How Can Organizations Use Technology for Crisis Management & Recovery? [5 Ways]

Public crisis incidents often occur with little warning, may escalate rapidly, and can have a wide-reaching impact on society for years to come. The global outbreak and spread of the COVID-19 coronavirus, for example, has created significant business challenges for virtually every organization, both public and private. 

Amid an unanticipated public crisis, business leaders may find themselves facing some tough decisions. They must act quickly to protect the well-being of their organization’s people, customers and assets; and decisively to manage additional risks to their business’s day-to-day operations.  

Converged Security & Information Management, or ‘CSIM’ platforms use technology to facilitate and enhance traditional crisis management strategies. CSIM pulls critical data from disparate security devices and tools across your organization into a single, unified operating picture. This empowers leaders to take effective action to mitigate even the most complex security threats, allowing your business to maintain operational continuity throughout a crisis, and make a faster recovery once the incident is resolved.  

Here are five ways CSIM can support business continuity and crisis management efforts before, during and after an incident:


  1. Providing Situational Awareness and Visualization Capabilities:
    CSIM solutions provide a real-time view of macro-level data, allowing operators to monitor multiple, critical information sources such as news media feeds, outbreaks of violence, or illness and severe weather alerts across an area of interest. When coupled with information from connected physical security inputs, such as cameras and sensors, operators gain a complete picture of the evolving security landscape. 
  2. Intelligently Managing and Automating Workflows:
    Dynamic action response plans, based on either user action or external input, can be configured to automatically trigger actions such as distributing mass communications ( via email, SMS, VoIP, etc.), locking down a facility or dispatching response personnel per the policies and procedures of the organization. 
  3. Enabling Remote Operations and Mobile Situation Awareness:
    A thin-client CSIM platform, like Vidsys Enterprise, runs on modern web browsers. This provides rapid access to the platform from remote and/or temporary locations as well as for organizational stakeholders who may only need to access the platform during the crisis.
  4. Supporting Organizational Resilience and Business Continuity:
    Many CSIM platforms offer support for high availability and disaster recovery measures that help organizations maintain critical functions after an emergency or disruption. 
  5. Facilitating Situation Management across Multiple and Disparate Sites:
    CSIM platforms that offer global dashboard views with access to events managed by both local and regionally deployed assets give even the largest and most widely dispersed organizations total visibility across their entire enterprise.


Combining a reliable CSIM solution with emergency preparedness and business continuity planning strategies can help organizations both maintain the safety and security of their employees and facilities as the situation continues to unfold and to prepare for a successful return to normalcy.

Want more tips on using converged security for crisis management and recovery? Check out our 4-page guide for organizational leaders and stakeholders:



Vidsys Enterprise 2020R2 - Spanish UI updates

Vidsys Enterprise 2020R2: improved video replay controls, auto reporting + more [release notes]

Our Release Notes blog series highlights new features and platform enhancements to help you learn how to get the most out of the Vidsys Enterprise platform. Want to see our comprehensive CSIM platform in action? Watch a quick demo now.


What’s New in VE 2020R2?

New and improved video replay controls

Updated automated reporting capabilities

Better support for Arabic and Spanish language users

User-friendly updates to the Situation Assignment controls


New automated reporting capabilities

New report options have been enabled for automated email distribution – you can now configure a total of 17 reports. With this update, System administrators can now receive “System Inventory Reports” to monitor their system size with ease, while shift supervisors can set up “Successful Logins and Logouts”  and other audit data reports to monitor operators’ system use and other key data points.


Vidsys Enterprise 2020R2 - EBI auto reporting


Improved video replay controls

The appearance of the video playback control bar has been updated for all Vidsys Enterprise video connectors. The tool now closely resembles the Synchronized Playback Studio controls, providing operators with a more consistent set of controls throughout the application.

The new control bar also features an updated timeline display and improved sliding scale controls while maintaining access to existing variable speed playback options.


Vidsys Enterprise 2020R2 Arabic UI updates


Extended foreign language support [Spanish & Arabic language users]

Vidsys Enterprise 2020R2 provides a smoother experience for global users with significant updates to both the Arabic and Spanish language interfaces. The Situation Awareness user interface in native Arabic locales now fully supports right-to-left (RTL) display as well as a full Arabic translation of all content and functions. Further development of RTL support in the Situation Summary and Situation Management windows is already underway and will be available in a future release version.

The Vidsys Enterprise access control functionality now also includes a Spanish language version. Both the Badge Trace and User Activity search windows now automatically display in Spanish when accessed by a user with a Spanish input locale (or an associated localized variant, such as a designated user based in a Spanish speaking country.)


Vidsys Enterprise 2020R2 - manage situation assign


Situation assignment control improvements

Control improvements allow you to prevent operators from modifying a situation assignment so that situations must be completed by the assigned operator/user group unless reassigned to another operator/group by an operator with sufficient permission rights. This feature prevents operators from declining and returning situations to the backlog instead of completing the assigned task.

Operators without sufficient account privileges to will be unable to access the Situation Summary or Management window’s Situation Assignment controls. The new capability is facilitated by the introduction of a new permission called “Manage Situation Assignment.” This new permission level complements the existing “Manage Assignment of Situations assigned to user/group.” When both permissions are enabled, a user can view, respond and manage situation assignments and is granted permission to assign tasks to both individual users and user groups.


To learn more about any of the new features included in Vidsys Enterprise 2020R2, head to our customer support page to schedule a live demo with one of our converged security experts. Or, if you’re ready to take your knowledge of Vidsys Enterprise to the next level, register now for an upcoming Certification Training session.

What happens when logical and physical securities converge?

Managing security is tough. It’s not just because the stakes are getting higher while the resources are getting tighter.  The plethora of tools needed and skills required are overwhelming. Not to mention the pressure of validating threats in real-time to minimize oversight and false alarms.  While cyber and physical breaches may be different in nature, they both warrant attention. With so much data coming in fast from everywhere: CCTV, sensors, network infrastructure, social media, alarms, access control, utilities, etc., security professionals need an automated way to get that 360 picture in real-time regardless of the threat origins so risks can be managed holistically.

At IFSEC 2019, a premier security conference which took place in London just a month ago, the topic of ‘Converged Security’ took center stage. “Change is the only constant, and the way to deal with that is by converging physical and cyber security, which have operated in separate silos in the past,” said Sarb Sembhi, certified information security manager (CISM) and CISO at Virtually Informed.  “To cope with the constant changes in the world around us, we need bring physical and logical security together in a single security operations center (SOC) to provide a single view,” he added.   The vision of a converged SOC is now a reality as demonstrated at the conference.



Note: this post originally appeared on Micro Focus’ IM&G community blog. 


Intelligent GSOC is a joint solution developed by Vidsys and Micro Focus that combines data aggregation, analytics, workflows and visualization into one easy to use platform. Join us at the upcoming Global Security Exchange (GSX) conference, September 10-12 in Chicago. Stop by Booth #242 to learn more about how this solution can help your organization simplify situation and risk management; or visit our Events Page now to schedule a live 1-on-1 demo with a Converged Security expert during the show!

integration & connectors blog series

Integrations & Connectors Update: X-Ray Proxy, NVR and More…

The Vidsys team is excited to announce our latest entry in our blog series – Integrations & Connectors Update – where we highlight new connectors and integrations that are available for our technology platform. Our Converged Security and Information Management (CSIM) software can integrate with any type of software or physical hardware technology.

The following connectors have been added to our library:

  1. Smiths XRax (X-Ray Proxy)
  2. Transas AIS (AIS/Vessel Monitoring System Proxy)
  3. Motorola Vicon Valerus (NVR Connector)
  4. GE Cimplicity (SCADA/HMI proxy)


Using Vidsys’ CSIM Platform, security organizations can integrate and analyze information from traditional physical security devices and resolve situations in real time.

Vidsys offers a growing list of connectors that enable integration between the Vidsys CSIM platform and other industry-leading converged and physical security products.

If you would like to learn more about these or any of our other 355+ integrations, contact us for more information or to schedule a live demo.


This entry is part of a blog series on Integrations and Connectors. You can revisit previous entries here

Intelligent GSOC and More: The trends that shaped ISC West 2019

The ISC West 2019 Security Conference at the Las Vegas Sands Expo might be over but we are far over from reeling under its effects. Some of the best technologies came together to exhibit and thousands of interested prospects wanted to get a bite of the security experience. This year Vidsys partnered with Micro Focus, a company that specializes in artificial intelligence and machine learning analytics, to develop a live demo of our joint ‘Intelligent GSOC’ offering. The innovative solution was on display at multiple pods in our co-sponsored booth and gave visitors a first-hand look at what an AI-powered, Intelligent Global Security Operations Center (GSOC) would look like. The demonstration showcased some of our best use cases while at the same time gave us a chance to hear from prospects directly and discuss their specific needs. Below is a compilation of the trends that the market is looking to accomplish in the near future.

Intelligent GSOC

The Global Security Operation Center (GSOC) was a hot topic at ISC West. Working jointly with Micro Focus, Vidsys leverages the external data sources in gathering ‘extra’ intelligence about an event, individual or specified area and enhance the overall situational awareness capabilities of a security officer or operations center. The ‘Intelligent GSOC’ is an extension to a regular GSOC environment where operators have traditionally used physical security systems to gather actionable intelligence of a situation or event. When it comes to investing in a GSOC, companies can derive real value by converging all the systems available through Vidsys’ CSIM platform to benefit the entire organization in the long run.

Video Analytics

Another trend that we witnessed this year, and what many prospects seem to desire in their security environment, was an increased focus on analytics. Having a way to automatically detect suspected individuals outside a corporate campus using facial recognition technology and get extra information about their recent past activities in the online world is a game changer. Our live demo at ISC West effectively showed how a converged system could utilize and apply video analytics tools in a real-world setting.

New CSIM Markets

With security needs constantly emerging and changing, there isn’t a clear native CSIM solution in Australia and New Zealand that can meet and fulfill all the region’s requirements. Oceania is predominantly served by vendors, consultants and system integrators that are looking for a holistic solution to meet their client’s security challenges. After discussions with key regional players at ISC West, we believe there are a lot of opportunities arising in the region. Our experiences at the show confirmed that the capabilities of our CSIM solution go above and beyond what’s currently being offered in these markets.

RSS and Social Media

Social media has become an increasingly important aspect of everyday life. From Facebook, Instagram to Twitter, we receive social media data in many forms. This data can absolutely be leveraged to enable better situation management. During the show, we had several inquiries about the ways in which our software platform utilizes Social Media data. Vidsys successfully demonstrated how our software platform incorporates RSS and social media alerts into its platform, correlates this data and serves as a proactive alerting security system that companies today in the ‘social age’ can easily rely on.

VE2019 Release 1.1: Accelerated performance and enhanced operability delivered in latest release of Vidsys Enterprise 2019

Security operators are responsible for managing hundreds of security situations each day. In order to effectively manage security operations, they must prioritize the highest risks and react in a timely, efficient manner. The latest version of Vidsys Enterprise 2019, VE2019R1.1, offers enhanced performance and operability to help operators better manage the everyday complexities and challenges of their job.

Improved Data Organization Capabilities

VE2019R1.1 automatically sorts situations, pushing the newest, incoming situations to the top of each respective severity group. The logic holds true regardless of how the data columns are sorted or the number of times the operator re-sorts the data. Additionally, the RiskShield page now displays a progress animation each time it sorts and reloads incoming data. This new feature allows operators to quickly identify the most recent situations.


Enhanced UI Stability for Large Enterprises 

As enterprises scale, security operators often find

themselves tasked with covering an increasing number of incoming situations from multiple sites. However, as the number of sites in an enterprise grows, operators may expect to experience some degradation in UI performance. VE2019R1.1 combats this issue by allowing users to set default and maximum caps on the number of situations loaded in the summary window. This simple, enhanced design and configuration change will help teams see a marked improvement in UI performance.

You load situations on-demand and the Vidsys client does the heavy lifting of loading and sorting situations instead of the server.

On a given day, your supervisor reaches out to you asking for a report on the usage of the top 10 video management systems being used in the enterprise over a period of time. He needs to justify the ROI for procuring these systems and determine if there is an alignment with the company’s overall security strategy. In addition, he is also looking for a report that would show him how many operators are actively using the Vidsys system. Look no further!

Enterprise Business Intelligence Reporting

Many organizations are not only interested in improving and simplifying security situation management but want to know how their enterprise security software contributes to the company’s overall security strategy and provides a quantifiable ROI.

The Enterprise Business Intelligence (EBI) reporting package released as part of VE2019R1.1 includes new reports that offer better insight into the ways your business uses Vidsys Enterprise. The updated EBI tool visually displays information in real-time via an easy-to-use reporting dashboard and includes common format report export options such as PDF, Excel and Word. Additionally, several existing reports, including “User Login” and “Managed Asset Audit Properties” reports have been updated to better suit customer needs.



To learn more about any of the new features included Vidsys Enterprise 2019 R1.1, contact your account manager or contact us to schedule a demo »

Detect. Solve. Protect: Harnessing the Power of an “Intelligent” Security System Solution

Imagine you are in charge of the day-to-day security operations for your company. You are responsible for overseeing a team of security officers, each of whom is equipped with a body camera. As the officers do their rounds, the bodycam collects video feed from the vicinity and sends it back to you in the Security Operations Center (SOC).

One day, while one of your team’s officers is out on patrol, his camera picks up a familiar face. After analyzing data received from both the physical camera feed and the company’s employee database, your intelligent security software identifies the visitor as a former employee. The software automatically creates an alert in the Security Operations Center. This alert provides information about the former employee, including details about their recent involvement in some criminal activity, and some threatening comments about your company that have recently been posted to their social media accounts.


Vidsys’ Converged Security & Information Management Platform


The information gives you more insight into the ex-employee’s visit. With this valuable knowledge in hand, you infer that the former employee may have a malicious motivation for returning to the office. The alert provided by your enterprise security software also contains an automated action plan, allowing you to quickly respond to the potential danger. You immediately contact the nearest security officer and update her on the situation. Within a few minutes, she has successfully tracked down the suspect and apprehended them for further questioning. You have successfully avoided what could have been a major security breach.

Now imagine you are tasked with actively monitoring a large sporting event. Your enterprise security software picks up an RSS or social media alert about a protest that is getting underway near the stadium. The alert informs you that a local group is organizing the protest. You run a keyword search against the software’s vast external database-pool and discover a document on the organization’s website that details the group leader’s extremist rhetoric and possible involvement in a recent bombing attempt. This information indicates that the protest could be a ploy for terrorist activity. You inform your supervisor of the threat and get in touch with on-the-ground security staff. Using the security software’s facial recognition capability, you identify the last-known location of the suspect – just a few yards away from the stadium. You communicate this information to mobile responders who quickly spot and apprehend the suspect, eliminating the imminent threat.


The technology behind these scenarios is made possible through a joint security solution developed by Vidsys and Micro Focus. Vidsys’ Converged Security and Information Management, or “CSIM” software is a powerful platform capable of collecting and converging data from disparate physical and digital security systems. It works together with Micro Focus’s AI software, which uses machine learning to quickly analyze large amounts of data produced by these various systems, as well as query external data sources around the web to determine correlations that may be critical to enterprise security management. Together, these tools create a more intelligent Security Operations Center (SOC) by increasing the efficiency of human operators and streamlining overall security initiatives.


Join us for a live demo during ISC West. April 10-12th at the Sands Expo, Las Vegas, NV, stop by Booth #34091 to learn more about how Vidsys and Micro Focus are working together to tackle some of the greatest security challenges in the market today. Visit our event page to Schedule a Demo During the Show »



How AI turns CCTVs into Round-the-Clock Guards

Security operators tasked with monitoring multiple camera feeds have a very challenging job simply because they are humans. No wonder the United Kingdom’s Centre for the Protection of National Infrastructure (CPNI) recommends a 20 minshift for CCTV control room operators because of vigilance decrement, a common occurrence where attention decreases and oversight increases for tasks requiring intense and sustained attention. Threat scenarios vary so operators must also be able to react swiftly and appropriately. False alarms could be costly and missed detections could be deadly so control rooms are operating under tremendous pressure, which in turn increases the risk of errors.

How can Artificial Intelligence (AI) help? AI powered analytics can automate continuous monitoring and real-time detection of threats:

  • Physical area – Scene analytics can identify and classify unattended objects/vehicles and suspicious movement patterns. For example, an unattended clear glass bottle on a table in the middle of a room would be classified to have a risk profile, which is different from that of an unattended backpack at the corner next to a high traffic entrance.
  • Human – Face analytics can enable people counting for crowd traffic control and identity verification.  For example, a person on a watch list entering a public event can be identified and monitored.
  • Vehicle – License plates, makes and models can be read and referenced against a database. For example, suspicious vehicles w/mismatched plates can be identified.

Let’s look at one of the most common security breaches – tailgating. Basic courtesy of holding a door for a ‘fellow employee’ might lead to catastrophic consequences. With AI powered video analytics monitoring CCTV feeds from entrances, any individual whose image does not have a match in the authorized personnel database can automatically trigger an alarm. The unknown individual can be automatically enrolled for continuous tracking across the premise with other CCTV feeds to assist security intervention. While tailgating alone might not warrant a drastic response such as a lockdown, if there are other threats – unattended backpack at the corner of a cafeteria and a parked vehicle with a license plate registered to a terminated employee- detected within a short timeframe, it might lead to a different conclusion.


Note: this story originally appeared on Micro Focus’ IM&G blog.


Vidsys and Micro Focus are partnering together to bring Intelligent GSOC to ISC West 2019! ISC West is the largest US security event featuring the latest products, training and best networking opportunities in the industry. This year’s event will be held April 10-12th in Las Vegas, NV. Stop by Booth #34091 to learn more about how this joint solution can make a difference in your security operations. Visit our ISC West event page to schedule a live demo at the show!

integration & connectors blog series

Integrations & Connectors Update: Latest Versions of Genetec, Lenel, Honeywell, Software House and More…

The Vidsys team is excited to announce our latest entry in our blog series – Integrations & Connectors Update – where we highlight new connectors and integrations that are available for our technology platform. Our Converged Security and Information Management (CSIM) software has the ability to integrate any type of software or physical hardware technology with our system.

The following Physical Access Control System Connectors have been added to our library:

  1. Genetec Security Center v5.6 Synergis IP
  2. Lenel OnGuard 7.3
  3. Software House C*CURE 9000 v2.5
  4. Honeywell Pro-Watch 4.2

Using Vidsys’ CSIM Platform, security organizations can integrate and analyze information from traditional physical security devices and systems, and resolve situations in real time.

Vidsys ACS connectors integrate 3rd party Access Control Systems with the Vidsys Converged Security & Information Management (CSIM) software. This integration allows events detected by the integrated access control managed sensors and card readers to be relayed to and annunciated by the Vidsys CSIM platform.   It also allows CSIM operators to control discovered devices that are connected to the access control system.  The connector automatically maps the access control system event types to standard CSIM Situation types and translates Vidsys CSIM software command syntax to that of the third-party access control system.

CSIM operators can also easily display the access control history and location of any badged holder configured within the access control system. The Vidsys operator needs no specific card holder information and simply searches using part of the card holder’s name. An up to date list of results is displayed directly within the Vidsys user interface. Alarm logs for devices can also be accessed.

Vidsys offers a growing list of connectors that enable integration between the Vidsys CSIM platform and other industry-leading converged and physical security products.

If you would like to find out more about this integration or other integrations, contact us for more information or a demo.


This entry is part of a blog series on Integrations and Connectors. You can revisit previous entries here

DP-London Gateway

International London-Based Port Turns to Vidsys

Vidsys customer, DP World London Gateway sea-port, was recently interviewed by Security Management Magazine’s Podcast about its comprehensive security program, which is integrated and managed by Vidsys’ Converged Security and Information Management (CSIM) platform.

London Gateway Harbour Master & Head of ISPS Security, Colin Hitchcock, was tasked with finding a new integration and management platform that could pull in numerous physical and IT security sources and create an intelligent situational awareness platform.

“When looking for a system, I asked myself ‘Are they flexible and can they alter the platform to fit our needs?’” That’s why Hitchcock was thrilled when they found Vidsys.

CSIM is an integral part of London Gateway’s security system, and recently helped expose port intruders. The situational awareness system worked exactly as planned when the situation went from hypothetical to reality.

A Vidsys end-customer since 2016, London Gateway has also partnered with Vidsys on recent expansion projects. The trade-enabling port operator selected Vidsys due to its open platform architecture and vast agility for future growth and innovation while being able to manage all sensors and systems from one unified view.

The port is a 2 square mile area surround by an 11-kilometer fence line, creating a massive infrastructure to be monitored and managed. Through highly automated technology, Vidsys helps the port run all data through a 24/7 Security Control Room, with a separate control room reserved for elevated security alerts. A particular feature of the CSIM platform that the Hitchcock uses frequently is the innovative smart reporting capability.

“We chose Vidsys due to its constantly forward-thinking approach to innovation and security,” said Hitchcock. “Through the Vidsys platform, we are able to extend our ability to monitor the port, our assets, and increase the efficiency and effectiveness of our security program.”

Vidsys CSIM also helps DP World London Gateway integrate Access Control, CCTV, Perimeter Intrusion Detection (PIDS) as well as Fire detection and Building Management and custom reporting capabilities. Vidsys meets all compliance standards and adheres to various security standards, including the International Port Security Code and Homeland Security protocols.

You can listen to the full Security Management podcast interview here.