PSIA Introduces Access Control and Intrusion Detection Profiles to the Physical Security Industry

PSIA Introduces Access Control and Intrusion Detection Profiles to the Physical Security Industry

The Physical Security Interoperability Alliance (PSIA) today announced the availability of its Access Control Profile and Intrusion Detection Profile as well as a tool for testing whether products conform to these profiles.

These profiles will enable manufacturers to easily and quickly adopt PSIA specifications by complying with a smaller subset of interoperability requirements. The testing tool gives integrators and end users total confidence that products complying with each PSIA Profile will interoperate smoothly with each other.

“We’re excited to introduce the first working profiles and test tool to the physical security industry,” said David Bunzel, executive director, the PSIA. “These profiles will enable a very wide range of vendors to quickly and affordably comply with PSIA specifications and expand plug-and-play compatibility across the security ecosystem.”

Profiles are common tools in technology standards and address a particular use case within a rich standard or specification.  The standard or specification is akin to a section in a library, covering every aspect of a subject; a profile would be the handful of books on a narrower, very specific topic. The PSIA Access Control and Intrusion Detection Profiles draw their data elements from the PSIA’s broader Area Control Specification.

“The PSIA’s Area Control specification is very deep and encompasses many combinations of security use cases,” said Larry Lien, chairman of the PSIA, and vice president of product management for Proximex, a Tyco International Company.  “The profiles enable vendors with narrower use cases to easily comply with our specs and guarantee product interoperability.”

The Profiles Test Tool certifies that a product or system fully complies with either or both of the new profiles to ensure plug-and-play interoperability. Honeywell, Inovonics, and Kastle Systems are among the vendors who have used the Profiles Test Tool to test conformance with the Area Control and/or Intrusion Detection Profiles. Additional vendors are using the test tool and expect to announce conformant products soon.

The PSIA Profiles Test Tool encompasses two distinct testers that simulate both “host-side” systems as well as “device-side” systems for profiles compliance.

“Its’ simulation capabilities make the test tool invaluable in helping vendors test and validate their PSIA compliance throughout the design and development phases of a product,” said Neelendra Bhandari, engineering manager, Honeywell Security.

The PSIA Profiles Working Group includes Assa Abloy, HID Global, Honeywell, Ingersoll Rand/Schlage, Inovonics, Kastle Systems, Mercury Security, Proximex and UTC/Lenel. Kastle’s CTO and Executive Vice President, Mohammad Soleimani, chairs the group.

“Consultants, integrators and end users demand great certainty that products incorporating a specification will interoperate as promised and deliver the benefits they expect,” said Soleimani. “The Access Control Profile and the Intrusion Detection Profile, plus the test tool, deliver this confidence by virtually ensuring that two or more profiles, compliant-and-tested products, will work together flawlessly.”

“As usual for the PSIA, we had a tremendous group of companies leading our profiles development,” said Lien. “The profiles were not driven by one or two vendors, but reflect a broad range of industry requirements.”

“We’re very excited about how the profiles will increase the number of standards-based products in the physical security world,” said Bunzel. “Consultants, integrators and end-users will have many more choices for building powerful security solutions with lower total cost of ownership.”

Vendors, integrators, consultants and end users interested in the Access Control Profile, Intrusion Detection Profile and Profiles Test Tool should contact the PSIA for more information.  Additional profiles will be released based on PSIA member input.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.