What is PSIM software?

February 2011 Integrated Solutions

IMS Research defines what PSIM software is.

IMS Research’s latest report examines the growing (and much hyped) market for PSIM software platforms.

“PSIM is a buzzword circulating around the floors of security tradeshows this year, but when questioned, few people are able to agree on what defines PSIM software and what its key capabilities are,” states the author of IMS’s latest research, The World Market for Physical Security Information Management (PSIM) Software – 2010 Edition, Gary Wong. Answers range from ‘it deals with the management of physical security information’ to ‘Is it not just systems integration?’

“The low awareness of what PSIM software is and its capabilities is a key limiting factor in the initial growth of the market,” states Wong.

Prior to starting the research for the report, IMS Research contacted the major vendors of PSIM software to build an industry consensus definition for PSIM software. IMS Research believes that a PSIM software platform must meet the seven following criteria:

1) Connectivity and integration: A PSIM software platform must connect and manage multiple disparate security systems, examples include (but are not limited to) video surveillance, access control, intrusion, fire and life safety, perimeter protection, mass notification and building automation. The PSIM platform should be capable of integration with other business systems within a corporate IT-infrastructure such as ERP systems, data warehouses, provisioning systems, etc. The PSIM platform should be open, therefore hardware and vendor agnostic, and capable of connecting to any input sensors and external applications.

2) Real time policy/configuration management: A PSIM software platform must be able to define and change policies and parameters related to various connected devices in the underlying subsystems (such as access control, video, etc).

3) Correlation and verification: A PSIM software platform must be able to automatically connect and cross-reference multiple events from multiple disparate security systems in real-time and give the ability to flexibly set rules.

4) Visualisation: A PSIM software platform must be able to visualise the actual situation independently from active events. In case of an event, the PSIM platform must be able to graphically display situational information in a manner that provides responders with a picture of the nature of the event, the location and the scope of the threat it presents. It must be able to integrate real world information as a geo-spatial representation.

5) A Rules-based workflow for response: A PSIM software platform must be able to immediately offer a step-by-step action plan, based on pre-determined rules and policies, to respond, manage/counter the threat and control response operations. The rules based workflow should be sufficiently complex as to adapt to escalating situations.

6) Availability/resilience: A PSIM software platform must have capability for redundant functionality (eg, servers, communication gateways and databases) to support continuity of business and disaster recovery. This includes the ability to integrate backup systems to automate transfer of control room capabilities. It must be able to watch and monitor the functionality and integrity of the underlying subsystems and detect possible threats on the network.

7) Post-event reporting and analysis: A PSIM software platform must provide an audit log that allows for post-event forensic review detailing the event situation and the action taken. It must be capable of developing customised reports that allow for analysis of multiple events in order to optimise policies and response.

While there are a number of products that fulfil some of the aforementioned criteria, such as VMS and ACS software, these products are unable to fulfil all of the criteria and are not considered to be PSIM software platforms by IMS Research. By 2014, IMS Research forecasts that the world market for PSIM software will be worth around $200 million.

As a point of perspective, IMS Research forecasts that the combined global market for VMS and ACS will exceed $1 billion by 2014. Wong states, “It is important to note that IMS Research has measured the market in terms of PSIM software licence revenue; if services, maintenance, design and consulting revenues were added; it is conceivable that the market for PSIM software would exceed $1 billion by 2014.”

For more information contact IMS Research, +44 1933 402 255, alastair.hayfield@imsresearch-usa.com, www.imsresearch.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Social media and intelligence-led surveillance
July 2019, Leaderware , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Social media has become a major feature of most people’s lives in the last few years and they can be invaluable as a source of information for companies and security organisations.

Read more...
You can’t isolate, so integrate
July 2019, Axis Communications SA , Industrial (Industry), Integrated Solutions
One of the most exciting trends to emerge from the Industry 4.0 revolution is that technologies and hardware that were originally developed for the security market are increasingly being co-opted to enhance organisational productivity.

Read more...
Controlled intelligence
July 2019 , Industrial (Industry), Integrated Solutions
Connected intelligence and 5G technology are set to profoundly impact the way the industrial sector approaches quality control.

Read more...
A smart Industry 4.0 solution
July 2019, Bosch Building Technologies , Industrial (Industry), CCTV, Surveillance & Remote Monitoring, Integrated Solutions
A new customised Industry 4.0 solution consists of the integration between video analytics and warehouse management software which prevents theft, heightens efficiency and improves shipment tracking.

Read more...
SIA talks open APIs at ID4Africa
July 2019 , Editor's Choice, Access Control & Identity Management, Integrated Solutions
Pioneering industry-first open standards initiative from the Secure Identity Alliance assures interoperability for sovereign ID programmes and promises to eliminate vendor lock-in.

Read more...
Credentials in the cloud
July 2019 , Access Control & Identity Management, Integrated Solutions
HID Global brings high-assurance authentication to broader markets with new cloud-based credential management solution.

Read more...
Next milestone in digital transformation
July 2019 , Industrial (Industry), Integrated Solutions
thyssenkrupp Materials Services continues to drive digital transformation with an artificial intelligence solution, which has been integrated into the processes of the materials distribution and service provider.

Read more...
Unintended consequences of ­technology
June 2019, Leaderware , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
The development of general AI capabilities has seen an accompanying concern among some of the key players in the IT space as well as academics internationally.

Read more...
Changing of the guard, AI style
June 2019, Active Track, Technews Publishing , Integrated Solutions, Security Services & Risk Management
Active Track is launching a raft of new AI-based products and services with which it intends to turn the security world as we know it on its head.

Read more...
A platform to the future
June 2019, Genetec, Cathexis Technologies, Milestone Systems, Gijima Electronic and Security Systems (GESS) , Integrated Solutions, CCTV, Surveillance & Remote Monitoring, IT infrastructure
With AI, IoT and cloud changing the security technology landscape, will your security management platform be able to adapt to new demands?

Read more...