Posts

Vidsys Launches Enterprise Mobile App for iOS and Android Devices

VIENNA, VA – August 28, 2019 – Vidsys, the leading global software technology manufacturer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software, today announces the launch of its mobile app for Apple iOS and Android devices – Vidsys Enterprise Mobile.

Vidsys Enterprise Mobile provides enterprise-level situational awareness using real-time live and recorded video playback from compatible integrated video management systems. Users are able to access up-to-date information from mission-critical security devices and systems anytime, anywhere, using the app on any compatible iOS or Android device.

“It’s vital that the increasingly mobile workforce has access to tools that enable them to quickly and efficiently respond to critical events,” said Vidsys President, Maurice Singleton. “Anyone who works in security knows that threats don’t adhere to a 9-5 schedule, so monitoring and defending against malicious actors requires 24/7 connectivity. With the launch of Vidsys Enterprise Mobile, users are able to promptly respond and investigate within the app, giving them peace of mind when on the go.”

 

Vidsys Enterprise Mobile Interface

 

Key Features of the App Include:

  • Ability to stream live and recorded video from multiple Video Management Systems (VMS)
  • Multiple camera display layouts
  • Pan, tilt and zoom controls
  • Video playback controls
  • Option to save in-app snapshots directly to camera roll
  • Support for active directory and local Vidsys users
  • Support for native multi-app split screen
  • Supports Wi-Fi, GSM and VPN connections

About Vidsys

Headquartered in Vienna, Virginia, USA, Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals including Transportation, Energy, Utility, Healthcare and Government. Vidsys software has obtained the highest levels of information security and assurance from both top-tier global corporations and the US federal government.

Vidsys is hardware, protocol and device agnostic and offers bi-directional, a browser-based platform with industry-specific features and functions that allows sensors, devices, systems, subsystems, and services to be interconnected via APIs and SDKs. The platform collects, correlates and converts vast amounts of data into meaningful and actionable information, based on the organization’s risk policy, standards and compliance requirements. By leveraging mobile and web-based technology, the software can be rapidly deployed and provides real-time situational awareness and information management capabilities.

 

 

What’s Next for PSIM? Converged Security Gives Rise to CSIM

Over the past 10 years, Physical Security Information Management (PSIM) has evolved tremendously outside of categories such as Video Management Systems (VMS), Access Control and Intrusion Detection, and companies worldwide have been using PSIM capabilities as a way to differentiate. Fast, integrated platforms offering real-time data and quick-reacting security solutions lay the foundation for this new digital movement. But as the security market continues to grow more crowded, creating reliable value-adds is an ongoing challenge for both vendors and integrators.

Legitimate PSIM is intelligent software that converts massive amounts of data into meaningful and actionable information by filtering and correlating the data based on time, location, duration, frequency, and type, and according to recent research, is estimated to be worth 112.43 Billion USD by 2021. While the definition of PSIM is often misunderstood as an integration platform or a command and control platform, the true nature of PSIM enterprise software is its capability to connect to other systems and subsystems including sensors and security and non-security related devices.

As PSIM has gained awareness globally, the demand for the software has increased and is driving large-scale projects, including many requests from U.S. federal government agencies. With customer and business process needs constantly evolving, software platforms must advance as well.

As innovations in PSIM continue, the platform has started to naturally shift towards a new platform, Converged Security and Information Management (CSIM).

CSIM extends software abilities beyond physical security by capturing and correlating data from multiple IT-security systems and information management systems. With capabilities for large-scale, widely dispersed customers, this advanced platform can be leveraged to support Smart City and IoT applications, in addition to a variety of use cases such as supply-chain systems, building management, logistics management, and manufacturing. CSIM can support customers globally where enhanced Enterprise Data Visualization and Enterprise Business Intelligence are integral features for reporting in real-time. Overall, the capabilities go beyond security and risk management by offering insights that can drive intelligent business decisions.

As the transition from PSIM to CSIM continues, there is a more formal cooperation between previously contrasting functions like physical security and IT security, and a substantial union between CSOs and CIOs has formed, encouraging organizational and operational convergences to align. In order to become more efficient and reduce risk to the organization, merging functions involves both process and accountability, accomplishing true business integrations around risk and compliance.

The shift to CSIM software can be leveraged globally by organizations and multi-site enterprises to garner beneficial, real-time situational awareness and management abilities, and can consolidate big data analytics tools, social media, and other intelligence inputs and tie in internal challenges with external threats. Now, enterprise leaders can have an extensive understanding of where threats are happening and their potential impact, allowing a more precise understanding of when and where crucial resources may be needed.

Interested in learning more about a CSIM solution for your business? Check out the Vidsys CSIM solution here.

Three Security Trends Poised to Take off in 2018

The past year has been a difficult one for those handling security in global enterprises – in fact, there was at least one major hack, breach or security flaw each month of 2017. With the surge of cyber attacks, ongoing weather catastrophes, global tensions, mass violence and terrorism, security plans have been put to the test to ensure business continuity and employee safety. As organizations adapt to handle a wider assortment of challenges and risks in 2018, we are sharing three trends that will impact organization security plans this year.

Move beyond “real-time monitoring” – Almost all companies spend time monitoring for risks in real-time for physical and cyber security. It is time for companies to invest resources in an effort to assess this gathered information and switch from a reactive approach to a proactive approach to better understand and manage operational risk.

Simplified security solutions – With each security breach, companies have a chance to learn valuable information and create greater awareness about the importance of comprehensive security programs. Learning from events like the Equifax breach that could have been prevented – if Equifax had fixed the security flaws that they previously acknowledged – organizations must learn to explain technical security concepts more simply so that employees and the general public will be more likely to follow safe security practices.

Companies will Lean on Smart Security Technology – A lack of skilled security specialists will prove the increasing need for smart technology that can help pull together data from various disparate security platforms and facilitate data analysis. As organizations find that security roles are more difficult to fill, technology will play a crucial role in filling the gaps. A centralized dashboard can allow a single security decision maker to increase their effectiveness through automating certain tasks and data analysis through rules and regulations set by each individual business.

Moving forward into 2018, organizations should be fully prepared for any security issues that arise. Although discussing security plans can be a difficult task, conversations must take place to transition into a proactive year, rather than another reactive one.

If you’re looking for a comprehensive, browser-based and easy-to-install security platform that leverages your existing resources to make your security solution smarter, contact Vidsys here for a free consultation.

Micro Focus Guest Blog: Faster And Better Decisions With Real Threat Awareness

Vidsys is partnering with Micro Focus for our Intelligent GSOC at the ASIS 2017 Conference next week. As we count down to ASIS, we’re sharing this blog post from Joe Leung, Micro Focus Analytics Marketing Manager, about generating real-time, data-backed decisions in response to threats.

“If only I knew that” is probably one of the most dreaded phrases to be uttered. This is especially true in the world of security where the stakes could be unimaginably high. Decisions such as locking down a school campus, shutting down a major event, or closing an airport terminal are serious ones with significant consequences. These consequences vary as they depend upon how quickly such a decision is made, and how effective the decision is in mitigating the risk. The challenge is to get as much relevant information about the threat as quickly as possible. So how do we tackle this information trinity – comprehensiveness, relevancy, timing – in security decision making?

Comprehensiveness – Are we tapping into all the data sources available to us so a real understanding of the threat can be established? CCTV is a well-established source where a diversity (human, vehicle, scene) of images may be available for threat analysis. Are we taking full advantage of all these different types of images? What about audio sensors? Would the sounds of glass breaking, people screaming or gun shots indicate a higher level of threat? What about communications in public (protest organization in social media) or in private (threatening email messages)? Would these communications be another critical piece of the threat puzzle?

Relevancy – Find what truly matters from the noise in the face of massive volume of diverse data is daunting. While a truck parked illegally may just constitute a minor traffic infraction, if the license plate does not match the make and model of the truck, and the truck driver’s face matches a picture on a watch list, these three individual incidents collectively provides highly relevant information that may call for a security response, which could be very different from responses for the individual incidents.

Timing – In a world where every second counts, any delay may mean a rapid escalation of potential carnage and/or damage. While it is hard to argue against the need to get all the relevant data for an intelligent decision, the disparate data sources, the varying data formats and the tsunami-like data flow are overwhelming the traditional human operator centric surveillance systems. Not only does the system have to spot a real threat in real-time, it must be able to alert the appropriate parties so the responders don’t miss a beat in addressing the threat.

The partnership between Vidsys and Micro Focus (formerly Hewlett Packard Enterprise) is laser-focused on addressing ALL of the above in one joint solution so security operators don’t have to compromise on either speed or effectiveness of their actions. If you are attending ASIS 2017, please register here to attend a reservation-only briefing on the big data analytics powered Intelligent GSOC, and to meet in-person the architects behind the solution.

See the original post on the Micro Focus blog here, and if you’ll be at ASIS, make sure to sign up to come to one of our demos here.

ASIS 2017: 3 Steps to Create an Enterprise Security Risk Management Program

At ASIS, one of the key themes will be how global organizations can create an effective security risk management program. But where should they start?

Businesses today are faced with a multitude of risks due to the complexity of technologies, regulations, system vulnerabilities, security threats and more. As your company’s information flows through networks, applications, databases and servers, it must be readily available, free from tampering and confidential to those only with authorized access.

To manage this complex environment of information, installing an intelligent software platform can convert your large amounts of unorganized, unstructured data to valuable, actionable information through correlations based on time, location, duration, frequency and type. An enterprise security risk management program should have the ability to integrate to other systems and subsystems, so that the software enables users to focus on managing situations rather than managing disparate technologies.

When implementing an enterprise security program to benefit your entire organization, follow these 3 steps for a holistic approach to IT security.

1. Prepare for challenges

Vulnerabilities, risks and threats all pose potential complications and can serve as a source of danger to your company’s information assets. Weaknesses or flaws in the system can lead to a security breach and can exist not only in technologies, but in people and business processes as well, and risks, such as loss of network connectivity, can result in devastating outcomes for your business. To prepare for these challenges, list out and categorize pertinent threats, assess vulnerabilities based on potential impact to the company, and prioritize risks based on likelihood and impact.

2. Manage outside your business

An enterprise security risk management program often entails dealing with third parties like vendors and suppliers. It is crucial for businesses to select trustworthy third-party companies, as those with unsecure networks or corner-cutting practices can create vulnerability and subsequent security threats. Be sure to know what security measures these companies have set in place, list out all of the third-party companies your business deals with, and then prioritize based on information overlap and criticality.

 3. Enable security controls

Effective IT security includes non-technical controls set in place for management and operational protocols, and technical controls implemented as a safeguard incorporated into hardware, software and firmware. As CIOs begin to establish these security controls such as deciding which monitoring and filtering technologies to purchase, they must work with other parts of the company to make business decisions collaboratively as the technology will have an impact on employees and processes.

As an organization’s ecosystem of information grows increasingly complex, information security becomes a critical factor to the entire company. By implementing a strong enterprise security risk management program, your entire organization will benefit.

Want to talk with one of our in-house security experts? Come to our Intelligent Global Security Operations Center demo with Micro Focus. Learn more and sign up here.

OnSSI VMS integrates with Vidsys CSIM

Below is an excerpt from SP&T News Online’s coverage of our latest integration with OnSSI.
OnSSI continues to expand the versatility of the Ocularis 5 Video Management System (VMS) via integration with Vidsys’ Converged Security and Information Management (CSIM) software. The integration allows operators to respond to events more quickly and effectively while enabling more accurate and efficient post-event investigation.

“The combined power of OnSSI’s Ocularis VMS and Vidsys’ CSIM solution provides operators with situational intelligence that enables faster, more effective responses to security events,” said Mulli Diamant, vice-president of international business development, OnSSI. “Additionally, this integration is quick and easy to deploy and use, streamlining video surveillance and CSIM functions to deliver heightened situational awareness and improved overall security.”

Built on the Vidsys Ocularis Connector, this integration supports multiple versions of Ocularis, including the latest version (5.2.1), allowing CSIM operators to view real-time and recorded video from within the Vidsys software. Video can be displayed in response to manual user selection and can be automatically displayed when an event is detected and reported by CSIM-integrated access control, intrusion detection or other systems.

“By combining our Vidsys CSIM platform with Ocularis, we are able to deliver a scalable, end-to-end security solution in an intuitive, easy-to-use format that makes event response times both faster and more efficient,” said James I. Chong, CEO and founder, Vidsys. “We are extremely pleased to have worked closely with OnSSI to continue our partnership, and deliver this powerful and innovative integrated solution.”

Read the full article on SP&T News here.

How Corporations Can Manage Campus Security Across The Globe

Corporate campuses present a unique and ongoing security challenge. Organizations must manage localized, detailed processes in addition to a diverse ecosystem of technologies such as access control, identity management, mass notification, video surveillance, inter-campus communications and business intelligence. Many corporate campuses consist of large groups of close-proximity buildings that host employees as well as sensitive customer and financial data, which can lead to concerns about security tactics. Organizations must monitor a multitude of risks, including insider threats, natural disasters, terror attacks, cyber-attacks and intellectual property theft. To add to this growing data collection and analysis, corporations must also be aware of activities taking place in the surrounding areas near the campus location. In situations where time is of the essence, it is imperative that a potential crisis be quickly recognized so that appropriate responses can immediately be deployed.

 

Vidsys’ Converged Security and Information Management (CSIM) software platform is equipped to address these needs and more. Our integrated platform allows us to seamlessly incorporate our software with a company’s specific compliance standards to make the organization run more efficiently and securely. Operating through an open architecture platform that uses a browser-based interface to share information, Vidsys creates a common operating picture across security systems, building management systems, and IT systems—all of which are major components to keeping a corporate campus operating smoothly and securely.

 

The updates included in the newest release of our CSIM software platform, Vidsys Enterprise 2017, are especially relevant for corporate campuses. The capabilities go beyond security and risk management by offering insights that can drive intelligent business decisions.

 

First, through Virtual Situation Management (VSM), corporations can keep track of their various locations in real-time, as the software is intelligent enough to read specific business “situation” requirements. A situation is created when input data based on specific organizational criteria is flagged as a risk. This could be through video footage or sensors at a corporate campus entry point, monitoring suspicious behavior at a large event, or tracking access to classified areas or data through identity management. The new enhanced situational awareness afforded by these capabilities enables organizations to better manage situations across their enterprise anytime and anywhere. This is a major boon for corporate campuses responsible for managing operations and offices in multiple locations around the globe.
In addition, the Enterprise Data Visualization (EDV) component is particularly compelling, as it pulls in third-party open source data and correlates it to the organization’s internal data points. This means that risk data generated around the customer’s environment can be analyzed to notify organizations of potential impacts on their personnel, resources, facilities and brand. By pulling and correlating data from both open source technology and social media inputs, organizations can monitor unhappy customer or employee fodder via social media and take the appropriate actions to respond. It also allows enterprises to make adjustments at the corporate level to identify and rectify the situation.
Building off of this data, the Enterprise Business Intelligence (EBI) platform allows customers to pull all of this data through a single dashboard to assemble reports of the relevant, correlated data occurring within their organizations. Reporting is flexible and scalable to the end user, thus providing customers the ability to utilize data for resource allocation and budgeting and the support of operations including building management systems and supply-chain systems. For corporate campuses, this could identify problems with workplace and communication issues and flag questionable processes so that businesses can make educated decisions.
As companies expand regionally, nationally, and globally, having a corporate security platform that is flexible, mobile and intelligent will create a strong base for the company’s safety, efficiency, and success.

Explore Our Safe City Global Security Operations Center

This month at ASIS 2016 we presented the Safe City Global Security Operations Center (GSOC), a consortium comprised of industry leading companies with best-of-breed technologies, to showcase our integrated security and smart city solutions. The consortium included Hikvision, Hewlett Packard Enterprise, Salient Systems and Viscount Systems, and focused primarily on industry-specific use cases such as Public Safety, Corporate Campus Security, and Transportation. Through the demonstrations, we were able to show our partners and customers how our technologies are integrated to create a comprehensive solution.

In case you weren’t able to make it to the demonstration, we wanted to give you a closer look at what we showcased at ASIS, and how these solutions can impact your organization.

The Safe City Partners 2016-09-12-08-56-51-1

Hikvision

Hikvision provides the video cameras and hardware that we use to capture footage in real-time for analysis.

Hewlett Packard Enterprise

Hewlett Packard Enterprise (HPE) pulls and stores the copious amounts of data that we need in order to analyze and correlate the information to provide actionable insights to our clients.

Salient Systems

Salient Systems has a Video Management Software (VMS) platform that offers a “Complete View” feature that pulls footage from existing cameras to improve video management and forensic investigations.

Vidsys

Our Converged Security Information Management (CSIM) software monitors and manages physical and IT assets to collect, analyze, verify, resolve and track information.  The rules engine and workflow tools give management the ability to pre-determine what data should or shouldn’t be correlated using filtering rules based on time, location, duration, frequency and type. The software is programmed to identify and flag potential situations for the command center operator.

Viscount Systems

Viscount provides integrated security solutions that unify access control across physical and digital platforms.

Step Into the GSOC

vidsys-operations-center-2What does a Safe City look like? Here are a couple of examples from our demonstration:

The concept of a Safe City is built on the premise of security technology combined with a Smart City infrastructure, which includes technology, sensors, and integrated data connectivity. The building blocks of a successful smart city are public safety and security as well as transportation infrastructure.

Smart Mobility and Transportation are driving growth for cities. For example, the City of New York launched a program to improve its wireless communications to help with public safety, and the infrastructure is now available for smart city concepts to interconnect all of the city traffic lights and share this data with a central hub to improve traffic flow and driver safety. When it comes to smart transportation, it means having the ability to collect fares more efficiently and provide advanced warnings to citizens of a potential accident or emergency in train or metro stations or on the road.

Smart Security & Safety

In the case of an emergency, a strong technology platform infrastructure is essential for city governments and organizations. Creating a proactive response plan and GPS and location-based assets to improve response times will make law enforcement, government officials and citizens better prepared. In order to make the most of the data (from video cameras and sensors, entry access ID, geospatial mapping, social media, etc.), data correlation is key. This is where our technology is able to provide the best, most useful insights and alerts to our users in order to better inform decision makers and provide response plans during major events.

Overall, the Safe City GSOC at ASIS was a huge success, stimulating important discussions about the need for Safe City infrastructures across the globe. We look forward to working with our partners to bring this demonstration to other conferences in the future as well as presenting some of the exciting projects we have underway.

Safe City Technology Consortium to Launch at ASIS 2016

This is an excerpt of an article announcing Vidsys’ Safe City Consortium and Global Security Operations Center Announcement at ASIS 2016. 

Vidsys, Hewlett Packard Enterprise, Hikvision, Viscount Systems and Salient Systems have partnered to create an integrated Safe City solution.

Vidsys, a provider of physical security information management (PSIM) and converged security and information management (CSIM) software, will launch the Safe City Technology Consortium with four other participating manufacturers at ASIS 2016 in Orlando, Fla.

The Consortium partners joining Vidsys include IT company Hewlett Packard Enterprise, video surveillance provider Hikvision, IT-centric access control provider Viscount Systems and VMS provider Salient Systems. The Consortium will showcase an integrated solution through the staging of a Safe City Global Security Operations Center (GSOC) demonstration during ASIS 2016.

The Safe City GSOC demonstration will leverage the integrated capabilities of the partner companies’ technologies combined with a CSIM platform to deliver real-world use cases and solutions, according to a news release.

“Demonstrating a scalable end-to-end solution that can be fully adopted and marketed by any of our systems integration partners reinforces the value of a converged security solution,” says James I. Chong, CEO and founder of Vidsys. “By engaging the ASIS audience in a more dynamic and interactive way, we plan to showcase the true benefits of a CSIM platform in a variety of applications, as well as the ability to expand beyond security and into Internet of Things.”

Read the full article on Security Sales & Integration here.

Why Social Media Is Key To Creating A Converged Security Platform

In today’s world, the power of social media is far reaching and significant, turning individuals into walking sources of data collection and information, with single messages or posts becoming accessible by anyone from anywhere within a matter of seconds. According to the annual Bank of America Trends in Consumer Mobility Report, 91 percent of U.S. consumers say their mobile phone is very important, just as important as their car (91 percent) and deodorant (91 percent), and significantly more important than television (76 percent) and coffee (60 percent).

When approaching safety and security, especially on a large scale, such as with enterprises, hospitals, special events or government campuses, many organizations look at the most obvious needs – physical security and cybersecurity – without considering a more converged approach that combines physical security monitoring along with IT. Even more surprising is that many organizations underestimate the power of using social media to track real-time security updates and events.

At Vidsys, we believe in implementing a converged platform that analyzes and correlates open source data with physical security data in order to provide a safe and secure environment. Below are a few of the advantages to this approach when handling emergency response situations

Faster

In the case of an incident, it is imperative to recognize the situation quickly so that the appropriate corrective actions can be implemented before it spins out of control. CSIM software makes this possible through an open architecture platform that integrates big data analytics tools, social media and other intelligence inputs to address both internal vulnerabilities and external threats. Quick access to the right data at the right time is key to addressing and resolving any situation.

Smarter

With CSIM, organizations can combine physical security with information technology to provide a more holistic evaluation of a security situation.  Sensor data, video data, identity and access data, GPS and geospatial data, and social media data are among the key sources of information from which to derive actionable intelligence. Formally integrating these previously disparate security aspects of the physical and IT components into a converged security environment is a natural evolution in our increasingly networked world.  This improved capability allows organizations to correlate data in a more efficient way.

Mobile

Mobile devices can also be thought of as sensors that can be leveraged in a security environment, enabling employees or social media users to both access and share data while also providing real-time, critical information. Employees can also send real-time updates to a larger group of people so that the closest responder to each group can act appropriately.

Actionable

A CSIM platform can convert both physical and open source data into meaningful and actionable information via business rules that correlate the data based on time, location, duration, frequency, and type. Financial losses due to a security incident can vary widely and it can be challenging to calculate in advance the financial impacts associated with loss of productivity, loss of customer business, legal fees and reputational damage.

Vidsys CSIM enabled a Fortune 50 company to maintain its security force head count even though it has doubled the size of its physical campus in the last five years. This company realized a 66% reduction in response time and a 50% reduction in false alarms from access control systems.  A major municipal transit agency using Vidsys CSIM saved millions of dollars by procuring security systems through a competitive bid process with multiple awards to multiple vendors. Vidsys CSIM’s open architecture enables end users to integrate multiple disparate systems from any brand, platform or device (such as social media) thereby increasing buying power and leverage on new projects.

As social media continues to grow and evolve, we are embracing these new capabilities and integrating them into our enterprise platform to create the best possible solutions to help our customers become safer, smarter, and more efficient.
Click here to request a demo to learn more about how social media can integrate with your physical security environment through Vidsys’ CSIM platform.