2022 CHAMPIONS - THE BEST OF 2022 AST 2022 CHAMPIONS EDITION FINAL | Page 151

Shared BOLO file in Valor Unify

Valor Unify auto- matically searches all associated in- formation integrat- ed from disparate systems .

www . AmericanSecurityToday . com 2022 CHAMPIONS - Edition 66

A Person of Inter- est in the shared database may trigger an alarm through an intrusion detection or behavior de- tection system as a Suspicious Person doing Pre-attack Sur- veillance around a perimeter of a secured area .

That same Person of Inter- est may be linked in a shared BOLO file created by another stakeholder , further highlight- ing a possible threat .

When integrating threat in- formation from various secu- rity systems into Valor Unify ,

Shared BOLO file in Valor Unify

the threat can be recognized in a timely manner .

If a cybersecurity analyst de- tects suspicious activity , Valor Unify enables input into the physical security system for heightened alert and a proac- tive approach .

Valor Unify is designed to ac- knowledge alarms , triage inci- dents based on shared informa- tion from multiple sources , and dispatch h resources according to dynamic unified SOPs ( stan- dard operating procedures ).

151