This document describes the Genesys integrated security management system from ISM. It discusses Genesys' system architecture which includes driver separation, a state engine, messaging service, and migrating technology to provide redundancy. Genesys provides a graphical user interface to monitor and control multiple security systems from different manufacturers on a single platform. It emphasizes ease of use, flexibility, and reliability.
An Internet of Things Reference Architecture Symantec
The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world, lowering costs, sometimes by billions of dollars. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, and countless industrial control systems. Unfortunately, this growth in connected devices brings increased security risks. Threats quickly evolve to target this rich and vulnerable landscape. Serious risks include physical harm to people, prolonged downtime, and damage to equipment such as pipelines, blast furnaces, and power generation facilities. As several such facilities and IoT systems have already been attacked and materially damaged, security must now be an essential consideration for anyone making or operating IoT devices or systems, particularly for the industrial Internet.
Micro Technologies (India) Ltd. is an IT based company, a leading global developer, manufacturer and marketer of security devices for its clients across the globe. Product lines include the much-needed security devices, life style and support systems and web-based software. Micro Technologies has a history of leading-edge security solutions products. This tradition continues through a singular focus on innovation, advanced technology and making the life of its clients safe, secure and manageable in terms of security, time and money one of the most important defining characteristics of a security and life support solution based company in the early 21st century. It is one of the most valued security solutions across the globe and has been accorded with many national and international awards for its growth and R & D. Micro Technologies aims at displaying not just the technological innovation and prowess but also the product diversity in various segments of vehicle, premises, mobile, other assets and now entering Energy & Health Segments.
Industrial Internet of Things or IIOT utilizes software, hardware, and cloud systems and services to connect the machines used in industrial environments. However, cybersecurity threats are something you need to worry about. You have to know how to keep your apps secure against these threats.
The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
An Internet of Things Reference Architecture Symantec
The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world, lowering costs, sometimes by billions of dollars. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, and countless industrial control systems. Unfortunately, this growth in connected devices brings increased security risks. Threats quickly evolve to target this rich and vulnerable landscape. Serious risks include physical harm to people, prolonged downtime, and damage to equipment such as pipelines, blast furnaces, and power generation facilities. As several such facilities and IoT systems have already been attacked and materially damaged, security must now be an essential consideration for anyone making or operating IoT devices or systems, particularly for the industrial Internet.
Micro Technologies (India) Ltd. is an IT based company, a leading global developer, manufacturer and marketer of security devices for its clients across the globe. Product lines include the much-needed security devices, life style and support systems and web-based software. Micro Technologies has a history of leading-edge security solutions products. This tradition continues through a singular focus on innovation, advanced technology and making the life of its clients safe, secure and manageable in terms of security, time and money one of the most important defining characteristics of a security and life support solution based company in the early 21st century. It is one of the most valued security solutions across the globe and has been accorded with many national and international awards for its growth and R & D. Micro Technologies aims at displaying not just the technological innovation and prowess but also the product diversity in various segments of vehicle, premises, mobile, other assets and now entering Energy & Health Segments.
Industrial Internet of Things or IIOT utilizes software, hardware, and cloud systems and services to connect the machines used in industrial environments. However, cybersecurity threats are something you need to worry about. You have to know how to keep your apps secure against these threats.
The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
Give your users the latest mobile technology while keeping your organization’s data safe. We help you secure, monitor and control mobile devices with over-the-air control. The self-service portal makes mobile management easy and stops Bring Your Own Device (BYOD) from becoming an IT nightmare. Choose the delivery model to suit your needs.
For more on Sophos Mobile Control, visit: http://bit.ly/SMC_solutions
Retail Stores and Wireless Security—RecommendationsAirTight Networks
Wireless computer networks are rapidly becoming universal. As a consumer-driven technology,
wireless was developed to be simple to install, configure and use. It is that very
simplicity, however, that has made it an easy attack vector. More than 95 percent of all
laptop computers have wireless built-in; consumers use wireless routers at home to attach
to their DSL or cable modems; cell phones and digital cameras are getting Wi-Fi enabled.
For a retailer, this means that even if you are not deploying wireless LANs in your establishments,
you have a wireless problem and you need a wireless security policy.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
CNL Software’s award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. Our solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage.
Chat, Social, Email....Getting Engagement Right in the Contact Centremplsystems
This Presentation which featured in a recent webinar by mplsystems CEO, Paul White, covers:
1. The evolving customer landscape
2. Reducing Multi-Channel Complexity
3. Multi-Channel in Action
4. Email - Making it Work!
5. Web Chat - Best Practice
6. Social Customer Service Tips
7. Smart Phone Apps and how to be prepared
On Friday 29th January, Jo gave a presentation on managing your Digital Transformation at Bryo, a network of young entrepreneurs.
Need help with your transformation? Contact us:
http://www.duvalunionconsulting.com/
Developing a Roadmap for Digital TransformationJohn Sinke
Digitally mature companies out-perform their peers in innovation, agility and responsiveness to customers. “Digirati” also enjoy advantages in efficiency and effectiveness in product delivery, marketing, e-commerce, sales and customer service. More importantly, companies that achieve Digital Excellence are 26% more profitable (source: Capgemini Consulting and MIT Centre for Digital Business).
However, building a Roadmap for Digital Transformation requires not only successful collaboration between the CMO and the CIO, it also demands a strong customer-focused orientation and digital culture. During this presentation, John Sinke will share insights from leading marketers and his personal experience of turning Resorts World Sentosa into a “digital business”.
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9Capgemini
In this edition of the Digital Transformation Review, we examine the approaches that organizations can take to crafting a strategy for a digital age, focusing on the following key questions: 1. How do you design a digital strategy in today’s uncertain and volatile world and understand how much reinvention of the organization is required? 2. Should your company become a
platform, or be a part of one? 3. What are the most successful approaches to executing digital strategy – acquisitions, partnerships, Greenfield?
Top Digital Transformation Trends and Priorities for 2016Charlene Li
Given the importance of digital transformation and the never ending onslaught of new technologies, how should organization prioritize limited resources, time, and attention? This presentation to the San Francisco American Marketing Association is the 7th year in a row when Charlene has presented her take of top digital trends.
Digital Transformation: What it is and how to get thereEconsultancy
Digital Transformation: What it is and how to get there.
Authored by Econsultancy CEO Ashley Friedlein, this presentation on the topic of 'Digital Transformation', is broken down into six sections covering:
1. Digital Transformation - what it is and recent data and research on the topic
2. Strategy - what a digital strategy should include
3. Technology - the challenges of technology and the skills gap
4. People - looking at organisational structure, culture, roles & responsibilities, environment recquired
5. Process - how to address the speed, innovation and agility required
6. Business Transformation - how digital transformation is actually business transformation
Give your users the latest mobile technology while keeping your organization’s data safe. We help you secure, monitor and control mobile devices with over-the-air control. The self-service portal makes mobile management easy and stops Bring Your Own Device (BYOD) from becoming an IT nightmare. Choose the delivery model to suit your needs.
For more on Sophos Mobile Control, visit: http://bit.ly/SMC_solutions
Retail Stores and Wireless Security—RecommendationsAirTight Networks
Wireless computer networks are rapidly becoming universal. As a consumer-driven technology,
wireless was developed to be simple to install, configure and use. It is that very
simplicity, however, that has made it an easy attack vector. More than 95 percent of all
laptop computers have wireless built-in; consumers use wireless routers at home to attach
to their DSL or cable modems; cell phones and digital cameras are getting Wi-Fi enabled.
For a retailer, this means that even if you are not deploying wireless LANs in your establishments,
you have a wireless problem and you need a wireless security policy.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
CNL Software’s award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. Our solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage.
Chat, Social, Email....Getting Engagement Right in the Contact Centremplsystems
This Presentation which featured in a recent webinar by mplsystems CEO, Paul White, covers:
1. The evolving customer landscape
2. Reducing Multi-Channel Complexity
3. Multi-Channel in Action
4. Email - Making it Work!
5. Web Chat - Best Practice
6. Social Customer Service Tips
7. Smart Phone Apps and how to be prepared
On Friday 29th January, Jo gave a presentation on managing your Digital Transformation at Bryo, a network of young entrepreneurs.
Need help with your transformation? Contact us:
http://www.duvalunionconsulting.com/
Developing a Roadmap for Digital TransformationJohn Sinke
Digitally mature companies out-perform their peers in innovation, agility and responsiveness to customers. “Digirati” also enjoy advantages in efficiency and effectiveness in product delivery, marketing, e-commerce, sales and customer service. More importantly, companies that achieve Digital Excellence are 26% more profitable (source: Capgemini Consulting and MIT Centre for Digital Business).
However, building a Roadmap for Digital Transformation requires not only successful collaboration between the CMO and the CIO, it also demands a strong customer-focused orientation and digital culture. During this presentation, John Sinke will share insights from leading marketers and his personal experience of turning Resorts World Sentosa into a “digital business”.
Digital Transformation Review 9: The Digital Strategy Imperative #DTR9Capgemini
In this edition of the Digital Transformation Review, we examine the approaches that organizations can take to crafting a strategy for a digital age, focusing on the following key questions: 1. How do you design a digital strategy in today’s uncertain and volatile world and understand how much reinvention of the organization is required? 2. Should your company become a
platform, or be a part of one? 3. What are the most successful approaches to executing digital strategy – acquisitions, partnerships, Greenfield?
Top Digital Transformation Trends and Priorities for 2016Charlene Li
Given the importance of digital transformation and the never ending onslaught of new technologies, how should organization prioritize limited resources, time, and attention? This presentation to the San Francisco American Marketing Association is the 7th year in a row when Charlene has presented her take of top digital trends.
Digital Transformation: What it is and how to get thereEconsultancy
Digital Transformation: What it is and how to get there.
Authored by Econsultancy CEO Ashley Friedlein, this presentation on the topic of 'Digital Transformation', is broken down into six sections covering:
1. Digital Transformation - what it is and recent data and research on the topic
2. Strategy - what a digital strategy should include
3. Technology - the challenges of technology and the skills gap
4. People - looking at organisational structure, culture, roles & responsibilities, environment recquired
5. Process - how to address the speed, innovation and agility required
6. Business Transformation - how digital transformation is actually business transformation
La primera edición de TEUNO Summit se llevó a cabo el 21 y 22 de junio en las ciudades de Quito y Guayaquil respectivamente, con el auspicio de grandes empresas como Cisco Meraki, AlienVault, Siemon, Microsoft, Casa Cable, INGRAM. Donde expertos TI hablaron sobre los desafíos de la conectividad y seguridad en las empresas.
Seqrite HawkkEye is a centralized security management (CSM) that strengthens your organization’s security posture. Get more info about this cloud security platform, unified endpoint management, and more make insight-driven security decisions in real-time.
https://www.seqrite.com/documents/en/datasheets/seqrite-hawkkeye-datasheet.pdf
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
A presentation by Giuseppe "Gippa" Paternò", GARL Director, at Brighton event "Open Source, the Cloud and your business" on 18th November 2014
Enterprise secure identity in the cloud with Single Sign On and Strong Authentication
We provide intelligent and result oriented solutions to help our clients to align their business goals and objectives effectively with technology in order to provide an efficient way to gain competitive advantage and new business opportunities. We specialize in giving professional solutions to anything from consultation, vpn connections and virtualization.
MORE ABOUT TESSERACT
AI Chatbots and IoT infringements are frequent fraud today; many specialists forecast that these threats are quite impactful in the future as well. Companies these days want to pick the proper firewall answer vendors to shield their reputation, data, and backside line. IT managers set firewalls to positive machine needs, making sure no statistics vulnerability. Once implemented, firewall equipment warranty that protection is monitored.
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceHCLSoftware
BigFix Workspace is a comprehensive digital workspace management solution designed to address the evolving challenges brought on by the pandemic and changing workforce dynamics. It empowers organizations to efficiently manage laptops and mobile devices efficiently, irrespective of employee locations, connectivity, or operating systems. The shift to remote work has presented productivity limitations for remote employees, making the traditional "bring it to the office" model obsolete. Additionally, the increased prevalence of cyberattacks, particularly ransomware, has made security a business concern rather than just a technical one.
For more information on Workspace Management Solution, visit: https://hclsw.co/-gniql
An advanced portfolio of leading infrastructure solutions for IT and OT networks. Our solutions include protection for wired and wireless networks and aid in the construct of highly secure indoor, campus, and outdoor networks.
Endpoint security will helps in enhancing protection to corporate networks. It prevents from threats, virus and monitor potential entry in the network. Would you like to know more about the endpoint security working mechanism, then click here https://www.comodo.com/business-enterprise/endpoint-protection/endpoint-security-manager.php
2. Established in 1989, ISM is a World pioneer in
integrated security management solutions; the
U.K.’s leading developer of integrated security
management, intercom and cell call systems.
Operating from our extensive manufacturing and
design facility in Sussex,
our global client base
encompasses many of the
World’s most prominent
institutions including
local authorities, health establishments, education
campuses, shopping centre operators, financial
institutions, the prison and police authorities.
We specialise in the design, development and
manufacture of graphical security control room
management software and intercom systems with
VoIP. Our Genesys software facilitates the integration
of many types and manufacture of third-party
equipment including CCTV matrix and digital video
recorders, access control systems, fire alarms,
intruder alarms, audio matrix, intercoms, public
address and paging systems - all from one holistic
security management system. Our Ultimate 3000
audio exchange provides solutions for telephone
entry, intercom, help point, disabled refuge and cell
call systems.
The market for integrated security systems
is changing dramatically. Go back a few
years and it was viable to rely on a few
PCs to control the security of a building or
site. That is not the case today. Security
control rooms are now responsible for
running multiple sites... 60... 70 and more,
in many countries spanning different
continents. It has become a ‘responsibility
of scale’. With the traditional and now
archaic server-based systems you are
completely reliant on the server. So
what happens when the server goes
down? Your security can be severely
compromised. Not so with Genesys.
We distribute control across all of your
workstations. We’re taking power to your
PC and multiplying it by the number of
PCs on your network. And the genius of
this? If one PC fails, we can migrate the
control to another PC seamlessly with no
interruptions, no downtime. With Genesys
we are giving you the absolute Holy Grail
in security control room management
systems. Unparalleled flexibility, power
beyond your wildest dreams and a
redundancy that’s second to none.
Stephen Smith,
Sales and Marketing Director, ISM
Decades of innovation,
design and manufacturing excellence
“
”
specialist
At the very core of our business is a robust
and unflinching commitment to research and
development. We invest at least 12.5% of our
annual turnover in research and development and
have our own dedicated R&D and innovation team
on-site. Running parallel to our R&D strategy is an
ongoing dialogue with clients. By understanding
the changing needs of our
clients’ and drawing on our
wealth of experience and
technical expertise within
the security industry we can
design, deliver and implement pioneering systems.
It’s a strategy that works because it fuels ongoing
innovation. Given the unparalleled rise in terrorist
activity in the 21st century and its insidious nature,
the organisations that approach us are looking for a
global solution to their security needs; one that can
be implemented at a local level, that is scalable yet
easy to manage by individual team members.
Genesys v2 is the answer. Several years in the
making and born out of Genesys Classic, Genesys
v2 is the culmination of our internationally recognised
ability to design systems that deliver security
management solutions globally.
Genesys v2 is a genuinely
unique patent protected product;
(something we explore in more
detail further on). Each one of our
products is designed, developed and manufactured
in-house and supported by a system design team
for pre-sales design support plus a full project
management department to assist in the successful
delivery and technical support after-care.
One of the first things a potential client wants to
discuss when approaching us is the experience we
have of working in their sector and the countries we
work in. The confidential and highly sensitive nature
of our work means that whilst we cannot share client
details or names we can tell you that our systems
have been deployed in:
• financial institutions
• police services
• prison services
• health services
• universities and schools
• mental health units
• government buildings
• high security control rooms
• airports
• critical infrastructure
• museums and art galleries
• oil and gas
• VIP residences
In fact from the City of London to the farthest points
on the globe, ISM have developed pioneering
security control room management systems that are
now responsible for protecting millions of people
from all walks of life by safeguarding the buildings
and infrastructures that house them.
The perfect partnership
of r&d and innovation
Who do you
work with…?
innovation
3. Imagine for a moment that you’re attending one
of our innovation meetings a few years ago. In
this particular meeting you’re listening to some of
the discussions between our R&D, design, project
management and senior management teams about
Genesys v2. This is what you would have heard...
“As part of the new networked security system,
the main command and control functions are to be
undertaken by an integrated graphic user Interface
computer front-end. This will monitor both local and
remote sites. The system will be capable of sending
and receiving information from
security subsystems to local/
regional Security Centres
and to the Main Security
Control Room. The Security
Information Management system (SIM) will be a
network of Windows 7 compatible PC workstation(s)
which will have overall control of all electronic
security systems installed at each site that can
include but not be limited to: -
• Perimeter intruder detection
• CCTV and Digital Recording
• Intruder Alarms
• Panic/Affray Alarms
• Video Content Analytics
• Building Management Systems
• Electronic Locking
• Cell Call
• Fire Detection
• Intercoms
• Public Address
• Trunked Radio
• Radio Paging
• Staff Safety Systems
• Guard Tour
“Genesys v2 must be a holistic security management
system with the ability to monitor and control multiple
systems from multiple manufacturers from a single
software platform.
“It must offer clear and concise easy to navigate
graphics and text acknowledgements along with real-
time active icons. These facilities shall enable the user
to be visually aware of all the activity of events and
actions as and when they happen. The graphic plans
will be in high resolution 2-D or 3-D format to enable
operators to become familiar with the building (s) and
locations that are being monitored and/or controlled
by the SIM system. There will be a 3-D model of the
site (s) and or location (s) to allow the operator an
instant overview of all of the maps available for the
system. As the software will be highly intuitive, training
the operators on the use of the system will take no
more than two hours. The system will have a complex
log to enable the manager/supervisors to produce
audit trails and reports.
“The software will operate as a standalone platform
over LAN or WAN networks for remote and local
sites with workstations that can be transferred to
any operating security control room on the network.
This offers the end user flexibility when closing down
sites or buildings for off-peak or
out of normal working hours or in
the unlikely event of any system
failures.
“The SIM system will have been designed in a
modular format for ease of operation. This is
especially relevant when the end users are using
multiple disciplines/integration. This will enable
management to allocate individual operators with
all or individual modules. The models represent the
system types such as fire alarm, intruder detection,
access control, audio intercoms, digital recording
systems, cell call, concierges etc. Each module shall
include a graphical control panel which replicates the
function of the hardware. Each module will display
the relevant icons on the maps for the individual
system (which can include associated modules
items via filters within the configuration menus). This
alleviates cluttered graphics and confusion for the
operators. The SIM system will offer true integration
via an action list application. This will enable
every device for each system to interact via cause
and effect to include display graphical maps and
memos/instructions related to the individual alarms
to the operators. This will allow all events to be
automatically triggered when an alarm device enters
any state; thereby eliminating the human error factor.
“The system will utilise the latest Microsoft.NET
platform and Windows Presentation Foundation
(WPF) for an enhanced graphical user experience
and will include migrating Driver redundancy
technology, with the ability to distribute the Driver
interfaces across the network as each SIM PC can
run individual Drivers. This also allows any of the
SIM workstation PC (s) on the network to become a
master for both the Drivers and the database.”
Hundreds of thousands of man-hours, engineering
excellence and patent approved application and this
is the system we developed: Genesys v2.
The brief,
that gave birth to genesys
enhanced
genesys® ®
Fire alarm
Access control
Intruder alarm
HARDWARE
GDS - Genesys Driver
Service
GMS - Genesys Messaging
Service
GSE - Genesys State
Engine
GMTS - Genesys Migrating
Technology Service
GFE - Genesys Front End
DB - Database
4. Genesys is a fully integrated security management
system capable of integrating multiple systems.
Interoperability is enabled from one holistic platform.
Genesys encompasses high levels of functionality,
exceptional ease of use, graceful redundancy and
advanced alarm handling.
• The Genesys front end
The Genesys Front End, sometimes referred to as a
Graphical User Interface or GUI is one of the engines.
Being independent of the rest of the system it can
reside on a PC to carry out control functions, or as
a main load carrying PC with driver control. This
independence increases the stability of the system. It
also enables effortless expansion.
• Why driver separation enables system
stability
One of the most critical and unique elements of
Genesys is that individual Driver instances are set
up for each system connected within the Genesys
Driver Service (GDS). This separation of Drivers
allows for the load of all the Drivers running to be
spread across the system - thereby allowing for a
large number of Drivers to be connected. The GDS
monitors each Driver instance. So, if a Driver become
unstable or fails due to poor third-party software
then the GDS can close down the individual Driver
(to ensure it does not cause an issue to any other
part of the system) at the same time as generating
an alarm event. The GDS promotes the ability to
migrate individual Drivers to other computers in the
event of a PC or network failure. By employing a
separate engine it is also
possible to run these Drivers
on dedicated PCs or servers
if you prefer this network
architecture. Genesys
incorporates a status engine and an SQL server
database. This means that the software remembers
the state of all devices, alarms and the current alarm
progress of alarm tick-lists. If an alarm has been
accepted on a PC and the PC fails before the alarm
has been reset then the alarm will be resent to the
network again. This ensures that no alarm is ever lost.
genesys,
…the world has waited
genesys,
system architecture
We listened to our clients. Ease of use was their
fundamental requirement. So we combined our
20 years’ plus experience and expertise with an
unquenchable thirst to understand at a granular
level what today’s users need. We embarked
on an evangelical study of how different
control rooms function and what the operators
are required to do, on a second by second
basis. And the result? With Genesys we have
developed a system that is truly groundbreaking
and genuinely unique. Genesys is a system that
the user can readily and easily use. It utilises
the latest Microsoft.NET platform and Windows
Presentation Foundation (WPF) for an enhanced
graphical user experience and it’s all wrapped
up in our pioneering patented migrating 3+
redundancy.
David Jenkins,
Managing Director, ISM
“
”
As well as incorporating our patented migrating
3+™ redundancy, Genesys has further
additional patents pending. With the ability to
distribute the Drivers across the network, each
Genesys PC can run the Drivers. Genesys
has moved away from the traditional server
and client configuration with all of its inherent
flaws and issues, to a more stable and robust
platform. We have transferred power from the
server to the PC.
Steven Card,
Technical Director, ISM
“
”
genesys® ®
unique
5. • The genius of the Genesys state
engine
As connected devices change state - some simply
from Off to On or others having multiple states such
as; tamper, fault, door open, insecure, pre-alarm,
then the Genesys State Engine (GSE) receives these
states and sends a message to update the icons
shown within the Genesys Front End. This provides
near real time status of all devices. This engine also
monitors the status of the Genesys computers on
the network, what alarms have been acknowledged,
and how many actions on the alarm task list have
been completed. This keeps each one of the Genesys
computers fully up-to-date. If a PC failure or engine
fault should occur then the other users are aware that
a user is off-line.
• Top secret level encryption
All messages are sent via the Genesys Messaging
Service (GMS) between the Genesys engines and
services using Secure Socket Layer Cryptographic
Protocol. The Genesys Migrating Technology Service
details the driver migration and all actions on the
system are stored within a Sequel server database.
When communicating between computers across
the network, Genesys employs 256 Bit Advanced
Encryption Service. This protects information up to
Top Secret level.
• Capability to communicate in multiple
languages
Genesys supports multiple languages; something
which is achieved by using a translation database
or databases. When an operator logs on, the correct
language is displayed to them (the separate language
databases are situated between the main system
database and the Genesys Front-End).
• Calling time on servers and clustering
software
Because of its pioneering system architecture,
Genesys is not restricted due to the size or capability
of a server, nor does it require the expense of moving
to server farms or utilising clustering software.
Genesys adds higher levels of automatic configurable
redundancy and power. It ensures continued
connectivity to all systems at all times.
Competitors have fallen into the trap of delivering
a Windows-like application. We know from
extensive research that operators don’t like it.
It’s confusing, messy on the screen, neither
clean nor clear. Genesys v2 has been developed
on the same principles as Genesys Classic; ease
of use, clear and concise graphics, clear menu
boxes and dynamic control panels that appear
when you touch the graphic. These features
and more are what make Genesys v2 a truly
outstanding system; a system that’s miles ahead
of anything available on the World market today
and tomorrow.
John Waite,
Business Development Director, ISM
“
”
Genesys is an outstanding breakthrough in
security management technology. Systems are
becoming larger as the need to control local,
national and international sites from one holistic
interface grows. Genesys has the flexibility to
fulfil requirements in the present moment and in
the future.
David Jenkins,
Managing Director, ISM
“
”
genesys® ®
lan/wan
access control
cctv
pagers
fire alarms
fire
alarms
intercoms
cctv
pagers
access
control
HARDWARE connection to lan/wan
intercoms
6. Clear and concise alarm management is absolutely
vital to the success of any security management
system. Genesys offers a comprehensive event
management database. Events and alarms are
presented to the operators clearly with an alarm
workflow together with automated and manual
workflow options that guide the operators through
these events. As alarms are handled in the same
generic way, training is straightforward and the
reactions of operators to these events are greatly
improved.
Genesys provides enhanced alarm handling
incorporating multiple scenarios that can be
allocated to alarms so that they trigger automatically
at certain events including:
1. On receipt of an alarm.
2. When the operator accepts the alarm.
3. If the device changes state etc.
For example if a PID alarm is triggered, Genesys will
automatically:
• Increase the frame recoding rate on the DVR/NVR.
• Page security staff.
• Lock down perimeter doors.
• Switch on perimeter lighting.
When the operator accepts the alarm they are
presented with the live CCTV images together with
the pre-and post-event recording from the DVR
at the time the event was generated. The alarm
task list is presented detailing a workflow for the
operator to follow. The workflow list can detail
basic functions for audit purposes such as ‘check
the CCTV’, ‘call the supervisor’. By selecting one of
these actions Genesys will carry out the automated
function and the item will be ticked off the list. The
operator will then proceed to the next item. It is
possible to add events to the workflow list such
as ‘lock down doors’ or ‘add a note to the alarm
event’. Only when this note has been added can the
operator reset the alarm.
Once the event has been cleared and the operator
has reset the alarm the system will automatically
revert back to a default position for example:
• Sending cameras to their home positions.
• Switching the monitors to default view.
• Returning the DVR to normal record state.
• Switching off floodlights.
• Normalising doors.
• Paging staff.
• Genesys Change Management in
Your Hands
Genesys can be fully configured by any trained
member of your team. The benefit of this is that you
have full control over your system. You can make
amendments to keep your system current without
having to call upon ISM for on-site support.
genesys® ®
Why enhanced alarm handling
is crucial
In Genesys security providers now have the
optimum tool to control and monitor their
complex security installations to the highest
degree.
Mark Ranger,
Technical Department Manager, ISM
“
”
Alarm event
Alarm Displayed
On Genesys
Operator
Accepts Alarm
Alarm Task List
Alarm Reset
CCTV PTZ to
preset position
Check CCTV
PTZ to Home
Position
DVR Triggered
Lockdown Doors
DVR Normalised
Alarm Silenced
Page Staff
Switch On
Lighting
Page Staff
CCTV Screen
Layout Change
Switch Lighting
Call Supervisor
Switch Off
Lighting
Log Entry
Required
Normalise Doors
Show Live, Pre
and Post Images
7. • SINGLE SCREEN ALARM LAYOUT
Genesys incorporates an alarm escalation feature.
This allows an operator to trigger different scenarios
with the display of a new tick-list if required.
The alarm escalation can be triggered automatically
from rules that are set up in the system configuration.
For example items such as multiple alarms from the
same area, alarms not accepted by an operator after
a set period of time and the number of active alarms
can be the trigger.
Genesys offers a completely configurable layout of
one, two or three PC monitor screen displays per
workstation - absolute flexibility plus the ability to
increase functionality as the system grows.
The end user has a system that is future proof
because its expansion capability is limitless.
Genesys has a full system log. This file records
the actions of the system - detailing the operator,
the action and any automated actions plus any
responses to alarms that have been recorded by
the operator. This log has a search facility and it is
capable of producing basic level reports. If a more
advanced analysis of the logs is required then the
database can be exported and interrogated by
any ODBC programme such as ACCESS and
Crystal Reports.
• DUAL SCREEN ALARM LAYOUT
• Big on Benefits
Here is a summary of just some of the features and
benefits of Genesys:
• Highly configurable. Most changes can be
implemented simply by updating the configuration
rather than applying in code. Enhanced functionality
reduces costs.
• Alarms can be set to specific users or workstations
and can be prioritised.
• Alarms can be easily identified and reacted to
because of the different alarm sounds and flashing
border colours per system.
• Emergency Procedures with alarm tick-lists.
• Alarm escalation rules and manual activation.
• Enhanced graphical user experience and animation
from utilising the latest Microsoft technologies -
.NET platform and Windows Presentation
Foundation (WPF).
• Ease of navigation from the Map control panel in
2D or 3D mode.
• Migrating 3+™ Technology:
- Each Driver can run on any networked PC with
its own sequence of migration PCs in the event
of failure.
- Distributed Drivers enable the communication
load to be spread across all networked PCs. No
reliance upon one PC for all communications.
- Because a front end is not required for the Driver
to run, Drivers can run on non-operator PCs. If
large numbers of Drivers are required additional
PCs can be added to handle the load.
- Each Driver runs in isolation from the front-end
and from other system components. A Driver
failure will have no effect on the functioning of the
rest of the system.
Genesys Classic is still a pioneer in security
control room systems, leading the market
by several years. Whenever Genesys Classic
is technically evaluated against any other
competitive security control room system it
always wins hands down. Competitors are still
trying to catch up with Genesys Classic let alone
Genesys v2. I believe we are years ahead of
the market.
David Jenkins,
Managing Director, ISM
“
”
- Drivers will continue working even when the front-
end is not running. When the front-end starts
up, any alarms that were activated whilst it was
not running will be displayed and any changes
to device states (for example doors opening and
closing) will be shown.
• Multiple monitor support:
- Front end can be configured to cover multiple
monitors (this is naturally dependant on the
capabilities of hardware).
- Different layouts for the Genesys v2 ‘panels’ (map,
video, alarms, control, etc) can be configured.
Layouts can be changed depending on user
preference and via Action Lists.
• Advanced Action List system – Define powerful and
complex cause and effect rules.
- Execute any command on any device.
- Define matrix actions/camera tours.
- Create highly configurable guard tours and
cell watches.
• Configurable ‘Tick Lists’ for accepting alarms:
- Uses the Action List system.
- Perform a series of automatic commands.
- Prompt for user input to make alarm notes.
- Alarm can only be reset once tick-list is complete.
• New Alarm Window and Alarm Ownership system:
- Dedicated alarm list window shows all alarms, or
a filtered selection of alarms.
- Alarms grouped by Accepted, Active and
Accepted by Other User. All alarms accepted by
the operator are grouped at the top of the list
and unaccepted alarms are grouped below.
Alarms accepted by other users are grouped at
the bottom.
- Accepted alarms are allocated to the user and
become unavailable to other users. The accepting
user’s progress through the alarm’s reset tick-list
is remembered enabling them to return to the
alarm later. The user can also log on to a different
workstation to continue processing the alarm.
- Accepted alarms can be escalated causing
them to be allocated to a higher level user and
changing the tick-list items, if required.
- Accepted alarms can be un-accepted, allowing
another user to continue processing the alarm.
• New Multi-State Device Icons:
- Devices are defined by the state attributed to
them. For example a door device could have a
‘Position’ state and a ‘Locked’ state.
- Each value for each state can have a map icon
associated with it. For example a door position’s
state value of ‘Open’ can display a different icon
to when it is ‘Closed’. Overlaid on top of that will
be the icon for the current Is Locked state – an
icon for either ‘True’ or ‘False’.
- The default configuration for the states that have
icons and the states that don’t is provided by
the Driver. However, the user can change any of
the defaults and can allocate icons to any state
values or remove them.
• New State Triggers feature:
- A trigger can be configured to activate when a
device state changes to a particular value. When
activated the trigger will run an Action List.
- The Driver provides full details on the default
configuration for its triggers (mainly used to
activate alarms). However it is fully configurable
by the user and any actions can be taken when
the status of the devices change.
- A selection of other, more general triggers are
also available. For example an Action List can
be run when any of the following activity is
selected on the system: Icon Clicked, Menu
Shown/Hidden, Module Button Clicked, and
Layout Changes.
• THREE SCREEN LAYOUT
8. • World leader and pioneer in the design and
manufacture of security software solutions and
high-quality audio intercom systems for 23 years.
• Inventors of Genesys Classic, the World’s leading
patented integrated security software platform.
• Inventors of Genesys v2 the next level in integrated
security software platforms.
• A highly trusted, respected and stable brand. ISM
software and hardware is used by thousands of
organisations worldwide.
• Dedicated manufacturing facility, project
management team, technical support and sales
in Sussex.
• Rated by Deloitte and Touche as the 49th fastest
growing technology company in the world.
• ISM invests 12.5% of gross revenue in research
and development compared to the industry average
of 7%.
• Leading provider of global centralised security
systems for police, prisons, custodial, commercial
banking and finance, education, rail and transport,
social housing critical infrastructure and more.
Please get in touch with us whether it is to discuss your security need, if you would like to
arrange a full system demonstration or simply require further information. Our experienced
team is available to assist.
The compelling case
for ism
worldwide
genesys® ®
9. InteRgrated Security Manufacturing Ltd
25-29 The Bell Centre | Newton Road | Crawley | West Sussex RH10 9FZ
Tel +44(0) 1293 529990 Fax +44(0) 1293 528023 E-mail info@ism-uk.com WEB www.ism-uk.com