The Best Security Solutions combine excellence in design, application and customer insight Kahl Betham Global Product Manager Gallagher Security
The evolution of physical security Business Policy End customer value derived Physical Security IT Physical Security PSIM IT BSIM Physical Security Industry Evolution
The evolution of physical security Standalone PSIM IT maturity BSIM TM No or low software Software prevalent Residing on IT infrastructure IP Devices prevalent Software prevalent Residing on IT infrastructure IP devices prevalent Integration with business policy
The evolution of physical security Standalone PSIM Stakeholder engagement maturity BSIM TM Stakeholders Security Manager Stakeholders Security Manager & IT Manager Manufacturer Sometimes Involved Stakeholders Security Manager, IT Manager plus CEO, CFO, CIO, HR, Operations etc Manufacturer Involvement Prevalent in partnership
The evolution of physical security Standalone PSIM Solution value to the business BSIM TM Security value only (Security Budget) Security with IT benefits (With bigger IT budget) Whole business benefit (Access to any budget)
The evolution of physical security End customer value derived Physical Security Industry Evolution
Traditional physical security Access Control Alarms Perimeter Imaging Software Software Software Software Access Controllers Alarm Panels Alarm Panels DVR/NVR/Matrix Readers Keypads Keypads Cameras Cards or Biometric Sensors (PIR) Fence Controllers &Sensors
The One Gallagher Security System Software Imaging Viewer Field Controllers Readers Keypads Input Keypads & Output Interface Fence Controller Perimeter Sensors Elevators Other 3 rd Party Products DVR/NVR Cards Alarm Sensors Physical Fence Cameras
Physical Security Information Management End customer value derived Physical Security IT PSIM Physical Security Industry Evolution
PSIM is a natural evolution of traditional security
Single platform to manage Physical Security equipment Information from multiple Management vendors Common management process Software Imaging Viewer Field Controllers Readers Keypads Input Keypads & Output Interface Fence Controller Perimeter Sensors Elevators Other 3 rd Party Products DVR/NVR Cards Alarm Sensors Physical Fence Cameras
Physical Security Information Management Software Improved situational awareness in Command & Control Imaging Viewer Field Controllers Readers Keypads Input Keypads & Output Interface Fence Controller Perimeter Sensors Elevators Other 3 rd Party Products DVR/NVR Cards Alarm Sensors Physical Fence Cameras
Physical Security Information Management Custom screen builders Not requiring developers Software Imaging Viewer Field Controllers Readers Keypads Input Keypads & Output Interface Fence Controller Perimeter Sensors Elevators Other 3 rd Party Products DVR/NVR Cards Alarm Sensors Physical Fence Cameras
Strong open integration architecture & Culture of collaboration Physical Security Information Management Software Imaging Viewer Field Controllers Readers Keypads Input Keypads & Output Interface Fence Controller Perimeter Sensors Elevators Other 3 rd Party Products DVR/NVR Cards Alarm Sensors Physical Fence Cameras
Physical Security Strong integration Information architecture Management in the field Software Event correlation from field sensors or edge devices Imaging Viewer Field Controllers Readers Keypads Input Keypads & Output Interface Fence Controller Perimeter Sensors Elevators Other 3 rd Party Products DVR/NVR Cards Alarm Sensors Physical Fence Cameras
Business Security Information Management Business Policy End customer value derived Physical Security IT Physical Security PSIM IT BSIM TM Physical Security Industry Evolution
BSIM best current example for the enterprise Most powerful form of control e.g. Human Resources, Safety, Security e.g. Induction, training, licences, testing e.g. Physical security infrastructure
Today s enterprise features, are tomorrow s commercial sector reality, out of the box. Access Granted NOTE Your induction will expire in 14 days, go to site office
End User derives more value a business connected security platform, that executes their business policy, and helps their operation run smoothly
End User derives more value Assurance of a safe and competent workforce Site access policy breaches are prevented Only qualified, trained and inducted people are granted site access Site access policy is managed Impending expiries are managed before disruption occurs
End User derives more value Through reduced risk of... operational downtime, when staff don t arrive at work site shutdown, in the event of a safety breach financial penalties, for non-compliance under audit legal action, from injured employees
Explosives Safety
Safety Zero Injuries
Membership Expiry & Authentication
Student safety Enrollment Resources
Contamination Control
Company Pool Car Management
Export Control
Inadvertent Access
Tenancy Management
The future of business with Gallagher Thank you