Integrated enterprise’s security command center
A complete solution for operational signal capture, the estimation of the threat criticality level, the selection of counteraction scenarios, incident results acquisition and analysis, the effectiveness evaluation of the actions taken.

This solution is for You, if it is necessary:

  • To receive objective and reliable information about the facility security level in real time.

  • To monitor compliance of facilities’ corporate security standards.

  • To estimate efficiency of the technical equipment use and the work of the security forces.

  • To collect the information to justify investments in improving the legal environment and organizational structure of security units of controlled facilities.

  • To minimize the negative influence of the human factor.

  • To reduce threat reaction time.

  • To improve the efficiency of existing equipment at the facility.

The advantages of the solution
  • Information collection and processing from all security systems of the facility.
  • Timely and consistent response to threats.
  • Control of deviations from regulations, training, progress reporting.
  • Daily activities automation of security forces, incident response, management of physical security systems.
  • Security levels management.
  • Detection of violations in the security measures taken.
  • The characteristics of the solution
    • Improving the efficiency of identifying penetration attempts to the object:
      • Integration of street situational video and audio analysis, biometric video analysis and integrated automated search system connected to databases of wanted people.
      • Disclosure of traffic deviations through the integration of satellite monitoring systems.
      • Integration of the engineering equipment supervisory control system and automatic control system of technological process in order to obtain information about their parameters beyond the norm.
      • Integration of various detection systems: search radar device, coordinates detection of radio-emitting equipment (mobile phones, RPAS).
      • Integration of computer and network equipment monitoring system to detect faults of integrated security system components.
    • Improvement the efficiency of information security systems by integrating them into a single complete security system:
      • Complex information analysis from authentication systems, information systems and ACS means.
      • Detection of external attacks aimed at interference in the technological process and other important areas effecting the safety.
      • Detection of insiders attempting to come round the information security system.
    • Assistance in verification of alarming events and control of decisions made by operators:
      • The output of complete information about the incident in order to correctly assess the situation.
      • Events combination related to a single situation treated as a single incident.
      • The ability to switch quickly between incidents, with easy visualization of completed and non-completed tasks.
      • Automation of attracting physical security forces, assigning them jobs and immediate transfer of information required for search and detention of the trespassers without delay.
      • Automatic and automated hazard level assignment to incidents with priority processing of the most dangerous incidents.
      • Radio wire integration and alerts automation.
      • Operators’ work control, identifying deviations from incidents’ reaction rules.
    • The complete analysis of incoming signals:
      • Alarm signals’ hazard evaluation based on statistics analysis.
      • Detection of unusual user activity when using ACS (for example, the arrival of the chief engineer or the head of a hazardous industrial machine at night could indicate a pre-emergency situation).
      • Detection of broken or blocked alarm annunciators.
      • Complete analysis of non-alarm signals in order to predict a dangerous situation or the development of an incident according to a dangerous scenario.
    • Planning the alignment of security forces, management and control of security staff:
      • Creation of available resources (workforce and means) database.
      • Stationary points’ arrangement on the map and plans, identification of the boundaries and routes of moving posts, work schedules appointment for posts, arrangement of additional posts for the regime of increased security.
      • Resources binding to posts for full-time and heavy security regime, the adequacy assessment of existing forces and resources.
      • Providing information on the current use of resources, displaying the location and status of forces and resources, assigning tasks to them.
      • Integration of radio digital system.
      • Using a multi-function safe mobile device.
      • Detection of violations in the guard force’s work: excommunication from posts, non-compliance of patrol schedules and routes, untimely performance of tasks, deviations from instructions.
    • Security levels’ management for instant switching of technical means and human resources in the regime of increasing security:
      • Regime of increasing security activation and deactivation.
      • Creating a database and an order for engagement of additional forces and resources in the regime of increasing security.
      • Patrol routes and schedules’ changing and monitoring compliance.
      • Expansion of areas controlled by video detectors, radars and other detection equipment.
      • Automatic build up of control of access and on-site mode with increased security.
      • Activation control of additional workstations of transport security equipment, redistribution of information output to the workstation.
    • Reduction of the enterprise’s losses and the control of the construction works’ progress:
      • Detection of violations on receipt, shipment and movement of the inventory by vehicles, integration with ACS, ACS resource management, weight, satellite monitoring of transport.
      • Control of crossing the enterprises’ territory by railway transport, the identification numbers of railway wagons and tanks, checking with train’s wagon lists, railway tank innage level control.
      • Reference to contracts issued to people and vehicles of contractors.
      • Identification of violations and prerequisites for the failure of construction deadlines.
      • Binding entries of contractors’ vehicles to contracts with the nature of the imported goods’ selection from the list.