PSIM: How it should work

September 2011 Perimeter Security, Alarms & Intruder Detection

Bernard Senekal continues his series on physical security information management (PSIM).

In the last edition we looked at the state of integration in the physical electronic security industry and how absolutely segmented, not only various sub systems such as fire/CCTV/access etc, are in terms of the management of these through a singular and distributed interface, but also how various vendor products do not conform to specific standards that allow interoperability in order to add business value. The end user demand, however, has created a very specific call for integrated management platforms and this demand is serviced through PSIM solutions.

So how should these systems work and how does one truly realise the benefit of PSIM in an enterprise?

Truly open

PSIM solutions are at their very core, open. Firstly, this means that they can attach to any subsystem, providing that the subsystem can make data available on an IP network. Subsystems come in various forms and mostly every one available today has some form of publishable SDK (Software Development Kit), API (Advanced Programming Interface) or TPDE (Third Party Data Exposure) through the likes of common protocols such as MODBUS, BACNET, etc. So, as a rule, PSIM can connect to any subsystem.

Secondly, a true PSIM solution should facilitate a DDK (Driver Development Kit) that allows a programmer to add subsystems without the need for a dependency on the company who creates the PSIM software solution. A good example of this is a recent case where a South African-based access control system, fire system and surveillance system had to be added to a PSIM solution provided by a global company. Because the PSIM provider has a readily available DDK, the development of these systems could be done locally and without the need for a dependency on the PSIM software solution company’s involvement. This is what I classify truly open.

Infinity + Features

Connection to subsystems is one of the key elements of a PSIM solution. However, it should also have the ability to truly offer customisable solutions once these subsystems are connected in order to cater for specific client requirements. It is no good that a PSIM solution is built on feature sets or a specific number of features.

If this was the case it would mean that somewhere along the line the end user is going to have a requirement that cannot be met with one of the many features available in the solution, meaning we are back where we started, only now we are dependent on the software company that supplies the integrated platform rather than the vendors we were dependant on before! No, true PSIM places the control of building features into the hands of the end user by allowing the end user to define exactly what they want out of the system and then having a toolkit that allows for these features to be built dynamically, not for pre created features to define what can and cannot be done. So, a true PSIM solution offers a toolkit that allows for infinity + features to be built, based on user requirement.

Consider the Balance

Other than the key criteria stated above one should also consider that true PSIM offers the following to the investor:

Global recognition

* Google it, study it and ensure that the PSIM solution you select has achieved major success on projects globally.

Total cost

* Ensure that cost for the solution you want to invest in is spelled out prior to purchase. Many integrated solutions offer a very attractive upfront cost for the software, but do not specify the exact services costs against the project plan that will be required in order to drive the project from the point of inception through to end user sign off and acceptance.

Scalability

* Good PSIM solutions can prove, in the field and in stress test environments that they are scalable in terms of the amounts of camera channels they can manage along with the quantity of alarms they are able to also.

* A good test for this is a simple question: ’Show me how you manage 100 000 cameras and 3 million alarms a day’. This is not uncommon when you start including large enterprise environments such as national key points, homeland security controls, large banking and financial estates, international mining estates etc.

Vendor independence

* As is typical with many growing industries, some of the larger vendors have recently purchased some of the up and coming independent PSIM providers. Why? Because they want to sell the vendor brands they manufacture, again trapping the end user.

* Be sure that the PSIM solution you select is a company that is absolutely vendor independent (not owned by a major hardware manufacturer).

Next month we will have a look at how PSIM solutions expand beyond just offering integration to physical electronic security devices.

For more information contact Sentronics, +27 (0)11 312 4147, [email protected], www.sentronics.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Autonomous construction site protection
Perimeter Security, Alarms & Intruder Detection
Ajax provides an autonomous security solution for a German construction site that is easy and flexible to install. It provides security against intrusions and theft via a 360-degree view.

Read more...
ASSA ABLOY acquires Amecor in South Africa
Amecor Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
ASSA ABLOY has signed an agreement to acquire Amecor, a well-known South African manufacturer of security communication equipment in the South African security market and beyond.

Read more...
Different fences for different farmers
Gallagher Perimeter Security, Alarms & Intruder Detection Agriculture (Industry)
Far beyond the simple delineation of boundaries, fencing serves as a dynamic solution to address various needs, from ensuring the security of farms and protecting livestock to defining property lines and enhancing aesthetic appeal.

Read more...
Protect remote sites with volumetric thermal detectors
OPTEX Perimeter Security, Alarms & Intruder Detection
Remote sites have always been more vulnerable to opportunistic intrusion, but over the last two years in particular, sites such as solar farms or industrial parks have become more common targets for criminals.

Read more...
Stafix focuses on local manufacturing
Perimeter Security, Alarms & Intruder Detection
Stafix Security Centres is a South African-owned company committed to providing customers with a choice of quality imported and locally manufactured products that meet the needs of the electronic security market.

Read more...
Texecom launches latest SmartCom 4G Communicator
Perimeter Security, Alarms & Intruder Detection
Texecom announced the upgraded and enhanced version of its SmartCom 4G communicator. Signal sensitivity on all the main bands has also been improved, increasing the usable range from masts, in some instances, by up to four times.

Read more...
Olarm advances smart security with Texecom integration
Olarm News & Events Perimeter Security, Alarms & Intruder Detection Products & Solutions
Following Olarm’s achievement as the OSPA 2023 winner of ‘Outstanding Security Integrator’, it has taken another significant step in its innovation journey with the announcement of its integration with Texecom Premier Elite.

Read more...
Texecom increases support in the EMEA with key appointments
Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
Texecom announced two new appointments to its EMEA sales team: Thomas Vanden Wyngaerdt as Head of EMEA Sales and Tom Wright as EMEA Account Manager.

Read more...
JVA electric fence systems
Perimeter Security, Alarms & Intruder Detection
JVA offers a wide range of perimeter-monitored fence solutions (including low and high voltage, amperage, taut wire, and vibration monitoring), as well as a variety of fence line accessories designed for the South African market.

Read more...
A good security system starts outside
OPTEX Perimeter Security, Alarms & Intruder Detection
Outdoor intrusion detectors have been specifically designed to expand the security coverage beyond the confines of a building and to warn of anyone approaching as early as possible.

Read more...