Total Situational Awareness

Taking a look at PSIM and PIAM convergence

It begins with a single system. It could be an access control system or a video system, but for a time it is enough to serve the company’s needs.

With growth, security becomes a more urgent concern, and additional systems are added over time. Another access control system goes online at a second location. A new video surveillance system covers the newly built warehouse. An acquisition introduces a totally new access control provider to the mix. More growth means more systems—intrusion systems, fire systems, intercom systems. Eventually, it becomes evident that all these diverse technologies should be tied together into a single system, but by that point it seems to be a monumentally challenging task.

A Common Obstacle

This familiar scenario has frustrated many security professionals over the years: How can an organization combine its farflung and disparate security systems into a unified whole? The bottom line is that incompatible systems present a higher risk and cost more to operate. Unconnected systems require extra work—one operator might have to view several monitors at once or consult several different data sources to get necessary information. If systems aren’t integrated, important processes have to be completed manually, and manual processes are susceptible to error and inconsistencies. It’s an unsustainable situation.

Combining systems presents obvious advantages— centralized management, more efficient operation, better situational awareness—but getting to a unified, interoperable system presents a challenge.

In a perfect world, an organization would start over from scratch and rebuild the system into one that fits current scale and needs, incorporating all the latest software functions and benefits from the ground up. However, in the real world this is simply not practical, and any approach to combine systems has to be able to accommodate legacy installations.

Unifying an existing large, disparate group of security systems really boils down to central management of two key factors—information and identity. Physical security information management (PSIM) systems have evolved to collect and manage information from the various systems. PSIM systems can streamline operations and reduce the number of staff needed to operate and maintain security departments. They also can simplify workflow and automate responses to specific events to reduce errors and inconsistencies.

Identity management is typically provided by physical identity access management (PIAM) software that combines information about individuals with information about security systems. Such systems manage the full range of identities and access privileges across an organization— who’s who and who can go where and when. PIAM systems also provide automation capabilities such as on-boarding and off-boarding of identities. They are another way to eliminate errors and inconsistency, which in turn lowers risks. PIAM systems link logical and physical identities throughout the organization, from computer passwords to ID credentials to visitor management.

Combining PSIM and PIAM systems provides the ultimate route to unify the disparate components of an enterprise’s security systems. Combining management of security information with management of physical identity and access enables complete centralized operation of security functions. Let’s look at how these complementary benefits can be maximized in the enterprise environment.

PSIM System Advantages

PSIM software provides a platform and applications that collect and correlate events from existing security devices and information systems (video, access control, sensors, analytics, networks and building systems). The systems empower staff to identify and proactively resolve situations as they unfold. The software eliminates data silos by streaming all the information from a variety of devices and systems into one location or dashboard. PSIM software aggregates information from physical and logical security systems and automates processes. The software helps to manage situations and to initiate the appropriate response. It provides complete situational awareness, getting the right information to the right people at the right time.

PSIM systems remove the need for multiple or remote command centers and for operators to manually review and correlate data from multiple systems. PSIM systems proactively resolve security- related or emergency situations with real-time data aggregated from multiple systems, including legacy systems. The user interface includes a complete view of all essential details pertaining to a situation— video, alarms and events from all devices and systems, map views and action plans. PSIM systems also proactively highlight potential situations based on rules and standard operating procedures. PIAM System Advantages Managing identity and credentialing of employees is a labor-intensive challenge for any enterprise, and companies with multiple access control systems and disparate databases face particularly difficult problems. Managing identities and their access in various physical access control systems with respect to different enterprise IT systems is often a completely separate operation, and the result can be a disjointed approach that is inefficient and expensive and can undermine overall security and regulatory compliance.

PIAM software solves these problems by unifying identity management enterprise-wide, integrating physical security systems, automating processes and simplifying control of employees, vendors and other identities. The technology allows enterprises to manage the lifecycle of identities as they relate to physical access, including synchronized on/off-boarding across all systems harboring an identity record, access profile and zone management, and role-based physical access.

Policy-driven PIAM software provides a holistic approach, combining global identity with compliance and risk assessment. Benefits include greater efficiency, lower costs and proactive management of regulatory compliance. PIAM software can streamline timeconsuming and inefficient processes such as issuing ID badges, managing various databases, adding new employees, responding to terminations and changing work assignments, and assigning access privileges across multiple physical access control systems. Management of multiple systems is combined into a single Web-based database.

Combining PSIM and PIAM

Combining PSIM and PIAM creates a comprehensive situational management platform that also provides verification, planning and automated response. The PIAM system correlates all identity and access data with the event/ situation data from the PSIM system to enable automatic, policy-driven responses to physical security situations. The combination enables correlation of any security incident or event with associated identities and access data to promote expedient and effective response. PIAM provides the element of “who,” and PSIM provides elements of “what,” “when” and “where.” Together, the systems can provide information about “why” and “how” to respond.

Integration of the systems constitutes an intelligent, connected infrastructure that enables intelligent operations. Automated processes eliminate errors, decrease costs and improve security. Automatic and pre-planned reactions ensure a consistent response when, where and how it is needed. Automated compliance and workflow promote better management of risk and increased ROI from lower operating expenses.

Together, PSIM and PIAM empower security operators with quick access to information, enabling staff to respond faster and more effectively and enhancing the overall security of the organization.

Software is the Solution

Managing information and identities throughout an organization, including privileges related to multiple legacy access control systems, is challenging. Software provides a centralized solution to tie the various systems together, unifying management of identities and access and reducing costs.

Combining the software functions of PSIM and PIAM represents a stateof- the-art approach to improving security and minimizing risk while saving money. Using this software approach makes it possible to meet security needs with one unified system. It ends with a single system, too.

This article originally appeared in the September 2012 issue of Security Today.


  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • LiftMaster Garage Door Opener

    LiftMaster Garage Door Opener

    LiftMaster Transforms the Garage Door Opener Into a Sleek Smart Home Device That Does More Than Open and Close the Garage Door 3

  • Unique Oversized ID Card Printer

    Unique Oversized ID Card Printer

    Idesco Corp. is announcing its card printer – the XCR100 2.0 printer- that allows customers to personalize oversized ID cards on demand. The printer is ideal for assisting healthcare organizations find the right badging solution. As healthcare facilities continue to combat the spread of COVID-19, issuing oversized ID cards has helped identify staff clearly while adding an extra layer of security. The XCR100 2.0 printer is the only dye-sublimation printer on the market that can personalize CR100 cards (3.88" x 2.63"). The cards that are 42% larger than the standard credit card size. The printer can produce up to 180 full cards per hour in color, and up to 1,400 cards per hour in monochrome. An optional flipper is available to print dual-sided badges in one pass. Contactless encoding comes as an option to help healthcare facilities produce secure access badges on demand and the card printer features a 2-year warranty. 3