Copyright © 2014 CNL Software. All rights reserved.
IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners.
IPSecurityCenterisasoftwarebasedintegrationandmanagement
platform,whichconnectsdisparatesecuritysystemssuchasradar,
analytics, PIDS, GPS tracking, GIS mapping and video surveillance;
aggregating intelligence allows organizations to react faster and
more precisely to incidents. IPSecurityCenter provides operators
with real-time situation awareness, through a common operating
picture (COP) and following an alert, alarm or trigger presents
step by step process guidance, ensuring complete compliance to
organizational security policies.
The Challenge
According to research by Washington State University,prior to the
terrorist attacks on September 11, 2001, the common perception
of transportation security was controlling theft and reducing
contraband such as drugs, illegal immigrants, and exports of
stolen vehicles and machinery. Post 9/11 transportation security
was transformed to assessing threats of possible terrorist attacks
on or through our supply chain systems. Ports, coasts, and
waterways are lined with military installations, nuclear power
plants, oil refineries, fuel tanks, pipelines, chemical plants, and
major cities with dense populations (U.S.H.R., 2004).
Internationally, port security is governed by rules issued by the
International Maritime Organization and its 2002 International
Ship and Port Facility Security Code. Additionally, programs
such as the Container Security Initiative and the Customs Trade
Partnership against Terrorism have become de facto global port
security programs.
Faced with these responsibilities and increasing governance
port Command and Control (C2) centers constantly monitor
their perimeter and critical assets using disparate systems such
as radar, video surveillance, access control, fence protection
systems, microwave sensors and video analytics to detect
activity that requires an immediate response by their security
teams. Add to this the numerous everyday false alarm triggers
such as authorized personnel, maintenance contractors, security
patrols and wildlife; the C2 center is continuously flooded with
alarms and alerts.
Responding to all of these events is unfeasible, so to verify each
incident a method of efficiently aggregating intelligence from all
systems and sensors is required.
The inability to distinguish real incidents from false alarms
significantlyreducesoperationalefficiency,reducespreparedness
and increases response times, leading to unacceptable security
risks in critical infrastructure protection environments.
When an alarm is received by the C2 center, an operator needs
to act fast and decisively. Numerous disparate systems mean
operators require extensive ongoing training on each process
relating to each alarm type. Additionally, responses vary
depending on the time, date, historic alarm data and perceived
threat level, so a method of allowing dynamic policies to be
created and enforced is absolutely essential.
The Integrated Solution
Port Security by its very nature, requires those responsible to
have complete situational awareness at all times as risks to their
facilities constantly changes and can have catastrophic effects far
beyond their site perimeter.
Ports typically have a centralized security facility with a range of
systems in place to monitor and manage security risks. To respond
and deal with the wide range of potential security risks, they
deploy response units each with differing capabilities. Integrating
all identification systems allows the immediate verification of all
incidents, greatly increasing their preparedness to respond to
real security threats with the appropriate resources.
Integrating all identification
systems allows the immediate
verification of all incidents, greatly
increasing their preparedness to
respond.
“
“
IPSecurityCenterTM
PSIM Enhancing Port Security
Includes the protection of the seaports themselves, the protection of travellers,
the inspection of cargo moving through the ports and maritime security.
About CNL Software
CNL Software is a world leader in developing Physical Security
Information Management (PSIM) software. Its award winning
technology is deployed to secure cities, critical resources and
global commerce. CNL Software’s solutions sit at the heart of
some of the largest, most complex and ground-breaking security
integration and business value initiatives in the world. Their
work with leading organizations is helping to shape the future
of security by offering thought leadership on key issues such as
energy reduction, process compliance and business advantage in
converged environments.
For more information please visit www.cnlsoftware.com
The Value Proposition
Providing a completely integrated security system,
IPSecurityCenter effectively manages all security resources,
systemsandpeopleandwillallowoperatorstohavethenecessary
level of real time awareness and emergency preparedness.
Organizations can utilize existing systems rather than replacing
their security estate, ensuring a cost effective way to achieve this.
IPSecurityCenter works with the leading security systems
in the market today and CNL Software’s technology alliance
partnerships (TAP) ensures a future proof off-the-shelf solution
to this complex integration challenge. Unlike other custom-made
integrations, IPSecurityCenter integrates bidirectionally at an
application and database level, exposing full functionality and a
complete audit trail for any reporting or investigation purposes.
Its intelligent workflow allows complex SOPs to be commissioned
and enforced for compliance and reduced operational risk.
Increased Situational Awareness
•	Common Operating Picture COP) for all security operatives
•	All security assets displayed in a Common Operating Picture
•	Aggregated intelligence for real time verification of alarms
Improved Efficiencies
•	Reduction in false alarms
•	Prioritization of the most appropriate security resources
•	Guide response teams using both audio and visual intelligence
•	Reduced training requirements
Reduced Response Time
•	Increased Emergency Preparedness
•	Live feedback from response teams for faster escalation
•	Dynamic guidance based on time, date, historic alarm data
and threat level
Risk Mitigation and Compliance
•	Supports HA/DR capabilities
•	Ensure SOPs are adhered to
•	Complete audit trail for reporting and investigation
•	Post event data fusion, allows tracking of information for
analysis and reporting to prevent future incidents
MSG-409-714
Radar
•	 Monitor traffic in radar
range
•	 Navigation information
•	 Weather system
monitoring
•	 Hazard warning
Port Security
•	 Land and water perimeter protection
•	 Authorized personnel & vessel access
•	 Vehicle and vessel recognition
•	 Mobile cargo inspection
GPS Tracking
•	 Freight tracking
•	 Container tracking
•	 Vessel tracking
•	 Perimeter breach
•	 Arrival & departure
notifications
•	 On board sensors
GIS Mapping
•	 Real time vessel tracking
•	 Spill response
•	 Shipping channel monitoring
•	 Incident tracking
The copyright in all material is owned by CNL Software or by CNL Software’s licensor(s). None of the material may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in
any form or by any means, including, but not limited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of CNL Software or the copyright owner.

IPSecurityCenterTM PSIM Enhancing Port Security

  • 1.
    Copyright © 2014CNL Software. All rights reserved. IPSecurityCenter is a trademark of CNL Software. All other trademarks and registered trademarks are the property of their respective owners. IPSecurityCenterisasoftwarebasedintegrationandmanagement platform,whichconnectsdisparatesecuritysystemssuchasradar, analytics, PIDS, GPS tracking, GIS mapping and video surveillance; aggregating intelligence allows organizations to react faster and more precisely to incidents. IPSecurityCenter provides operators with real-time situation awareness, through a common operating picture (COP) and following an alert, alarm or trigger presents step by step process guidance, ensuring complete compliance to organizational security policies. The Challenge According to research by Washington State University,prior to the terrorist attacks on September 11, 2001, the common perception of transportation security was controlling theft and reducing contraband such as drugs, illegal immigrants, and exports of stolen vehicles and machinery. Post 9/11 transportation security was transformed to assessing threats of possible terrorist attacks on or through our supply chain systems. Ports, coasts, and waterways are lined with military installations, nuclear power plants, oil refineries, fuel tanks, pipelines, chemical plants, and major cities with dense populations (U.S.H.R., 2004). Internationally, port security is governed by rules issued by the International Maritime Organization and its 2002 International Ship and Port Facility Security Code. Additionally, programs such as the Container Security Initiative and the Customs Trade Partnership against Terrorism have become de facto global port security programs. Faced with these responsibilities and increasing governance port Command and Control (C2) centers constantly monitor their perimeter and critical assets using disparate systems such as radar, video surveillance, access control, fence protection systems, microwave sensors and video analytics to detect activity that requires an immediate response by their security teams. Add to this the numerous everyday false alarm triggers such as authorized personnel, maintenance contractors, security patrols and wildlife; the C2 center is continuously flooded with alarms and alerts. Responding to all of these events is unfeasible, so to verify each incident a method of efficiently aggregating intelligence from all systems and sensors is required. The inability to distinguish real incidents from false alarms significantlyreducesoperationalefficiency,reducespreparedness and increases response times, leading to unacceptable security risks in critical infrastructure protection environments. When an alarm is received by the C2 center, an operator needs to act fast and decisively. Numerous disparate systems mean operators require extensive ongoing training on each process relating to each alarm type. Additionally, responses vary depending on the time, date, historic alarm data and perceived threat level, so a method of allowing dynamic policies to be created and enforced is absolutely essential. The Integrated Solution Port Security by its very nature, requires those responsible to have complete situational awareness at all times as risks to their facilities constantly changes and can have catastrophic effects far beyond their site perimeter. Ports typically have a centralized security facility with a range of systems in place to monitor and manage security risks. To respond and deal with the wide range of potential security risks, they deploy response units each with differing capabilities. Integrating all identification systems allows the immediate verification of all incidents, greatly increasing their preparedness to respond to real security threats with the appropriate resources. Integrating all identification systems allows the immediate verification of all incidents, greatly increasing their preparedness to respond. “ “ IPSecurityCenterTM PSIM Enhancing Port Security Includes the protection of the seaports themselves, the protection of travellers, the inspection of cargo moving through the ports and maritime security.
  • 2.
    About CNL Software CNLSoftware is a world leader in developing Physical Security Information Management (PSIM) software. Its award winning technology is deployed to secure cities, critical resources and global commerce. CNL Software’s solutions sit at the heart of some of the largest, most complex and ground-breaking security integration and business value initiatives in the world. Their work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as energy reduction, process compliance and business advantage in converged environments. For more information please visit www.cnlsoftware.com The Value Proposition Providing a completely integrated security system, IPSecurityCenter effectively manages all security resources, systemsandpeopleandwillallowoperatorstohavethenecessary level of real time awareness and emergency preparedness. Organizations can utilize existing systems rather than replacing their security estate, ensuring a cost effective way to achieve this. IPSecurityCenter works with the leading security systems in the market today and CNL Software’s technology alliance partnerships (TAP) ensures a future proof off-the-shelf solution to this complex integration challenge. Unlike other custom-made integrations, IPSecurityCenter integrates bidirectionally at an application and database level, exposing full functionality and a complete audit trail for any reporting or investigation purposes. Its intelligent workflow allows complex SOPs to be commissioned and enforced for compliance and reduced operational risk. Increased Situational Awareness • Common Operating Picture COP) for all security operatives • All security assets displayed in a Common Operating Picture • Aggregated intelligence for real time verification of alarms Improved Efficiencies • Reduction in false alarms • Prioritization of the most appropriate security resources • Guide response teams using both audio and visual intelligence • Reduced training requirements Reduced Response Time • Increased Emergency Preparedness • Live feedback from response teams for faster escalation • Dynamic guidance based on time, date, historic alarm data and threat level Risk Mitigation and Compliance • Supports HA/DR capabilities • Ensure SOPs are adhered to • Complete audit trail for reporting and investigation • Post event data fusion, allows tracking of information for analysis and reporting to prevent future incidents MSG-409-714 Radar • Monitor traffic in radar range • Navigation information • Weather system monitoring • Hazard warning Port Security • Land and water perimeter protection • Authorized personnel & vessel access • Vehicle and vessel recognition • Mobile cargo inspection GPS Tracking • Freight tracking • Container tracking • Vessel tracking • Perimeter breach • Arrival & departure notifications • On board sensors GIS Mapping • Real time vessel tracking • Spill response • Shipping channel monitoring • Incident tracking The copyright in all material is owned by CNL Software or by CNL Software’s licensor(s). None of the material may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not limited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of CNL Software or the copyright owner.