatively develop and modernize a complex of systems, connecting the latest technical means and technologies (perspective economy: the modernization of individual technical segments does not require replacing the core of the complex).

SUPPORT FOR STANDARD AND OPEN PROTOCOLS

  • Universal protocol for the integration of the systems of fire alarm and alarm system;
  • Support for the open standard OPC AE for the integration of automation and safety systems;
  • Support for the open standard LonWorks for the integration of automation and security systems;

CROSS-PLATFORM
Work under both Windows and Linux operating systems.

Hardware support

  • Network of PCE Multifunction Security Controllers in

Peripheral controllers DC-04;

Recognizer of ELAR autonomers on the basis of the Megapixel library;

Network devices (SCSS, SKIS, BIS);

I / O modules ICPcon i-7000 series;

Touch control panel for receiving and receiving notifications.

  • GSM-modem (AT-commands, receive-send SMS);
  • LCD display DK-8070;
  • LED text boards of street and internal execution (INELSIS);
  • Perimeter protection systems of NPF Poliservice;
  • Pertex protection systems;
  • Fiber-optical means of perimeter protection;
  • Transmission system for “FOBOS” notifications;
  • Biometric Biosmart readers;
  • Electronic safes for storage of keys and small items of SK-24 EMU);
  • Video surveillance system “Intellect” ITV / AxxonSoft (leader in Russia);
  • The video surveillance system Xprotect Milestone (leader in the world);
  • Video surveillance system “BVMS” BOSCH;
  • The video surveillance system and effective video analysis Kipod;
  • Surveillance system “SecurOS” ISS.

support for integrated systems

  • Integrated system of dispatching of engineering systems and
    safety BOSCH BuildingIntegration System (BIS);
  • Integrated security system “Orion Pro”.

Transition from event processing to processing of incident information
At any alarm event in ESM, an incident card is opened in which all information related to this event is registered (system events and their evaluation by the operator, video recordings, phonograms of telephone conversations, operators’ actions and comments, etc.).

Scenario management of incident response
ESM has a set of scenarios to counter and eliminate each type of threat. In any situation, ESM gives the operator answers to questions about what happened, how critical it is and what to do about it, and the manager in a timely manner tells what measures are being taken and how the problem is resolved.

Conclusion of Step-by-Step Instructions for Responding to an Event Operator
In ESM, a step-by-step instruction for each type of threat is displayed, which should be taken in the current situation.
Step-by-step instructions by 90% are made up of the available instructions for operators and security guards. Instructions are processed and entered in the ESM.

 

WHAT EFFECT?

Employees are forced to respond
to threats, clearly in accordance with the instructions
approved at the enterprise;

Deviations in actions from instructions
are revealed in real time – the
opportunity to intervene in time and
prevent the situation from getting out of
control;

Timely detection of
unscrupulous TCO operators who
provide the system with knowingly
false information, incl. creation of
evidence base.

Automated management of security levels and operating modes ITCO
ESM one of the few system that has the function of managing safety levels and ensures automatic and rapid adaptation of the operation of technical facilities without danger to the level of threat to the enterprise. By pressing one button the object is transferred from “peaceful” to “combat” mode:

 

 

 

  • Increases control when passing
    through access points;
  • Change the settings of the
    detection tools on the perimeter of the object;
  • The screens of the dispatch center
    display a larger or smaller
    amount of data;
  • Additional
    operator workstations are activated.

Integration of communication facilities
ESM integrates IP telephony, which provides:

  • Activating the processing of incidents
    when calling an operator over the phone
    emergency services;
  • Automation of call of subscribers
    within the framework of step-by-step instructions
    (from the interface);
  • Automatic dialing to subscribers
    and their voice notification
    of incidents and threats.
    Recording of phonograms of negotiations and their
    connection to incident cards;
  • Identification of violations in the timing of the
    report from posts by means of communication.

ANALYTICAL FUNCTIONAL ESM FOR RESPONSE MANAGEMENT

CORRELATIONS OF DATA

The system tracks interrelated events by comparing information from different sources and combining a sequence of events belonging to one situation in the incident record card.

In the algorithm of information analytics, the following data is involved:

  • signals from technical detection means;
  • signals from video motion detectors and situational
    video analysis tools ;
  • information on weather conditions from weather stations;
  • information from the TCO operator
    on the confirmation / denial of information obtained
    using video surveillance or
    messages from the rapid response team.

ASSESSMENT OF THE LEVEL OF RELIABILITY OF SIGNALS

Correlation of data provides an assessment of the reliability of information through a comprehensive analysis of signals from these sources. The reliability of information affects the type of information displayed and the operator’s ability to respond to this alarm.
For events that have confidence from the average and above, incidents are automatically triggered with the launch of step-by-step instructions on how to resolve them, the operator is not able to reset them without reacting.

Events with confidence below the average are displayed in the form of a video window with the decision buttons “Alarm”, “False alarm”, “Verification required”, the incident is activated depending on the decision made by the operator, and the information is sufficient to verify the correctness of the decision.

RESULT:

  • Reducing the number of false alarms (by an order of magnitude);
  • Summation of detecting abilities of all technical means.

MAINTAINING MAINTENANCE

Automatic calculation of the increase in the number of false alarms with a proposal to activate the “need for maintenance” mode.
Doppler meter of interference from vegetation with a proposal to activate the regime “grass mowing”.
Use incident management technology to control the timeliness of maintenance and save reports on maintenance work.

ANALYTICAL FUNCTIONAL ESM FOR FORMING REPORTING

STANDARD REPORT SET

  • security, fire, alarm;
  • additional engineering subsystems;
  • access control subsystems,
    work time accounting, pass bureau;
  • control of operators’ response to incidents.

REPORT DESIGNER

  • Forming a report from a template
    with preliminary settings for the parameters of the construction, sorting
    and filtering the output data
    and setting up the form of the output form;
  • Publish this report
    to other users;
  • Set up a schedule for automatic report generation and send it by e-mail.

MONITORING DISPLACEMENTS

A specialized application for monitoring the location of users and groups of users of the access control system, quick user search and reporting on the recording of working hours.

Management of the state of monitoring objects (technical means and territories) using hierarchical plans. As a managed monitoring object, icons or territorial objects are placed on the map, and it is possible to split all the elements into display layers.

Maintenance of the operator’s logs provides retrospective security. All operator actions for each incident are recorded in the archive and are available for analysis and service investigations. You can not delete or corrupt the data.

Operative reporting from an object plan allows you to view a retrospective event log about any monitoring object and video recordings made of events at any time.

ARCHITECTURE AND CHARACTERISTICS

YOU CAN CONNECT TO THE COMPLEX:

ESM combines all the resources that provide security (security and force personnel,
technical means, regulations and instructions), and centrally manages them.

  • Multifunctional access control and management system using the latest recognition tools: fingerprints, 3D face model, registration number of the car;
  • The system of thermal imaging control of the perimeter and the territory of the facility;
  • System of technological video surveillance and technological signaling;
  • The system of perimeter protection of an object using technical means of a different detection principle;
  • System of video surveillance and event video analytics;
  • Security, alarm and fire alarm systems;
  • Monitoring systems for buildings and structures;
  • Other systems.