You are on page 1of 9


ult imate
ult imate
Established in 1989, ISM is a World pioneer in
integrated security management solutions; the
U.K.’s leading developer of integrated security
management, intercom and cell call systems.
Operating from our extensive manufacturing and
design facility in Sussex,
our global client base
encompasses many of the
World’s most prominent
institutions including
local authorities, health establishments, education
campuses, shopping centre operators, financial
institutions, the prison and police authorities.

We specialise in the design, development and
manufacture of graphical security control room
management software and intercom systems with
VoIP. Our Genesys software facilitates the integration
of many types and manufacture of third-party
equipment including CCTV matrix and digital video
recorders, access control systems, fire alarms,
intruder alarms, audio matrix, intercoms, public
address and paging systems - all from one holistic
security management system. Our Ultimate 3000
audio exchange provides solutions for telephone
entry, intercom, help point, disabled refuge and cell
call systems.
The market for integrated security systems
is changing dramatically. Go back a few
years and it was viable to rely on a few
PCs to control the security of a building or
site. That is not the case today. Security
control rooms are now responsible for
running multiple sites... 60... 70 and more,
in many countries spanning different
continents. It has become a ‘responsibility
of scale’. With the traditional and now
archaic server-based systems you are
completely reliant on the server. So
what happens when the server goes
down? Your security can be severely
compromised. Not so with Genesys.
We distribute control across all of your
workstations. We’re taking power to your
PC and multiplying it by the number of
PCs on your network. And the genius of
this? If one PC fails, we can migrate the
control to another PC seamlessly with no
interruptions, no downtime. With Genesys
we are giving you the absolute Holy Grail
in security control room management
systems. Unparalleled flexibility, power
beyond your wildest dreams and a
redundancy that’s second to none.
Stephen Smith,
Sales and Marketing Director, ISM
Decades of innovation,
design and manufacturing excellence

At the very core of our business is a robust
and unflinching commitment to research and
development. We invest at least 12.5% of our
annual turnover in research and development and
have our own dedicated R&D and innovation team
on-site. Running parallel to our R&D strategy is an
ongoing dialogue with clients. By understanding
the changing needs of our
clients’ and drawing on our
wealth of experience and
technical expertise within
the security industry we can
design, deliver and implement pioneering systems.
It’s a strategy that works because it fuels ongoing
innovation. Given the unparalleled rise in terrorist
activity in the 21st century and its insidious nature,
the organisations that approach us are looking for a
global solution to their security needs; one that can
be implemented at a local level, that is scalable yet
easy to manage by individual team members.
Genesys v2 is the answer. Several years in the
making and born out of Genesys Classic, Genesys
v2 is the culmination of our internationally recognised
ability to design systems that deliver security
management solutions globally.
Genesys v2 is a genuinely
unique patent protected product;
(something we explore in more
detail further on). Each one of our
products is designed, developed and manufactured
in-house and supported by a system design team
for pre-sales design support plus a full project
management department to assist in the successful
delivery and technical support after-care.
One of the first things a potential client wants to
discuss when approaching us is the experience we
have of working in their sector and the countries we
work in. The confidential and highly sensitive nature
of our work means that whilst we cannot share client
details or names we can tell you that our systems
have been deployed in:
• financial institutions
• police services
• prison services
• health services
• universities and schools
• mental health units
• government buildings
• high security control rooms
• airports
• critical infrastructure
• museums and art galleries
• oil and gas
• VIP residences
In fact from the City of London to the farthest points
on the globe, ISM have developed pioneering
security control room management systems that are
now responsible for protecting millions of people
from all walks of life by safeguarding the buildings
and infrastructures that house them.
The perfect partnership
of r&d and innovation
Who do you
work with…?
Imagine for a moment that you’re attending one
of our innovation meetings a few years ago. In
this particular meeting you’re listening to some of
the discussions between our R&D, design, project
management and senior management teams about
Genesys v2. This is what you would have heard...
“As part of the new networked security system,
the main command and control functions are to be
undertaken by an integrated graphic user Interface
computer front-end. This will monitor both local and
remote sites. The system will be capable of sending
and receiving information from
security subsystems to local/
regional Security Centres
and to the Main Security
Control Room. The Security
Information Management system (SIM) will be a
network of Windows 7 compatible PC workstation(s)
which will have overall control of all electronic
security systems installed at each site that can
include but not be limited to: -
• Perimeter intruder detection
• CCTV and Digital Recording
• Intruder Alarms
• Panic/Affray Alarms
• Video Content Analytics
• Building Management Systems
• Electronic Locking
• Cell Call
• Fire Detection
• Intercoms
• Public Address
• Trunked Radio
• Radio Paging
• Staff Safety Systems
• Guard Tour
“Genesys v2 must be a holistic security management
system with the ability to monitor and control multiple
systems from multiple manufacturers from a single
software platform.
“It must offer clear and concise easy to navigate
graphics and text acknowledgements along with real-
time active icons. These facilities shall enable the user
to be visually aware of all the activity of events and
actions as and when they happen. The graphic plans
will be in high resolution 2-D or 3-D format to enable
operators to become familiar with the building (s) and
locations that are being monitored and/or controlled
by the SIM system. There will be a 3-D model of the
site (s) and or location (s) to allow the operator an
instant overview of all of the maps available for the
system. As the software will be highly intuitive, training
the operators on the use of the system will take no
more than two hours. The system will have a complex
log to enable the manager/supervisors to produce
audit trails and reports.
“The software will operate as a standalone platform
over LAN or WAN networks for remote and local
sites with workstations that can be transferred to
any operating security control room on the network.
This offers the end user flexibility when closing down
sites or buildings for off-peak or
out of normal working hours or in
the unlikely event of any system
“The SIM system will have been designed in a
modular format for ease of operation. This is
especially relevant when the end users are using
multiple disciplines/integration. This will enable
management to allocate individual operators with
all or individual modules. The models represent the
system types such as fire alarm, intruder detection,
access control, audio intercoms, digital recording
systems, cell call, concierges etc. Each module shall
include a graphical control panel which replicates the
function of the hardware. Each module will display
the relevant icons on the maps for the individual
system (which can include associated modules
items via filters within the configuration menus). This
alleviates cluttered graphics and confusion for the
operators. The SIM system will offer true integration
via an action list application. This will enable
every device for each system to interact via cause
and effect to include display graphical maps and
memos/instructions related to the individual alarms
to the operators. This will allow all events to be
automatically triggered when an alarm device enters
any state; thereby eliminating the human error factor.
“The system will utilise the latest Microsoft.NET
platform and Windows Presentation Foundation
(WPF) for an enhanced graphical user experience
and will include migrating Driver redundancy
technology, with the ability to distribute the Driver
interfaces across the network as each SIM PC can
run individual Drivers. This also allows any of the
SIM workstation PC (s) on the network to become a
master for both the Drivers and the database.”
Hundreds of thousands of man-hours, engineering
excellence and patent approved application and this
is the system we developed: Genesys v2.
The brief,
that gave birth to genesys
ult imate
ult imate
Fire alarm
Access control
Intruder alarm
GDS - Genesys Driver
GMS - Genesys Messaging
GSE - Genesys State
GMTS - Genesys Migrating
Technology Service
GFE - Genesys Front End
DB - Database
Genesys is a fully integrated security management
system capable of integrating multiple systems.
Interoperability is enabled from one holistic platform.
Genesys encompasses high levels of functionality,
exceptional ease of use, graceful redundancy and
advanced alarm handling.
• The Genesys front end
The Genesys Front End, sometimes referred to as a
Graphical User Interface or GUI is one of the engines.
Being independent of the rest of the system it can
reside on a PC to carry out control functions, or as
a main load carrying PC with driver control. This
independence increases the stability of the system. It
also enables effortless expansion.
• Why driver separation enables system
One of the most critical and unique elements of
Genesys is that individual Driver instances are set
up for each system connected within the Genesys
Driver Service (GDS). This separation of Drivers
allows for the load of all the Drivers running to be
spread across the system - thereby allowing for a
large number of Drivers to be connected. The GDS
monitors each Driver instance. So, if a Driver become
unstable or fails due to poor third-party software
then the GDS can close down the individual Driver
(to ensure it does not cause an issue to any other
part of the system) at the same time as generating
an alarm event. The GDS promotes the ability to
migrate individual Drivers to other computers in the
event of a PC or network failure. By employing a
separate engine it is also
possible to run these Drivers
on dedicated PCs or servers
if you prefer this network
architecture. Genesys
incorporates a status engine and an SQL server
database. This means that the software remembers
the state of all devices, alarms and the current alarm
progress of alarm tick-lists. If an alarm has been
accepted on a PC and the PC fails before the alarm
has been reset then the alarm will be resent to the
network again. This ensures that no alarm is ever lost.
…the world has waited
system architecture
We listened to our clients. Ease of use was their
fundamental requirement. So we combined our
20 years’ plus experience and expertise with an
unquenchable thirst to understand at a granular
level what today’s users need. We embarked
on an evangelical study of how different
control rooms function and what the operators
are required to do, on a second by second
basis. And the result? With Genesys we have
developed a system that is truly groundbreaking
and genuinely unique. Genesys is a system that
the user can readily and easily use. It utilises
the latest Microsoft.NET platform and Windows
Presentation Foundation (WPF) for an enhanced
graphical user experience and it’s all wrapped
up in our pioneering patented migrating 3+
David Jenkins,
Managing Director, ISM

As well as incorporating our patented migrating
3+™ redundancy, Genesys has further
additional patents pending. With the ability to
distribute the Drivers across the network, each
Genesys PC can run the Drivers. Genesys
has moved away from the traditional server
and client configuration with all of its inherent
flaws and issues, to a more stable and robust
platform. We have transferred power from the
server to the PC.
Steven Card,
Technical Director, ISM

ult imate
ult imate
• The genius of the Genesys state
As connected devices change state - some simply
from Off to On or others having multiple states such
as; tamper, fault, door open, insecure, pre-alarm,
then the Genesys State Engine (GSE) receives these
states and sends a message to update the icons
shown within the Genesys Front End. This provides
near real time status of all devices. This engine also
monitors the status of the Genesys computers on
the network, what alarms have been acknowledged,
and how many actions on the alarm task list have
been completed. This keeps each one of the Genesys
computers fully up-to-date. If a PC failure or engine
fault should occur then the other users are aware that
a user is off-line.
• Top secret level encryption
All messages are sent via the Genesys Messaging
Service (GMS) between the Genesys engines and
services using Secure Socket Layer Cryptographic
Protocol. The Genesys Migrating Technology Service
details the driver migration and all actions on the
system are stored within a Sequel server database.
When communicating between computers across
the network, Genesys employs 256 Bit Advanced
Encryption Service. This protects information up to
Top Secret level.
• Capability to communicate in multiple
Genesys supports multiple languages; something
which is achieved by using a translation database
or databases. When an operator logs on, the correct
language is displayed to them (the separate language
databases are situated between the main system
database and the Genesys Front-End).
• Calling time on servers and clustering
Because of its pioneering system architecture,
Genesys is not restricted due to the size or capability
of a server, nor does it require the expense of moving
to server farms or utilising clustering software.
Genesys adds higher levels of automatic configurable
redundancy and power. It ensures continued
connectivity to all systems at all times.
Competitors have fallen into the trap of delivering
a Windows-like application. We know from
extensive research that operators don’t like it.
It’s confusing, messy on the screen, neither
clean nor clear. Genesys v2 has been developed
on the same principles as Genesys Classic; ease
of use, clear and concise graphics, clear menu
boxes and dynamic control panels that appear
when you touch the graphic. These features
and more are what make Genesys v2 a truly
outstanding system; a system that’s miles ahead
of anything available on the World market today
and tomorrow.
John Waite,
Business Development Director, ISM

Genesys is an outstanding breakthrough in
security management technology. Systems are
becoming larger as the need to control local,
national and international sites from one holistic
interface grows. Genesys has the flexibility to
fulfil requirements in the present moment and in
the future.
David Jenkins,
Managing Director, ISM

ult imate
ult imate
access control
fire alarms
HARDWARE connection to lan/wan
Clear and concise alarm management is absolutely
vital to the success of any security management
system. Genesys offers a comprehensive event
management database. Events and alarms are
presented to the operators clearly with an alarm
workflow together with automated and manual
workflow options that guide the operators through
these events. As alarms are handled in the same
generic way, training is straightforward and the
reactions of operators to these events are greatly
Genesys provides enhanced alarm handling
incorporating multiple scenarios that can be
allocated to alarms so that they trigger automatically
at certain events including:
1. On receipt of an alarm.
2. When the operator accepts the alarm.
3. If the device changes state etc.
For example if a PID alarm is triggered, Genesys will
• Increase the frame recoding rate on the DVR/NVR.
• Page security staff.
• Lock down perimeter doors.
• Switch on perimeter lighting.

When the operator accepts the alarm they are
presented with the live CCTV images together with
the pre-and post-event recording from the DVR
at the time the event was generated. The alarm
task list is presented detailing a workflow for the
operator to follow. The workflow list can detail
basic functions for audit purposes such as ‘check
the CCTV’, ‘call the supervisor’. By selecting one of
these actions Genesys will carry out the automated
function and the item will be ticked off the list. The
operator will then proceed to the next item. It is
possible to add events to the workflow list such
as ‘lock down doors’ or ‘add a note to the alarm
event’. Only when this note has been added can the
operator reset the alarm.
Once the event has been cleared and the operator
has reset the alarm the system will automatically
revert back to a default position for example:
• Sending cameras to their home positions.
• Switching the monitors to default view.
• Returning the DVR to normal record state.
• Switching off floodlights.
• Normalising doors.
• Paging staff.
• Genesys Change Management in
Your Hands
Genesys can be fully configured by any trained
member of your team. The benefit of this is that you
have full control over your system. You can make
amendments to keep your system current without
having to call upon ISM for on-site support.
ult imate
ult imate
Why enhanced alarm handling
is crucial
In Genesys security providers now have the
optimum tool to control and monitor their
complex security installations to the highest
Mark Ranger,
Technical Department Manager, ISM

Alarm event
Alarm Displayed
On Genesys
Accepts Alarm
Alarm Task List
Alarm Reset
preset position
Check CCTV
PTZ to Home
DVR Triggered
Lockdown Doors
DVR Normalised
Alarm Silenced
Page Staff
Switch On
Page Staff
CCTV Screen
Layout Change
Switch Lighting
Call Supervisor
Switch Off
Log Entry
Normalise Doors
Show Live, Pre
and Post Images
Genesys incorporates an alarm escalation feature.
This allows an operator to trigger different scenarios
with the display of a new tick-list if required.
The alarm escalation can be triggered automatically
from rules that are set up in the system configuration.
For example items such as multiple alarms from the
same area, alarms not accepted by an operator after
a set period of time and the number of active alarms
can be the trigger.
Genesys offers a completely configurable layout of
one, two or three PC monitor screen displays per
workstation - absolute flexibility plus the ability to
increase functionality as the system grows.
The end user has a system that is future proof
because its expansion capability is limitless.
Genesys has a full system log. This file records
the actions of the system - detailing the operator,
the action and any automated actions plus any
responses to alarms that have been recorded by
the operator. This log has a search facility and it is
capable of producing basic level reports. If a more
advanced analysis of the logs is required then the
database can be exported and interrogated by
any ODBC programme such as ACCESS and
Crystal Reports.
• Big on Benefits
Here is a summary of just some of the features and
benefits of Genesys:
• Highly configurable. Most changes can be
implemented simply by updating the configuration
rather than applying in code. Enhanced functionality
reduces costs.
• Alarms can be set to specific users or workstations
and can be prioritised.
• Alarms can be easily identified and reacted to
because of the different alarm sounds and flashing
border colours per system.
• Emergency Procedures with alarm tick-lists.
• Alarm escalation rules and manual activation.
• Enhanced graphical user experience and animation
from utilising the latest Microsoft technologies -
.NET platform and Windows Presentation
Foundation (WPF).
• Ease of navigation from the Map control panel in
2D or 3D mode.
• Migrating 3+™ Technology:
- Each Driver can run on any networked PC with
its own sequence of migration PCs in the event
of failure.
- Distributed Drivers enable the communication
load to be spread across all networked PCs. No
reliance upon one PC for all communications.
- Because a front end is not required for the Driver
to run, Drivers can run on non-operator PCs. If
large numbers of Drivers are required additional
PCs can be added to handle the load.
- Each Driver runs in isolation from the front-end
and from other system components. A Driver
failure will have no effect on the functioning of the
rest of the system.
Genesys Classic is still a pioneer in security
control room systems, leading the market
by several years. Whenever Genesys Classic
is technically evaluated against any other
competitive security control room system it
always wins hands down. Competitors are still
trying to catch up with Genesys Classic let alone
Genesys v2. I believe we are years ahead of
the market.
David Jenkins,
Managing Director, ISM

- Drivers will continue working even when the front-
end is not running. When the front-end starts
up, any alarms that were activated whilst it was
not running will be displayed and any changes
to device states (for example doors opening and
closing) will be shown.
• Multiple monitor support:
- Front end can be configured to cover multiple
monitors (this is naturally dependant on the
capabilities of hardware).
- Different layouts for the Genesys v2 ‘panels’ (map,
video, alarms, control, etc) can be configured.
Layouts can be changed depending on user
preference and via Action Lists.
• Advanced Action List system – Define powerful and
complex cause and effect rules.
- Execute any command on any device.
- Define matrix actions/camera tours.
- Create highly configurable guard tours and
cell watches.
• Configurable ‘Tick Lists’ for accepting alarms:
- Uses the Action List system.
- Perform a series of automatic commands.
- Prompt for user input to make alarm notes.
- Alarm can only be reset once tick-list is complete.
• New Alarm Window and Alarm Ownership system:
- Dedicated alarm list window shows all alarms, or
a filtered selection of alarms.
- Alarms grouped by Accepted, Active and
Accepted by Other User. All alarms accepted by
the operator are grouped at the top of the list
and unaccepted alarms are grouped below.
Alarms accepted by other users are grouped at
the bottom.
- Accepted alarms are allocated to the user and
become unavailable to other users. The accepting
user’s progress through the alarm’s reset tick-list
is remembered enabling them to return to the
alarm later. The user can also log on to a different
workstation to continue processing the alarm.
- Accepted alarms can be escalated causing
them to be allocated to a higher level user and
changing the tick-list items, if required.
- Accepted alarms can be un-accepted, allowing
another user to continue processing the alarm.
• New Multi-State Device Icons:
- Devices are defined by the state attributed to
them. For example a door device could have a
‘Position’ state and a ‘Locked’ state.
- Each value for each state can have a map icon
associated with it. For example a door position’s
state value of ‘Open’ can display a different icon
to when it is ‘Closed’. Overlaid on top of that will
be the icon for the current Is Locked state – an
icon for either ‘True’ or ‘False’.
- The default configuration for the states that have
icons and the states that don’t is provided by
the Driver. However, the user can change any of
the defaults and can allocate icons to any state
values or remove them.
• New State Triggers feature:
- A trigger can be configured to activate when a
device state changes to a particular value. When
activated the trigger will run an Action List.
- The Driver provides full details on the default
configuration for its triggers (mainly used to
activate alarms). However it is fully configurable
by the user and any actions can be taken when
the status of the devices change.
- A selection of other, more general triggers are
also available. For example an Action List can
be run when any of the following activity is
selected on the system: Icon Clicked, Menu
Shown/Hidden, Module Button Clicked, and
Layout Changes.
• World leader and pioneer in the design and
manufacture of security software solutions and
high-quality audio intercom systems for 23 years.
• Inventors of Genesys Classic, the World’s leading
patented integrated security software platform.
• Inventors of Genesys v2 the next level in integrated
security software platforms.
• A highly trusted, respected and stable brand. ISM
software and hardware is used by thousands of
organisations worldwide.
• Dedicated manufacturing facility, project
management team, technical support and sales
in Sussex.
• Rated by Deloitte and Touche as the 49th fastest
growing technology company in the world.
• ISM invests 12.5% of gross revenue in research
and development compared to the industry average
of 7%.
• Leading provider of global centralised security
systems for police, prisons, custodial, commercial
banking and finance, education, rail and transport,
social housing critical infrastructure and more.
Please get in touch with us whether it is to discuss your security need, if you would like to
arrange a full system demonstration or simply require further information. Our experienced
team is available to assist.
The compelling case
for ism
ult imate
ult imate
25-29 The Bell Centre | Newton Road | Crawley | West Sussex RH10 9FZ
TEL +44(0) 1293 529990 FAX +44(0) 1293 528023 E-MAIL WEB