Total Situational Awareness

Taking a look at PSIM and PIAM convergence

It begins with a single system. It could be an access control system or a video system, but for a time it is enough to serve the company’s needs.

With growth, security becomes a more urgent concern, and additional systems are added over time. Another access control system goes online at a second location. A new video surveillance system covers the newly built warehouse. An acquisition introduces a totally new access control provider to the mix. More growth means more systems—intrusion systems, fire systems, intercom systems. Eventually, it becomes evident that all these diverse technologies should be tied together into a single system, but by that point it seems to be a monumentally challenging task.

A Common Obstacle

This familiar scenario has frustrated many security professionals over the years: How can an organization combine its farflung and disparate security systems into a unified whole? The bottom line is that incompatible systems present a higher risk and cost more to operate. Unconnected systems require extra work—one operator might have to view several monitors at once or consult several different data sources to get necessary information. If systems aren’t integrated, important processes have to be completed manually, and manual processes are susceptible to error and inconsistencies. It’s an unsustainable situation.

Combining systems presents obvious advantages— centralized management, more efficient operation, better situational awareness—but getting to a unified, interoperable system presents a challenge.

In a perfect world, an organization would start over from scratch and rebuild the system into one that fits current scale and needs, incorporating all the latest software functions and benefits from the ground up. However, in the real world this is simply not practical, and any approach to combine systems has to be able to accommodate legacy installations.

Unifying an existing large, disparate group of security systems really boils down to central management of two key factors—information and identity. Physical security information management (PSIM) systems have evolved to collect and manage information from the various systems. PSIM systems can streamline operations and reduce the number of staff needed to operate and maintain security departments. They also can simplify workflow and automate responses to specific events to reduce errors and inconsistencies.

Identity management is typically provided by physical identity access management (PIAM) software that combines information about individuals with information about security systems. Such systems manage the full range of identities and access privileges across an organization— who’s who and who can go where and when. PIAM systems also provide automation capabilities such as on-boarding and off-boarding of identities. They are another way to eliminate errors and inconsistency, which in turn lowers risks. PIAM systems link logical and physical identities throughout the organization, from computer passwords to ID credentials to visitor management.

Combining PSIM and PIAM systems provides the ultimate route to unify the disparate components of an enterprise’s security systems. Combining management of security information with management of physical identity and access enables complete centralized operation of security functions. Let’s look at how these complementary benefits can be maximized in the enterprise environment.

PSIM System Advantages

PSIM software provides a platform and applications that collect and correlate events from existing security devices and information systems (video, access control, sensors, analytics, networks and building systems). The systems empower staff to identify and proactively resolve situations as they unfold. The software eliminates data silos by streaming all the information from a variety of devices and systems into one location or dashboard. PSIM software aggregates information from physical and logical security systems and automates processes. The software helps to manage situations and to initiate the appropriate response. It provides complete situational awareness, getting the right information to the right people at the right time.

PSIM systems remove the need for multiple or remote command centers and for operators to manually review and correlate data from multiple systems. PSIM systems proactively resolve security- related or emergency situations with real-time data aggregated from multiple systems, including legacy systems. The user interface includes a complete view of all essential details pertaining to a situation— video, alarms and events from all devices and systems, map views and action plans. PSIM systems also proactively highlight potential situations based on rules and standard operating procedures. PIAM System Advantages Managing identity and credentialing of employees is a labor-intensive challenge for any enterprise, and companies with multiple access control systems and disparate databases face particularly difficult problems. Managing identities and their access in various physical access control systems with respect to different enterprise IT systems is often a completely separate operation, and the result can be a disjointed approach that is inefficient and expensive and can undermine overall security and regulatory compliance.

PIAM software solves these problems by unifying identity management enterprise-wide, integrating physical security systems, automating processes and simplifying control of employees, vendors and other identities. The technology allows enterprises to manage the lifecycle of identities as they relate to physical access, including synchronized on/off-boarding across all systems harboring an identity record, access profile and zone management, and role-based physical access.

Policy-driven PIAM software provides a holistic approach, combining global identity with compliance and risk assessment. Benefits include greater efficiency, lower costs and proactive management of regulatory compliance. PIAM software can streamline timeconsuming and inefficient processes such as issuing ID badges, managing various databases, adding new employees, responding to terminations and changing work assignments, and assigning access privileges across multiple physical access control systems. Management of multiple systems is combined into a single Web-based database.

Combining PSIM and PIAM

Combining PSIM and PIAM creates a comprehensive situational management platform that also provides verification, planning and automated response. The PIAM system correlates all identity and access data with the event/ situation data from the PSIM system to enable automatic, policy-driven responses to physical security situations. The combination enables correlation of any security incident or event with associated identities and access data to promote expedient and effective response. PIAM provides the element of “who,” and PSIM provides elements of “what,” “when” and “where.” Together, the systems can provide information about “why” and “how” to respond.

Integration of the systems constitutes an intelligent, connected infrastructure that enables intelligent operations. Automated processes eliminate errors, decrease costs and improve security. Automatic and pre-planned reactions ensure a consistent response when, where and how it is needed. Automated compliance and workflow promote better management of risk and increased ROI from lower operating expenses.

Together, PSIM and PIAM empower security operators with quick access to information, enabling staff to respond faster and more effectively and enhancing the overall security of the organization.

Software is the Solution

Managing information and identities throughout an organization, including privileges related to multiple legacy access control systems, is challenging. Software provides a centralized solution to tie the various systems together, unifying management of identities and access and reducing costs.

Combining the software functions of PSIM and PIAM represents a stateof- the-art approach to improving security and minimizing risk while saving money. Using this software approach makes it possible to meet security needs with one unified system. It ends with a single system, too.

This article originally appeared in the September 2012 issue of Security Today.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.