Expanding PSIM

October 2011 Perimeter Security, Alarms & Intruder Detection

Bernard Senekal talks about sensor management and data security.

To date we have touched on the state of integration and how PSIM (physical security information management) solutions can enhance value of sub systems (CCTV/ACS/fire/intruder etc). PSIM ensures multiple disparate security systems across an enterprise can be integrated to a PSIM front-end in order to provide responses to events by mobilising human operators or ensuring other security sub-systems act according to the standard operating procedures defined. We have pointed out how these systems should work and which key elements users should identify when considering PSIM as an investment for their enterprise.

PSIM however expands beyond just integration with physical electronic security equipment. The rule essentially is that if you can give PSIM data on an IP network, this data can be used to do just about anything with. PSIM solutions are database driven applications. Moreover, by their very nature, databases can manage data back and forth and allow for exposure of functionality through a PSIM front-end that is typically not found in a vendor-based system.

So what else can be managed by a PSIM platform? Let us take a step back and look at banking and finance operation as an example of illustrating the point. In this case, the typical security estate consists of ATMs, cash handling operations, bank branches and corporate offices as well as VIP protection for executives. The security systems found inside these environments are anything from CCTV, ACS, fire, public address, smoke canons, vaults sensors, intruder, etc.

PSIM would typically be set up to allow for a view on the entire estate and the ability to mobilise physical presense and trigger other electronic security systems to manage incidents. PSIM would also be used to report current or historic scorecards of the health of the security of the organisation at certain points in time.

But let us add some other points of data to a PSIM system in a banking environment. To do this we need to understand other challenges that banking operations might have. How about ensuring we have control over HVAC? So should a fire break out in building A in the west wing, we are able to not only confirm visually (CCTV), notify evacuation (PA systems), ensure all the right doors are open and where relevant, locked down (ACS), but we are also able to ensure that the air-conditioning systems in the area of the fire are shut down in order to prevent the fire from spreading more rapidly.

What about if we start matching data network security to physical electronic security? A good example of this might be to set certain profiles of users that can authenticate on a corporate network to only be able to log in if the access control system shows that they have accessed the corporate building or bank branch.

Cybercrime activities are serious concerns for banking environments and much of the planning of this happens with colluding of organised crime circles and internal bank resources. So when one starts to profile data retrieved from physical electronic security systems and includes a view on electronic data one can start forming a picture and start asking the right questions.

For example, if I have a view on my SAP HR database and I can see that a contractor’s contract expires in two weeks from today, then why is this person accessing the building after hours (as per my ACS information) and why are they logging onto the network and accessing very specific resources or perhaps making use of ports on a computer such as a USB point?

One can take this much wider and start to create a profile for security inside an organisation, allow security to broadcast to the citizens inside a bank about riots or protests before these people attempt to enter a city centre to come to work as an example, so now suddenly we are linking news briefs and social networking and taking valuable information back to employees.

The possibilities are endless, open PSIM to the data and PSIM will open your mind to management in our sector that has been impossible before.

For more information contact Sentronics, +27 (0)11 312 4147, michelle@sentronics.co.za, www.sentronics.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.