SlideShare a Scribd company logo
1 of 4
Download to read offline
www.cnlsoftware.com
CNL Software Case Study
IBM UK - Corporate Security
February 2012
About the Organization
IBM is a globally integrated enterprise operating in over 170
countries. IBM United Kingdom’s history began on November 19,
1951 and today IBM UK has around 20,000 employees, bringing
innovative solutions to a diverse client base to help solve some of
their toughest business challenges. In addition to being the world’s
largest IT and consulting services company, IBM is a global business
and technology leader, innovating in research and development
to shape the future of society at large. IBM’s prized research,
development and technical talent around the world partner with
governments, corporations, thinkers and doers on ground breaking
real world problems to help make the world work better and build
a smarter planet.
The Challenges
IBM and its brand name are globally recognized as a leading US
company. While this brand recognition has obvious benefits, the
flip side to this is IBM is an easily identifiable target for individual’s
intent on damaging the US and its perceived assets.
The challenge was to provide IBM with a method of ensuring
consistent levels of security across its 26 locations in the UK. IBM
needed to ensure better visibility of threats to all of their sites,
assets and people. The solution was required to rationalize the
number of control rooms, which would generate a rapid return
on investment, provide improved efficiency and reduce on-going
costs.
IBM wanted to proactively identify trends and irregularities across
all the locations, allowing actions to be taken to reduce business
risks. They had a number of unconnected systems from a variety
of manufacturers over these sites totalling more than 700 security
devices. They wanted to reduce redundancy in these security
systems, maximizing the investment they had already made.
Finally, the solution needed to be easy to use, ensuring even during
a major incident operators were still able to easily navigate and
utilize all of its features.
IBM
February 2012 Confidential © 2012 CNL Software Page 1
The Solution
IBM selected IPSecurityCenter as a platform for their security
solution. The solution was exceptional, and was selected as a
Finalist by an independent expert panel in the Security Excellence
Awards 2008.
	
Firstly, IBM realized the only way to achieve their goals was to
create a centralized command and control center, which integrated
their entire physical security infrastructure including: access
control, CCTV, intruder detection and fire alarm inputs across all
locations. Centralizing the security management would allow them
to maintain a consistent level of security across all locations. All
of the information from the sub system would be collected in this
centralized management system.
		
All of the resulting data needed to be presented in an easy to use
interface, ensuring only relevant information was displayed when
required. This was presented on individual operator workstations
and a strategically placed video wall.
	
Management required detailed reports for strategic decisions;
this was accomplished by using the customizable reporting within
IPSecurityCenter.
Increasing efficiency was part of the requirement. As a result
routine tasks were automatically scheduled hourly, daily, weekly or
monthly to eliminate human error. Additionally, IPSecurityCenter
enabled the transfer of all paper based policies into automated
operator guidance, which improved efficiency and ensured
consistent responses to incidents and events.
Key Benefits
•	 Reduced Security Risks
•	 Increased Situation Awareness
•	 Centralized Control
•	 Reduced Costs
•	 Policy Compliance
•	 Operator Guidance
•	 Removed Vendor Dependency
Benefits
IPSecurityCenter has helped IBM convert the information from all
their security systems into visual intelligence, which has lead to
improved situational awareness for all security staff.
The workflows within IPSecurityCenter have helped the security
staff to provide faster and more effective responses to incident
and event management, which has resulted in a reduced level of
interruptions to the business. The trend analysis has assisted the
security team to identify frequently occurring incidents, allowing
management to add resources to reduce these.
IBM saw an ROI on their investment through cost savings within
the first 18 months. A price cannot be put on the increased level of
security at all of the IBM sites; a single security breach could cause
untold damage both financially and to the IBM brand. The impact
would affect both customer trust and investor confidence.
The Future
In the long term, IBM will see increased functionality and further
cost savings. Automatically distributed SMS and email messaging
will enable more efficient and effective methods of delivering
information to the necessary individuals. Using IPSecurityCenter,
new security staff will only need to learn one intuitive system
therefore reducing training requirements.
The open architecture of IPSecurityCenter will allow the integration
of new technology as the need occurs. For example it could allow
the use of biometric, analytic technologies and GIS mapping.
Furthermore, the scalability of the system will enable new buildings
to be quickly added when required. The system has been stress
tested to handle 6.9 million triggers in a 24 hour period, more than
enough to meet the demand of an organization the size of IBM.
February 2012 Confidential © 2012 CNL Software Page 2
IBM
Integrated Technologies
•	 GE PicturePerfect
•	 Milestone VMS
•	 Visimetrics
•	 Siemens GSM
•	 360 Vision matrix
•	 VCL matrix
•	 Vicon matrix
•	 Barco video walls
•	 A range of cameras and DVRs
www.cnlsoftware.com
Copyright © 2012 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.
Contact Us
CNL Software USA
11715 Fox Road, Suite 400-190
Indianapolis, IN 46236 USA
Tel: +1.317.522.0313
CNL Software UK
CNL House, Lower Guildford Road
Knaphill, Surrey, GU21 2EP, UK
Tel: +44 (0)1483 480088
Email : info@cnlsoftware.com
Web: www.cnlsoftware.com
MCS/104/0212
About CNL Software
CNL Software is a world leader and global provider
of Physical Security Information Management (PSIM)
software, designed for complete Integrated Situation
Management. Our award winning PSIM technology is
deployed to secure major cities, critical infrastructure and
global commerce. CNL’s software sits at the heart of some
of the largest, most complex and ground-breaking security
integration projects in the world. Our work with leading
organizations is helping to shape the future of security by
offering thought leadership on key issues such as asset
protection, energy reduction, process compliance and
business advantage in converged physical environments.
About IPSecurityCenterTM
IPSecurityCenter is the ultimate PSIM software based
integration and management platform. It connects and
manages disparate building and security technologies
such as video surveillance, life critical systems, radar,
analytics, HVAC, PIDS, GPS tracking and GIS mapping.
Through aggregating intelligence from these systems, it
allows organizations to react faster and more precisely
to incidents. IPSecurityCenter provides operators with
real-time Situational Awareness through a Common
Operating Picture (COP) and following an alert, alarm or
event presents step by step process guidance, ensuring
complete compliance to security policies.

More Related Content

What's hot

IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?IBM Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 

What's hot (20)

IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 

Viewers also liked

IBM Case Study of Maximo Implementation at CCC
IBM Case Study of Maximo Implementation at CCCIBM Case Study of Maximo Implementation at CCC
IBM Case Study of Maximo Implementation at CCCCCT International
 
Intel-Case study
Intel-Case studyIntel-Case study
Intel-Case studyJacob Jose
 
Samsung case study
Samsung case studySamsung case study
Samsung case studyJujhar Sidhu
 
Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)
Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)
Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)Tyler Anton
 
Huwaei Case Study - Goals and Strategies
Huwaei Case Study - Goals and Strategies Huwaei Case Study - Goals and Strategies
Huwaei Case Study - Goals and Strategies Ahmed Ehab
 
Samsung case study
Samsung case studySamsung case study
Samsung case studyAhmed Omar
 
Samsung Case Study
Samsung Case StudySamsung Case Study
Samsung Case StudyQuasar
 

Viewers also liked (10)

dcVAST-Case-Study
dcVAST-Case-StudydcVAST-Case-Study
dcVAST-Case-Study
 
IBM Case Study of Maximo Implementation at CCC
IBM Case Study of Maximo Implementation at CCCIBM Case Study of Maximo Implementation at CCC
IBM Case Study of Maximo Implementation at CCC
 
Intel-Case study
Intel-Case studyIntel-Case study
Intel-Case study
 
Huwaie Case Study
Huwaie Case StudyHuwaie Case Study
Huwaie Case Study
 
Samsung case study
Samsung case studySamsung case study
Samsung case study
 
Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)
Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)
Huawei Technologies Ltd_Case Study Analysis (Tyler Anton)
 
Huwaei Case Study - Goals and Strategies
Huwaei Case Study - Goals and Strategies Huwaei Case Study - Goals and Strategies
Huwaei Case Study - Goals and Strategies
 
Samsung case study
Samsung case studySamsung case study
Samsung case study
 
Samsung Case Study
Samsung Case StudySamsung Case Study
Samsung Case Study
 
Samsung Electronics Case Study
Samsung Electronics Case StudySamsung Electronics Case Study
Samsung Electronics Case Study
 

Similar to CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security

Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Cloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedCloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedAutotask
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018MayankAgrawal205
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
CBP drives success using optimized, scalable IT infrastructure
CBP drives success using  optimized, scalable IT  infrastructureCBP drives success using  optimized, scalable IT  infrastructure
CBP drives success using optimized, scalable IT infrastructureIBM India Smarter Computing
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017Joel Gil
 
Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13IBM Switzerland
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationVincent Kwon
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)Prabir Saha
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 
Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012Prolifics
 
IBM Express Advantage April '08 - Business Partner Launch overview
IBM Express Advantage April '08 - Business Partner Launch overviewIBM Express Advantage April '08 - Business Partner Launch overview
IBM Express Advantage April '08 - Business Partner Launch overviewSeville
 

Similar to CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security (20)

Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Cloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedCloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is Consumed
 
Managing IT in Business- IBM Report 2018
Managing IT in Business-  IBM Report 2018Managing IT in Business-  IBM Report 2018
Managing IT in Business- IBM Report 2018
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
CBP drives success using optimized, scalable IT infrastructure
CBP drives success using  optimized, scalable IT  infrastructureCBP drives success using  optimized, scalable IT  infrastructure
CBP drives success using optimized, scalable IT infrastructure
 
Ibm
IbmIbm
Ibm
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
WM press release VIP Tower - 122017
WM press release VIP Tower - 122017WM press release VIP Tower - 122017
WM press release VIP Tower - 122017
 
Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13Smarter Computing_Sebastian Krause_IBM Symp13
Smarter Computing_Sebastian Krause_IBM Symp13
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisation
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)
 
Ibm
IbmIbm
Ibm
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012Prolifics at IBM Lotusphere 2012
Prolifics at IBM Lotusphere 2012
 
IBM Express Advantage April '08 - Business Partner Launch overview
IBM Express Advantage April '08 - Business Partner Launch overviewIBM Express Advantage April '08 - Business Partner Launch overview
IBM Express Advantage April '08 - Business Partner Launch overview
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security

  • 1. www.cnlsoftware.com CNL Software Case Study IBM UK - Corporate Security February 2012
  • 2. About the Organization IBM is a globally integrated enterprise operating in over 170 countries. IBM United Kingdom’s history began on November 19, 1951 and today IBM UK has around 20,000 employees, bringing innovative solutions to a diverse client base to help solve some of their toughest business challenges. In addition to being the world’s largest IT and consulting services company, IBM is a global business and technology leader, innovating in research and development to shape the future of society at large. IBM’s prized research, development and technical talent around the world partner with governments, corporations, thinkers and doers on ground breaking real world problems to help make the world work better and build a smarter planet. The Challenges IBM and its brand name are globally recognized as a leading US company. While this brand recognition has obvious benefits, the flip side to this is IBM is an easily identifiable target for individual’s intent on damaging the US and its perceived assets. The challenge was to provide IBM with a method of ensuring consistent levels of security across its 26 locations in the UK. IBM needed to ensure better visibility of threats to all of their sites, assets and people. The solution was required to rationalize the number of control rooms, which would generate a rapid return on investment, provide improved efficiency and reduce on-going costs. IBM wanted to proactively identify trends and irregularities across all the locations, allowing actions to be taken to reduce business risks. They had a number of unconnected systems from a variety of manufacturers over these sites totalling more than 700 security devices. They wanted to reduce redundancy in these security systems, maximizing the investment they had already made. Finally, the solution needed to be easy to use, ensuring even during a major incident operators were still able to easily navigate and utilize all of its features. IBM February 2012 Confidential © 2012 CNL Software Page 1 The Solution IBM selected IPSecurityCenter as a platform for their security solution. The solution was exceptional, and was selected as a Finalist by an independent expert panel in the Security Excellence Awards 2008. Firstly, IBM realized the only way to achieve their goals was to create a centralized command and control center, which integrated their entire physical security infrastructure including: access control, CCTV, intruder detection and fire alarm inputs across all locations. Centralizing the security management would allow them to maintain a consistent level of security across all locations. All of the information from the sub system would be collected in this centralized management system. All of the resulting data needed to be presented in an easy to use interface, ensuring only relevant information was displayed when required. This was presented on individual operator workstations and a strategically placed video wall. Management required detailed reports for strategic decisions; this was accomplished by using the customizable reporting within IPSecurityCenter. Increasing efficiency was part of the requirement. As a result routine tasks were automatically scheduled hourly, daily, weekly or monthly to eliminate human error. Additionally, IPSecurityCenter enabled the transfer of all paper based policies into automated operator guidance, which improved efficiency and ensured consistent responses to incidents and events. Key Benefits • Reduced Security Risks • Increased Situation Awareness • Centralized Control • Reduced Costs • Policy Compliance • Operator Guidance • Removed Vendor Dependency
  • 3. Benefits IPSecurityCenter has helped IBM convert the information from all their security systems into visual intelligence, which has lead to improved situational awareness for all security staff. The workflows within IPSecurityCenter have helped the security staff to provide faster and more effective responses to incident and event management, which has resulted in a reduced level of interruptions to the business. The trend analysis has assisted the security team to identify frequently occurring incidents, allowing management to add resources to reduce these. IBM saw an ROI on their investment through cost savings within the first 18 months. A price cannot be put on the increased level of security at all of the IBM sites; a single security breach could cause untold damage both financially and to the IBM brand. The impact would affect both customer trust and investor confidence. The Future In the long term, IBM will see increased functionality and further cost savings. Automatically distributed SMS and email messaging will enable more efficient and effective methods of delivering information to the necessary individuals. Using IPSecurityCenter, new security staff will only need to learn one intuitive system therefore reducing training requirements. The open architecture of IPSecurityCenter will allow the integration of new technology as the need occurs. For example it could allow the use of biometric, analytic technologies and GIS mapping. Furthermore, the scalability of the system will enable new buildings to be quickly added when required. The system has been stress tested to handle 6.9 million triggers in a 24 hour period, more than enough to meet the demand of an organization the size of IBM. February 2012 Confidential © 2012 CNL Software Page 2 IBM Integrated Technologies • GE PicturePerfect • Milestone VMS • Visimetrics • Siemens GSM • 360 Vision matrix • VCL matrix • Vicon matrix • Barco video walls • A range of cameras and DVRs
  • 4. www.cnlsoftware.com Copyright © 2012 CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners. Contact Us CNL Software USA 11715 Fox Road, Suite 400-190 Indianapolis, IN 46236 USA Tel: +1.317.522.0313 CNL Software UK CNL House, Lower Guildford Road Knaphill, Surrey, GU21 2EP, UK Tel: +44 (0)1483 480088 Email : info@cnlsoftware.com Web: www.cnlsoftware.com MCS/104/0212 About CNL Software CNL Software is a world leader and global provider of Physical Security Information Management (PSIM) software, designed for complete Integrated Situation Management. Our award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. CNL’s software sits at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage in converged physical environments. About IPSecurityCenterTM IPSecurityCenter is the ultimate PSIM software based integration and management platform. It connects and manages disparate building and security technologies such as video surveillance, life critical systems, radar, analytics, HVAC, PIDS, GPS tracking and GIS mapping. Through aggregating intelligence from these systems, it allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time Situational Awareness through a Common Operating Picture (COP) and following an alert, alarm or event presents step by step process guidance, ensuring complete compliance to security policies.