• No results found

Integrated Physical Security and Incident Management

N/A
N/A
Protected

Academic year: 2021

Share "Integrated Physical Security and Incident Management"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Integrated Physical Security

and Incident Management

IT Enterprise Services

Every organisation needs to be confident

about its physical security and its ability

to respond to unexpected incidents.

Protecting your staff, your clients and the

general public is paramount.

(2)

Physical Security and Incident Management

CCTV systems are an established tool in detecting damage, theft, intrusion or natural disaster – but viewing recorded footage after the event is too late. New technologies now enable businesses to monitor their environment, respond quickly, and control the situation – and to reduce their financial loss.

At Capita we provide a consultative approach, so any solutions we propose are

developed to match your business processes and operational needs. Together with our world-leading hardware and software partners, we provide solid, reliable solutions that can meet the most exacting requirements.

Why Physical Security Matters

The threats to physical security are multiple, and range from natural events such as floods through deliberate small-scale damage and theft to more sophisticated attempts to damage business. The damage extends to reduced productivity, falling customer confidence and increased cost of insurance, and ultimately financial loss through all of these. What is needed is smarter technology, greater use of intelligence and better ways of preventing crime rather than just recording it.

At Capita, we have established expertise in applying technological solutions, and identifying where organisations can not only improve their efficiency but also find cost savings. Working closely with you, we can mitigate many of the daily challenges to your business, whilst also providing business benefits and improvements through specialised technology which looks at how customers interact with your business.

Using automated technologies and specialised software such as Video Analytics,

organisations can benefit both financially and operationally. Even the most experienced operator will miss events taking place on a bank of CCTV display screens, but detailed video analysis can set parameters so that when a specific event takes place, the system automatically notifies a guard.

The same analytical solution can be used to provide enhanced and automated Physical Security by protecting the building infrastructure too, through the use of systems certified with iLIDS (the Imagery Library for Intelligent Detection Systems, the government’s benchmark for video analytics systems).

Integrated security systems can be complex and a major investment – which is why Capita offers such a wide range of options to suit your organisation. The true cost of relying on outdated or labour-intensive security can be far higher.

The Role of Video Analytics and Business Intelligence

Video Analytics enables real-time event detection and will generate ‘meta-data’ used for post-event search and statistical analysis.

Rather than having an operator manually reviewing video, and gathering tallies on people, vehicles and their direction, Video Analytics can determine speed, track direction and perform counting.

Video analytics when combined with an integrated IP CCTV system, provides a high level of relevant and powerful intelligent information, useful for businesses, security and mitigating environmental conditions.

Capita CloudVision – Hosted and Managed Video Surveillance

A cornerstone to Capita’s physical security portfolio is CloudVision. A hosted video surveillance service, it extends from an entry-level cloud recording solution all the way up to a sophisticated package complemented by a growing range of physical security and business analysis applications.

CloudVision is Security as a Service, which solves the challenges of using CCTV systems in real time, and managing the systems. Analytical software can be moved between cameras and sites, ensuring that Business Intelligence is only paid for when it’s needed. With a continually growing App Store, the options are only limited by creativity, from People Counting in Retail, to live streaming of events over the internet.

Video footage is only recorded when there is an event – movement detected in a secure area, for example – so there’s no need to trawl through days or weeks of archived video. Access to live camera feeds are available, by web, tablet or phone – streamlining alerting systems and communication.

As with other Cloud-based solutions, investment in infrastructure is kept to a minimum and installation and deployment are simplified. CloudVision offers a true ‘invest as you go’ service. Local Storage Delayed response Real time response

Figure 2 - Steps to value added Physical Security and reducing response time

Visual Verification Police Response Perimeter Breach

Removed / Left Object Number Plate Loitering People Counting Walked Path Heatmap Occupancy Security Analytics Business Analytics ARC Response Cloud Storage Enabling footage to be accessed easier

(3)

CloudControl – Managed Access Control

Once businesses have invested in their own physical security – cameras, fencing,

intruder alarms – they often overlook the associated costs such as training and software as well as the costs of managing the system. Unexpected overheads not only put

pressure on budgets, they can also cause lapses in security and governance.

With Capita’s CloudControl, Access Control is delivered as a service, enabling business processes to be delivered without incurring unplanned costs

.

Traditional approach

CloudControl

Badge Printer Badges are printed, posted via courier Web Cameras Images sent via HR, once passport vetted by secure portal Cards on stock in cupboard PAYG cards, shipped as needed

Multiple-sites, multiple cards? One card for all Train the front desk staff to grant access

and administer cards We have fully trained staff to deliver moves and changes Local Server to control devices and store

data All information is stored in our Data Centre, and pushed to devices as needed Local staff to monitor live events Email alarms issued in real time

Figure 3 - Conventional model comparison to CloudControl model

Complete Management – Physical Security Information

Management (PSIM)

For fully integrated control, information management is the key. By using advanced PSIMs we can enable situation planning, response type and complete analysis of security, safety and emergency events, where the technology is tailored to the

operational requirements. This is important where the chance of human error can put public safety at risk. By integrating and correlating information from multiple and diverse systems across the organisation and coordinating responses, we can ensure that everyone in the operational chain knows what is happening and what their role involves.

PSIM platforms monitor and correlate information from across the network, from a wide variety of static and mobile devices. These can include GPS, RFID, panic buttons and building management sensors in addition to traditional security components, and provide the organisation with a coherent architecture.

Figure 4 - Cost of ownership - Traditional vs CloudControl

Task

Traditional approach

CloudControl

Card printing Under utilised asset that requires specific person to operate Image sent via email. Card returned in the post. Adding a user with access

rights Specific person when available adds user Tick list sent with photo with required access Revoking rights When an employee leaves, cards left active as not returned. Electronic request at the point of exit to automatically disable card. Hardware costs Requires computer, power, space, licensing, anti-virus, data cabling Just the web

Training costs Repeat training for staff churn Simple web based with support avail-able Where to use At the work computer, in the office On the web @ anywhere

Time taken Lots Little

Premises Premises

Team of staff providing support via a Service Desk

Shipment

of Cards Remote Network Monitoring & Management Onsite staff to administer

systems and provision uncontrolled cards Supplier / Manufacturer for support Local staff monitoring events

(4)

After Integration

Integrated Physical Security – more than CCTV

CCTV systems have developed beyond their traditional passive and reactive approach to security and loss prevention and they can now deliver automated and real-time management across your estate. In addition, when integrated with other systems, CCTV can start to deliver an estate-wide management system, often referred to as PSIM (Physical Security Information Management).

Capita delivers complete Integrated Physical Security solutions that, in addition to standard video surveillance and access control, can include applications such as Intercom and Telephony, Alarm Integration, GIS Mapping, Perimeter Security, Barriers and Turnstiles and even environmental sensors – and they can all operate as one system. This approach provides a complete security eco-system for the organisation, wherever it’s based.

The real-time information that is generated from the sensors can be displayed on management terminals and video walls for real-time management. By connecting all the disparate systems into one platform, events can be correlated and analysed. Events can even be matched to workflow, to help optimise staff productivity and reduce response time – this is how we do more with less.

The benefit of deploying overall management architectures is the ability it gives an organisation to detect and act upon events, where the speed of response and the action taken can save lives, as well as businesses.

Incident Management and Situation Awareness

The full integration of different technologies creates new opportunities to streamline business. Matching workflows to business processes enables more efficient use of assets and infrastructure – less duplication of effort, and less wastage – at the same time optimising Control Room operations.

Capita’s approach is to configure the technology to meet your operational requirements, as opposed to taking an off-the-shelf solution that would limit the flexibility of the system. By crafting the technology around the business processes and correlating different events in the environment, we can capture and analyse the events to present meaningful information to control room staff. This means fewer false alarms and speedier responses – in short, enhanced capability.

Capita deliver a complete network and physical security solution, from design and installation of LAN and WAN networks to telephony and collaboration with physical security, and also connecting communication streams such as radio, telephony and mobile services – one common network that enables faster response times and greater control.

CCTV Access Control Video Analytics License Plate Mobile Phone Recognition GPS

Figure 5 - Integrating multiple voice systems to enable ‘command & control’ solutions

VHF Radio

VHF Radio

UHF Radio

UHF Radio

Mobile phone

Mobile phone

VoIP

VoIP

PSTN

PSTN

PBX

PBX

Before Integration

VHF Radio UHF Radio

Mobile phone VoIP

PSTN

NXTL

VHF Radio

UHF Radio

Mobile phone

VoIP

PSTN

NXTL

(5)

An Application for Every Business

The applications can become independent of the hardware, and are application agnositc. Applications themselves can run concurrently, and provide security & business analytics through individual cameras.

Banking &

Retail Office Warehouse

Public

(airport / station

/ port) Construction Motorway

Industrial Processing &

Utilities

Trip Wire Yes Yes Yes Yes Yes

Perimeter Yes Yes Yes

Gender Yes Yes

Counting

(people) Yes

Counting

(cars) Yes Yes Yes

One Way

(trafficdirection) Yes Yes

Tailgating Yes Yes Yes

Heat Map Yes

Facial

Recognition Yes

ANPR Yes Yes Yes

Loitering Yes Yes Yes Yes

Suspicious /

Left Object Yes Yes

Stopped

Vehicle Yes Yes

Object

Removed Yes Yes Yes Yes

Live Internet

Streaming Yes

Vehicle Speed Yes Yes

People Search Yes

Where next?

Security affects us all – to find out more and discuss your requirements, contact:

0117 3115757 | ts@capita.co.uk

References

Related documents

There a lot of studies concerning the price linkage and asymmetric price transmission between the same commodities in the foreign and domestic market (see Meyer and

A third anomaly (Line 26E, 250s) is coincident with an anomalous copper value. A fourth anomalous value occurs on Line 26E at 450s. These two anomalies may reflect disseminated

School Leadership and Student Achievement The Hiring Process of School Administrators The Advantages of Structured Interviews Summary III.. METHODOLOGY ...39 Participants

Outline 1 Introduction Problem Domain Orocos’ Solution Orocos History 2 Orocos Framework Building Applications Component API Component Development 3 Demo Application Setup..

For example, the latent variables can be used to represent the similarities and dissimilarities between the samples: Figure 4 illustrates the difference in the sample

MGT of America performed an annual inspection for compliance with the ICE National Detention Standards (NOS) at the Central Texas Detention Facility (CTDF) located in San

The interactive experience provided by this IPE event was an opportunity for students to practice professional collaboration around the topic of food intake, which is best

Table 2 Summary of the exposure scenarios of studies on the passive inhalation of cannabis smoke Exposure area’s volume (L) Room type Room ventilation Substanc e Smoking