Genesys 2 Brochure Web

download Genesys 2 Brochure Web

of 9

Transcript of Genesys 2 Brochure Web

  • 8/12/2019 Genesys 2 Brochure Web

    1/9

  • 8/12/2019 Genesys 2 Brochure Web

    2/9

    Established in 1989, ISM is a World pioneer in

    integrated security management solutions; the

    U.K.s leading developer of integrated security

    management, intercom and cell call systems.

    Operating from our extensive manufacturing and

    design facility in Sussex,

    our global client base

    encompasses many of the

    Worlds most prominent

    institutions including

    local authorities, health establishments, education

    campuses, shopping centre operators, financialinstitutions, the prison and police authorities.

    We specialise in the design, development and

    manufacture of graphical security control room

    management software and intercom systems with

    VoIP. Our Genesys software facilitates the integration

    of many types and manufacture of third-party

    equipment including CCTV matrix and digital video

    recorders, access control systems, fire alarms,

    intruder alarms, audio matrix, intercoms, public

    address and paging systems - all from one holistic

    security management system. Our Ultimate 3000

    audio exchange provides solutions for telephone

    entry, intercom, help point, disabled refuge and cell

    call systems.

    The market for integrated security systems

    is changing dramatically. Go back a few

    years and it was viable to rely on a few

    PCs to control the security of a building or

    site. That is not the case today. Security

    control rooms are now responsible for

    running multiple sites... 60... 70 and more,

    in many countries spanning different

    continents. It has become a responsibility

    of scale. With the traditional and now

    archaic server-based systems you are

    completely reliant on the server. So

    what happens when the server goes

    down? Your security can be severely

    compromised. Not so with Genesys.

    We distribute control across all of your

    workstations. Were taking power to your

    PC and multiplying it by the number of

    PCs on your network. And the genius of

    this? If one PC fails, we can migrate the

    control to another PC seamlessly with no

    interruptions, no downtime. With Genesys

    we are giving you the absolute Holy Grail

    in security control room management

    systems. Unparalleled flexibility, power

    beyond your wildest dreams and a

    redundancy thats second to none.

    Stephen Smith,

    Sales and Marketing Director, ISM

    Decades of innovation,design and manufacturing excellence

    specialist

    At the very core of our business is a robust

    and unflinching commitment to research and

    development. We invest at least 12.5% of our

    annual turnover in research and development and

    have our own dedicated R&D and innovation team

    on-site. Running parallel to our R&D strategy is an

    ongoing dialogue with clients. By understanding

    the changing needs of our

    clients and drawing on our

    wealth of experience and

    technical expertise within

    the security industry we candesign, deliver and implement pioneering systems.

    Its a strategy that works because it fuels ongoing

    innovation. Given the unparalleled rise in terrorist

    activity in the 21st century and its insidious nature,

    the organisations that approach us are looking for a

    global solution to their security needs; one that can

    be implemented at a local level, that is scalable yet

    easy to manage by individual team members.

    Genesys v2 is the answer. Several years in the

    making and born out of Genesys Classic, Genesys

    v2 is the culmination of our internationally recognised

    ability to design systems that deliver security

    management solutions globally.

    Genesys v2 is a genuinely

    unique patent protected product;

    (something we explore in more

    detail further on). Each one of ourproducts is designed, developed and manufactured

    in-house and supported by a system design team

    for pre-sales design support plus a full project

    management department to assist in the successful

    delivery and technical support after-care.

    One of the first things a potential client wants to

    discuss when approaching us is the experience we

    have of working in their sector and the countries we

    work in. The confidential and highly sensitive nature

    of our work means that whilst we cannot share client

    details or names we can tell you that our systems

    have been deployed in:

    financial institutions

    police services prison services

    health services

    universities and schools

    mental health units

    government buildings

    high security control rooms

    airports

    critical infrastructure

    museums and art galleries

    oil and gas

    VIP residences

    In fact from the City of London to the farthest points

    on the globe, ISM have developed pioneering

    security control room management systems that are

    now responsible for protecting millions of people

    from all walks of life by safeguarding the buildings

    and infrastructures that house them.

    The perfect partnershipof r&d and innovation

    Who do youwork with?

    innovation

  • 8/12/2019 Genesys 2 Brochure Web

    3/9

    Imagine for a moment that youre attending one

    of our innovation meetings a few years ago. In

    this particular meeting youre listening to some of

    the discussions between our R&D, design, project

    management and senior management teams about

    Genesys v2. This is what you would have heard...

    As part of the new networked security system,

    the main command and control functions are to be

    undertaken by an integrated graphic user Interface

    computer front-end. This will monitor both local and

    remote sites. The system will be capable of sending

    and receiving information from

    security subsystems to local/

    regional Security Centres

    and to the Main Security

    Control Room. The Security

    Information Management system (SIM) will be a

    network of Windows 7 compatible PC workstation(s)

    which will have overall control of all electronic

    security systems installed at each site that can

    include but not be limited to: -

    Perimeter intruder detection

    CCTV and Digital Recording

    Intruder Alarms

    Panic/Affray Alarms

    Video Content Analytics

    Building Management Systems

    Electronic Locking

    Cell Call

    Fire Detection

    Intercoms

    Public Address

    Trunked Radio

    Radio Paging

    Staff Safety Systems Guard Tour

    Genesys v2 must be a holistic security management

    system with the ability to monitor and control multiple

    systems from multiple manufacturers from a single

    software platform.

    It must offer clear and concise easy to navigate

    graphics and text acknowledgements along with real-

    time active icons. These facilities shall enable the user

    to be visually aware of all the activity of events and

    actions as and when they happen. The graphic plans

    will be in high resolution 2-D or 3-D format to enable

    operators to become familiar with the building (s) and

    locations that are being monitored and/or controlled

    by the SIM system. There will be a 3-D model of the

    site (s) and or location (s) to allow the operator an

    instant overview of all of the maps available for the

    system. As the software will be highly intuitive, training

    the operators on the use of the system will take no

    more than two hours. The system will have a complex

    log to enable the manager/supervisors to produce

    audit trails and reports.

    The software will operate as a standalone platform

    over LAN or WAN networks for remote and local

    sites with workstations that can be transferred to

    any operating security control room on the network.

    This offers the end user flexibility when closing down

    sites or buildings for off-peak or

    out of normal working hours or in

    the unlikely event of any system

    failures.

    The SIM system will have been designed in a

    modular format for ease of operation. This is

    especially relevant when the end users are using

    multiple disciplines/integration. This will enable

    management to allocate individual operators with

    all or individual modules. The models represent the

    system types such as fire alarm, intruder detection,

    access control, audio intercoms, digital recording

    systems, cell call, concierges etc. Each module shall

    include a graphical control panel which replicates the

    function of the hardware. Each module will display

    the relevant icons on the maps for the individual

    system (which can include associated modules

    items via filters within the configuration menus). This

    alleviates cluttered graphics and confusion for the

    operators. The SIM system will offer true integration

    via an action list application. This will enable

    every device for each system to interact via cause

    and effect to include display graphical maps and

    memos/instructions related to the individual alarmsto the operators. This will allow all events to be

    automatically triggered when an alarm device enters

    any state; thereby eliminating the human error factor.

    The system will utilise the latest Microsoft.NET

    platform and Windows Presentation Foundation

    (WPF) for an enhanced graphical user experience

    and will include migrating Driver redundancy

    technology, with the ability to distribute the Driver

    interfaces across the network as each SIM PC can

    run individual Drivers. This also allows any of the

    SIM workstation PC (s) on the network to become a

    master for both the Drivers and the database.

    Hundreds of thousands of man-hours, engineering

    excellence and patent approved application and this

    is the system we developed: Genesys v2.

    The brief,that gave birth to genesys

    enhanced

    Fire alarm

    Access control

    Intruder alarm

    HARDWARE

    GDS - Genesys Driver

    Service

    GMS - Genesys Messaging

    Service

    GSE - Genesys State

    Engine

    GMTS- Genesys Migrating

    Technology Service

    GFE - Genesys Front End

    DB - Database

  • 8/12/2019 Genesys 2 Brochure Web

    4/9

    Genesys is a fully integrated security management

    system capable of integrating multiple systems.

    Interoperability is enabled from one holistic platform.

    Genesys encompasses high levels of functionality,

    exceptional ease of use, graceful redundancy and

    advanced alarm handling.

    The Genesys front end

    The Genesys Front End, sometimes referred to as a

    Graphical User Interface or GUI is one of the engines.

    Being independent of the rest of the system it can

    reside on a PC to carry out control functions, or as

    a main load carrying PC with driver control. This

    independence increases the stability of the system. It

    also enables effortless expansion.

    Why driver separation enables systemstability

    One of the most critical and unique elements of

    Genesys is that individual Driver instances are set

    up for each system connected within the Genesys

    Driver Service (GDS). This separation of Drivers

    allows for the load of all the Drivers running to be

    spread across the system - thereby allowing for a

    large number of Drivers to be connected. The GDS

    monitors each Driver instance. So, if a Driver become

    unstable or fails due to poor third-party software

    then the GDS can close down the individual Driver

    (to ensure it does not cause an issue to any other

    part of the system) at the same time as generating

    an alarm event. The GDS promotes the ability to

    migrate individual Drivers to other computers in the

    event of a PC or network failure. By employing a

    separate engine it is also

    possible to run these Drivers

    on dedicated PCs or servers

    if you prefer this network

    architecture. Genesys

    incorporates a status engine and an SQL server

    database. This means that the software remembers

    the state of all devices, alarms and the current alarm

    progress of alarm tick-lists. If an alarm has been

    accepted on a PC and the PC fails before the alarm

    has been reset then the alarm will be resent to the

    network again. This ensures that no alarm is ever lost.

    genesys,the world has waited

    genesys,system architecture

    We listened to our clients. Ease of use was their

    fundamental requirement. So we combined our

    20 years plus experience and expertise with an

    unquenchable thirst to understand at a granular

    level what todays users need. We embarked

    on an evangelical study of how different

    control rooms function and what the operators

    are required to do, on a second by second

    basis. And the result? With Genesys we have

    developed a system that is truly groundbreaking

    and genuinely unique. Genesys is a system that

    the user can readily and easily use. It utilises

    the latest Microsoft.NET platform and Windows

    Presentation Foundation (WPF) for an enhanced

    graphical user experience and its all wrapped

    up in our pioneering patented migrating 3+

    redundancy.

    David Jenkins,

    Managing Director, ISM

    As well as incorporating our patented migrating

    3+ redundancy, Genesys has further

    additional patents pending. With the ability to

    distribute the Drivers across the network, each

    Genesys PC can run the Drivers. Genesys

    has moved away from the traditional server

    and client configuration with all of its inherent

    flaws and issues, to a more stable and robust

    platform. We have transferred power from the

    server to the PC.

    Steven Card,

    Technical Director, ISM

    unique

  • 8/12/2019 Genesys 2 Brochure Web

    5/9

    The genius of the Genesys stateengine

    As connected devices change state - some simply

    from Off to On or others having multiple states such

    as; tamper, fault, door open, insecure, pre-alarm,

    then the Genesys State Engine (GSE) receives these

    states and sends a message to update the icons

    shown within the Genesys Front End. This provides

    near real time status of all devices. This engine also

    monitors the status of the Genesys computers on

    the network, what alarms have been acknowledged,

    and how many actions on the alarm task list have

    been completed. This keeps each one of the Genesys

    computers fully up-to-date. If a PC failure or engine

    fault should occur then the other users are aware that

    a user is off-line.

    Top secret level encryption

    All messages are sent via the Genesys Messaging

    Service (GMS) between the Genesys engines and

    services using Secure Socket Layer Cryptographic

    Protocol. The Genesys Migrating Technology Service

    details the driver migration and all actions on the

    system are stored within a Sequel server database.

    When communicating between computers across

    the network, Genesys employs 256 Bit Advanced

    Encryption Service. This protects information up to

    Top Secret level.

    Capability to communicate in multiplelanguages

    Genesys supports multiple languages; something

    which is achieved by using a translation database

    or databases. When an operator logs on, the correct

    language is displayed to them (the separate language

    databases are situated between the main system

    database and the Genesys Front-End).

    Calling time on servers and clusteringsoftware

    Because of its pioneering system architecture,

    Genesys is not restricted due to the size or capability

    of a server, nor does it require the expense of moving

    to server farms or utilising clustering software.

    Genesys adds higher levels of automatic configurable

    redundancy and power. It ensures continued

    connectivity to all systems at all times.

    Competitors have fallen into the trap of delivering

    a Windows-like application. We know from

    extensive research that operators dont like it.

    Its confusing, messy on the screen, neither

    clean nor clear. Genesys v2 has been developed

    on the same principles as Genesys Classic; easeof use, clear and concise graphics, clear menu

    boxes and dynamic control panels that appear

    when you touch the graphic. These features

    and more are what make Genesys v2 a truly

    outstanding system; a system thats miles ahead

    of anything available on the World market today

    and tomorrow.

    John Waite,

    Business Development Director, ISM

    Genesys is an outstanding breakthrough in

    security management technology. Systems are

    becoming larger as the need to control local,

    national and international sites from one holistic

    interface grows. Genesys has the flexibility to

    fulfil requirements in the present moment and in

    the future.

    David Jenkins,

    Managing Director, ISM

    lan/wan

    access control

    cctv

    pagers

    fire alarms

    s

    intercoms

    cctv

    pagersaccesscontrol

    HARDWARE connection to lan/wan

    intercoms

  • 8/12/2019 Genesys 2 Brochure Web

    6/9

    Clear and concise alarm management is absolutely

    vital to the success of any security management

    system. Genesys offers a comprehensive event

    management database. Events and alarms are

    presented to the operators clearly with an alarm

    workflow together with automated and manual

    workflow options that guide the operators through

    these events. As alarms are handled in the same

    generic way, training is straightforward and the

    reactions of operators to these events are greatly

    improved.

    Genesys provides enhanced alarm handling

    incorporating multiple scenarios that can be

    allocated to alarms so that they trigger automatically

    at certain events including:

    1. On receipt of an alarm.

    2. When the operator accepts the alarm.

    3.If the device changes state etc.

    For example if a PID alarm is triggered, Genesys will

    automatically:

    Increase the frame recoding rate on the DVR/NVR.

    Page security staff.

    Lock down perimeter doors.

    Switch on perimeter lighting.

    When the operator accepts the alarm they are

    presented with the live CCTV images together with

    the pre-and post-event recording from the DVR

    at the time the event was generated. The alarm

    task list is presented detailing a workflow for the

    operator to follow. The workflow list can detail

    basic functions for audit purposes such as check

    the CCTV, call the supervisor. By selecting one of

    these actions Genesys will carry out the automated

    function and the item will be ticked off the list. The

    operator will then proceed to the next item. It is

    possible to add events to the workflow list such

    as lock down doors or add a note to the alarm

    event. Only when this note has been added can the

    operator reset the alarm.

    Once the event has been cleared and the operator

    has reset the alarm the system will automatically

    revert back to a default position for example:

    Sending cameras to their home positions.

    Switching the monitors to default view.

    Returning the DVR to normal record state.

    Switching off floodlights.

    Normalising doors.

    Paging staff.

    Genesys Change Management inYour Hands

    Genesys can be fully configured by any trained

    member of your team. The benefit of this is that you

    have full control over your system. You can make

    amendments to keep your system current without

    having to call upon ISM for on-site support.

    Why enhanced alarm handlingis crucial

    In Genesys security providers now have the

    optimum tool to control and monitor their

    complex security installations to the highest

    degree.

    Mark Ranger,

    Technical Department Manager, ISM

    Alarm event

    Alarm Displayed

    On Genesys

    Operator

    Accepts Alarm

    Alarm Task List

    Alarm Reset

    CCTV PTZ to

    preset position

    Check CCTV

    PTZ to Home

    Position

    DVR Triggered

    Lockdown Doors

    DVR Normalised

    Alarm Silenced

    Page Staff

    Switch On

    Lighting

    Page Staff

    CCTV Screen

    Layout Change

    Switch Lighting

    Call Supervisor

    Switch Off

    Lighting

    Log Entry

    Required

    Normalise Doors

    Show Live, Pre

    and Post Images

  • 8/12/2019 Genesys 2 Brochure Web

    7/9

    SINGLE SCREEN ALARM LAYOUT

    Genesys incorporates an alarm escalation feature.

    This allows an operator to trigger different scenarios

    with the display of a new tick-list if required.

    The alarm escalation can be triggered automatically

    from rules that are set up in the system configuration.

    For example items such as multiple alarms from the

    same area, alarms not accepted by an operator after

    a set period of time and the number of active alarms

    can be the trigger.

    Genesys offers a completely configurable layout of

    one, two or three PC monitor screen displays per

    workstation - absolute flexibility plus the ability to

    increase functionality as the system grows.

    The end user has a system that is future proof

    because its expansion capability is limitless.

    Genesys has a full system log. This file records

    the actions of the system - detailing the operator,

    the action and any automated actions plus any

    responses to alarms that have been recorded by

    the operator. This log has a search facility and it is

    capable of producing basic level reports. If a more

    advanced analysis of the logs is required then the

    database can be exported and interrogated by

    any ODBC programme such as ACCESS and

    Crystal Reports.

    DUAL SCREEN ALARM LAYOUT

    Big on Benefits

    Here is a summary of just some of the features and

    benefits of Genesys:

    Highly configurable. Most changes can be

    implemented simply by updating the configuration

    rather than applying in code. Enhanced functionality

    reduces costs.

    Alarms can be set to specific users or workstations

    and can be prioritised.

    Alarms can be easily identified and reacted to

    because of the different alarm sounds and flashing

    border colours per system.

    Emergency Procedures with alarm tick-lists.

    Alarm escalation rules and manual activation.

    Enhanced graphical user experience and animation

    from utilising the latest Microsoft t echnologies -

    .NET platform and Windows Presentation

    Foundation (WPF).

    Ease of navigation from the Map control panel in

    2D or 3D mode.

    Migrating 3+ Technology:

    - Each Driver can run on any networked PC with

    its own sequence of migration PCs in the event

    of failure.

    - Distributed Drivers enable the communication

    load to be spread across all networked PCs. No

    reliance upon one PC for all communications.

    - Because a front end is not required for the Driver

    to run, Drivers can run on non-operator PCs. If

    large numbers of Drivers are required additional

    PCs can be added to handle the load.

    - Each Driver runs in isolation from the front-end

    and from other system components. A Driver

    failure will have no effect on the functioning of the

    rest of the system.

    Genesys Classic is still a pioneer in security

    control room systems, leading the market

    by several years. Whenever Genesys Classic

    is technically evaluated against any other

    competitive security control room system it

    always wins hands down. Competitors are still

    trying to catch up with Genesys Classic let alone

    Genesys v2. I believe we are years ahead of

    the market.

    David Jenkins,

    Managing Director, ISM

    - Drivers will continue working even when the front-

    end is not running. When the front-end starts

    up, any alarms that were activated whilst it was

    not running will be displayed and any changes

    to device states (for example doors opening and

    closing) will be shown.

    Multiple monitor support:

    - Front end can be configured to cover multiple

    monitors (this is naturally dependant on the

    capabilities of hardware).

    - Different layouts for the Genesys v2 panels (map,

    video, alarms, control, etc) can be configured.

    Layouts can be changed depending on user

    preference and via Action Lists.

    Advanced Action List system Define powerful and

    complex cause and effect rules.

    - Execute any command on any device.

    - Define matrix actions/camera tours.

    - Create highly configurable guard tours and

    cell watches.

    Configurable Tick Lists for accepting alarms:

    - Uses the Action List system.

    - Perform a series of automatic commands.

    - Prompt for user input to make alarm notes.

    -Alarm can only be reset once tick-list is complete.

    New Alarm Window and Alarm Ownership system:

    - Dedicated alarm list window shows all alarms, or

    a filtered selection of alarms.

    -Alarms grouped by Accepted, Active and

    Accepted by Other User. All alarms accepted by

    the operator are grouped at the top of the list

    and unaccepted alarms are grouped below.Alarms accepted by other users are grouped at

    the bottom.

    -Accepted alarms are allocated to the user and

    become unavailable to other users. The accepting

    users progress through the alarms reset tick-list

    is remembered enabling them to return to the

    alarm later. The user can also log on to a different

    workstation to continue processing the alarm.

    -Accepted alarms can be escalated causing

    them to be allocated to a higher level user and

    changing the tick-list items, if required.

    -Accepted alarms can be un-accepted, allowing

    another user to continue processing the alarm.

    New Multi-State Device Icons:

    - Devices are defined by the state attributed to

    them. For example a door device could have a

    Position state and a Locked state.

    - Each value for each state can have a map icon

    associated with it. For example a door positions

    state value of Open can display a different icon

    to when it is Closed. Overlaid on top of that will

    be the icon for the current Is Locked state an

    icon for either True or False.

    - The default configuration for the states that have

    icons and the states that dont is provided by

    the Driver. However, the user can change any of

    the defaults and can allocate icons to any state

    values or remove them.

    New State Triggers feature:

    -A trigger can be configured to activate when a

    device state changes to a particular value. When

    activated the trigger will run an Action List.

    - The Driver provides full details on the default

    configuration for its triggers (mainly used to

    activate alarms). However it is fully configurable

    by the user and any actions can be taken when

    the status of the devices change.

    -A selection of other, more general triggers are

    also available. For example an Action List can

    be run when any of the following activity is

    selected on the system: Icon Clicked, Menu

    Shown/Hidden, Module Button Clicked, and

    Layout Changes.

    THREE SCREEN LAYOUT

  • 8/12/2019 Genesys 2 Brochure Web

    8/9

    World leader and pioneer in the design and

    manufacture of security software solutions and

    high-quality audio intercom systems for 23 years.

    Inventors of Genesys Classic, the Worlds leading

    patented integrated security software platform.

    Inventors of Genesys v2 the next level in integrated

    security software platforms.

    A highly trusted, respected and stable brand. ISM

    software and hardware is used by thousands of

    organisations worldwide.

    Dedicated manufacturing facility, project

    management team, technical support and sales

    in Sussex.

    Rated by Deloitte and Touche as the 49th fastest

    growing technology company in the world.

    ISM invests 12.5% of gross revenue in research

    and development compared to the industry average

    of 7%.

    Leading provider of global centralised security

    systems for police, prisons, custodial, commercial

    banking and finance, education, rail and transport,

    social housing critical infrastructure and more.

    Please get in touch with us whether it is to discuss your security need, if you would like to

    arrange a full system demonstration or simply require further information. Our experienced

    team is available to assist.

    The compelling casefor ism

    worldwide

  • 8/12/2019 Genesys 2 Brochure Web

    9/9

    INTERGRATED SECURITY MANUFACTURING LTD

    25-29 The Bell Centre |Newton Road |Crawley |West Sussex RH10 9FZ

    TEL+44(0) 1293 529990 FAX+44(0) 1293 528023 [email protected] WEBwww.ism-uk.com