Integrated information platform for risk management

March 2024 Editor's Choice, News & Events, Security Services & Risk Management

Online Intelligence recently launched version 7 of its CiiMS (Centralised Integrated Information Management System). Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements and services on offer in version 7.

Online Intelligence, formed in 2003, is a software and services provider specialising in configurable and integrated solutions for enterprise risk, security management, incident and investigative case management, and event/alarm monitoring. It now boasts clients globally, and its integrated solutions address their risk and security concerns.

CiiMS 7 is a complete interface redesign that makes it easier for clients to navigate and access the applications. These are all integrated to deliver a single platform for risk and intelligence. It is available as a cloud service or onsite for companies with sensitive information to protect – such as banks.

The new CiiMS Risk application is an enterprise risk management framework that integrates threat and risk identification, mitigation, and monitoring into the platform. Risks are categorised and measured by the traditional probability and severity categories and potential consequences, which can be displayed on a risk matrix chart. The application now also offers risk forecasting through its dynamic rules engine.

Old and new events captured in CiiMS can be evaluated at set intervals to see whether they fit any risk forecasting scenarios for the client and allow them to compare potential and actual consequences. The system is also integrated into over 100 third-party platforms in the risk and security market to capture and analyse all the data on one platform. The results include all relevant information that potentially impacts the user's risk profile.

Additional applications

CiiMS Signal Tower integrates with various systems, including alarm technologies, ANPR/LPR databases, guard monitoring systems, CCTV platforms, fleet management, IoT, and industrial control systems. It can be linked to more than one of these systems simultaneously, allowing for the processing of large data volumes and quick updates to dashboards, analysis, and reporting.

With all that data in one platform, users can easily search for events, known risks or potentially new risks, and drill down into granular information to assist in investigations. This leads to CiiMS Intel, an incident and investigative case management application, a central repository of incidents, profiles and investigation management data.

Not forgetting the mobile security and risk operators who require data and have information to share while away from their computers, CiiMS Go is a mobile app designed for on-the-go operations. Users can create occurrences and checklists, even when offline in areas with no coverage. An emergency SOS alarm is also part of the app, sending the user’s information and last known location to the Signal Tower application.

Threat intelligence

Risk management is not only an internal discipline, but also needs to be cognisant of external threats that can influence business operations, such as riots or fuel shortages. CiiMS supports integrating external threats, including forecasted or expected threats, ahead of time, allowing clients to take appropriate measures. AI is used to forecast and project correlations between the external environment and the business’s risk management, warning, for example, that a specific threat could impact operations in a certain manner.

The data used to determine the external threats is gathered from various informal and formal sources, as well as OSINT (open-source intelligence) sources. These risks are disseminated via the CiiMS platform and multiple other mechanisms, such as WhatsApp.

A short video highlighting the above and other features of CiiMS 7.0 is available on the Online Intelligence home page (www.onlineintelligence.co.za).




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...