Defining the New PSIM Model for Commercial Security Applications

Defining the New PSIM Model for Commercial Security Applications

Today, advanced PSIM solutions with software architecture flexible enough to adapt to complex commercial organizations are being successfully deployed.

Physical Security and Information Management (PSIM) solutions have at times earned negative reviews in the pro security industry for a multitude of reasons ranging from suppliers overpromising on integration and control capabilities to complexity of implementation and use. But now things are beginning to change. Today, advanced PSIM solutions with software architecture flexible enough to adapt to complex commercial organizations are being successfully deployed. Not only do these solutions have the capability to integrate in an open, standard way with a broad group of security systems, they are also easy to operate allowing faster and more efficient implementation and use leading to tangible ROI returns.

When defining this new PSIM model for commercial security applications, there are four primary capabilities that provide security operations with greater value and put today’s solutions miles ahead of their predecessors.

Integration

When it comes to the capabilities today’s advanced PSIM solutions offer, primary is the ability to integrate multiple disparate systems into a single, centralized interface. The architecture of these systems is flexible enough to cover multiple physical locations while supporting and bridging the gap between a vast range of integrated solutions – with the ability to grow, expand and adapt.

PSIMs must have an open architecture that provides a means of integration that is simple, maintainable, cost-efficient and scalable. The flexibility to integrate seamlessly with virtually any solution from different manufacturers, including legacy systems, saves organizations money while streamlining operations and providing more complete information for incident response.

In today’s growth-driven business environment, this is especially important for organizations that acquire other companies or facilities. This often introduces new and different business and security systems into the overall enterprise, so even if a company has standardized on one or two different systems, that number can easily expand to 10 or more following an acquisition. Without a PSIM to unify these systems, communication between them can become impossible, making overall management expensive, time-consuming and highly error-prone.

Further increasing effectiveness, new PSIM solutions standardize functionality across different classes of systems, eliminating costly bespoke solutions, and delivering a consistent user experience. For example, regardless of manufacturer, every access control or video surveillance integration should perform the same when integrated with a PSIM platform. This ensures security personnel can follow established response procedures no matter what system they happen to be connected to. Consider the impact of introducing an operator to an unfamiliar system or user interface during a high-pressure situation. There is tremendous value in providing an operator with a familiar user interface in any situation to optimize the potential for calm, standardized response.

Incident Response and Resolution

Effective incident response relies on good standard operating procedures (SOPs) that direct an operator’s actions based on the nature of an event, its location and other criteria. These are sometimes overly complicated, requiring security staff to consult separate documents to identify the appropriate response and then follow a long list of time consuming manual steps to resolve the issue.

To ensure the most efficient, consistent and effective response, operators need a set of simple steps to follow. When an incident occurs, time is often of the essence. An employee who is stressed or anxious about a situation they aren’t used to dealing with only serves to slow down the response and increase the potential for human error.

Simplicity is the key, and today’s PSIMs utilize automation to speed response and reduce the potential for human error or overreaction by automatically performing formerly manual processes based on SOPs. With automated log-in to Active Directory, identification of an incident’s location (GPS), pinpointing the nearest camera and other actions, a 30-step manual response can often be reduced to five or six steps. This ensures that operators are directed to perform the critical tasks that require human intervention such as determining whether a person seen on video is a potential threat, what he or she looked like and other factors used for identification, situational assessment and proper response.

With automation, organizations can keep complex processes in place while presenting operators and security officers with simple, streamlined actions to make them more effective at responding to incidents, even those they’ve never experienced before.

Situational Awareness

Today’s security operations centers (SOCs) are responsible for monitoring hundreds or thousands of sensors and systems, accessing documents and information from various sources and managing multiple software interfaces, all of which generate an overwhelming amount of data. Operators need to know what is happening and where, but given the sheer volume of available information it is impossible for individuals or even entire departments to sort through data without missing some critical details.

PSIMs can put all the information an operator needs at their fingertips, collating the highest priority alarms and automatically associating nearby video along with maps, call lists and other security sensor data, so that operators don’t need to search for data from myriad systems. This helps enable them to make quick and accurate decisions based on a complete picture of events.

Reporting and Insights

In addition to situational awareness, PSIMs can also analyze the data they capture to provide deep insights and intelligence about security, business and overall organizational operations, both in real time and over extended periods of time. Armed with this information, organizations can better prepare for events and identify any changes that can improve response and staff adherence to SOPs. These solutions can provide in-depth views into specific incidents as well for post-event analysis that can further improve security and operations.

Without question, the ability to integrate disparate systems is the main hallmark of the new PSIM model for commercial security deployments. The scope of integrations now embraces much more than video and access systems, enterprises are deploying a wide variety of non-traditional physical security systems that include business risk alerting, mass notification, IOT devices, mobile safety apps, and more. The combination of integration, improved incident response, greater situational awareness and the availability of deep insights into incidents are delivering the functionality needed to increase security while reducing inefficiencies and costs.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3