|
Integrated building and security management
|
Integrated building and security management This could be considered as the combination of Physical Security Information Management or PSIM and building automation , which can then all be centralised by a building management software package . Integrated building and security management software platforms tend to provide a software application that are capable of centralising both security and building automation equipment and devices using a single software package. In order for the software to be able to communicate with equipment systems it is necessary for both software and hardware to share a common language, or protocol . Protocols found in security and building automation projects can use open standards (free to access for everybody) or alternatively proprietary to a particularly equipment or manufacturer (see lock in strategy ). Integrated building and security management software will typically be structured in a server - multiple client hierachy and are able to communicate over the ethernet to support the real time communication using a large number of different protocols simultaneously so that different equipment systems can be checked and controlled remotely in real time. Any changes in status will be represented graphically using human machine interface (HMI) technology. These changes in status will come from various devices and could represent a variety of events such as door opened / closed, access granted or denied, alarm triggered, alarm fault, alarm tamper, alarm reset, cctv camera event, temperature value, or machine on or off. More sophisticated integrated building and security management software packages will also provide cause and effect links between connected sub systems so that a trigger event from one system can be used to start or stop a process in other systems. Other standard features typically found in these software packages include on screen messages to control room staff following an event, recorded sounds and messages as well as full audit logs of a users interactions with the software and equipment.
|
|
|