By security integration we understand unified management of security & non-security systems using dedicated software applications capable to bidirectionally communicate with underlying systems and devices. Integration also involves development that can be identified as application development, drivers development, integration layers development and more.
For security & intelligence we integrate based on PSIM – physical security information management – concept that provides a single GUI no matter the number and types of underlying systems, focusing on situational awareness and provide step by step operator guidance based on SoPs (standard operating procedures) that are implemented within the platform. These projects are dedicated for command and control centers (room) and addresses not only to physical security but also to building management and safety.
[read more="Read more" less="Read less"]We use multiple connections methods with the undelying systems and devices, making use of native SDK, API and other open communication protocols available. There are also situations when none of the above are available therefore we are used to perform reverse engineering as well.
The level of integration and proposed solution depends on client operational requirements as well as the performance and capabilities of systems and devices that shall be integrated.
There can be several ways in delivering an integrated solution within security operations. Most important in this process is helping our customers understand the benefits of having an integrated solution. Based on our experienced team of solution architects and engineers we involve in defining the operational needs. This is the base in shaping the solution architecture and generate the technical requirements of solution that shall match the user requirements.
There is a complete process that we follow when delivering an integrated solution. Some of the tasks we perform are: defining operational requirements, performing site surveys and an audit of existing infrastructure and used applications, generating technical requirements and designing the solution architecture. Once all these are being performed, a project plan is generated.
Several scenarios can be identified within the process of security integration. Most important is that Alfred Net can comply with almost any of such scenarios. Depending on client’s environment, delivering an integrated solution involves integration of existing underlying systems and devices or delivering turn-key solution including the underlying systems or devices.
Security integration does not stop at security systems only, but also at business related systems that generate events and alarms important for safety & security operations. There is no limitation in integration of security and non security systems and devices as well as with third party applications used by different departments within the organization.
Each solution is unique and Alfred Net team has the capability to support clients in implementing the appropriate solution that serves short, medium and long term business and operational requirements.
We focus on solutions delivery not on products. We have access to multiple solutions provided by leading vendors and have the skills in identifying the ones that match entirely or partially user requirements and ‘glue’ together parts from different vendors in order to deliver at the end an integrated, fully functional and open architecture solution.
Here’s a short list of underlying systems and devices: video surveillance, access control, intrusion detection, perimeter protection, security radar, fire detection, CO detection, call recording, communications, network infrastructure, security lighting, physical access, building management systems, barriers, turnstiles, gates, HVAC, fire suppression, barcode scanners, license plate recognition and more, as well as third party applications such as Microsoft Active Directory, SAP modules, custom developed apps, external databases and more.
[/read]