SlideShare a Scribd company logo
genesys
ultimate
®
compact
ultimate
®
compact
Established in 1989, ISM is a World pioneer in
integrated security management solutions; the
U.K.’s leading developer of integrated security
management, intercom and cell call systems.
Operating from our extensive manufacturing and
design facility in Sussex,
our global client base
encompasses many of the
World’s most prominent
institutions including
local authorities, health establishments, education
campuses, shopping centre operators, financial
institutions, the prison and police authorities.
We specialise in the design, development and
manufacture of graphical security control room
management software and intercom systems with
VoIP. Our Genesys software facilitates the integration
of many types and manufacture of third-party
equipment including CCTV matrix and digital video
recorders, access control systems, fire alarms,
intruder alarms, audio matrix, intercoms, public
address and paging systems - all from one holistic
security management system. Our Ultimate 3000
audio exchange provides solutions for telephone
entry, intercom, help point, disabled refuge and cell
call systems.
The market for integrated security systems
is changing dramatically. Go back a few
years and it was viable to rely on a few
PCs to control the security of a building or
site. That is not the case today. Security
control rooms are now responsible for
running multiple sites... 60... 70 and more,
in many countries spanning different
continents. It has become a ‘responsibility
of scale’. With the traditional and now
archaic server-based systems you are
completely reliant on the server. So
what happens when the server goes
down? Your security can be severely
compromised. Not so with Genesys.
We distribute control across all of your
workstations. We’re taking power to your
PC and multiplying it by the number of
PCs on your network. And the genius of
this? If one PC fails, we can migrate the
control to another PC seamlessly with no
interruptions, no downtime. With Genesys
we are giving you the absolute Holy Grail
in security control room management
systems. Unparalleled flexibility, power
beyond your wildest dreams and a
redundancy that’s second to none.
Stephen Smith,
Sales and Marketing Director, ISM
Decades of innovation,
		design and manufacturing excellence
“
”
specialist
At the very core of our business is a robust
and unflinching commitment to research and
development. We invest at least 12.5% of our
annual turnover in research and development and
have our own dedicated R&D and innovation team
on-site. Running parallel to our R&D strategy is an
ongoing dialogue with clients. By understanding
the changing needs of our
clients’ and drawing on our
wealth of experience and
technical expertise within
the security industry we can
design, deliver and implement pioneering systems.
It’s a strategy that works because it fuels ongoing
innovation. Given the unparalleled rise in terrorist
activity in the 21st century and its insidious nature,
the organisations that approach us are looking for a
global solution to their security needs; one that can
be implemented at a local level, that is scalable yet
easy to manage by individual team members.
Genesys v2 is the answer. Several years in the
making and born out of Genesys Classic, Genesys
v2 is the culmination of our internationally recognised
ability to design systems that deliver security
management solutions globally.
Genesys v2 is a genuinely
unique patent protected product;
(something we explore in more
detail further on). Each one of our
products is designed, developed and manufactured
in-house and supported by a system design team
for pre-sales design support plus a full project
management department to assist in the successful
delivery and technical support after-care.
One of the first things a potential client wants to
discuss when approaching us is the experience we
have of working in their sector and the countries we
work in. The confidential and highly sensitive nature
of our work means that whilst we cannot share client
details or names we can tell you that our systems
have been deployed in:
• financial institutions
• police services
• prison services
• health services
• universities and schools
• mental health units
• government buildings
• high security control rooms
• airports
• critical infrastructure
• museums and art galleries
• oil and gas
• VIP residences
In fact from the City of London to the farthest points
on the globe, ISM have developed pioneering
security control room management systems that are
now responsible for protecting millions of people
from all walks of life by safeguarding the buildings
and infrastructures that house them.
The perfect partnership
		of r&d and innovation
Who do you
		work with…?
innovation
Imagine for a moment that you’re attending one
of our innovation meetings a few years ago. In
this particular meeting you’re listening to some of
the discussions between our R&D, design, project
management and senior management teams about
Genesys v2. This is what you would have heard...
“As part of the new networked security system,
the main command and control functions are to be
undertaken by an integrated graphic user Interface
computer front-end. This will monitor both local and
remote sites. The system will be capable of sending
and receiving information from
security subsystems to local/
regional Security Centres
and to the Main Security
Control Room. The Security
Information Management system (SIM) will be a
network of Windows 7 compatible PC workstation(s)
which will have overall control of all electronic
security systems installed at each site that can
include but not be limited to: -
• Perimeter intruder detection
• CCTV and Digital Recording
• Intruder Alarms
• Panic/Affray Alarms
• Video Content Analytics
• Building Management Systems
• Electronic Locking
• Cell Call
• Fire Detection
• Intercoms
• Public Address
• Trunked Radio
• Radio Paging
• Staff Safety Systems
• Guard Tour
“Genesys v2 must be a holistic security management
system with the ability to monitor and control multiple
systems from multiple manufacturers from a single
software platform.
“It must offer clear and concise easy to navigate
graphics and text acknowledgements along with real-
time active icons. These facilities shall enable the user
to be visually aware of all the activity of events and
actions as and when they happen. The graphic plans
will be in high resolution 2-D or 3-D format to enable
operators to become familiar with the building (s) and
locations that are being monitored and/or controlled
by the SIM system. There will be a 3-D model of the
site (s) and or location (s) to allow the operator an
instant overview of all of the maps available for the
system. As the software will be highly intuitive, training
the operators on the use of the system will take no
more than two hours. The system will have a complex
log to enable the manager/supervisors to produce
audit trails and reports.
“The software will operate as a standalone platform
over LAN or WAN networks for remote and local
sites with workstations that can be transferred to
any operating security control room on the network.
This offers the end user flexibility when closing down
sites or buildings for off-peak or
out of normal working hours or in
the unlikely event of any system
failures.
“The SIM system will have been designed in a
modular format for ease of operation. This is
especially relevant when the end users are using
multiple disciplines/integration. This will enable
management to allocate individual operators with
all or individual modules. The models represent the
system types such as fire alarm, intruder detection,
access control, audio intercoms, digital recording
systems, cell call, concierges etc. Each module shall
include a graphical control panel which replicates the
function of the hardware. Each module will display
the relevant icons on the maps for the individual
system (which can include associated modules
items via filters within the configuration menus). This
alleviates cluttered graphics and confusion for the
operators. The SIM system will offer true integration
via an action list application. This will enable
every device for each system to interact via cause
and effect to include display graphical maps and
memos/instructions related to the individual alarms
to the operators. This will allow all events to be
automatically triggered when an alarm device enters
any state; thereby eliminating the human error factor.
“The system will utilise the latest Microsoft.NET
platform and Windows Presentation Foundation
(WPF) for an enhanced graphical user experience
and will include migrating Driver redundancy
technology, with the ability to distribute the Driver
interfaces across the network as each SIM PC can
run individual Drivers. This also allows any of the
SIM workstation PC (s) on the network to become a
master for both the Drivers and the database.”
Hundreds of thousands of man-hours, engineering
excellence and patent approved application and this
is the system we developed: Genesys v2.
The brief,
		 that gave birth to genesys
enhanced
genesys® ®
Fire alarm
Access control
Intruder alarm
HARDWARE
GDS	 -	Genesys Driver
Service
GMS	 -	Genesys Messaging
Service
GSE	 -	Genesys State
Engine
GMTS	-	Genesys Migrating
Technology Service
GFE	 -	Genesys Front End
DB	 - 	Database
Genesys is a fully integrated security management
system capable of integrating multiple systems.
Interoperability is enabled from one holistic platform.
Genesys encompasses high levels of functionality,
exceptional ease of use, graceful redundancy and
advanced alarm handling.
• The Genesys front end
The Genesys Front End, sometimes referred to as a
Graphical User Interface or GUI is one of the engines.
Being independent of the rest of the system it can
reside on a PC to carry out control functions, or as
a main load carrying PC with driver control. This
independence increases the stability of the system. It
also enables effortless expansion.
• Why driver separation enables system
stability
One of the most critical and unique elements of
Genesys is that individual Driver instances are set
up for each system connected within the Genesys
Driver Service (GDS). This separation of Drivers
allows for the load of all the Drivers running to be
spread across the system - thereby allowing for a
large number of Drivers to be connected. The GDS
monitors each Driver instance. So, if a Driver become
unstable or fails due to poor third-party software
then the GDS can close down the individual Driver
(to ensure it does not cause an issue to any other
part of the system) at the same time as generating
an alarm event. The GDS promotes the ability to
migrate individual Drivers to other computers in the
event of a PC or network failure. By employing a
separate engine it is also
possible to run these Drivers
on dedicated PCs or servers
if you prefer this network
architecture. Genesys
incorporates a status engine and an SQL server
database. This means that the software remembers
the state of all devices, alarms and the current alarm
progress of alarm tick-lists. If an alarm has been
accepted on a PC and the PC fails before the alarm
has been reset then the alarm will be resent to the
network again. This ensures that no alarm is ever lost.
genesys,
		 …the world has waited
genesys,
		system architecture
We listened to our clients. Ease of use was their
fundamental requirement. So we combined our
20 years’ plus experience and expertise with an
unquenchable thirst to understand at a granular
level what today’s users need. We embarked
on an evangelical study of how different
control rooms function and what the operators
are required to do, on a second by second
basis. And the result? With Genesys we have
developed a system that is truly groundbreaking
and genuinely unique. Genesys is a system that
the user can readily and easily use. It utilises
the latest Microsoft.NET platform and Windows
Presentation Foundation (WPF) for an enhanced
graphical user experience and it’s all wrapped
up in our pioneering patented migrating 3+
redundancy.
David Jenkins,
Managing Director, ISM
“
”
As well as incorporating our patented migrating
3+™ redundancy, Genesys has further
additional patents pending. With the ability to
distribute the Drivers across the network, each
Genesys PC can run the Drivers. Genesys
has moved away from the traditional server
and client configuration with all of its inherent
flaws and issues, to a more stable and robust
platform. We have transferred power from the
server to the PC.
Steven Card,
Technical Director, ISM
“
”
genesys® ®
unique
• The genius of the Genesys state
engine
As connected devices change state - some simply
from Off to On or others having multiple states such
as; tamper, fault, door open, insecure, pre-alarm,
then the Genesys State Engine (GSE) receives these
states and sends a message to update the icons
shown within the Genesys Front End. This provides
near real time status of all devices. This engine also
monitors the status of the Genesys computers on
the network, what alarms have been acknowledged,
and how many actions on the alarm task list have
been completed. This keeps each one of the Genesys
computers fully up-to-date. If a PC failure or engine
fault should occur then the other users are aware that
a user is off-line.
• Top secret level encryption
All messages are sent via the Genesys Messaging
Service (GMS) between the Genesys engines and
services using Secure Socket Layer Cryptographic
Protocol. The Genesys Migrating Technology Service
details the driver migration and all actions on the
system are stored within a Sequel server database.
When communicating between computers across
the network, Genesys employs 256 Bit Advanced
Encryption Service. This protects information up to
Top Secret level.
• Capability to communicate in multiple
languages
Genesys supports multiple languages; something
which is achieved by using a translation database
or databases. When an operator logs on, the correct
language is displayed to them (the separate language
databases are situated between the main system
database and the Genesys Front-End).
• Calling time on servers and clustering
software
Because of its pioneering system architecture,
Genesys is not restricted due to the size or capability
of a server, nor does it require the expense of moving
to server farms or utilising clustering software.
Genesys adds higher levels of automatic configurable
redundancy and power. It ensures continued
connectivity to all systems at all times.
Competitors have fallen into the trap of delivering
a Windows-like application. We know from
extensive research that operators don’t like it.
It’s confusing, messy on the screen, neither
clean nor clear. Genesys v2 has been developed
on the same principles as Genesys Classic; ease
of use, clear and concise graphics, clear menu
boxes and dynamic control panels that appear
when you touch the graphic. These features
and more are what make Genesys v2 a truly
outstanding system; a system that’s miles ahead
of anything available on the World market today
and tomorrow.
John Waite,
Business Development Director, ISM
“
”
Genesys is an outstanding breakthrough in
security management technology. Systems are
becoming larger as the need to control local,
national and international sites from one holistic
interface grows. Genesys has the flexibility to
fulfil requirements in the present moment and in
the future.
David Jenkins,
Managing Director, ISM
“
”
genesys® ®
lan/wan
access control
cctv
pagers
fire alarms
fire
alarms
intercoms
cctv
pagers
access
control
HARDWARE connection to lan/wan
intercoms
Clear and concise alarm management is absolutely
vital to the success of any security management
system. Genesys offers a comprehensive event
management database. Events and alarms are
presented to the operators clearly with an alarm
workflow together with automated and manual
workflow options that guide the operators through
these events. As alarms are handled in the same
generic way, training is straightforward and the
reactions of operators to these events are greatly
improved.
Genesys provides enhanced alarm handling
incorporating multiple scenarios that can be
allocated to alarms so that they trigger automatically
at certain events including:
1. On receipt of an alarm.
2. When the operator accepts the alarm.
3. If the device changes state etc.
For example if a PID alarm is triggered, Genesys will
automatically:
• Increase the frame recoding rate on the DVR/NVR.
• Page security staff.
• Lock down perimeter doors.
• Switch on perimeter lighting.
When the operator accepts the alarm they are
presented with the live CCTV images together with
the pre-and post-event recording from the DVR
at the time the event was generated. The alarm
task list is presented detailing a workflow for the
operator to follow. The workflow list can detail
basic functions for audit purposes such as ‘check
the CCTV’, ‘call the supervisor’. By selecting one of
these actions Genesys will carry out the automated
function and the item will be ticked off the list. The
operator will then proceed to the next item. It is
possible to add events to the workflow list such
as ‘lock down doors’ or ‘add a note to the alarm
event’. Only when this note has been added can the
operator reset the alarm.
Once the event has been cleared and the operator
has reset the alarm the system will automatically
revert back to a default position for example:
• Sending cameras to their home positions.
• Switching the monitors to default view.
• Returning the DVR to normal record state.
• Switching off floodlights.
• Normalising doors.
• Paging staff.
• Genesys Change Management in
Your Hands
Genesys can be fully configured by any trained
member of your team. The benefit of this is that you
have full control over your system. You can make
amendments to keep your system current without
having to call upon ISM for on-site support.
genesys® ®
Why enhanced alarm handling
		is crucial
In Genesys security providers now have the
optimum tool to control and monitor their
complex security installations to the highest
degree.
Mark Ranger,
Technical Department Manager, ISM
“
”
Alarm event
Alarm Displayed
On Genesys
Operator
Accepts Alarm
Alarm Task List
Alarm Reset
CCTV PTZ to
preset position
Check CCTV
PTZ to Home
Position
DVR Triggered
Lockdown Doors
DVR Normalised
Alarm Silenced
Page Staff
Switch On
Lighting
Page Staff
CCTV Screen
Layout Change
Switch Lighting
Call Supervisor
Switch Off
Lighting
Log Entry
Required
Normalise Doors
Show Live, Pre
and Post Images
• SINGLE SCREEN ALARM LAYOUT
Genesys incorporates an alarm escalation feature.
This allows an operator to trigger different scenarios
with the display of a new tick-list if required.
The alarm escalation can be triggered automatically
from rules that are set up in the system configuration.
For example items such as multiple alarms from the
same area, alarms not accepted by an operator after
a set period of time and the number of active alarms
can be the trigger.
Genesys offers a completely configurable layout of
one, two or three PC monitor screen displays per
workstation - absolute flexibility plus the ability to
increase functionality as the system grows.
The end user has a system that is future proof
because its expansion capability is limitless.
Genesys has a full system log. This file records
the actions of the system - detailing the operator,
the action and any automated actions plus any
responses to alarms that have been recorded by
the operator. This log has a search facility and it is
capable of producing basic level reports. If a more
advanced analysis of the logs is required then the
database can be exported and interrogated by
any ODBC programme such as ACCESS and
Crystal Reports.
• DUAL SCREEN ALARM LAYOUT
• Big on Benefits
Here is a summary of just some of the features and
benefits of Genesys:
• Highly configurable. Most changes can be
implemented simply by updating the configuration
rather than applying in code. Enhanced functionality
reduces costs.
• Alarms can be set to specific users or workstations
and can be prioritised.
• Alarms can be easily identified and reacted to
because of the different alarm sounds and flashing
border colours per system.
• Emergency Procedures with alarm tick-lists.
• Alarm escalation rules and manual activation.
• Enhanced graphical user experience and animation
from utilising the latest Microsoft technologies -
.NET platform and Windows Presentation
Foundation (WPF).
• Ease of navigation from the Map control panel in
2D or 3D mode.
• Migrating 3+™ Technology:
	 - Each Driver can run on any networked PC with
its own sequence of migration PCs in the event
of failure.
	 - Distributed Drivers enable the communication
load to be spread across all networked PCs. No
reliance upon one PC for all communications.
	 - Because a front end is not required for the Driver
to run, Drivers can run on non-operator PCs. If
large numbers of Drivers are required additional
PCs can be added to handle the load.
	 - Each Driver runs in isolation from the front-end
and from other system components. A Driver
failure will have no effect on the functioning of the
rest of the system.
Genesys Classic is still a pioneer in security
control room systems, leading the market
by several years. Whenever Genesys Classic
is technically evaluated against any other
competitive security control room system it
always wins hands down. Competitors are still
trying to catch up with Genesys Classic let alone
Genesys v2. I believe we are years ahead of
the market.
David Jenkins,
Managing Director, ISM
“
”
	 - Drivers will continue working even when the front-
end is not running. When the front-end starts
up, any alarms that were activated whilst it was
not running will be displayed and any changes
to device states (for example doors opening and
closing) will be shown.
• Multiple monitor support:
	 - Front end can be configured to cover multiple
monitors (this is naturally dependant on the
capabilities of hardware).
	 - Different layouts for the Genesys v2 ‘panels’ (map,
video, alarms, control, etc) can be configured.
Layouts can be changed depending on user
preference and via Action Lists.
• Advanced Action List system – Define powerful and
complex cause and effect rules.
	 - Execute any command on any device.
	 - Define matrix actions/camera tours.
	 - Create highly configurable guard tours and
cell watches.
• Configurable ‘Tick Lists’ for accepting alarms:
	 - Uses the Action List system.
	 - Perform a series of automatic commands.
	 - Prompt for user input to make alarm notes.
	 - Alarm can only be reset once tick-list is complete.
• New Alarm Window and Alarm Ownership system:
	 - Dedicated alarm list window shows all alarms, or
a filtered selection of alarms.
	 - Alarms grouped by Accepted, Active and
Accepted by Other User. All alarms accepted by
the operator are grouped at the top of the list
and unaccepted alarms are grouped below.
Alarms accepted by other users are grouped at
the bottom.
	 - Accepted alarms are allocated to the user and
become unavailable to other users. The accepting
user’s progress through the alarm’s reset tick-list
is remembered enabling them to return to the
alarm later. The user can also log on to a different
workstation to continue processing the alarm.
	 - Accepted alarms can be escalated causing
them to be allocated to a higher level user and
changing the tick-list items, if required.
	 - Accepted alarms can be un-accepted, allowing
another user to continue processing the alarm.
• New Multi-State Device Icons:
	 - Devices are defined by the state attributed to
them. For example a door device could have a
‘Position’ state and a ‘Locked’ state.
	 - Each value for each state can have a map icon
associated with it. For example a door position’s
state value of ‘Open’ can display a different icon
to when it is ‘Closed’. Overlaid on top of that will
be the icon for the current Is Locked state – an
icon for either ‘True’ or ‘False’.
	 - The default configuration for the states that have
icons and the states that don’t is provided by
the Driver. However, the user can change any of
the defaults and can allocate icons to any state
values or remove them.
• New State Triggers feature:
	 - A trigger can be configured to activate when a
device state changes to a particular value. When
activated the trigger will run an Action List.
	 - The Driver provides full details on the default
configuration for its triggers (mainly used to
activate alarms). However it is fully configurable
by the user and any actions can be taken when
the status of the devices change.
	 - A selection of other, more general triggers are
also available. For example an Action List can
be run when any of the following activity is
selected on the system: Icon Clicked, Menu
Shown/Hidden, Module Button Clicked, and
Layout Changes.
• THREE SCREEN LAYOUT
• World leader and pioneer in the design and
manufacture of security software solutions and
high-quality audio intercom systems for 23 years.
• Inventors of Genesys Classic, the World’s leading
patented integrated security software platform.
• Inventors of Genesys v2 the next level in integrated
security software platforms.
• A highly trusted, respected and stable brand. ISM
software and hardware is used by thousands of
organisations worldwide.
• Dedicated manufacturing facility, project
management team, technical support and sales
in Sussex.
• Rated by Deloitte and Touche as the 49th fastest
growing technology company in the world.
• ISM invests 12.5% of gross revenue in research
and development compared to the industry average
of 7%.
• Leading provider of global centralised security
systems for police, prisons, custodial, commercial
banking and finance, education, rail and transport,
social housing critical infrastructure and more.
Please get in touch with us whether it is to discuss your security need, if you would like to
arrange a full system demonstration or simply require further information. Our experienced
team is available to assist.
The compelling case
		for ism
worldwide
genesys® ®
InteRgrated Security Manufacturing Ltd
25-29 The Bell Centre | Newton Road | Crawley | West Sussex RH10 9FZ
Tel +44(0) 1293 529990 Fax +44(0) 1293 528023 E-mail info@ism-uk.com WEB www.ism-uk.com

More Related Content

What's hot

Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
wendyking63
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
Simplex networking overview_brochure
Simplex networking overview_brochureSimplex networking overview_brochure
Simplex networking overview_brochure
JeremyGarcia46
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
kwader Saudi
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
Sophos
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
AirTight Networks
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
Javier Gonzalez
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
 

What's hot (14)

Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Simplex networking overview_brochure
Simplex networking overview_brochureSimplex networking overview_brochure
Simplex networking overview_brochure
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a12 wireless ips-ss_12-17-10_a
12 wireless ips-ss_12-17-10_a
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 

Viewers also liked

Integrated Contact Center (Final)
Integrated Contact Center (Final)Integrated Contact Center (Final)
Integrated Contact Center (Final)
Anand Rao
 
Chat, Social, Email....Getting Engagement Right in the Contact Centre
Chat, Social, Email....Getting Engagement Right in the Contact CentreChat, Social, Email....Getting Engagement Right in the Contact Centre
Chat, Social, Email....Getting Engagement Right in the Contact Centre
mplsystems
 
Managing your Digital Transformation
Managing your Digital TransformationManaging your Digital Transformation
Managing your Digital Transformation
Scopernia
 
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
John Sinke
 
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9Digital Transformation Review 9: The Digital Strategy Imperative #DTR9
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9
Capgemini
 
Top Digital Transformation Trends and Priorities for 2016
Top Digital Transformation Trends and Priorities for 2016Top Digital Transformation Trends and Priorities for 2016
Top Digital Transformation Trends and Priorities for 2016
Charlene Li
 
Digital Transformation: What it is and how to get there
Digital Transformation: What it is and how to get thereDigital Transformation: What it is and how to get there
Digital Transformation: What it is and how to get there
Econsultancy
 

Viewers also liked (7)

Integrated Contact Center (Final)
Integrated Contact Center (Final)Integrated Contact Center (Final)
Integrated Contact Center (Final)
 
Chat, Social, Email....Getting Engagement Right in the Contact Centre
Chat, Social, Email....Getting Engagement Right in the Contact CentreChat, Social, Email....Getting Engagement Right in the Contact Centre
Chat, Social, Email....Getting Engagement Right in the Contact Centre
 
Managing your Digital Transformation
Managing your Digital TransformationManaging your Digital Transformation
Managing your Digital Transformation
 
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
 
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9Digital Transformation Review 9: The Digital Strategy Imperative #DTR9
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9
 
Top Digital Transformation Trends and Priorities for 2016
Top Digital Transformation Trends and Priorities for 2016Top Digital Transformation Trends and Priorities for 2016
Top Digital Transformation Trends and Priorities for 2016
 
Digital Transformation: What it is and how to get there
Digital Transformation: What it is and how to get thereDigital Transformation: What it is and how to get there
Digital Transformation: What it is and how to get there
 

Similar to Genesys-2-Brochure-Web

Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
José Carlos Álvarez
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
TEUNO
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
Jose Luis Garcia Rodriguez
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
SonaliG6
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Jan Vekemans
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
Tesseract Consulting
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
emmaelice
 
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceSolve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
HCLSoftware
 
Multisentry Solutions Company Profile
Multisentry Solutions Company ProfileMultisentry Solutions Company Profile
Multisentry Solutions Company ProfilePier Vittorio Sassone
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profilejaymieann
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
Mestizo Enterprises
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
Karteek Irukulla
 
Company Profile
Company ProfileCompany Profile
Company ProfileShehza Ali
 

Similar to Genesys-2-Brochure-Web (20)

Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceSolve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
 
SECHEIM_TRADING
SECHEIM_TRADINGSECHEIM_TRADING
SECHEIM_TRADING
 
Multisentry Solutions Company Profile
Multisentry Solutions Company ProfileMultisentry Solutions Company Profile
Multisentry Solutions Company Profile
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 

Genesys-2-Brochure-Web

  • 2. Established in 1989, ISM is a World pioneer in integrated security management solutions; the U.K.’s leading developer of integrated security management, intercom and cell call systems. Operating from our extensive manufacturing and design facility in Sussex, our global client base encompasses many of the World’s most prominent institutions including local authorities, health establishments, education campuses, shopping centre operators, financial institutions, the prison and police authorities. We specialise in the design, development and manufacture of graphical security control room management software and intercom systems with VoIP. Our Genesys software facilitates the integration of many types and manufacture of third-party equipment including CCTV matrix and digital video recorders, access control systems, fire alarms, intruder alarms, audio matrix, intercoms, public address and paging systems - all from one holistic security management system. Our Ultimate 3000 audio exchange provides solutions for telephone entry, intercom, help point, disabled refuge and cell call systems. The market for integrated security systems is changing dramatically. Go back a few years and it was viable to rely on a few PCs to control the security of a building or site. That is not the case today. Security control rooms are now responsible for running multiple sites... 60... 70 and more, in many countries spanning different continents. It has become a ‘responsibility of scale’. With the traditional and now archaic server-based systems you are completely reliant on the server. So what happens when the server goes down? Your security can be severely compromised. Not so with Genesys. We distribute control across all of your workstations. We’re taking power to your PC and multiplying it by the number of PCs on your network. And the genius of this? If one PC fails, we can migrate the control to another PC seamlessly with no interruptions, no downtime. With Genesys we are giving you the absolute Holy Grail in security control room management systems. Unparalleled flexibility, power beyond your wildest dreams and a redundancy that’s second to none. Stephen Smith, Sales and Marketing Director, ISM Decades of innovation, design and manufacturing excellence “ ” specialist At the very core of our business is a robust and unflinching commitment to research and development. We invest at least 12.5% of our annual turnover in research and development and have our own dedicated R&D and innovation team on-site. Running parallel to our R&D strategy is an ongoing dialogue with clients. By understanding the changing needs of our clients’ and drawing on our wealth of experience and technical expertise within the security industry we can design, deliver and implement pioneering systems. It’s a strategy that works because it fuels ongoing innovation. Given the unparalleled rise in terrorist activity in the 21st century and its insidious nature, the organisations that approach us are looking for a global solution to their security needs; one that can be implemented at a local level, that is scalable yet easy to manage by individual team members. Genesys v2 is the answer. Several years in the making and born out of Genesys Classic, Genesys v2 is the culmination of our internationally recognised ability to design systems that deliver security management solutions globally. Genesys v2 is a genuinely unique patent protected product; (something we explore in more detail further on). Each one of our products is designed, developed and manufactured in-house and supported by a system design team for pre-sales design support plus a full project management department to assist in the successful delivery and technical support after-care. One of the first things a potential client wants to discuss when approaching us is the experience we have of working in their sector and the countries we work in. The confidential and highly sensitive nature of our work means that whilst we cannot share client details or names we can tell you that our systems have been deployed in: • financial institutions • police services • prison services • health services • universities and schools • mental health units • government buildings • high security control rooms • airports • critical infrastructure • museums and art galleries • oil and gas • VIP residences In fact from the City of London to the farthest points on the globe, ISM have developed pioneering security control room management systems that are now responsible for protecting millions of people from all walks of life by safeguarding the buildings and infrastructures that house them. The perfect partnership of r&d and innovation Who do you work with…? innovation
  • 3. Imagine for a moment that you’re attending one of our innovation meetings a few years ago. In this particular meeting you’re listening to some of the discussions between our R&D, design, project management and senior management teams about Genesys v2. This is what you would have heard... “As part of the new networked security system, the main command and control functions are to be undertaken by an integrated graphic user Interface computer front-end. This will monitor both local and remote sites. The system will be capable of sending and receiving information from security subsystems to local/ regional Security Centres and to the Main Security Control Room. The Security Information Management system (SIM) will be a network of Windows 7 compatible PC workstation(s) which will have overall control of all electronic security systems installed at each site that can include but not be limited to: - • Perimeter intruder detection • CCTV and Digital Recording • Intruder Alarms • Panic/Affray Alarms • Video Content Analytics • Building Management Systems • Electronic Locking • Cell Call • Fire Detection • Intercoms • Public Address • Trunked Radio • Radio Paging • Staff Safety Systems • Guard Tour “Genesys v2 must be a holistic security management system with the ability to monitor and control multiple systems from multiple manufacturers from a single software platform. “It must offer clear and concise easy to navigate graphics and text acknowledgements along with real- time active icons. These facilities shall enable the user to be visually aware of all the activity of events and actions as and when they happen. The graphic plans will be in high resolution 2-D or 3-D format to enable operators to become familiar with the building (s) and locations that are being monitored and/or controlled by the SIM system. There will be a 3-D model of the site (s) and or location (s) to allow the operator an instant overview of all of the maps available for the system. As the software will be highly intuitive, training the operators on the use of the system will take no more than two hours. The system will have a complex log to enable the manager/supervisors to produce audit trails and reports. “The software will operate as a standalone platform over LAN or WAN networks for remote and local sites with workstations that can be transferred to any operating security control room on the network. This offers the end user flexibility when closing down sites or buildings for off-peak or out of normal working hours or in the unlikely event of any system failures. “The SIM system will have been designed in a modular format for ease of operation. This is especially relevant when the end users are using multiple disciplines/integration. This will enable management to allocate individual operators with all or individual modules. The models represent the system types such as fire alarm, intruder detection, access control, audio intercoms, digital recording systems, cell call, concierges etc. Each module shall include a graphical control panel which replicates the function of the hardware. Each module will display the relevant icons on the maps for the individual system (which can include associated modules items via filters within the configuration menus). This alleviates cluttered graphics and confusion for the operators. The SIM system will offer true integration via an action list application. This will enable every device for each system to interact via cause and effect to include display graphical maps and memos/instructions related to the individual alarms to the operators. This will allow all events to be automatically triggered when an alarm device enters any state; thereby eliminating the human error factor. “The system will utilise the latest Microsoft.NET platform and Windows Presentation Foundation (WPF) for an enhanced graphical user experience and will include migrating Driver redundancy technology, with the ability to distribute the Driver interfaces across the network as each SIM PC can run individual Drivers. This also allows any of the SIM workstation PC (s) on the network to become a master for both the Drivers and the database.” Hundreds of thousands of man-hours, engineering excellence and patent approved application and this is the system we developed: Genesys v2. The brief, that gave birth to genesys enhanced genesys® ® Fire alarm Access control Intruder alarm HARDWARE GDS - Genesys Driver Service GMS - Genesys Messaging Service GSE - Genesys State Engine GMTS - Genesys Migrating Technology Service GFE - Genesys Front End DB - Database
  • 4. Genesys is a fully integrated security management system capable of integrating multiple systems. Interoperability is enabled from one holistic platform. Genesys encompasses high levels of functionality, exceptional ease of use, graceful redundancy and advanced alarm handling. • The Genesys front end The Genesys Front End, sometimes referred to as a Graphical User Interface or GUI is one of the engines. Being independent of the rest of the system it can reside on a PC to carry out control functions, or as a main load carrying PC with driver control. This independence increases the stability of the system. It also enables effortless expansion. • Why driver separation enables system stability One of the most critical and unique elements of Genesys is that individual Driver instances are set up for each system connected within the Genesys Driver Service (GDS). This separation of Drivers allows for the load of all the Drivers running to be spread across the system - thereby allowing for a large number of Drivers to be connected. The GDS monitors each Driver instance. So, if a Driver become unstable or fails due to poor third-party software then the GDS can close down the individual Driver (to ensure it does not cause an issue to any other part of the system) at the same time as generating an alarm event. The GDS promotes the ability to migrate individual Drivers to other computers in the event of a PC or network failure. By employing a separate engine it is also possible to run these Drivers on dedicated PCs or servers if you prefer this network architecture. Genesys incorporates a status engine and an SQL server database. This means that the software remembers the state of all devices, alarms and the current alarm progress of alarm tick-lists. If an alarm has been accepted on a PC and the PC fails before the alarm has been reset then the alarm will be resent to the network again. This ensures that no alarm is ever lost. genesys, …the world has waited genesys, system architecture We listened to our clients. Ease of use was their fundamental requirement. So we combined our 20 years’ plus experience and expertise with an unquenchable thirst to understand at a granular level what today’s users need. We embarked on an evangelical study of how different control rooms function and what the operators are required to do, on a second by second basis. And the result? With Genesys we have developed a system that is truly groundbreaking and genuinely unique. Genesys is a system that the user can readily and easily use. It utilises the latest Microsoft.NET platform and Windows Presentation Foundation (WPF) for an enhanced graphical user experience and it’s all wrapped up in our pioneering patented migrating 3+ redundancy. David Jenkins, Managing Director, ISM “ ” As well as incorporating our patented migrating 3+™ redundancy, Genesys has further additional patents pending. With the ability to distribute the Drivers across the network, each Genesys PC can run the Drivers. Genesys has moved away from the traditional server and client configuration with all of its inherent flaws and issues, to a more stable and robust platform. We have transferred power from the server to the PC. Steven Card, Technical Director, ISM “ ” genesys® ® unique
  • 5. • The genius of the Genesys state engine As connected devices change state - some simply from Off to On or others having multiple states such as; tamper, fault, door open, insecure, pre-alarm, then the Genesys State Engine (GSE) receives these states and sends a message to update the icons shown within the Genesys Front End. This provides near real time status of all devices. This engine also monitors the status of the Genesys computers on the network, what alarms have been acknowledged, and how many actions on the alarm task list have been completed. This keeps each one of the Genesys computers fully up-to-date. If a PC failure or engine fault should occur then the other users are aware that a user is off-line. • Top secret level encryption All messages are sent via the Genesys Messaging Service (GMS) between the Genesys engines and services using Secure Socket Layer Cryptographic Protocol. The Genesys Migrating Technology Service details the driver migration and all actions on the system are stored within a Sequel server database. When communicating between computers across the network, Genesys employs 256 Bit Advanced Encryption Service. This protects information up to Top Secret level. • Capability to communicate in multiple languages Genesys supports multiple languages; something which is achieved by using a translation database or databases. When an operator logs on, the correct language is displayed to them (the separate language databases are situated between the main system database and the Genesys Front-End). • Calling time on servers and clustering software Because of its pioneering system architecture, Genesys is not restricted due to the size or capability of a server, nor does it require the expense of moving to server farms or utilising clustering software. Genesys adds higher levels of automatic configurable redundancy and power. It ensures continued connectivity to all systems at all times. Competitors have fallen into the trap of delivering a Windows-like application. We know from extensive research that operators don’t like it. It’s confusing, messy on the screen, neither clean nor clear. Genesys v2 has been developed on the same principles as Genesys Classic; ease of use, clear and concise graphics, clear menu boxes and dynamic control panels that appear when you touch the graphic. These features and more are what make Genesys v2 a truly outstanding system; a system that’s miles ahead of anything available on the World market today and tomorrow. John Waite, Business Development Director, ISM “ ” Genesys is an outstanding breakthrough in security management technology. Systems are becoming larger as the need to control local, national and international sites from one holistic interface grows. Genesys has the flexibility to fulfil requirements in the present moment and in the future. David Jenkins, Managing Director, ISM “ ” genesys® ® lan/wan access control cctv pagers fire alarms fire alarms intercoms cctv pagers access control HARDWARE connection to lan/wan intercoms
  • 6. Clear and concise alarm management is absolutely vital to the success of any security management system. Genesys offers a comprehensive event management database. Events and alarms are presented to the operators clearly with an alarm workflow together with automated and manual workflow options that guide the operators through these events. As alarms are handled in the same generic way, training is straightforward and the reactions of operators to these events are greatly improved. Genesys provides enhanced alarm handling incorporating multiple scenarios that can be allocated to alarms so that they trigger automatically at certain events including: 1. On receipt of an alarm. 2. When the operator accepts the alarm. 3. If the device changes state etc. For example if a PID alarm is triggered, Genesys will automatically: • Increase the frame recoding rate on the DVR/NVR. • Page security staff. • Lock down perimeter doors. • Switch on perimeter lighting. When the operator accepts the alarm they are presented with the live CCTV images together with the pre-and post-event recording from the DVR at the time the event was generated. The alarm task list is presented detailing a workflow for the operator to follow. The workflow list can detail basic functions for audit purposes such as ‘check the CCTV’, ‘call the supervisor’. By selecting one of these actions Genesys will carry out the automated function and the item will be ticked off the list. The operator will then proceed to the next item. It is possible to add events to the workflow list such as ‘lock down doors’ or ‘add a note to the alarm event’. Only when this note has been added can the operator reset the alarm. Once the event has been cleared and the operator has reset the alarm the system will automatically revert back to a default position for example: • Sending cameras to their home positions. • Switching the monitors to default view. • Returning the DVR to normal record state. • Switching off floodlights. • Normalising doors. • Paging staff. • Genesys Change Management in Your Hands Genesys can be fully configured by any trained member of your team. The benefit of this is that you have full control over your system. You can make amendments to keep your system current without having to call upon ISM for on-site support. genesys® ® Why enhanced alarm handling is crucial In Genesys security providers now have the optimum tool to control and monitor their complex security installations to the highest degree. Mark Ranger, Technical Department Manager, ISM “ ” Alarm event Alarm Displayed On Genesys Operator Accepts Alarm Alarm Task List Alarm Reset CCTV PTZ to preset position Check CCTV PTZ to Home Position DVR Triggered Lockdown Doors DVR Normalised Alarm Silenced Page Staff Switch On Lighting Page Staff CCTV Screen Layout Change Switch Lighting Call Supervisor Switch Off Lighting Log Entry Required Normalise Doors Show Live, Pre and Post Images
  • 7. • SINGLE SCREEN ALARM LAYOUT Genesys incorporates an alarm escalation feature. This allows an operator to trigger different scenarios with the display of a new tick-list if required. The alarm escalation can be triggered automatically from rules that are set up in the system configuration. For example items such as multiple alarms from the same area, alarms not accepted by an operator after a set period of time and the number of active alarms can be the trigger. Genesys offers a completely configurable layout of one, two or three PC monitor screen displays per workstation - absolute flexibility plus the ability to increase functionality as the system grows. The end user has a system that is future proof because its expansion capability is limitless. Genesys has a full system log. This file records the actions of the system - detailing the operator, the action and any automated actions plus any responses to alarms that have been recorded by the operator. This log has a search facility and it is capable of producing basic level reports. If a more advanced analysis of the logs is required then the database can be exported and interrogated by any ODBC programme such as ACCESS and Crystal Reports. • DUAL SCREEN ALARM LAYOUT • Big on Benefits Here is a summary of just some of the features and benefits of Genesys: • Highly configurable. Most changes can be implemented simply by updating the configuration rather than applying in code. Enhanced functionality reduces costs. • Alarms can be set to specific users or workstations and can be prioritised. • Alarms can be easily identified and reacted to because of the different alarm sounds and flashing border colours per system. • Emergency Procedures with alarm tick-lists. • Alarm escalation rules and manual activation. • Enhanced graphical user experience and animation from utilising the latest Microsoft technologies - .NET platform and Windows Presentation Foundation (WPF). • Ease of navigation from the Map control panel in 2D or 3D mode. • Migrating 3+™ Technology: - Each Driver can run on any networked PC with its own sequence of migration PCs in the event of failure. - Distributed Drivers enable the communication load to be spread across all networked PCs. No reliance upon one PC for all communications. - Because a front end is not required for the Driver to run, Drivers can run on non-operator PCs. If large numbers of Drivers are required additional PCs can be added to handle the load. - Each Driver runs in isolation from the front-end and from other system components. A Driver failure will have no effect on the functioning of the rest of the system. Genesys Classic is still a pioneer in security control room systems, leading the market by several years. Whenever Genesys Classic is technically evaluated against any other competitive security control room system it always wins hands down. Competitors are still trying to catch up with Genesys Classic let alone Genesys v2. I believe we are years ahead of the market. David Jenkins, Managing Director, ISM “ ” - Drivers will continue working even when the front- end is not running. When the front-end starts up, any alarms that were activated whilst it was not running will be displayed and any changes to device states (for example doors opening and closing) will be shown. • Multiple monitor support: - Front end can be configured to cover multiple monitors (this is naturally dependant on the capabilities of hardware). - Different layouts for the Genesys v2 ‘panels’ (map, video, alarms, control, etc) can be configured. Layouts can be changed depending on user preference and via Action Lists. • Advanced Action List system – Define powerful and complex cause and effect rules. - Execute any command on any device. - Define matrix actions/camera tours. - Create highly configurable guard tours and cell watches. • Configurable ‘Tick Lists’ for accepting alarms: - Uses the Action List system. - Perform a series of automatic commands. - Prompt for user input to make alarm notes. - Alarm can only be reset once tick-list is complete. • New Alarm Window and Alarm Ownership system: - Dedicated alarm list window shows all alarms, or a filtered selection of alarms. - Alarms grouped by Accepted, Active and Accepted by Other User. All alarms accepted by the operator are grouped at the top of the list and unaccepted alarms are grouped below. Alarms accepted by other users are grouped at the bottom. - Accepted alarms are allocated to the user and become unavailable to other users. The accepting user’s progress through the alarm’s reset tick-list is remembered enabling them to return to the alarm later. The user can also log on to a different workstation to continue processing the alarm. - Accepted alarms can be escalated causing them to be allocated to a higher level user and changing the tick-list items, if required. - Accepted alarms can be un-accepted, allowing another user to continue processing the alarm. • New Multi-State Device Icons: - Devices are defined by the state attributed to them. For example a door device could have a ‘Position’ state and a ‘Locked’ state. - Each value for each state can have a map icon associated with it. For example a door position’s state value of ‘Open’ can display a different icon to when it is ‘Closed’. Overlaid on top of that will be the icon for the current Is Locked state – an icon for either ‘True’ or ‘False’. - The default configuration for the states that have icons and the states that don’t is provided by the Driver. However, the user can change any of the defaults and can allocate icons to any state values or remove them. • New State Triggers feature: - A trigger can be configured to activate when a device state changes to a particular value. When activated the trigger will run an Action List. - The Driver provides full details on the default configuration for its triggers (mainly used to activate alarms). However it is fully configurable by the user and any actions can be taken when the status of the devices change. - A selection of other, more general triggers are also available. For example an Action List can be run when any of the following activity is selected on the system: Icon Clicked, Menu Shown/Hidden, Module Button Clicked, and Layout Changes. • THREE SCREEN LAYOUT
  • 8. • World leader and pioneer in the design and manufacture of security software solutions and high-quality audio intercom systems for 23 years. • Inventors of Genesys Classic, the World’s leading patented integrated security software platform. • Inventors of Genesys v2 the next level in integrated security software platforms. • A highly trusted, respected and stable brand. ISM software and hardware is used by thousands of organisations worldwide. • Dedicated manufacturing facility, project management team, technical support and sales in Sussex. • Rated by Deloitte and Touche as the 49th fastest growing technology company in the world. • ISM invests 12.5% of gross revenue in research and development compared to the industry average of 7%. • Leading provider of global centralised security systems for police, prisons, custodial, commercial banking and finance, education, rail and transport, social housing critical infrastructure and more. Please get in touch with us whether it is to discuss your security need, if you would like to arrange a full system demonstration or simply require further information. Our experienced team is available to assist. The compelling case for ism worldwide genesys® ®
  • 9. InteRgrated Security Manufacturing Ltd 25-29 The Bell Centre | Newton Road | Crawley | West Sussex RH10 9FZ Tel +44(0) 1293 529990 Fax +44(0) 1293 528023 E-mail info@ism-uk.com WEB www.ism-uk.com