A closer look at PSIM

June 2013 News & Events

In a June 2012 report, Frost & Sullivan noted there was a PSIM (physical security information management) education gap. Basically, too few people know what PSIM is and what is can do for them. This is unfortunate because, just as people are starting to see the integration benefits of PSIM solutions, the technology is growing with PSIM now being used to incorporate standard operating procedures (SOPs) and processes of continuous enhancement as users learn from their mistakes and ensure each event is handled better than the last.

PSIM is even being used to enforce regulatory compliance as it takes on more than physical security tasks – such as queue management and overcrowding prevention. And PSIM is not only for large enterprises anymore. Even smaller companies are looking to “PSIM-Lite” solutions to help them manage their environments better.

To find out more about PSIM and its use in the real world, Hi-Tech Security Solutions asked Adlan Hussain, global head of marketing at CNL Software a few questions.

Hi-Tech Security Solutions: In the interests of education, perhaps we can start with your description of what PSIM is and what benefits it delivers to clients. Is there a difference between what we call a management platform and PSIM?

Hussain: PSIM is the evolution of security management platforms, which were previously based on analogue technologies. With the shift to IP based technologies came the opportunity to aggregate legacy analogue with digital solutions, create control room solutions of some complexity at much lower cost, extract rich data from the connected systems and allowed the system to assist operators with standard operating procedures (SOPs) pre-programmed in to the PSIM solution. With advanced solutions, the addition of workflow technology provides operators with customised step by step guidance to manage situations with control of all of the information provided by the underlying systems.

The main difference between a security management platform is its SOPs are normally fixed and the company has to follow the pre-determined operation according to the platform. In PSIM, it moulds around the user requirements and can be customised. It can be compared to SAP, same system can be used for a manufacturer as well as a bank, just needs customising to apply to the client’s needs. And yes, it was once considered expensive, but now competes with mid- to high-end management platforms that do not have the same capability.

Solutions of this complexity were previously only in the domain of government and big corporates as they were bespoke systems, cost a small fortune and were expensive to maintain. With PSIM, it is a customising solution that works with all the subsystems, allowing them to be brought together in a more economical way, reducing the ongoing support costs as well.

Hi-Tech Security Solutions: What is the state of PSIM uptake in South Africa? Are the larger enterprises adopting the technology? What about PSIM-Lite – is it even a rumour on the continent?

Hussain: CNL Software is fortunate to have strong partners in South Africa, who have been working with us since PSIM was in an infant stage. The product of this partnership has been a number of very large deployments of IPSecurityCenter in SA, spread across a number of vertical sectors, including mining, pipeline security, critical infrastructure protection, transportation and retail security. All of these systems have been intelligent systems delivered by our partner, so none of these were 'PSIM-Lite'. [E-thele SQD Networks is a CNL partner in South Africa – Ed.]

Regarding the PSIM-Lite market, the waters are murky as many video management systems (VMS) and access control systems (ACS) companies are trying to morph their products into this category. So, when you look at a proposal, you have to ask is this a VMS, ACS or PSIM-Lite. This is creating confusion and blurs the lines between intelligent systems and connected systems.

Hi-Tech Security Solutions: What are the biggest misconceptions about PSIM that you have come across in the market?

Hussain: One of the biggest misconceptions is that PSIM is a simple fix it all (a so-called silver bullet) solution. If you have issues with the network or failures in the underlying systems, PSIM will not fix this. You will need to get this resolved before installing.

Similarly, if you do not have any SOPs, you will need to define and create these so they can be implemented with the PSIM. Without having the requirements specified and a target action to be taken against an alert/alarm, guiding operators will not be as effective. It is the role of a good PSIM integrator to be able to work with you to create and resolve all issues needed for a smooth PSIM deployment. If your project is truly large, then you may consider a consultant as these can often advise what is needed rather than what an installer wants to sell to you.

Hi-Tech Security Solutions: PSIM solutions are expensive and complex. Do they deliver benefits and returns to companies who are prepared to spend the money? How should customers measure the ROI?

Hussain: Our experience with our customers shows that a well designed and delivered PSIM solution can offer huge benefits to an organisation. IBM in the UK was one of the first corporate users of PSIM technology in the world. Thom Williamson, manager security operations, IBM, commented on their solution, ”CNL consolidated 26 locations across our operations in the United Kingdom. We are moving from 17 command and control centres down to one. We estimate our ROI will be less than 18 months. The solution will provide the business with operational flexibility I never imagined possible.“

Well designed and delivered, PSIM is considered expensive and complex, but it ensures that complex risks, which could cost an organisation millions in damages are managed using all of the available intelligence. The challenge for security professionals is to push security to the right level and ensure it receives the necessary financial investment. It should pay for itself in operational savings.

Hi-Tech Security Solutions: Are you finding customers are wanting to expand their PSIM solutions to include SOPs, compliance and so forth? Is the technology up to the task?

Hussain: One of the keys to CNL Software’s success within PSIM has been our ability to integrate SOPs and compliance using workflow technology. We provide visual tools to easily create, use, save and store processes and procedure making light work of complex tasks. While other PSIM and some PSIM-Lite solutions are able to integrate and connect a number of systems, none were designed from the ground up to provide workflow technology in the same way as IPSecurityCenter. Our core clients value the fact we are customisable and match their requirements rather than act as a giant video aggregation engine.

Hi-Tech Security Solutions: What are some of the features that makes your PSIM or management platform stand out from the crowd?

Hussain: IPSecurityCenter PSIM has several key features that distinguish it from other PSIM platforms.

* Scalability – IPSecurityCenter is proven to scale and provides high levels of availability needed in some of the largest PSIM security projects in the world today. Several of these exceed 250 locations, with multiple buildings at each location. Some of these statistics are given below.

* Largest number of protected employees – 127 000.

* Largest number of operators – 250 including both thick and Web clients.

* Largest number of subsystems – 26 disparate subsystems.

* Largest number of locations – 255 locations.

* Largest number of alarm points – over 10 000.

* Largest number of SOPs or workflows – 52.

* Largest number of cameras – 60 000.

* Interface – IPSecurityCenter has been developed to allow a flexible graphical user interface (GUI). It is completely customisable, allowing simple controls to deliver complex tasks. For example, some projects require very simple kiosk-style controls to allow non-security personnel to view camera feeds. The role-based interface, ensures that only the appropriate tools are shown to support the specific tasks, taking the complexity out of the look-and-feel of the system. It also has the ability to host third-party content, such as intranet pages, third-party applications, etc. The availability of both thick and thin clients allows greater flexibility, allowing the perfect balance to be achieved between functionality and accessibility.

* Process Guidance and Workflow – IPSecurityCenter allows complex site-specific dynamic workflows to be created to guide operators in the event of an incident. It takes into account factors such as geographic location, time-of-day and the perceived threat level. It uses the IPSecurityCenter Response Plan Builder, giving visual design tools for updating and creating new processes allowing customer to respond to their dynamic environments.

* High Availability and Disaster Recovery – Many of our competitors chose to use third-party products to provide their HA/DR strategy. We implemented Microsoft’s recommended approach, using MS Clusters, SQL server and in this way can offer the clients a truly scalable solution, including load balancing and no requirement to stop servers on update. With many of our systems deployed in mission critical locations, the very idea of having to reboot a server on update is not acceptable.

* Federation – Increasingly we are seeing safe city, police, government and critical national infrastructure projects where it is essential to link systems and view/manage all the alarm data from any site and view any camera from any control room. Through advanced use of our own technology, we can create a single system of tens, if not hundreds of control rooms all linked together, providing a single protective shield over the Enterprise.

* Web/Mobile Clients – Our web and mobile client are exactly the same, meaning that learning one allows the operator to use any of the popular browsers/mobile platforms available.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...