04 Mar 2026

Genesys

Integrated Security Manufacturing Stand: 5/F100
ISM Limited
Genesys
Genesys
Genesys
Genesys - i-CMS System Overview

The i-CMS shall provide unified situational awareness, system correlation, and centralised security management across multiple secure locations.

The i-CMS shall detail design, build, configuration, and deployment (network diagrams, redundancy schema).

  • Integration of initial subsystems:
    • CCTV (VSS) & Video Management Systems (VMS)
    • Access Control Systems (ACS)
    • Intrusion Detection Systems (IDS/GA)
    • Perimeter Protection (PIDS)
    • Intercom and communications
    • Alarm, Incident Reporting and Event Management
    • Drone detection / Counter Unmanned Aerial Systems (CUAS)
    • Advanced real time Security and Operational Intelligent Analytics
    • Manual and automated point of entry/floor/building lockdown
    • Mass Communication tetra Radio for Incident management and reporting
  • Vendor/Manufacturer - neutral approach to avoid lock-in.

 

  • Command centre visualisation:
    • 2D/3D map-based situational views using Computer Aided Design (CAD), Mapping or Graphical Designed site maps and building plans.
    • Device status dynamic dashboards and reporting.
    • Operator action workflows and SOP automation utilising cause & effect system tools.
    • Event correlation and automated decision support.
    • Incident management and reporting including mass communication via radio/SMS/email.

 

System Infrastructure and Integration Framework

  • Server/workstation/Thin Client architecture (on-prem (Secure Enclave), cloud, hybrid, or accredited environment).

·         Built on Microsoft .NET and WPF technologies to deliver superior user experience, advanced system integration, and secure networked operations.

  • Network topology design to include resilience, redundancy, and failover with patented Migrating 3+ technology.
  • Secure data storage, retention policies, and access management.
  • AES -256 encryption and End-to End TLS protocols.
  • Encrypted data exchange between i-CMS and all subsystem communication links for fault tolerant design.
  • Cybersecurity hardening aligned to government NPSA CAPSS framework standards and guidelines.
  • Security Information and Event Management (SIEM) logging capability for audit and threat analysis.
  • Open standards-based connectors.
  • SDK or REST/ Open API for third-party integration.

User Interface & Operator Experience

  • Customisable operator dashboards.
  • Role-based profiles and multi-level user permissions.
  • Incident handling, audit trails, and post-event reporting.
  • Secure multi-site control functionality.

Future System Integrations & Scalability Roadmap

Ongoing, Planned & Future Integrations:

  • Advanced analytics (AI/ML-based threat detection, facial recognition, object tracking, vehicle classification).
  • Radar/Lidar perimeter detection
  • SCADA or industrial control systems
  • Environmental monitoring and IoT sensors
  • Secure communications and dispatch platforms including mass communication.
  • Integration of non-critical third-party systems unless defined as priority.
  • 3D interactive Building Information Modelling (BIM)
  • Mobile applications unless specifically requested.
  • Dedicated *on premises AI analytics *unless presented as separate optional deliverable.
  • Body worn cameras unless integrated to VSS (VMS)

Note: (The above list is not limited to, and itemised items may/will be included in future integration phases.)

 Compliance & Regulatory Requirements

National Protective Security Authority (NPSA) Cyber Assurance of Physical Security Systems (CAPSS) Compliance

The solution will be designed to meet relevant CAPSS requirements including:

  • Secure device authentication.
  • Supply chain assurance.
  • Vulnerability management and patching policy.
  • Approved cryptographic protocols.
  • Evidence required for certification and audit trails.

Other Regulatory Requirements:

As applicable:

  • NCSC security guidance. (Aligned with NPSA)
  • GDPR / data protection controls.
  • Secure access control authentication (biometric, multi-factor, government-approved smartcard identity management).

Project Delivery Methodology

Phased Implementation

  • Discovery & Requirements Assessment
  • Preliminary Design & High-Level Architecture
  • Detailed System Design & Stakeholder Review
  • Build & Integration
  • POC, Testing & User Acceptance
  • Go-Live & Handover

Documentation Deliverables

  • System architecture and integration drawings.
  • Data flow diagrams.
  • Risk assessments and threat modelling.
  • Operational SOP documentation.
  • Cyber assurance and compliance documentation (CAPSS certification evidence submission)
  • Site Acceptance Test (SAT)

Note: Acceptance criteria will be documented for the complete i-CMS to include integrated solutions.

 Training & Knowledge Transfer

  • Operator training to include but not limited to:
    • Digital Manuals
    • Video instruction modules
    • On-site coaching
    • Optional scenario-based operational drills.

 

Service, Support & Warranty

  • 24/7 365 days Service Support Agreement (SSA)
    • Defined SLAs (response, fix, escalation rules).
  • Advantage Elite Partner accredited service and maintenance program.

 

 

 

 

 

 

Loading