c-hq security services


Posts tagged with "technology"

Feb 2

Defining PSIM

PSIM as a concept emerged because end user managers of security environments cried out for better management of their security information. They wanted to be able to do with security data what every other business unit does with the data from their respective business units – that is, to make intelligent business decisions.

PSIM is a better, more flexible and much more useful way of managing security events and the information needed to respond to incidents than traditional command centre solutions.

Currently, improvisational, fragmented and off-the-cuff security management is the norm. It’s common to find security operations and traditional command-and-control centres using paper-based processes and not sharing information. Business units and IT departments rarely have access to data in corporate security departments. Events are managed separately.

Access-control-related events are monitored and managed separately from intrusion detection systems, and separate also from environmental sensors and other alerting systems. Often the people and systems are not even located in the same facility, inhibiting information sharing and correlation.

Converged security and IT networks need to be managed to mitigate any risk of negative impact through the flood of data induced by an IP CCTV system.

Ensuring interoperability across different vendors’ devices/systems is a challenge. The physical security market as a whole lacks common, open standards. Thus, virtually, any deployment requires the development of new drivers to integrate various systems.

Choosing the right system. The capability to intelligently analyse and cross-reference incoming data represents a further challenge, most PSIM systems, still process individual alarms.

"PSIM is simply the security version of the larger, more important business tool of Information Management."

PSIM principles may be used to produce better situational awareness, prompting better security and business decisions. Situation management software creates useful information out of raw video by contextualizing it (unifying video, alarm and sensor data) which improves situational awareness and makes incident responses more efficient.

Data management best practices are more pervasive now. Regulatory compliance and management best practices dictate that computer systems and data be handled in standardized ways. Security departments are, in general, not compliant with these best practices.

The PSIM system will aggregate, correlate and analyse data from various sources, including alarms, environmental sensors, intrusion-detection systems and video surveillance to ….

● Present a situational view of data.
● Guide standard operating procedures by documenting efficient best practices for every situation.
● Identify trends by searching through data from current and past events to create reports.
● Audit operator behaviour by recording all responses to all alerts for later analysis.

Physical Security Information Management systems provide specific security information based on intelligent analysis of data from a range of sensors from what would traditionally be disparate systems. It enables an organisation to manage risk and ensure that standard procedures are carried out at an enterprise level.

c-hq provides effective technical advice based on the understanding of your threats, the associated hazards and their potential. Working in line with CPNI guidelines, we provide advice and guidance for the security of people and property, critical national infrastructure and the high security estate.

We provide support in the development and the design of your system. Producing schematics, schedules, interac-tion matrices and configuration tables as well as compliancy documentation and commercial selection.

An effective protection system protects more than just assets, it protects a business.

Steve Hunt http://www.huntbi.com
Frost & Sullivan http://www.frost.com


I was recently asked which biometric technology I thought was most reliable. This is a relatively easy question to answer until I considered the wider issues of using it as a form of identification for access management and then trying to work out which technology is best.

Physical biometric identifiers are the distinctive and measurable characteristics used to identify individuals such as facial recognition, fingerprints, palm vein, iris and retina patterns etc.

The reliability of a technology tends to be the inverse of the social acceptance of that technology. Fingerprints are socially accepted with some resistance from those that associate them with criminal behaviour but they have a relatively high false positive or rejection rate. Which may be fine on a small access control system to a comms room but in an airport with thousands of passengers passing through on an hourly basis, a high percentage failure rate is unacceptable. Facial recognition is quite uncontroversial but equally has relatively high failure rates.

It is generally regarded that eye scans are the most reliable form of biometrics. However, technology such as iris and retina scanning appears to have more social resistance due to its perceived intrusive nature. For this reason iris scanning is now more prevalent than the deeper retina scan. The reliability of iris scanning was born out in a study carried out by the National Physics Laboratory some years ago, where is competed against six other technologies and won with the best false match and rejection ratios.

The problem is compounded by the fact that biometric systems provide”probabilistic results”. It is possible to get variable results due to technical issues and degradation of data, such as fingerprint damage for example. There is also evidence of ethnicity, age, sex and medical conditions affecting rejection rates. Having poorly installed and maintained systems combined with the deployment of biometric technology at airports and other high volume portals without understanding the biology of the population being screened could lead to long queues.

In conclusion, no single biometric trait has been identified as fully stable or distinctive and biometric reading technology should only be deployed with this in mind. False positives and reject rates need to be considered in line with the number and the biology of the users of the system.

(Source: chqconsulting.co.uk)