Vidsys Launches Enterprise Mobile App for iOS and Android Devices

VIENNA, VA – August 28, 2019 – Vidsys, the leading global software technology manufacturer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software, today announces the launch of its mobile app for Apple iOS and Android devices – Vidsys Enterprise Mobile.

Vidsys Enterprise Mobile provides enterprise-level situational awareness using real-time live and recorded video playback from compatible integrated video management systems. Users are able to access up-to-date information from mission-critical security devices and systems anytime, anywhere, using the app on any compatible iOS or Android device.

“It’s vital that the increasingly mobile workforce has access to tools that enable them to quickly and efficiently respond to critical events,” said Vidsys President, Maurice Singleton. “Anyone who works in security knows that threats don’t adhere to a 9-5 schedule, so monitoring and defending against malicious actors requires 24/7 connectivity. With the launch of Vidsys Enterprise Mobile, users are able to promptly respond and investigate within the app, giving them peace of mind when on the go.”


Vidsys Enterprise Mobile Interface


Key Features of the App Include:

  • Ability to stream live and recorded video from multiple Video Management Systems (VMS)
  • Multiple camera display layouts
  • Pan, tilt and zoom controls
  • Video playback controls
  • Option to save in-app snapshots directly to camera roll
  • Support for active directory and local Vidsys users
  • Support for native multi-app split screen
  • Supports Wi-Fi, GSM and VPN connections

About Vidsys

Headquartered in Vienna, Virginia, USA, Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals including Transportation, Energy, Utility, Healthcare and Government. Vidsys software has obtained the highest levels of information security and assurance from both top-tier global corporations and the US federal government.

Vidsys is hardware, protocol and device agnostic and offers bi-directional, a browser-based platform with industry-specific features and functions that allows sensors, devices, systems, subsystems, and services to be interconnected via APIs and SDKs. The platform collects, correlates and converts vast amounts of data into meaningful and actionable information, based on the organization’s risk policy, standards and compliance requirements. By leveraging mobile and web-based technology, the software can be rapidly deployed and provides real-time situational awareness and information management capabilities.



IFSEC Vidsys Webinar: Achieving near real-time risk management with a converged security centre

Today’s high-risk, myriad-threat security environment demands a converged security solution that consolidates monitoring of both physical and cybersecurity events within one, unified platform.

Organizations can thus leverage disparate data sources to effectively manage situations in near real-time without navigating multiple subsystems – including analytics and cybersecurity – and complete investigations and take appropriate actions promptly. Speed is, after all, of the essence in these situations.

In this webinar, you’ll hear from a panel of experts in converged security and enterprise security risk management. Panelists will discuss the concept, reality, and evolution of having both physical and cyber-security teams managing and collaborating in the same security operations center.


Roberto Mandanas, VP Strategic Marketing and Alliances, Vidsys

Sarb Sembhi CISM, CISO, Virtually Informed Ltd

James Willison MA MSyI, Founder, Unified Security Ltd

Host/Moderator: Adam Bannister, editor, IFSEC Global



What’s Next for PSIM? Converged Security Gives Rise to CSIM

Over the past 10 years, Physical Security Information Management (PSIM) has evolved tremendously outside of categories such as Video Management Systems (VMS), Access Control and Intrusion Detection, and companies worldwide have been using PSIM capabilities as a way to differentiate. Fast, integrated platforms offering real-time data and quick-reacting security solutions lay the foundation for this new digital movement. But as the security market continues to grow more crowded, creating reliable value-adds is an ongoing challenge for both vendors and integrators.

Legitimate PSIM is intelligent software that converts massive amounts of data into meaningful and actionable information by filtering and correlating the data based on time, location, duration, frequency, and type, and according to recent research, is estimated to be worth 112.43 Billion USD by 2021. While the definition of PSIM is often misunderstood as an integration platform or a command and control platform, the true nature of PSIM enterprise software is its capability to connect to other systems and subsystems including sensors and security and non-security related devices.

As PSIM has gained awareness globally, the demand for the software has increased and is driving large-scale projects, including many requests from U.S. federal government agencies. With customer and business process needs constantly evolving, software platforms must advance as well.

As innovations in PSIM continue, the platform has started to naturally shift towards a new platform, Converged Security and Information Management (CSIM).

CSIM extends software abilities beyond physical security by capturing and correlating data from multiple IT-security systems and information management systems. With capabilities for large-scale, widely dispersed customers, this advanced platform can be leveraged to support Smart City and IoT applications, in addition to a variety of use cases such as supply-chain systems, building management, logistics management, and manufacturing. CSIM can support customers globally where enhanced Enterprise Data Visualization and Enterprise Business Intelligence are integral features for reporting in real-time. Overall, the capabilities go beyond security and risk management by offering insights that can drive intelligent business decisions.

As the transition from PSIM to CSIM continues, there is a more formal cooperation between previously contrasting functions like physical security and IT security, and a substantial union between CSOs and CIOs has formed, encouraging organizational and operational convergences to align. In order to become more efficient and reduce risk to the organization, merging functions involves both process and accountability, accomplishing true business integrations around risk and compliance.

The shift to CSIM software can be leveraged globally by organizations and multi-site enterprises to garner beneficial, real-time situational awareness and management abilities, and can consolidate big data analytics tools, social media, and other intelligence inputs and tie in internal challenges with external threats. Now, enterprise leaders can have an extensive understanding of where threats are happening and their potential impact, allowing a more precise understanding of when and where crucial resources may be needed.

Interested in learning more about a CSIM solution for your business? Check out the Vidsys CSIM solution here.

Vidsys CSIM Supports UAE Smart City Objectives through the Hassantuk Programme

Abu Dhabi, UAE –October 11, 2017 – Vidsys, a global provider of enterprise Converged Security and Information Management (CSIM) software, announced today that Injazat Data Systems will employ its CSIM platform as part of the UAE’s Hassantuk programme.

This Smart and Safe City programme aims to reduce the cost of inspecting buildings and provide central monitoring of fire and life safety events for over 150,000 buildings across the UAE. Legislation has been passed mandating all addressable buildings must connect to Hassantuk for monitoring equipment and provision of service.  Injazat Data Systems is the service provider under the Ministry of Interior (MOI) for the ten-year Hassantuk programme.

A centralized dashboard visualization layer will be provided by Vidsys CSIM, with a unified interface for operators on a 24×7 basis. The CSIM platform will provide filtering and correlation of all alarms and events based on location, type, and priority, and will present automated Standard Operating Procedures (SOP’s) for the operator to follow dynamically, along with real-time reporting.

“This strategic country-wide initiative will decrease response time for incidents using direct e-notification and automatic location identification,” said Atif Al-Braiki, Director of Strategic Projects at Injazat Data Systems. “This intelligent solution will enhance the Civil Defense’s ability to monitor life and fire safety round-the-clock.”

“Vidsys is thrilled to be working with the UAE’s Ministry of Interior and our partner, Injazat Data Systems, to launch this programme,” said Vidsys CEO, James I. Chong. “Working with the UAE government on this and other fronts with key regional partners like Injazat Data Systems, we expect to see rapid adoption of Internet of Things (IoT) initiatives in the region including smart building, smart traffic, and other smart applications.”

Vidsys is continuously innovating and developing Internet of Things (IoT) and Smart City technologies, with the goal of leveraging big data to create smarter and safer communities.

About Vidsys

Headquartered in Vienna, Virginia, USA, Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals, including Transportation, Energy, Utility, Healthcare, and Government. Vidsys software has obtained highest levels of information security and assurance from both top-tier global corporations and the US federal government.

Vidsys is hardware, protocol, and device agnostic, and offers bi-directional, browser-based platform with industry-specific features and functions that allows sensors, devices, systems, subsystems, and services to be interconnected via open architecture APIs and SDKs. The platform collects, correlates and converts vast amounts of data into meaningful and actionable information, based on the organization’s risk policy, standards and compliance requirements. By leveraging mobile and web-based technology, the software can be rapidly deployed and provides real-time situational awareness and information management capabilities. For more information, please visit

ASIS 2017: 3 Steps to Create an Enterprise Security Risk Management Program

At ASIS, one of the key themes will be how global organizations can create an effective security risk management program. But where should they start?

Businesses today are faced with a multitude of risks due to the complexity of technologies, regulations, system vulnerabilities, security threats and more. As your company’s information flows through networks, applications, databases and servers, it must be readily available, free from tampering and confidential to those only with authorized access.

To manage this complex environment of information, installing an intelligent software platform can convert your large amounts of unorganized, unstructured data to valuable, actionable information through correlations based on time, location, duration, frequency and type. An enterprise security risk management program should have the ability to integrate to other systems and subsystems, so that the software enables users to focus on managing situations rather than managing disparate technologies.

When implementing an enterprise security program to benefit your entire organization, follow these 3 steps for a holistic approach to IT security.

1. Prepare for challenges

Vulnerabilities, risks and threats all pose potential complications and can serve as a source of danger to your company’s information assets. Weaknesses or flaws in the system can lead to a security breach and can exist not only in technologies, but in people and business processes as well, and risks, such as loss of network connectivity, can result in devastating outcomes for your business. To prepare for these challenges, list out and categorize pertinent threats, assess vulnerabilities based on potential impact to the company, and prioritize risks based on likelihood and impact.

2. Manage outside your business

An enterprise security risk management program often entails dealing with third parties like vendors and suppliers. It is crucial for businesses to select trustworthy third-party companies, as those with unsecure networks or corner-cutting practices can create vulnerability and subsequent security threats. Be sure to know what security measures these companies have set in place, list out all of the third-party companies your business deals with, and then prioritize based on information overlap and criticality.

 3. Enable security controls

Effective IT security includes non-technical controls set in place for management and operational protocols, and technical controls implemented as a safeguard incorporated into hardware, software and firmware. As CIOs begin to establish these security controls such as deciding which monitoring and filtering technologies to purchase, they must work with other parts of the company to make business decisions collaboratively as the technology will have an impact on employees and processes.

As an organization’s ecosystem of information grows increasingly complex, information security becomes a critical factor to the entire company. By implementing a strong enterprise security risk management program, your entire organization will benefit.

Want to talk with one of our in-house security experts? Come to our Intelligent Global Security Operations Center demo with Micro Focus. Learn more and sign up here.

3 Ways CSIM Supports Crisis Communications

When it comes to communicating during a crisis, timing is everything. The decisions an organization makes from when an incident starts to when law enforcement responds at the scene is crucial. That’s why it’s more important now than ever for organizations to lay the groundwork for an emergency plan that will enable intelligent decision-making if an incident occurs.

A key component of any emergency plan is effective communication and coordination – whether between different departments of a business or different agencies within a city or local government.

Converged Security and Information Management (CSIM) provides a central operations dashboard where decision makers can see their organization’s data in an intelligent way.

CSIM can interpret data from numerous data sources and send actionable insights to key decision-makers. This empowers organizations to minimize the amount of time it takes to sort through data, determine appropriate actions and respond.

Here are three ways that CSIM technology supports crisis communications:

Managing Data – CSIM technology brings together a common operating picture of all company and organizational asset data. Based on customized rules and regulations, organizations can set perimeters for what should be flagged as a “risk”. The first warning sign is usually unusual or unexpected activity, whether physically on your organization’s campus or virtually on your IT system. By collecting data from disparate sensors, devices, systems and subsystems, software tools are able to identify patterns that are unusual on any monitoring or sensor device.

Increasing Situational Awareness – Organizations can create a safer environment through the provision of a robust access control system.  The more secure a building is, the longer it will take for an intruder to enter the premises. Building in safeguards such as fewer entry access points, gated access to different parts of a building, RFID and in some cases biometrics, are all steps that building managers and companies should consider.

It’s also important to take a look at your infrastructure – both physical and IT assets – and ensure that the data from these devices is communicating to a central hub to create a 360° picture.

Integrating Systems – CSIM pulls together the video data along with other information from access control systems, sensors, alarms, ID management, GIS, and other data sources to create a holistic sense of situational awareness and provide appropriate actions.

While security sensors and video footage alone can help secure an organization, businesses can leverage powerful technology to integrate their data and receive automated, intelligent information that eliminates the risk of human error and facilitates the security process – saving your organization money, time, and in some cases employee safety.

If you’re interested in learning more about what a CSIM system can do for your business, you can visit our Vidsys CSIM solution page here.

Announcing Vidsys Enterprise 2017 Release 1.3

Vidsys has launched the latest version of Vidsys Enterprise – Release 1.3

The latest version of our Converged Security and Information Management (CSIM) software platfor incorporates new tools and capabilities as well as enhances the platform’s intuitiveness for the operator.

Originally launched in June 2016, Vidsys Enterprise increased the capabilities of the Vidsys CSIM software platform in enterprise deployments through features such as the Enterprise Business Intelligence (EBI) and the Virtual Situation Management (VSM) dashboards. These features provide a consolidated view of Situations across multiple independent Vidsys Enterprise servers, and increase support across large organizations who needed to quickly and efficiently address multiple Situations or locations at once. The Enterprise Data Visualization component (EDV) receives and correlates data generated outside the customer’s environment to notify them of potential impact to their personnel, resources, facilities, and brand.

Release 1.3 provides additional feature performance improvements to the software that will increase efficiency and overall user experience in the platform. The Vidsys reporting engine, Enterprise Business Intelligence, has been updated with new reports to facilitate quick and simple reporting by location. Additionally, to support the fundamental security of the solution and its underlying technologies, Release 1.3 incorporates the latest version of JAVA environment (8u111).

Other new features include:

  • Health Monitoring Dashboard
  • Vidsys Video Wall for Enterprise 2017
  • Video Export Manager
  • CCTV PTZ Request & Override
  • ESRI ArcGIS Map Integration Enhancements
  • Customized Floorplan Links
  • Optimized Responders List
  • Situation Detail Pages

The Release 1.3 launch reflects a number of upgrades to improve ease of use and to better serve our customers. We’re excited to roll out this new version of Enterprise and its key new features that will greatly improve how customers can get the most from our platform.

Click here to read more about Vidsys Enterprise.

Social Media’s Important Role in the Internet of Things

When discussing the Internet of Things (IoT), it is important to consider the massive amount of data that is being generated in today’s technological landscape. Experts are now saying that 35 to 50 billion objects will be connected to the cloud by the year 2020, just a few years from now.

It’s also important to consider that 90% of the data present within IoT has only been generated in the past few years. That’s an impressive statistic, but not surprising considering modern technological advancements and norms.

All of us carry cell phones equipped with multiple applications, and many of us have laptops and tablets creating data as well. Furthermore, even our vehicles and the cameras onboard are generating data. This abundance of data is transformational not only for security, but also as a means to help manage and build real-time intelligence for organizations, schools, smart buildings and smart cities.

An overwhelming majority of the data present in the IoT is being created by social media activity. Since almost everybody carries a cell phone, it has become common for the first person to actually witness an event to capture video and still images through texting, tweeting or Snapchatting the incident. For instance, if a car accident occurs, witnesses will take a picture or videos of what happened. The images that are captured carry metadata, telling the cloud where you are located and what time it is.

Law enforcement understands this trend and, as a result, is now beginning to use social media data as an important tool across multiple agencies. In the past, it was understood that a 911 operator would be the first to be notified of something happening—whether it be a health emergency, a robbery, or a natural disaster. Today, social media data actually is out-running those 911 calls because there are already groups of people that are seeing a situation unfold in real-time and creating their own metadata on the incident. That information is the data that people are now able to leverage and use — if they have the ability to make sense of that data.

The Vidsys platform allows individuals to pull in big data from social media and other IoT devices and correlates the data – essentially making sense of the noise – in order to create a clear and efficient response plan. Our technology helps organizations and smart cities by providing actionable information to help them make critical decisions when it matters the most.

Having the ability and proper knowledge to leverage and use social media data in the right way is transformational for how our society operates. While it’s important to consider the current state of IoT and data, it’s even more important to consider the future potential of IoT and how it can be managed and utilized in the most beneficial manner for society.

Vidsys Global Director of Strategic Marketing Featured in Washington Business Journal

Our Global Director of Strategic Marketing, Roberto Mandanas, was featured in the Washington Business Journal last month as one of their DC marketing leaders in the spotlight. Click here to read the full article on Washington Business Journal online.

Breaking Down The Top Trend In Security For 2016

Over the decade that Vidsys has worked in the security industry, we have seen a giant shift in the way organizations structure and run their security platforms. The creation of the title “Chief Information Security Officer” (CISO) was necessary to encompass the role of overseeing the security and management of information and company assets. The CISO role has become one of the key decision makers within an organization, as he or she is responsible for ensuring that security initiatives align with a business’ programs and objectives, as well as that all business technology is adequately protected. Over time, these responsibilities have shifted to identifying, developing, implementing and maintaining security-related processes that reduce the organization’s operational risk.

At ASIS International this year, there was a key focus on the CISO’s role. One of the key sessions called, “CISO Impact: Driving Security into the Business” explored the importance of a CISO’s team and overall impact on business success. The growth of the CISO role signals the merging of physical and cybersecurity, and Vidsys’ technology is at the center of this movement.

Vidsys was founded on our first platform, Physical Security Information Management (PSIM), designed to help law enforcement make educated decisions by continuously and instantly correlating vast amounts of data gathered from any number or virtually any type, brand or generation of physical security system or sensor, as well as from networked management applications.  As technology has rapidly evolved, we saw the need for further security integration with IT to create better solutions across all company assets.

When it comes to Integrated IT and Physical Security, Vidsys is moving in lockstep with how the two disparate functions are becoming one.

Vidsys sits at the intersection of physical and cyber, and our CSIM platform encapsulates the solutions needed to drive better situational awareness, real-time data correlation, and actionable information that can do everything from improving business efficiency to potentially saving lives. Our CSIM software takes the premise of PSIM, but enhances it through geospatially aligning information and assets into a single user interface. The rules engine and workflow tools give management the ability to pre-determine what data should be correlated and what should be filtered out based on time, location, duration, frequency and type. Since it’s programmed to present potential situations for evaluation, it’s an extremely valuable tool for CISOs to implement within their organizations.

With greater connectivity and the growth of IoT and Smart Cities, the merging of physical and IT security is essential to creating smarter, safer cities. A key part of this transformation will be in the hands of security leaders, proving the role of the CISO more important now than ever.