{"id":2642,"date":"2019-06-11T15:23:12","date_gmt":"2019-06-11T12:23:12","guid":{"rendered":"http:\/\/nanodems.mybirer.com\/?page_id=2642"},"modified":"2021-05-13T20:50:45","modified_gmt":"2021-05-13T17:50:45","slug":"critical-infrastructure","status":"publish","type":"page","link":"https:\/\/www.nanodems.com\/security\/critical-infrastructure\/","title":{"rendered":"Critical Infrastructure"},"content":{"rendered":"<p>[vc_row][vc_column][gsf_heading sub_title=&#8221;Streamline operations, decrease downtime and increase efficiency with Nanodems NDIS Critical Infrastructure solution.&#8221; local_subtitle=&#8221;subtitle-bottom&#8221; heading_size=&#8221;large&#8221;]<\/p>\n<h4><span class=\"TextRun BCX7 SCXW118488391\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX7 SCXW118488391\"><strong>Transforming. Connecting. Impacting Security System Integration For The Better<\/strong><br \/>\n<\/span><\/span><\/h4>\n<p>[\/gsf_heading][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1609784606517{padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1609784011928{padding-top: 40px !important;}&#8221;]Energy and Utilities fall under the critical infrastructure category where threat levels and incidents need to be carefully managed and evaluated. However, when multiple disparate systems, various hardware devices, existing and new infrastructure devices, and regulatory compliance are all at play it complicates the oversight process.<\/p>\n<p>Identifying disruptions in operations, damaged infrastructures or equipment, threats or incidents resulting in losses are critical. Nanodems NDIS platform delivers these critical infrastructure entities an intelligent PSIM solution, which converges and unites all disparate physical security systems to provide a centrally managed command and control station.<\/p>\n<p>Seamlessly track and monitor all systems including:<\/p>\n<ul>\n<li>Perimeter Systems<\/li>\n<li>Intercom Systems<\/li>\n<li>ACS Systems<\/li>\n<li>CCTV Systems<\/li>\n<li>UVIS and ANPR Systems<\/li>\n<li>Radars<\/li>\n<li>RF and Barcode Systems<\/li>\n<li>Access Control<\/li>\n<li>SCADA<\/li>\n<li>OPC and MODBUS<\/li>\n<li>Intrusion Alarms and Sensors<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;3440&#8243; img_size=&#8221;large&#8221; style=&#8221;vc_box_circle_2&#8243; css_animation=&#8221;left-to-right&#8221; css=&#8221;.vc_custom_1609782659647{padding-top: 40px !important;padding-right: 60px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Anticipate and identify threats or incidents with better global oversight of operations. Deploy SOP\u2019s to handle incidents real time, maintaining operational integrity and continuity. Leverage existing infrastructure to maximize cost efficiency and interoperability.[\/vc_column_text][gsf_space desktop=&#8221;80&#8243; tablet=&#8221;80&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;60&#8243; mobile=&#8221;60&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1611756668758{padding-top: 10px !important;padding-bottom: 20px !important;background-color: #423d3b !important;}&#8221;][vc_column css=&#8221;.vc_custom_1609785109085{padding-bottom: 20px !important;}&#8221;][vc_custom_heading text=&#8221;NDIS is an intelligent solution that can seamlessly integrate all components of critical infrastructure monitoring into one centralized and converged physical security management system.&#8221; font_container=&#8221;tag:h4|font_size:32|text_align:center|color:%23f68922|line_height:1.2&#8243; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:800%20bold%20regular%3A800%3Anormal&#8221; css=&#8221;.vc_custom_1611756714489{padding-top: 20px !important;padding-bottom: 30px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1609785309512{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_column][gsf_space desktop=&#8221;60&#8243; tablet=&#8221;60&#8243; tablet_portrait=&#8221;50&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1609785628843{padding-bottom: 80px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1609784755308{padding-bottom: 10px !important;}&#8221;][vc_single_image image=&#8221;3813&#8243; img_size=&#8221;large&#8221; style=&#8221;vc_box_rounded&#8221; css_animation=&#8221;right-to-left&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1609785509350{background-color: rgba(246,137,34,0.9) !important;*background-color: rgb(246,137,34) !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609854255421{padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h4><span data-contrast=\"auto\">Use NDIS to\u2026<\/span><\/h4>\n<ul>\n<li>Identify issues quicker, respond faster and reduce operational downtime<\/li>\n<li>Centrally and securely, track and monitor activity across different locations<\/li>\n<li>Anticipate, identify, and swiftly respond to incidents and threats<\/li>\n<li>Reduce costs, time and human resources demand to improve efficiency and streamline operations<\/li>\n<li>Comply and keep current with ever-changing regulatory requirements<\/li>\n<li>Maintain uninterrupted security operations<\/li>\n<li>Expand business security operations, while reducing costs through our open architecture platform<\/li>\n<li>Map out standard operating procedures to reduce disruptions and downtime<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1609787014904{padding-top: 20px !important;padding-bottom: 0px !important;}&#8221;][vc_column][vc_separator color=&#8221;mulled_wine&#8221; style=&#8221;shadow&#8221; border_width=&#8221;2&#8243; css=&#8221;.vc_custom_1609787095705{padding-top: 10px !important;}&#8221;][gsf_heading sub_title=&#8221;&#8221; css=&#8221;.vc_custom_1609787155756{padding-top: 10px !important;}&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><strong class=\"uppercase\">NDIS delivers:<\/strong><\/h3>\n<p>[\/gsf_heading][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1609787035224{padding-top: 50px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3831&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583244796256{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609860661346{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><b><span data-contrast=\"auto\">The Converged Vision\u2122 Concept<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><br \/>\n<\/span><\/h6>\n<ul>\n<li>Offers open architecture for more flexibility and scalability<\/li>\n<li>Delivers seamless integration between multiple systems<\/li>\n<li>Centralizes monitoring and tracking for better situational awareness<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3828&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583244055246{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609857247328{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><b><span data-contrast=\"auto\">One-Step Device Configuration<\/span><\/b><\/h6>\n<ul>\n<li>Standardize configuration to thousands of devices with one click<\/li>\n<li>Minimizes set-up time and device installation<\/li>\n<li>Ensures uniform monitoring and reporting<\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3827&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583243784067{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609941511226{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><b><span data-contrast=\"auto\">Integration with Cyber Security Products<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h6>\n<ul>\n<li>Automates actions between cyber and physical security systems<\/li>\n<li>Enables faster response times to cyber threats and attacks<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3832&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583245020886{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609865143217{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><b><span data-contrast=\"none\">Intelligen<\/span><\/b><b><span data-contrast=\"none\">t Security Insights<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h6>\n<ul>\n<li>Enhances global awareness and better mitigates risk<\/li>\n<li>Dynamic GPS mapping delivers greater insight with incidents or investigations<\/li>\n<li>Customizable reports and trends are easily accessible<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1583235815751{padding-top: 0px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3823&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583241507047{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1610377892794{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><strong>Instantaneous Access &amp; Authorization<\/strong> <\/span><\/h6>\n<ul>\n<li>Centrally configure, grant or remove access rights with one click<\/li>\n<li>Disseminate the right information at the right time to the right people<\/li>\n<li>Allows for faster and more efficient response by personnel<\/li>\n<li>User-friendly format for SOP delivery<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3820&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583241120189{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609865820442{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><b><span data-contrast=\"auto\">Real-Time Health Monitoring<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h6>\n<ul>\n<li>Devices are monitored 24\/7 for failure, disruption and connectivity<\/li>\n<li>Any interruption in signal sets off several alarms: dashboard, email &amp; SMS<\/li>\n<li>At-a-glance visually assess hardware conditions &amp; system statuses<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3825&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583242260788{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1609867908326{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><b><span data-contrast=\"auto\">Alarm and Incident Management<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h6>\n<ul>\n<li>Customizable alerts for immediate notification of issue(s)<\/li>\n<li>Integrated system correlates alarms to events and instant footage for faster response<\/li>\n<li>Automatically logs each incident or resolution for better planning<\/li>\n<li>Enables effortless compliance with current regulations<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3830&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1583244699625{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1610377878632{padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}&#8221;]<\/p>\n<h6 style=\"text-align: center;\"><strong>Audit Trails and Personnel Access Management<\/strong><\/h6>\n<ul>\n<li>Monitor &amp; track personnel activity by location to gain global views of operations<\/li>\n<li>Maintain accurate audit logs for regulatory compliance<\/li>\n<li>On-demand display of user actions protects physical and online data<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1609868895322{padding-top: 10px !important;}&#8221;][vc_column][vc_separator color=&#8221;mulled_wine&#8221; border_width=&#8221;2&#8243;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1611761411276{padding-top: 10px !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_custom_heading text=&#8221;For more information or to learn how NDIS Critical Infrastructure Solutions can help your organization:&#8221; font_container=&#8221;tag:h5|font_size:20|text_align:left|color:%23423d3b|line_height:1.3&#8243; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1611761333064{padding-bottom: 20px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1609787730519{padding-top: 20px !important;}&#8221;][gsf_button title=&#8221;CONTACT US&#8221; size=&#8221;lg&#8221; link=&#8221;url:https%3A%2F%2Fwww.nanodems.com%2Fsecurity%2Fcontact-us%2F||target:%20_blank|&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][gsf_heading sub_title=&#8221;Streamline operations, decrease downtime and increase efficiency with Nanodems NDIS Critical Infrastructure solution.&#8221; local_subtitle=&#8221;subtitle-bottom&#8221; heading_size=&#8221;large&#8221;] Transforming. Connecting. Impacting Security System Integration For The Better [\/gsf_heading][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1609784606517{padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1609784011928{padding-top: 40px !important;}&#8221;]Energy and Utilities fall under the critical infrastructure category where threat levels and incidents need to be carefully managed and evaluated. However, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2642","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages\/2642"}],"collection":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/comments?post=2642"}],"version-history":[{"count":36,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages\/2642\/revisions"}],"predecessor-version":[{"id":4166,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages\/2642\/revisions\/4166"}],"wp:attachment":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/media?parent=2642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}