What is PSIM software?

February 2011 Integrated Solutions

IMS Research defines what PSIM software is.

IMS Research’s latest report examines the growing (and much hyped) market for PSIM software platforms.

“PSIM is a buzzword circulating around the floors of security tradeshows this year, but when questioned, few people are able to agree on what defines PSIM software and what its key capabilities are,” states the author of IMS’s latest research, The World Market for Physical Security Information Management (PSIM) Software – 2010 Edition, Gary Wong. Answers range from ‘it deals with the management of physical security information’ to ‘Is it not just systems integration?’

“The low awareness of what PSIM software is and its capabilities is a key limiting factor in the initial growth of the market,” states Wong.

Prior to starting the research for the report, IMS Research contacted the major vendors of PSIM software to build an industry consensus definition for PSIM software. IMS Research believes that a PSIM software platform must meet the seven following criteria:

1) Connectivity and integration: A PSIM software platform must connect and manage multiple disparate security systems, examples include (but are not limited to) video surveillance, access control, intrusion, fire and life safety, perimeter protection, mass notification and building automation. The PSIM platform should be capable of integration with other business systems within a corporate IT-infrastructure such as ERP systems, data warehouses, provisioning systems, etc. The PSIM platform should be open, therefore hardware and vendor agnostic, and capable of connecting to any input sensors and external applications.

2) Real time policy/configuration management: A PSIM software platform must be able to define and change policies and parameters related to various connected devices in the underlying subsystems (such as access control, video, etc).

3) Correlation and verification: A PSIM software platform must be able to automatically connect and cross-reference multiple events from multiple disparate security systems in real-time and give the ability to flexibly set rules.

4) Visualisation: A PSIM software platform must be able to visualise the actual situation independently from active events. In case of an event, the PSIM platform must be able to graphically display situational information in a manner that provides responders with a picture of the nature of the event, the location and the scope of the threat it presents. It must be able to integrate real world information as a geo-spatial representation.

5) A Rules-based workflow for response: A PSIM software platform must be able to immediately offer a step-by-step action plan, based on pre-determined rules and policies, to respond, manage/counter the threat and control response operations. The rules based workflow should be sufficiently complex as to adapt to escalating situations.

6) Availability/resilience: A PSIM software platform must have capability for redundant functionality (eg, servers, communication gateways and databases) to support continuity of business and disaster recovery. This includes the ability to integrate backup systems to automate transfer of control room capabilities. It must be able to watch and monitor the functionality and integrity of the underlying subsystems and detect possible threats on the network.

7) Post-event reporting and analysis: A PSIM software platform must provide an audit log that allows for post-event forensic review detailing the event situation and the action taken. It must be capable of developing customised reports that allow for analysis of multiple events in order to optimise policies and response.

While there are a number of products that fulfil some of the aforementioned criteria, such as VMS and ACS software, these products are unable to fulfil all of the criteria and are not considered to be PSIM software platforms by IMS Research. By 2014, IMS Research forecasts that the world market for PSIM software will be worth around $200 million.

As a point of perspective, IMS Research forecasts that the combined global market for VMS and ACS will exceed $1 billion by 2014. Wong states, “It is important to note that IMS Research has measured the market in terms of PSIM software licence revenue; if services, maintenance, design and consulting revenues were added; it is conceivable that the market for PSIM software would exceed $1 billion by 2014.”

For more information contact IMS Research, +44 1933 402 255, alastair.hayfield@imsresearch-usa.com, www.imsresearch.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Carefully nurtured supplier relationships reap benefits
May 2019, Powell Tronics , Integrated Solutions
Powell Tronics has spent the past decade building a solid foundation of leading-edge technology products sourced from a range of locally and internationally respected market leaders in the security sector.

Read more...
Platforms and community lead the future
May 2019, Milestone Systems , Editor's Choice, CCTV, Surveillance & Remote Monitoring, News, Integrated Solutions
Milestone Systems took a look into the future of open platforms and the power of community at MIPS EMEA in Copenhagen in March this year.

Read more...
The consequences of false alerts
May 2019, Leaderware , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Craig Donald discusses the impact of false alarm rates on the utility of intelligent security technology systems.

Read more...
Protecting people’s money, and their data
May 2019, Cathexis Technologies, CA Southern Africa, IDEMIA , Editor's Choice, Integrated Solutions, Financial (Industry)
The temptations inherent to the banking sector, and financial institutions more generally, pit them in an eternal and increasingly high-tech battle to secure themselves against threats from within and without.

Read more...
Access authentication with a wave
May 2019, IDEMIA , Editor's Choice, Access Control & Identity Management, Integrated Solutions, Financial (Industry), Commercial (Industry)
Financial organisations are making the move to contactless fingerprint biometrics in order to meet the increasing burden of regulatory and compliance demands.

Read more...
Does your control room add value?
May 2019, Fidelity Security Group, G4S South Africa, Progroup , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure, Commercial (Industry)
Whether on- or offsite, control rooms are a critical aspect of security today and care must be taken in the design and rollout of these nerve centres.

Read more...
Augmenting surveillance video
May 2019, ISDS , News, Integrated Solutions
ISDS is moving from its previous business model to focusing on being a value-added distributor and supporting its channel partners.

Read more...
LunarX targets high-end security solutions
May 2019 , Editor's Choice, News, Integrated Solutions
LunarX Consulting and Projects, a new value-added distributor of high-end security solutions, was launched at an event at Serengeti Estate in March 2018.

Read more...
Complete security solutions for bank branches
May 2019, Hikvision South Africa , Integrated Solutions
Everyone has a favourite heist film – whether it’s a traditional shoot ‘em up like Bonnie and Clyde, or something a bit more high-tech, like Oceans 11, they’re compelling viewing.

Read more...
Delivering greater control room value
May 2019, Cathexis Technologies , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
A truly integrated security system requires that all aspects of the security system work seamlessly together, while being managed by the heart of the system, which is the control room.

Read more...