SlideShare a Scribd company logo
1 of 2
Download to read offline
iSMS
iNTEGRATED SECURITY
MANAGEMENT SYSTEM
security Solutions & services
indracompany.com
Indra se reserva el
derecho de modificar
estas especificaciones
sin notificación previa
Avda. de Bruselas, 35.
28108 Alcobendas.
Madrid (España)
T +34 91 480 60 00
F +34 91 480 60 31
security@indracompany.com
indracompany.com
Modular Components
Call Typification &
Localización
• Main catalogue
• Associated calls
• GIS y Street Finder
Automatic Warnings
• Alarms
• CCTV
EMERGENCY Identification
Multiagency System
• Actuation Protocols
• Information facilities
EMERGENCY Tracking
Scheduled services
management
• Task Planner
Incident Tracking
• Warning System
Resource Management
• Operative Protocols
• Dispatch Proposal
EMERGENCY Management
Mass Calls
Activity Report
Information Analysis
INCIDENT
RECEIVING
RESOURCE
DISPATCHING
TRACKING REPORT
Sensors Radars
Special Systems
Fire Detection
and Extinction
CCTV PTZ/IR
Perimeter
Protection
PA Systems
Access Control
Intrusion Detection
COMMAND
AND
CONTROL CENTRE
Computer Aided
Dispatch (CAD)
Physical Security Information Managemeng (PSIM)
Coastal Surveillance Systems (CSS)
iSafety®
INTEGRA®
iMARE®
iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM
ENC
Radar
Radar
Extractor
AIS
CCTV
Weather Data
Oceanic Data
DF
Maritime Radio
Communications
Low Brandwidth
Connection
Network
Remote
User
Internet
Synchronised
Record Payback
iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM
Specifications (Baseline configuration)
INTEGRATED SECURITY MANAGEMENT
Allows from a single application to manage all
security systems: alarms, CCTV, access control,
fire, incident management, coastal surveillance
systems, VTS.
• Open architecture allows the software to
customized upon request.
• Multi-user architecture with different access
profiles.
• Multilanguage Application.
• Scalable solution.
• Allows contingency facilities to ensure high
availability.
• Supervision and monitoring servers
applications.
• Real-time monitoring of communications.
• Multiple users on local and remote.
• System audit. Registration for all events
actions of all users of the system, report
generation Integra monitors user actions for
later analysis.
• Management support - Active Users Directory
with Windows.
CCTV
• Open platform for integration of CCTV
systems.
• Integration of DVR, NVR and IP cameras from
different market leading vendors.
• Viewing and playback simultaneously.
• Plans Management.
• Virtual Matrix. Create and manage arrays.
• PTZ User Priority.
• Permissions camera and user configurable
priorities.
• Integration with alarm subsystems.
• Indexing recordings or alarms (intrusion, access
control, fire, videosensor) or filtering the list
based on the alarms.
• Display and alarm programming in videowall
systems.
• Integration with videowall and display systems
from other manufacturers.
• Programmable Recording calendar, alarm or
user.
• Validation of the recordings by hash code
embedded in them.
• System analytics extracting images from video
recordings using existing configurable sensor.
• Alarms.
• Open platform for integration of intrusion
alarm systems.
• Bidirectional Treatment with central alarm
module integrated alarm management.
• Graphical Treatment of alarm points
represented in maps and zoom functionality
and navigation between maps.
Representation on list of pending alarms.
• Automatic display of cameras associated with
alarm points.
• Display of video cameras located in maps from
the management module and alarm handling.
• Quick access to system data and telephone
numbers for alarm management.
• Integration with telephony calls using
automatic dialing.
• Maintenance alarms for differentiated
management facilities.
• Motor filters or automatic systems for
advanced alarm handling.
Single console
Open platform
Database
CCTV and Video Management System (VMS)
Automatic Access Control System (AACS)
Perimeter Intrusion Detection System (PIDS)
Indoor intrusion detection system (IIDS)
Fire detection system (FDS)
SCADA/BMS
3D Surveillance system
Emergency Management & CAD system
Coastal Surveillance System & OSD
Vessel Traffic Services (VTS)
Radar EOS and AIS module
Sonar Module
GIS Module
UAVs Module
Toll systems module
eGates module
PAGA and Intercom module
Cybersecurity Module
Allows from a single application to manage all
security systems alarms, CCTV, access control,
fire
Allows to easily integrate third-party hardware
Building three separate layers allows to easily
integrate any customer Database
Allows to easily integrate third-party hardware
Allows to easily integrate third-party hardware
Allows to easily integrate third-party hardware
Allows to easily integrate third-party hardware
Allows to easily integrate third-party hardware
Indra HORUS SCADA
Indra 3D Surveillance
Indra iSafety, DisasterAware, EMOPS, OASIS
Indra iMare Coastal Surveillance System
Indra iMare Coastal Surveillance System
Indra iMare Coastal Surveillance System
Indra iMare Coastal Surveillance System
Indra iSafety Integrated GIS Modules
Mantis, Pelicano, MRI
Indra Intelligent Trafic Systems (ITS)
Indra Automatic Border Control (ABC)
Allows to easily integrate third-party hardware
Indra i-CSOC Monitoring Center
• Generating a report with automatic alarms
and actions treated by operators.
• Treatment Support Tools for each alarm type,
decission trees or action plans.
• Logging of alarms in several categories of
historical.
• Historic Management with ability to
configure customized searches.
• Generate daily report for notification to third
parties with the possibility of automatic
sending e- mails.
• Supervision of communications with the
central alarm.
• Lack of monitoring alarms, control news.
• Functionality deadman for control room.
• General Tele-commands, automatically
sending orders to all alarm systems without
management by the operator.
• Monitoring and query software version of the
control panels.
• Automatic Update version.
• Integration with emergency or incident
management system.
Access control:
• Integration with access control and security
management equipment. Allows reception of
the alarms associated with the access control
and actions over the controlled equipment.
Allows the use of the alarm inputs of the
controllers as alarm system signals.
Engineering controls:
• Integration of third-party technical controls
BMS.
MODULES
iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM
SECURITY SOLUTIONS
& SERVICES
iSMS
iNTEGRATED SECURITY
MANAGEMENT SYSTEM
Introduction Security Management System Aplications
Indra designs, develops and integrates
Infrastructure Protection, Coastal
Surveillance Systems and Emergency
Management systems in one
comprehensive solution PSIM / CAD /
CSS.
These systems can be integrated
with existing networks and 3rd
party subsystems or databases of
the customer’s business to enhance
functionality and coordination (SAP,
Maximo, eGates, GIS, …
Signals form the connected 3rd party
subsystems are transferred directly
to the centralised equipment. From
there signals are transfered to the
control rooms as required for security or
operational purpose.
Integrated Security Management System
(iSMS) combines security systems in a
multiple interface interaction with third
(3rd) party security subsystem in a
common multi-user environment.
iSMS is state of the art software
modular in design and flexible for
future expansion. Integrates all security
components permitting programmed
control and information gathering at user
level.
iSMS provides the daily operation
platform for operators, and all status/
alarm/Events information on the
3rd party subsystems. Is designed
for manage entry/exit control, alarm
monitoring, retrive records of events and
alarms.
Strategic or Crytical infrastructures
whose operation is essential and not
allow alternative solutions. (Land, air, sea
and cyberspace protection)
• Oil&Gas infrastructure, Offshore
platforms.
• Aviation, ISPSC Ports, Railway.
• Safe Cities, International events.
• Correctional facilities, Healthcare Cities,
Mines.
• Substations, Power Plants and Utilities
infrastructures.
• Banks offices, Tier Certificate Data
Centers.
• LEED Certificate Corporate Cities,
Corporate SOCs.
• Military sites or shipyards.
In today’s business environment, integrated security management systems
play a key role, as a uniform high level interface to accommodate user
requirements and add value to our customers. iSMS leverages underlying
existing COTS 3rd party security subsystems, from our market leaders
partners, in the field of CCTV, Access Control, IDS, Perimeter Protection, Fire
Protection, Control Centers, BMS and SCADAs, by complementing them, with
our own innovative key security software and hardware (3Dsurveillance,
Isecure panel, Isense buried sensors, Radar DIO, Automatic Border Control,
IMare Coastal Surveillance, Isafety Emergency Management, secure
communications and cybersecurity).
iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM
Key features
Main References
MODULAR DESIGN
The iSMS offers a complete solution scalable
from one to hundreds of subsystems that can
be added on a unit-by-unit basis (CCTV, AACS,
PIDS, IDS,FDS...).
iSMS Design is subsystem independent: Any
state of art sensor in the market required can
be integrated.
COMMAND AND CONTROL CENTER
Centralization of all information received from
all security subsystems and control centers.
Process, integrates and displays information in
real time.
National, Regional, Local and Mobile
hierarchical Command and Control Centers.
CENTRALIZED OPERATION
iSMS supports the capability to create and
execute security actions on events from a
different security subsystem or on schedules.
iSMS interfaces with Access Control
Systems, with Alarm Systems, with Building
Management Systems, with License Plate
Recognition systems, with Object Recognition
Software, Facial Recognition Software, with
Heat, Ventilation and Air Conditioning systems,
SNMP network systems.
SECURITY OPERATION CENTER INTEGRATION
Security Operation Center (SOC) Integration
with multi-site physical security systems.
As a single integrated physical security system
across all customer’s sites, the SOC integrates
emergency response capabilities and Physical
Security Systems, to establish consolidated
operations. All information from the Integrated
Security System such as the alarms, Video
feeds, Audio annunciation, Security Controls,
and Barrier Systems remain available to the
SOC.
• Barcelona Airport, Barcelona Port.
• Renfe Railway Security Control Center.
• Expo Zaragoza international event.
• Caixa Bank offices.
• Gas Natural Fenosa Corporate Corporate SOC
(CESEC).
• Navantia multi-sites and Military shipyards.
RADAR SENSORS AND GIS INTEGRATION
Radar traces and intercepted units are
represented on the map of the area.
Measurement and analysis tools available to
operators.
Esaty to define and customize blind spots and
alerts.
IP CCTV INTEGRATION
All video streams supplied from analog
cameras or IP cameras of various vendors will
be digitally encoded compression formats and
recorded simultaneously in real time.
iSMS is based on a true open architecture and
allow for use of non-proprietary PC storage
hardware, not limit the storage capacity
and allow for gradual upgrades of recording
capacity.
The iSMS digitally sign recorded video using
cryptography.
3D GRAPHICAL USER INTERFACE
A graphical user interface that enables
organized access to various functions through
graphical buttons and popup menus.
Integration with Geographic Information
Systems (GIS), displaying all the information on
the map.
Simultaneous deployment of video and
infrared video.
TACTICAL NETWORKS INTEGRATION
IP protocol used.
Secure communications used.
Bandwidth for video streams range from Kbits/
sec to Mbits/sec, frame rates ranging from 1fps
to 30fps at resolutions ranging from CIF to
FullHD and up to Mpixel.
iSMS supports any form of IP network
connectivity, including: LAN, WAN, VPN,
Internet, and Wireless.
3rd PARTY SDK SYSTEMS INTEGRATION
The iSMS also supports PTZ camera protocols,
access control systems, object recognition
systems, video walls, VMS systems, Emergency
Management Systems.
Visualization of live camera view integrated
into 3D scenarios associated to the area under
protection, enables greater attention span
compared to conventional systems.
HIGH AVAILABILITY AND DISASTER
RECOVERY
Operating 24 hours x 365 days.
Minimum Life System 15.
Mean time between system failures (MTBF)>
5,000 hours.
Minimum availability of 95%.
VMware®environments support.
Failover configuration supportr.
VTS, CSS AND CAD INTEGRATION
Easy integration with the systems of vessel
traffic services (VTS), CSS Coastal Surveillance
System as Indra iMare and Computer Aided
Dispatch (CAD) for Emergency Management
Systems as Indra Isafety.

More Related Content

Similar to indra_isms_integrated.pdf

Intelligent Video Surveillance Solution
Intelligent Video Surveillance SolutionIntelligent Video Surveillance Solution
Intelligent Video Surveillance SolutionMindtree Ltd.
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfLongJidin1
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draftenergyvijay
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...xKinAnx
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-enVahid RG-zadeh
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
WIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptxWIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptxdeepakkumar954581
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Eurotech
 

Similar to indra_isms_integrated.pdf (20)

Intelligent Video Surveillance Solution
Intelligent Video Surveillance SolutionIntelligent Video Surveillance Solution
Intelligent Video Surveillance Solution
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Access Control
Access ControlAccess Control
Access Control
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
Deimos security suite eng
Deimos security suite engDeimos security suite eng
Deimos security suite eng
 
MIservices
MIservicesMIservices
MIservices
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Pioneer Systems
Pioneer Systems Pioneer Systems
Pioneer Systems
 
Pioneer Systems
Pioneer Systems Pioneer Systems
Pioneer Systems
 
Pioneer Systems
Pioneer SystemsPioneer Systems
Pioneer Systems
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
WIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptxWIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptx
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 

More from Kumaran637735

The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...Kumaran637735
 
20071119_Quality_Tools_ver2 PMI Westchestler Quality
20071119_Quality_Tools_ver2 PMI Westchestler Quality20071119_Quality_Tools_ver2 PMI Westchestler Quality
20071119_Quality_Tools_ver2 PMI Westchestler QualityKumaran637735
 
The intention of this presentation is to: Provide a summary of notable change...
The intention of this presentation is to: Provide a summary of notable change...The intention of this presentation is to: Provide a summary of notable change...
The intention of this presentation is to: Provide a summary of notable change...Kumaran637735
 
ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...
ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...
ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...Kumaran637735
 
02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx
02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx
02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docxKumaran637735
 
Example of KPI and Objectivss Framework.pptx
Example of KPI and Objectivss Framework.pptxExample of KPI and Objectivss Framework.pptx
Example of KPI and Objectivss Framework.pptxKumaran637735
 

More from Kumaran637735 (6)

The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
The resilient U.S. late-cycle expansion contributed to a stalling pattern in ...
 
20071119_Quality_Tools_ver2 PMI Westchestler Quality
20071119_Quality_Tools_ver2 PMI Westchestler Quality20071119_Quality_Tools_ver2 PMI Westchestler Quality
20071119_Quality_Tools_ver2 PMI Westchestler Quality
 
The intention of this presentation is to: Provide a summary of notable change...
The intention of this presentation is to: Provide a summary of notable change...The intention of this presentation is to: Provide a summary of notable change...
The intention of this presentation is to: Provide a summary of notable change...
 
ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...
ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...
ISO9001Revision Aligning QMS policy and objectives with the strategy of the o...
 
02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx
02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx
02 SUPPLIER QUALITY MANAGEMENT SYSTEM AUDIT CHECKLIST.docx
 
Example of KPI and Objectivss Framework.pptx
Example of KPI and Objectivss Framework.pptxExample of KPI and Objectivss Framework.pptx
Example of KPI and Objectivss Framework.pptx
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

indra_isms_integrated.pdf

  • 1. iSMS iNTEGRATED SECURITY MANAGEMENT SYSTEM security Solutions & services indracompany.com Indra se reserva el derecho de modificar estas especificaciones sin notificación previa Avda. de Bruselas, 35. 28108 Alcobendas. Madrid (España) T +34 91 480 60 00 F +34 91 480 60 31 security@indracompany.com indracompany.com Modular Components Call Typification & Localización • Main catalogue • Associated calls • GIS y Street Finder Automatic Warnings • Alarms • CCTV EMERGENCY Identification Multiagency System • Actuation Protocols • Information facilities EMERGENCY Tracking Scheduled services management • Task Planner Incident Tracking • Warning System Resource Management • Operative Protocols • Dispatch Proposal EMERGENCY Management Mass Calls Activity Report Information Analysis INCIDENT RECEIVING RESOURCE DISPATCHING TRACKING REPORT Sensors Radars Special Systems Fire Detection and Extinction CCTV PTZ/IR Perimeter Protection PA Systems Access Control Intrusion Detection COMMAND AND CONTROL CENTRE Computer Aided Dispatch (CAD) Physical Security Information Managemeng (PSIM) Coastal Surveillance Systems (CSS) iSafety® INTEGRA® iMARE® iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM ENC Radar Radar Extractor AIS CCTV Weather Data Oceanic Data DF Maritime Radio Communications Low Brandwidth Connection Network Remote User Internet Synchronised Record Payback
  • 2. iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM Specifications (Baseline configuration) INTEGRATED SECURITY MANAGEMENT Allows from a single application to manage all security systems: alarms, CCTV, access control, fire, incident management, coastal surveillance systems, VTS. • Open architecture allows the software to customized upon request. • Multi-user architecture with different access profiles. • Multilanguage Application. • Scalable solution. • Allows contingency facilities to ensure high availability. • Supervision and monitoring servers applications. • Real-time monitoring of communications. • Multiple users on local and remote. • System audit. Registration for all events actions of all users of the system, report generation Integra monitors user actions for later analysis. • Management support - Active Users Directory with Windows. CCTV • Open platform for integration of CCTV systems. • Integration of DVR, NVR and IP cameras from different market leading vendors. • Viewing and playback simultaneously. • Plans Management. • Virtual Matrix. Create and manage arrays. • PTZ User Priority. • Permissions camera and user configurable priorities. • Integration with alarm subsystems. • Indexing recordings or alarms (intrusion, access control, fire, videosensor) or filtering the list based on the alarms. • Display and alarm programming in videowall systems. • Integration with videowall and display systems from other manufacturers. • Programmable Recording calendar, alarm or user. • Validation of the recordings by hash code embedded in them. • System analytics extracting images from video recordings using existing configurable sensor. • Alarms. • Open platform for integration of intrusion alarm systems. • Bidirectional Treatment with central alarm module integrated alarm management. • Graphical Treatment of alarm points represented in maps and zoom functionality and navigation between maps. Representation on list of pending alarms. • Automatic display of cameras associated with alarm points. • Display of video cameras located in maps from the management module and alarm handling. • Quick access to system data and telephone numbers for alarm management. • Integration with telephony calls using automatic dialing. • Maintenance alarms for differentiated management facilities. • Motor filters or automatic systems for advanced alarm handling. Single console Open platform Database CCTV and Video Management System (VMS) Automatic Access Control System (AACS) Perimeter Intrusion Detection System (PIDS) Indoor intrusion detection system (IIDS) Fire detection system (FDS) SCADA/BMS 3D Surveillance system Emergency Management & CAD system Coastal Surveillance System & OSD Vessel Traffic Services (VTS) Radar EOS and AIS module Sonar Module GIS Module UAVs Module Toll systems module eGates module PAGA and Intercom module Cybersecurity Module Allows from a single application to manage all security systems alarms, CCTV, access control, fire Allows to easily integrate third-party hardware Building three separate layers allows to easily integrate any customer Database Allows to easily integrate third-party hardware Allows to easily integrate third-party hardware Allows to easily integrate third-party hardware Allows to easily integrate third-party hardware Allows to easily integrate third-party hardware Indra HORUS SCADA Indra 3D Surveillance Indra iSafety, DisasterAware, EMOPS, OASIS Indra iMare Coastal Surveillance System Indra iMare Coastal Surveillance System Indra iMare Coastal Surveillance System Indra iMare Coastal Surveillance System Indra iSafety Integrated GIS Modules Mantis, Pelicano, MRI Indra Intelligent Trafic Systems (ITS) Indra Automatic Border Control (ABC) Allows to easily integrate third-party hardware Indra i-CSOC Monitoring Center • Generating a report with automatic alarms and actions treated by operators. • Treatment Support Tools for each alarm type, decission trees or action plans. • Logging of alarms in several categories of historical. • Historic Management with ability to configure customized searches. • Generate daily report for notification to third parties with the possibility of automatic sending e- mails. • Supervision of communications with the central alarm. • Lack of monitoring alarms, control news. • Functionality deadman for control room. • General Tele-commands, automatically sending orders to all alarm systems without management by the operator. • Monitoring and query software version of the control panels. • Automatic Update version. • Integration with emergency or incident management system. Access control: • Integration with access control and security management equipment. Allows reception of the alarms associated with the access control and actions over the controlled equipment. Allows the use of the alarm inputs of the controllers as alarm system signals. Engineering controls: • Integration of third-party technical controls BMS. MODULES iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM SECURITY SOLUTIONS & SERVICES iSMS iNTEGRATED SECURITY MANAGEMENT SYSTEM Introduction Security Management System Aplications Indra designs, develops and integrates Infrastructure Protection, Coastal Surveillance Systems and Emergency Management systems in one comprehensive solution PSIM / CAD / CSS. These systems can be integrated with existing networks and 3rd party subsystems or databases of the customer’s business to enhance functionality and coordination (SAP, Maximo, eGates, GIS, … Signals form the connected 3rd party subsystems are transferred directly to the centralised equipment. From there signals are transfered to the control rooms as required for security or operational purpose. Integrated Security Management System (iSMS) combines security systems in a multiple interface interaction with third (3rd) party security subsystem in a common multi-user environment. iSMS is state of the art software modular in design and flexible for future expansion. Integrates all security components permitting programmed control and information gathering at user level. iSMS provides the daily operation platform for operators, and all status/ alarm/Events information on the 3rd party subsystems. Is designed for manage entry/exit control, alarm monitoring, retrive records of events and alarms. Strategic or Crytical infrastructures whose operation is essential and not allow alternative solutions. (Land, air, sea and cyberspace protection) • Oil&Gas infrastructure, Offshore platforms. • Aviation, ISPSC Ports, Railway. • Safe Cities, International events. • Correctional facilities, Healthcare Cities, Mines. • Substations, Power Plants and Utilities infrastructures. • Banks offices, Tier Certificate Data Centers. • LEED Certificate Corporate Cities, Corporate SOCs. • Military sites or shipyards. In today’s business environment, integrated security management systems play a key role, as a uniform high level interface to accommodate user requirements and add value to our customers. iSMS leverages underlying existing COTS 3rd party security subsystems, from our market leaders partners, in the field of CCTV, Access Control, IDS, Perimeter Protection, Fire Protection, Control Centers, BMS and SCADAs, by complementing them, with our own innovative key security software and hardware (3Dsurveillance, Isecure panel, Isense buried sensors, Radar DIO, Automatic Border Control, IMare Coastal Surveillance, Isafety Emergency Management, secure communications and cybersecurity). iSMS. iNTEGRATED SECURITY MANAGEMENT SYSTEM Key features Main References MODULAR DESIGN The iSMS offers a complete solution scalable from one to hundreds of subsystems that can be added on a unit-by-unit basis (CCTV, AACS, PIDS, IDS,FDS...). iSMS Design is subsystem independent: Any state of art sensor in the market required can be integrated. COMMAND AND CONTROL CENTER Centralization of all information received from all security subsystems and control centers. Process, integrates and displays information in real time. National, Regional, Local and Mobile hierarchical Command and Control Centers. CENTRALIZED OPERATION iSMS supports the capability to create and execute security actions on events from a different security subsystem or on schedules. iSMS interfaces with Access Control Systems, with Alarm Systems, with Building Management Systems, with License Plate Recognition systems, with Object Recognition Software, Facial Recognition Software, with Heat, Ventilation and Air Conditioning systems, SNMP network systems. SECURITY OPERATION CENTER INTEGRATION Security Operation Center (SOC) Integration with multi-site physical security systems. As a single integrated physical security system across all customer’s sites, the SOC integrates emergency response capabilities and Physical Security Systems, to establish consolidated operations. All information from the Integrated Security System such as the alarms, Video feeds, Audio annunciation, Security Controls, and Barrier Systems remain available to the SOC. • Barcelona Airport, Barcelona Port. • Renfe Railway Security Control Center. • Expo Zaragoza international event. • Caixa Bank offices. • Gas Natural Fenosa Corporate Corporate SOC (CESEC). • Navantia multi-sites and Military shipyards. RADAR SENSORS AND GIS INTEGRATION Radar traces and intercepted units are represented on the map of the area. Measurement and analysis tools available to operators. Esaty to define and customize blind spots and alerts. IP CCTV INTEGRATION All video streams supplied from analog cameras or IP cameras of various vendors will be digitally encoded compression formats and recorded simultaneously in real time. iSMS is based on a true open architecture and allow for use of non-proprietary PC storage hardware, not limit the storage capacity and allow for gradual upgrades of recording capacity. The iSMS digitally sign recorded video using cryptography. 3D GRAPHICAL USER INTERFACE A graphical user interface that enables organized access to various functions through graphical buttons and popup menus. Integration with Geographic Information Systems (GIS), displaying all the information on the map. Simultaneous deployment of video and infrared video. TACTICAL NETWORKS INTEGRATION IP protocol used. Secure communications used. Bandwidth for video streams range from Kbits/ sec to Mbits/sec, frame rates ranging from 1fps to 30fps at resolutions ranging from CIF to FullHD and up to Mpixel. iSMS supports any form of IP network connectivity, including: LAN, WAN, VPN, Internet, and Wireless. 3rd PARTY SDK SYSTEMS INTEGRATION The iSMS also supports PTZ camera protocols, access control systems, object recognition systems, video walls, VMS systems, Emergency Management Systems. Visualization of live camera view integrated into 3D scenarios associated to the area under protection, enables greater attention span compared to conventional systems. HIGH AVAILABILITY AND DISASTER RECOVERY Operating 24 hours x 365 days. Minimum Life System 15. Mean time between system failures (MTBF)> 5,000 hours. Minimum availability of 95%. VMware®environments support. Failover configuration supportr. VTS, CSS AND CAD INTEGRATION Easy integration with the systems of vessel traffic services (VTS), CSS Coastal Surveillance System as Indra iMare and Computer Aided Dispatch (CAD) for Emergency Management Systems as Indra Isafety.