PSIM: Why should I be interested?

CCTV Handbook 2013 Surveillance

Physical Security Information Management (PSIM) software enables security departments to manage an enterprise’s exposure to security risk. It is designed to aid decision-making and deployment planning within an organisation.

Within physical security operations, it has been widely accepted that critical information from numerous sources is left to system operators to interpret and act upon consistently and correctly. Most end-users have video surveillance, access control and building management systems. These systems are not integrated together and work independently with no communication with other systems in the ecosystem.

Security breaches and challenges

Following several large security breaches, such as 9/11 and 7/7, security professionals have recognised the need to bring together this information in a format that can be visualised and distributed. As a result, the security industry is now in transition; moving from disparate systems to integrated and interoperable systems.

Whilst system integration might not seem much of a challenge in the world of IT where standards have been around for decades, the physical security world has been much slower to adapt to change. This means a large number of organisations are using lots of systems in their control room which cannot work with each other.

How does PSIM help?

Firstly, PSIM provides an off-the-shelf platform to manage all of these systems, including both legacy systems and new technology, by connecting them together through a single interface. This is far more cost-effective than other forms of integration, such as bespoke turnkey solutions offered by some integrators.

Secondly, it uses workflow technology to provide operators with guidance and intelligence for situation management. This enforces all policies, increases effectiveness and provides evidence of compliance for auditing and risk mitigation. For example, it can perform intuitive prioritisation and escalation according to a range of predetermined criteria that might include chronology, location, priority and prevailing threat.

How does PSIM differ from other forms of integration?

Several studies have been carried out in this area by research companies including Frost and Sullivan and IMS, which have highlighted some of the features that distinguish a PSIM solution from other physical security and event management products. These key points define a PSIM product, and have been collated below:

* Open platform: It provides easy integration with a variety of systems from leading manufacturers. It is therefore essential that the PSIM vendor is not tied to any manufacturer of the underlying systems.

* Data collection: Device level information is collected from all connected systems. It should provide the ability to integrate events and alarms from these systems along with information such as time and geography, allowing it to automatically identify situations and then dynamically update them as they unfold.

* Data aggregation: The PSIM software should have the ability to evaluate the information that is gathered to identify and priorities real incidents and situations.

* Visualisation and collaboration: It should provide the ability to visualise a situation as it evolves and to share this intelligence with response teams, ensuring responses are fast and appropriate.

* Geospatial engine: Dynamically locating and creating relationships between devices, people and assets relationships is essential. For example, it may automatically identify the nearest cameras to a situation’s address or locate the security person closest to a medical emergency. This should offer the ability to display situations, devices, people and alarms – and shows what is happening in real-time within a given situation or globally across all situations.

* Incident resolution: The PSIM system software should facilitate the presentation of logically displayed and clearly communicated actions. It should enforce standard operating procedures to an operator, along with the information, tools and contact information needed for resolution – all within a single user interface. It should provide a set of easy-to-use visual tools to generate policies that are automatically imported into the system for use in the identification and resolution of situations.

* Reporting: All activity should be monitored, including all operator actions, to aid compliance management, provide training scenarios and as an auditable record of activity subsequent to a security incident. It should gather all information (videos, alarms, audio), actions taken, and results into one folder for compliance and investigative analysis or post situation training.

* Modular platform: It should dynamically adapt to changes in devices, configurations, situations, policies, and reporting while the system is running and support a distributed architecture for high availability and disaster recovery.

Are all PSIM solutions the same?

There are several true PSIM vendors in the market place who have been deploying their PSIM solutions for more than five years now. These vendors are several versions into the development of their software, giving them vital experience that only comes from successfully deploying a number of large scale installations. This has enabled them to understand the challenges and create products that are mature enough to meet the wide number of applications seen in PSIM today.

Unfortunately, there are also a large number of companies who are now marketing their old products under the PSIM banner; which is creating confusion in the market place as these products do not have many of the features essential to a PSIM solution.

True PSIM solutions have become more sophisticated, emphasising added organisation value through hardened security and increased efficiency or reduced ongoing costs. The crucial factor being that the customer can decide what their priorities are and implement all or just a few modules of a PSIM according to their unique situation.

This flexibility is key when selecting a PSIM solution. Organisations should research the product and ensure the PSIM solution is future-proof and can adapt to the organisation’s changing security needs. This will reduce the risk of purchasing a system that will need replacing if the organisation’s circumstances change a few years down the line.

For more information contact E-thele, +27 (0)12 665 3158, manica@ethele.co.za, www.ethele.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
The AI goldrush has a credibility problem
Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.