PSIM Chosen by Mining Organization in South Africa

PSIM Chosen by Mining Organization in South Africa

CNL Software, a producer of physical security information management (PSIM) software, and e-Thele SQD Networks, designer and implementer of situational management and PSIM solutions, are working together to provide a comprehensive security management system for a global mining organization for its operations in South Africa.

Illegal mining operations cost South Africa an estimated $5 billion per year. As well as the loss of property, illegal mining activities also have a negative effect on the mining organizations safety record as the death or injury of illegal miners is seen as a safety breach.

IPSecurityCenter integrates security systems across the mining estate, including abandoned mines and areas where it is not possible to have security staff on the ground at all times. The systems provide control room operators with real-time situation awareness through a common operating picture (COP), following an alert, alarm or trigger. IPSecurityCenter presents step-by-step process guidance, directing rapid response teams over vast areas both above and below ground, ensuring complete compliance to organizational security and health and safety policies.

“The first phase of this mine project will integrate the organization’s video surveillance capability as well as legacy technologies including access control, physical alarm systems, SCADA, perimeter intrusion detection and video analytics technologies,” explained Wolfgang Engling, managing director of e-Thele SQD Networks. “IPSecurityCenter will help reduce the instances of theft through illegal access and minimize other risks to property, while also protecting the health and safety of staff, visitors and the public.”

“IPSecurityCenter has been chosen by CNI projects around the globe to help with security challenges including the protection of personnel, buildings, transportation systems and other critical facilities, which are often located over vast geographical areas,” said VP of Sales, James Condron, with CNL Software. “Being able to identify and deal with threats quickly and efficiently means that organizations are reducing costs that would be incurred from theft or major safety incidents”.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3