Genesys
The i-CMS shall
provide unified situational awareness, system correlation, and centralised
security management across multiple secure locations.
The i-CMS shall detail design, build, configuration,
and deployment (network diagrams, redundancy schema).
- Integration
of initial subsystems:
- CCTV (VSS) & Video Management
Systems (VMS)
- Access Control Systems (ACS)
- Intrusion Detection Systems
(IDS/GA)
- Perimeter Protection (PIDS)
- Intercom and communications
- Alarm, Incident Reporting and Event
Management
- Drone
detection / Counter Unmanned Aerial Systems (CUAS)
- Advanced
real time Security and Operational Intelligent Analytics
- Manual
and automated point of entry/floor/building lockdown
- Mass
Communication tetra Radio for Incident management and reporting
- Vendor/Manufacturer
- neutral approach to avoid lock-in.
- Command
centre visualisation:
- 2D/3D map-based situational views
using Computer Aided Design (CAD), Mapping or Graphical Designed site
maps and building plans.
- Device status dynamic dashboards
and reporting.
- Operator action workflows and SOP
automation utilising cause & effect system tools.
- Event correlation and automated
decision support.
- Incident management and reporting
including mass communication via radio/SMS/email.
System Infrastructure and Integration Framework
- Server/workstation/Thin
Client architecture (on-prem (Secure Enclave), cloud, hybrid, or
accredited environment).
· Built on Microsoft .NET and WPF technologies to deliver superior user experience, advanced system integration, and secure networked operations.
- Network
topology design to include resilience, redundancy, and failover with patented
Migrating 3+ technology.
- Secure
data storage, retention policies, and access management.
- AES -256
encryption and End-to End TLS protocols.
- Encrypted
data exchange between i-CMS and all subsystem communication links for
fault tolerant design.
- Cybersecurity
hardening aligned to government NPSA CAPSS framework standards and
guidelines.
- Security
Information and Event Management (SIEM) logging capability for audit and
threat analysis.
- Open
standards-based connectors.
- SDK or
REST/ Open API for third-party integration.
User Interface & Operator Experience
- Customisable
operator dashboards.
- Role-based
profiles and multi-level user permissions.
- Incident
handling, audit trails, and post-event reporting.
- Secure multi-site control functionality.
Future System Integrations & Scalability Roadmap
Ongoing,
Planned & Future Integrations:
- Advanced
analytics (AI/ML-based threat detection, facial recognition, object
tracking, vehicle classification).
- Radar/Lidar
perimeter detection
- SCADA
or industrial control systems
- Environmental
monitoring and IoT sensors
- Secure
communications and dispatch platforms including mass communication.
- Integration
of non-critical third-party systems unless defined as priority.
- 3D
interactive Building Information Modelling (BIM)
- Mobile
applications unless specifically requested.
- Dedicated
*on premises AI analytics *unless presented as
separate optional deliverable.
- Body
worn cameras unless integrated to VSS (VMS)
Note: (The above list is not limited to, and itemised items may/will
be included in future integration phases.)
National
Protective Security Authority (NPSA) Cyber Assurance of Physical Security
Systems (CAPSS) Compliance
The solution
will be designed to meet relevant CAPSS requirements including:
- Secure
device authentication.
- Supply
chain assurance.
- Vulnerability
management and patching policy.
- Approved
cryptographic protocols.
- Evidence
required for certification and audit trails.
Other
Regulatory Requirements:
As applicable:
- NCSC
security guidance. (Aligned with NPSA)
- GDPR /
data protection controls.
- Secure
access control authentication (biometric, multi-factor,
government-approved smartcard identity management).
Project Delivery Methodology
Phased
Implementation
- Discovery
& Requirements Assessment
- Preliminary
Design & High-Level Architecture
- Detailed
System Design & Stakeholder Review
- Build
& Integration
- POC, Testing
& User Acceptance
- Go-Live
& Handover
Documentation
Deliverables
- System
architecture and integration drawings.
- Data
flow diagrams.
- Risk
assessments and threat modelling.
- Operational
SOP documentation.
- Cyber
assurance and compliance documentation (CAPSS certification evidence
submission)
- Site
Acceptance Test (SAT)
Note: Acceptance criteria will be documented for the complete
i-CMS to include integrated solutions.
Training & Knowledge Transfer
- Operator
training to include but not limited to:
- Digital
Manuals
- Video
instruction modules
- On-site
coaching
- Optional
scenario-based operational drills.
Service,
Support & Warranty
- 24/7
365 days Service Support Agreement (SSA)
- Defined
SLAs (response, fix, escalation rules).
- Advantage
Elite Partner
accredited service and maintenance program.