ASG's Security Solutions Blog

Great Conversation Button

Connect with ASG

Don't miss a conversation! Continue the Conversation by email.

Your email:

Current Articles | RSS Feed RSS Feed

Filling the Gaps in Security Information Management

  
  
  
  
binary code 10891596

By securityinfowatch.com

There has been a debate within the industry for some time now over what exactly constitutes a true security information management solution. Everyday, security personnel at organizations both big and small are bombarded with data from the security devices they use, be it alerts from video analytic software monitoring surveillance feeds or alarms triggered by intrusion detection sensors. While having more data to work with can be a good thing, the challenge comes in being able to aggregate all of this information into actionable intelligence.

Integrators Face A New Business Model

  
  
  
  
Ron Worman, The Sage Group

Featured on InfoSecurityWatch.com

Ron Worman, Managing Partner of The Sage Group was asked to comment on conversations he had while at ASIS 2012:

  • The emergence of the cloud and the readiness of the channel



The Biggest Hurdle to PSIM Adoption: Integrators?

  
  
  
  
PSIM

By Sage Conversations... Featured in July's issue of SD & I Magazine

Sage has been monitoring the conversations and the case studies in and around Physical Security Information Management (PSIM). Much of the conversation focuses on the lack of traction PSIM is getting in the marketplace. We thought it would be interesting for dealers and integrators to share our findings.

There's No Such Thing as Too Much Information

  
  
  
  
Verint

By Debjit Das, Vice President of Global Marketing, Verint Video Intelligence Solutions

In a modern security environment, information is a critical asset, and organizations rely on a wide array of information systems and technology solutions to protect people, property, and assets. Unfortunately, these organizations are now swimming, if not drowning, in wave after wave of business and security system data. In order to quickly identify potential security problems and avoid undesirable outcomes, organizations must be able to more efficiently view, correlate, and analyze the information their enterprise systems provide.

Transforming Overload into Opportunity
With the information explosion, we have progressed from asking how we can collect information to how we can transform it into the opportunity to make faster and smarter decisions for enhancing security and operating more efficiently.  

The answer comes in two parts.  First, organizations need to implement tools for understanding more of the information at hand – not just structured information (such as the names of employees who swiped their ID cards to enter a restricted facility), but also unstructured information (such as video showing how many people actually entered the facility and what they did while there). Second, organizations should consider solutions for correlating and viewing all of the pertinent data in a meaningful way for more rapid and complete situational awareness, better emergency preparedness, and fast and effective response.  

Powerful Insight with a Robust and Integrated Video Portfolio
A comprehensive IP video portfolio that addresses virtually every aspect of video surveillance – from video capture to video viewing to video analysis – enables information to be more readily shared and used.  Add video analytics to the mix, and security staff need no longer be tied to scrutinizing banks of security screens for detecting suspicious activity. For example, when an intruder enters a restricted area, video analytics can quickly detect that a virtual tripwire has been crossed, and the video system can automatically send alerts and related video to the appropriate security staff, while repositioning PTZ cameras to capture the intruder’s activity.  

The optimal video system is built on an open architecture for easier integration with other enterprise systems: fire alarm, intrusion detection, access control, perimeter protection, Point of Sale, business systems, and databases, among others. This integration allows the video system to leverage the important information these security and business systems provide and produce more timely and valuable intelligence. For instance, a large retailer might generate several million transactions daily, making it all but impossible to detect theft and fraud. But video integration with the Point of Sale system, combined with sophisticated analytics software, makes it possible to detect suspicious activity that might not otherwise be found: a sales associate who processes repeated returns with no customer present or multiple price overrides for a single customer, common in “sweet-hearting.”

The optimal video system can be easily administered and maintained from a central location, regardless of how many sensors are added. So, when an organization grows to span cities or even continents, the IP video system scales to accommodate new locations and changing objectives without forklift upgrades or armies of new staff.     

But, the most effective video systems are those that also incorporate a Physical Security Information Management solution – PSIM – that fuses information from security, safety, and building management systems. PSIM enables users to more quickly view and analyze events that occur over large areas and initiate and manage response, often in concert with multiple agencies.

In Conclusion: Actionable Intelligence for a Safer World
Clearly, organizations around the globe are flooded with more information than they can rapidly assess and understand. Without the proper tools, many organizations will continue to use just a fraction of available information to make decisions that impact lives and assets. However, robust, integrated video portfolios – especially those that include Physical Security Information Management ― can transform information overload into Actionable Intelligence for a safer world and more secure and effective operations.

A New Script for Jack Bauer's "24" - the Virtual SOC

  
  
  
  
fire

By ASG's Professional Services Group

Fade in:  Unknown location

Jack Bauer quickly runs down a hallway chasing someone in a dark blue suit, gun in hand.  

Jack:  CTU, this is Bauer, where is this guy headed?

CTU Analyst:  Bauer, this is CTU, suspect moving towards the ammunition dump. 

Zoom in: CTU Analyst’s fingers on the keyboard

Span up: to view the blip on the screen moving through a building.

Span out: to full room to show the large back lit screen on the wall ahead where everyone else in the room can see the situation as it transpires. Typing feverishly, she provides Jack with more information about the missing warhead from a screen on her desktop that can access procedures, radiation detectors and a myriad of other applications all at once.
-End Scene

The New Buzz Word: PSIM Does it Apply?

  
  
  
  
Fingerprint keyboard

By Nigel Waterton

I would like to take a closer look at one of the highly talked about buzz words at ISC West – PSIM.  As a relatively new term used in the industry, it is important first to know how it is defined as well as if it is something that can be applied across channels and organizations alike.

ISC West - What Did You Gain From This Year's Event?

  
  
  
  
ISC West 2011

A recap of ISC West from Nigel Waterton, Director of Business Development

It was a great show this year! There were lots of new products and solutions showcased. Traffic was high as well as the energy from sponsors and attendees alike. Now that I have returned to my desk & gathered my thoughts, I want to share some of them with you.

All Posts