Brivo ACS WebService Integrated with PPM 2000 Incident Reporting Software

Brivo Systems LLC and PPM 2000 Inc., leaders in software-as-a-service applications for security management, have integrated ACS WebService® with Perspective™ Incident Reporting & Investigation Management software.

The integration between the two SaaS-based solutions means that select access control events now can be passed to an incident reporting system for documentation, analysis and follow-up.

The Brivo system records activity for every access-related event and transmits specific events to the Perspective incident reporting system. Once this data is acquired, the software uses established business rules to flag patterns or specific events and automatically create incident reports. Such incidents are documented real-time and notifications can be sent to senior management and investigators.

Brivo demonstrated this integration at the recently concluded ASIS Annual Seminar & Exhibits, showing how specific events (e.g., a door forced open, invalid card, etc.) logged by the Brivo system could automatically trigger an actionable Perspective incident report. With this escalation of access events to incident status, Perspective now offers highly valuable in-depth statistical analysis and follow-up investigation management.

Direct transfer of data from one system to another eliminates human error and duplicate data entry, significantly improving productivity and security outcomes. In addition, Perspective customers can use their Brivo access data in a way unique to their own needs by setting up business rules that create incident reports for the access activity they want to track.

“This integration enables any organization to employ a cloud-based approach to access control and integrated incident reporting," explained Brian McIlravey, CPP, PPM 2000’s co-CEO. "It completes the life cycle of incident management in regards to access control—while the majority of ACS events may not require an incident report or a follow-up investigation; those that do need to be escalated are automatically submitted to our system with all related data."

“This is a cloud-to-cloud integration, so none of the critical data transfer and acquisition takes place on-premise—a huge savings for the customer,” said Steve Van Till, president and CEO of Brivo Systems. “Even more important, by incorporating physical security data into the incident management framework, we ensure the completeness of datasets used for corporate risk and compliance.”

The system and software are sold and installed separately and then connected via a network interface using Brivo’s Datasync connector.

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.