What is IMS? Incident Management Software

What is IMS?

User Rating: 3 / 5

Star ActiveStar ActiveStar ActiveStar InactiveStar Inactive

For a long time, the Military planners have used the term Critical Event to describe something that is of vital importance when setting an operation in progress. The name remains popular today and has, over time, changed to mean anything that is an alert or change from normality. Initsys uses the term to define a change of state in a similar way; it could be a series of events that combine to make something critical or a group of pointers that indicate all is not well. In most cases, a critical event is as simple as a fire alarm activation or an indicator that an intruder has accessed an area that he or she should not have. But, it could be as complicated as detecting the mass movement of people in a city centre, running from some, as yet, unknown situation. It could also be a series of unrelated warnings that individually could get ignored: for example, a heating system reporting a rise in temperature, a fire alarm reporting a fault and an intruder alarm indicating a tamper.... a real World event that would have been catastrophic had it not been for Merlin.

MerlinAi profiles and procedures combine powerfully to ensure that the minutest detail isn't overlooked when processing an event...... was that access control violation, as seen earlier, and noted by the software tied to the intrusion event we have just seen?

Likewise, a critical event could be downgraded; the threat level lowered- if the software detects that the information is following a familiar pattern, processed multiple times in the past as a false positive.

Starting life as simple automation software for commercial control rooms, Merlin has now evolved, it handles alarm events quickly but can also be extended to all forms of a state change from normal. It can be used to filter sensors that perform poorly from masking those that have detected real activity.


As examples, MerlinAi can....

  • Locate events in real time in geographic locations, handling multiple calls for the same incident as one. Keeping response resource properly engaged and free.
  • Filter sensors that are triggered by weather or other factors from those that do not, avoiding the operator blindness caused by too many false triggers.
  • Identify data that could be linked and providing that to the operations personnel, raising the threat of an incident as it happens automatically.