CNL Software - Experts & Thought Leaders

Latest CNL Software news & announcements

Everbridge, Inc. unveils Critical Event Management (CEM) for IoT supported by technology acquisitions

Everbridge, Inc., the globally renowned company in critical event management (CEM), has announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organisations to protect their people, assets, operations, supply chain and brand from critical events such as coronavirus (COVID-19). Everbridge CEM platform Everbridge’s industry renowned CEM platform will feature a new IoT extension module that will also leverage the intellectual property from recent technology acquisitions of Connexient and CNL Software. As a result, organisations will be able to gather a broader range of situational intelligence and automate targeted responses throughout their entire safety, security, and operational continuum – from across a global footprint to within campuses and facilities. Everbridge CEM platform enables organisations to utilise vast amounts of electronic data, including IoT sensors With the number of IoT devices expected to approach 75 billion by 2025, the Everbridge CEM platform enables organisations to utilise vast amounts of electronic data, including IoT sensors, to digitally transform how they manage the safety and security of their employees, customers, patients, first responders, residents, and visitors, as well as the resiliency of their operations and supply chain. Critical Event Management (CEM) for IoT CEM for IoT extends the number of use cases for the Everbridge platform within the broader critical event management market, complementing the company’s existing offerings for supply chain and wearable devices. Companies, governments and healthcare organisations utilise CEM to mitigate risks from coronavirus with several million COVID-19 related communications deployed by Everbridge in recent weeks. The expansion of CEM for IoT enhances coronavirus-related use cases to better protect people, operations, supply chain and brand. Coordination between first responders, healthcare units For example, the Everbridge ecosystem supports over 1,500 healthcare entities including the top pharmaceutical, biomedical and medical device and manufacturing companies, as well as the largest healthcare systems (overseeing more than 25 percent of all hospital beds in the U.S.), managed care organisations, pharmacies, and statewide health alert networks (HANs), including the Center for Disease Control and Prevention (CDC) and the National Institutes of Health (NIH). CEM for IoT improves the ability to coordinate first responders and other critical healthcare resources such as intensive care unit (ICU) beds, respirators, expert medical staff, etc., based on real-time data on the broader impact of COVID-19. Data security and threat identification The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats Everbridge’s IoT initiative employs the same CEM framework currently being used by global industry firms involved in aircraft manufacturing, financial services, entertainment & media, high tech, healthcare, hospitality, retail, pharmaceuticals, the federal government, and other sectors. The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats; determining the relevance of a threat to an organisation’s people, facilities, assets, supply chain and reputation based on their dynamic locations; automatically initiating and orchestrating an enterprise-wide response plan using the organisation’s policies and procedures and monitoring execution of that plan; while analysing cycle times and results to identify bottlenecks and improve future performance. The acquisitions of Connexient and CNL Software augment the IoT capabilities of the Everbridge CEM Platform bringing the total number of out-of-the-box integrations to over 225. Integrations include numerous healthcare systems, indoor positioning, digital wayfinding, building management, access control, intruder detection, video management, and many more. Safe City and Smart Building programs Everbridge solutions secure major events, cities, states, military installations, government buildings, universities, airports, corporate campuses, and healthcare facilities, providing instrumental functionality to Safe City and Smart Building use cases across multiple critical events including coronavirus. The CEM platform monitors threat data streams continuously, alerts stakeholders" “The CEM platform monitors threat data streams continuously, alerts stakeholders when there is a relevant issue, and automatically orchestrates a coordinated response—it is always on,” said Imad Mouline, Chief Technology Officer (CTO) of Everbridge Inc. Connected, IoT devices Everbridge has experience with early implementations of Safe City and Smart Building programs in both the public safety and corporate space. According to IHS Markit, the global Safe City market will reach $35.8 billion in 2024. Brand Essence Market Research forecasts the overall Smart Building market will grow to $59 billion in 2025. The utilisation of a network of connected devices, or IoT, will make up a portion of both markets.

CNL Software to exhibit Physical Security Information Management software at Intersec 2020

CNL Software, globally renowned developer of Physical Security Information Management (PSIM) software solution, is pleased to announce that it will be exhibiting at Intersec 2020. CNL will focus on the technology that is driving the digital transformation of control rooms across the Middle East region. CNL will be joined by Cepton Technologies, Inc. a developer of industry-leading 3D sensing solutions, who will be showcasing their latest correlation of LiDAR data with real time video visualisation. Scalable and secure PSIM solutions CNL Software will share valuable insights into its open, adaptable, scalable and secure PSIM solutions CNL Software will share valuable insights into its open, adaptable, scalable and secure PSIM solutions as chosen by regional governments, military, enterprises and cities.  It will discuss how security operations can leverage the latest technology developments such as Artificial Intelligence (AI) and Machine Learning (ML) to help to identify and respond to incidents faster and more accurately. “CNL IPSecurityCenter is trusted by the best-informed security operations in the Middle East to provide proactive control from a central command center and supports autonomous local operations”, said Craig Menzies, General Manager – Middle East for CNL Software. “The region is changing, we are seeing the digitalisation of control rooms as organisations evolve to meet today’s security challenges. CNL is driving this within our customers, enabling them to leverage from the best of breed technologies.” Integration with IPSecurityCenter When integrated with IPSecurityCenter, Cepton further enhances the industry’s most comprehensive PSIM system solution, providing users with access to more of the tools they need to quickly see, understand, assess and properly resolve perimeter security and surveillance incidents, consistently. “For the first time in the Middle East, Cepton will be showcasing the correlation of LiDAR data with real time video visualisation. From a technical perspective the camera will be calibrated into a common coordinate system with the LiDAR. As a result, it will provide 3D world coordinates from the LiDAR onto a 2D video stream,” said Neil Huntingdon, VP Business Development at Cepton. LiDAR network detection Neil further adds, ”This ground breaking system provides instant video confirmation of targets detected by the LiDAR network, which will reduce false positives and allow threats to be identified faster. We have also created targeted zones for critical areas, where we can use superior algorithms without the need for additional computing hardware. This functionality also allows us target sections of video, which can be stored in high-resolution while the rest is stored in lower resolutions leading to increased efficiency and reducing the need for expensive processing and storage.”

CNL honoured with 2019 Technology Partner of the Year award by Edge360

CNL, global provider of Physical Security Information Management (PSIM) software and solutions, is pleased to announce that it has been awarded the 2019 Technology Partner of the Year by Edge360, internationally renowned designer, developer, manufacturer and integrator of intelligence-based public safety technologies and solutions for federal, state and local governments, as well as commercial and private organisations. The award recognises CNL’s excellence in innovation and implementation of customer centric solutions. Real-time 3D visualisation platform The award distinguishes CNL as a premier technology partner, enabling the delivery of quality solutions The award distinguishes CNL as a premier technology partner, enabling the delivery of quality solutions that leverage both existing capabilities and next-generation technologies to solve mission critical security challenges using Edge360’s real-time 3D visualisation platform. Utilising the RavenView3D Plug In, developed by Edge360, CNL’s PSIM displays RavenView3D models allowing full visibility and interaction with an entire city. Its powerful building x-ray mode shows exactly which building, floor or zone is in alarm, delivering complete situational awareness and helping operators to manage appropriate responses to improve security. This industry-renowned solution ensures a focus on providing end customers with the most efficient, yet effective results, creating a measurable return on their investment. Integration with IPSecurityCenter “We value our strong partnership with elite technology providers such as CNL who strengthen our ability to meet our customers’ most challenging requirements,” said Rick Urban, Director of Special Projects, Edge360. “As a team, we have the ability to collaborate to deliver great solutions that can be rapidly developed, integrated, and deployed to our customers.” “CNL Software is committed to working with new and innovative technologies that will give our customers improved security and greater efficiency” comments Mike Mostow, General Manager – Americas, CNL. “When integrated with IPSecurityCenter, Raven View3D further enhances the industry’s most comprehensive PSIM platform, providing users with access to more of the tools they need to quickly see, understand, assess and properly resolve security incidents, consistently.”

Insights & Opinions from thought leaders at CNL Software

Embracing digital transformation in the security industry

Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.

Connected Security Expo at ISC West addresses convergence of physical security & IT

As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated video cloud service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organisations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-accelerated solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM software platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial recognition software IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorised person and track him or her across non-overlapping cameras. Enhance situational awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-class security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimised to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic physical security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable productsUL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive automated system Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create significant value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.

Quick poll
What is the most significant challenge facing smart building security today?