OPERATIONS
SECURITY SUPERVISOR
OVERVIEW
The Security Supervisor system is aimed at the perimeter control of certain areas. For this purpose, the system makes use of sensors positioned on metal fences placed along the border and able to establish any type of tampering or intrusion. The Security Supervisor is the heart of the entire system and represents the real element of integration between the various specific security solutions. It has the task of making decisions within the system, depending on the events coming from the various subsystems. It interfaces with the centralized DB and based on the configuration of the system and the events received in input establishes the actions to be taken and sends them to the subsystems concerned, monitoring that the transactions are completed. Through the use of the Service Bus, in order to register on the system events of its own competence, received and sent, it acts by generating and sending actions to the various subsystems.
The definition of the actions to be taken according to the events occurring on the controlled site, is carried out through the configuration of specific workflows that make use of an integrated Business Process Modeling (BPM) environment. The BPM functions can be configured by the system administrator via the configuration module (Security Supervisor Config).
It is possible to set the alert level of the system. In other words, all WorkFlow can be configured with an alert level that, if it coincides with the one set in the system, triggers the WorkFlow. When an event is received, the Security Supervisor typically performs the following actions:
- It takes the list of all the workflows that can be activated against the event and corresponding to the currently active system alert level
- Based on the priority associated with the individual applicable workflows and any exclusivity condition of a workflow, it activates the workflow (s) that map the total activation conditions
Workflows can be graphically composed by defining the following elements:
- Identification of the workflow activation conditions (events).
- Workflow priority
- Exclusivity condition
- Alert level applicable
Flow of applicable system actions selectable from a dedicated repository of embedded actions (camera preset setting, URL application launch, alarm sending)
The definition of workflows makes it possible to model the overall behavior of the system and to define with extreme simplicity the policies for managing a site’s security by exploiting in an integrated way all the potential offered by the various subsystems.
BENEFITS
The use of Security Supervisor offers many advantages:
“Maximization of the security levels through anti-intrusion alert functions”
“Minimum staff employment, both for the management and the maintenance”
“Total respect of the privacy rules”
SOLUTION COMPONENTS
ENTERPRISE MONITOR
Enterprise Monitor receives information from all systems to represent both site security alerts and alarms related to the operating status of the device. It represents the synoptic of synthetic presentation of all important current events, such as alarms and accesses. It provides a quick graphical display of the entire site and allows you to know the current alarms as well as view the status in real time of the steps to the various ways using light indications that show the individual steps occurred with the operating status.
The system, using color logics, allows to know the operating status of the device and possible current alarms.
The Enterprise monitor consists of a central screen that houses a CAD map in the DWF Web format and a number of screens that show the cameras in which active alarms are present.
FUNCTIONALITY
The Supervisor module is also equipped with an Enterprise Monitor that offers an integrated view to create a sophisticated control room.
Enterprise Monitor is a configurable presentation system, able to prepare synoptic maps with monitoring and control functions for devices managed by various security systems. The system allows, in fact, to insert active objects in maps able to modify the aspects according to the operating status and to activate commands related to the specific type of objects.