Expanding PSIM

October 2011 Perimeter Security, Alarms & Intruder Detection

Bernard Senekal talks about sensor management and data security.

To date we have touched on the state of integration and how PSIM (physical security information management) solutions can enhance value of sub systems (CCTV/ACS/fire/intruder etc). PSIM ensures multiple disparate security systems across an enterprise can be integrated to a PSIM front-end in order to provide responses to events by mobilising human operators or ensuring other security sub-systems act according to the standard operating procedures defined. We have pointed out how these systems should work and which key elements users should identify when considering PSIM as an investment for their enterprise.

PSIM however expands beyond just integration with physical electronic security equipment. The rule essentially is that if you can give PSIM data on an IP network, this data can be used to do just about anything with. PSIM solutions are database driven applications. Moreover, by their very nature, databases can manage data back and forth and allow for exposure of functionality through a PSIM front-end that is typically not found in a vendor-based system.

So what else can be managed by a PSIM platform? Let us take a step back and look at banking and finance operation as an example of illustrating the point. In this case, the typical security estate consists of ATMs, cash handling operations, bank branches and corporate offices as well as VIP protection for executives. The security systems found inside these environments are anything from CCTV, ACS, fire, public address, smoke canons, vaults sensors, intruder, etc.

PSIM would typically be set up to allow for a view on the entire estate and the ability to mobilise physical presense and trigger other electronic security systems to manage incidents. PSIM would also be used to report current or historic scorecards of the health of the security of the organisation at certain points in time.

But let us add some other points of data to a PSIM system in a banking environment. To do this we need to understand other challenges that banking operations might have. How about ensuring we have control over HVAC? So should a fire break out in building A in the west wing, we are able to not only confirm visually (CCTV), notify evacuation (PA systems), ensure all the right doors are open and where relevant, locked down (ACS), but we are also able to ensure that the air-conditioning systems in the area of the fire are shut down in order to prevent the fire from spreading more rapidly.

What about if we start matching data network security to physical electronic security? A good example of this might be to set certain profiles of users that can authenticate on a corporate network to only be able to log in if the access control system shows that they have accessed the corporate building or bank branch.

Cybercrime activities are serious concerns for banking environments and much of the planning of this happens with colluding of organised crime circles and internal bank resources. So when one starts to profile data retrieved from physical electronic security systems and includes a view on electronic data one can start forming a picture and start asking the right questions.

For example, if I have a view on my SAP HR database and I can see that a contractor’s contract expires in two weeks from today, then why is this person accessing the building after hours (as per my ACS information) and why are they logging onto the network and accessing very specific resources or perhaps making use of ports on a computer such as a USB point?

One can take this much wider and start to create a profile for security inside an organisation, allow security to broadcast to the citizens inside a bank about riots or protests before these people attempt to enter a city centre to come to work as an example, so now suddenly we are linking news briefs and social networking and taking valuable information back to employees.

The possibilities are endless, open PSIM to the data and PSIM will open your mind to management in our sector that has been impossible before.

For more information contact Sentronics, +27 (0)11 312 4147, [email protected], www.sentronics.co.za

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

CIAS chosen for complex perimeters
XtraVision Perimeter Security, Alarms & Intruder Detection
The challenge was to guarantee the ROI (return on investment) based on the technological amortization of at least 10 years of service, right from the design phase.

Texecom launches the Midnight Black Collection
Technews Publishing Perimeter Security, Alarms & Intruder Detection Products
Working in harmony with darker environments, the Midnight Black Collection has been created for businesses and sites that require or prefer a security solution which offers discreet protection that compliments their surroundings.

XtraVision Facilitates Integration
XtraVision Perimeter Security, Alarms & Intruder Detection
XtraVision, a global distributor of SAMM FOTAS DAS fibre intrusion detection technology and ARTECO Video Even Management Software, in the South African, African, and South American regions, has recently facilitated the integration between the two manufacturers.

Olarm product highlights for 2022
Olarm Perimeter Security, Alarms & Intruder Detection Products
Olarm rapidly expanded its ecosystem in 2022 with several new products, the launch of its training academy, and a presence in Gauteng.

Smart home security
Olarm Smart Home Automation Perimeter Security, Alarms & Intruder Detection Products
The applied use of smart technology within the Olarm ecosystem, through smart features coupled with existing systems, extends the benefits of technology into different spheres.

Be cautious when receiving deliveries at home
News Perimeter Security, Alarms & Intruder Detection Security Services & Risk Management
Community reports of residents being held up at their gate when collecting fast food deliveries at home are once again surfacing.

Banks move to lithium battery technology for intruder systems
Uniross Batteries Perimeter Security, Alarms & Intruder Detection
With advances in battery technology, lithium batteries now include a built-in Battery Management System (BMS) to monitor the battery and shut it down should there be a risk of a failure or overheating.

Future-proofed intrusion detection for retail
Elvey Security Technologies Retail (Industry) Perimeter Security, Alarms & Intruder Detection Products
One of the ongoing challenges that has faced retailers during their adoption of security technology is the issues caused by non-standardisation of technology.

Johnson Controls releases IQ4
Perimeter Security, Alarms & Intruder Detection Integrated Solutions
New lower cost panel leverages Qolsys IQ Platform targeting residential, SMB, builder, MDU/multi-family and wellness market segments.

The false alarm that’s costing money
Guardian Eye Perimeter Security, Alarms & Intruder Detection
Property safety is often a litany of false alarms and fake threats that take up time, cost money and test patience, but it doesn’t have to be that way thanks to modern technology