• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

6 Points to Consider About Physical Security Information Management

Turn your security data into security intelligence.

April 22, 2013 TD Staff Leave a Comment

Previous Slide Next Slide

There can be no misunderstanding or mistrust between the previously separate security and IT arms of an organization when implementing PSIM. Each side of the operation must better understand what each other does and communicate and collaborate effectively. Security professionals will need IT training and vice versa in order to maximize the utility and power of the PSIM solution.

With budgets tight, the case must be made internally for PSIM. “PSIM solutions have a return on investment (ROI) and a total cost of ownership (TCO),” says Larry Lien of Proximex. “Good PSIM solutions can be easily justified within 18 months just in cost savings, improving operational efficiency and helping to reduce risk. Additionally, decision makers should look for systems that have lower total costs of ownership, [and] that are easy to set up and maintain over time.”

“PSIM does not always include network devices,” says Tamar Newberger of Catbird Security. “There can be difficulties in acquiring data uniformity and ‘good data,’ as well as integrating various levels of abstracted APIs. Data from integrated devices can be normalized to the extent that a lot of its value has to be sacrificed.” Newberger recommends solutions that standardize on one technology for each control. He adds, “Make sure the PSIM solution supports the components you want to integrate, such that it provides the event data and correlation that your business/mission requires.”

“When considering implementing PSIM, organizations should look not only at their present requirements but also at their future needs,” says Larry Lien of Proximex. “Upgrades do not need to be done all at once, and PSIM offers the flexibility to provide growth and expansion in the future.”

That should include access control, closed-circuit television and other video surveillance, fire alarms, intrusion detection and much more.

PSIM is a gigantic task that requires planning (and buy-in) from various components of an organization. “Discuss capabilities and product/project goals in advance of PSIM deployment, and prepare for cross-functional organization structures to be in place, says Tamar Newberger of Catbird Security.” Newberger encourages decision-makers to take advantage of this rare opportunity “to do security completely differently—and better. He says the goal should be to “software-ize” network security in order to be more agile and more accurate.

What if security were smarter? What if it were seamlessly integrated with IT? These wishes are coming true thanks to the emerging concept of Physical Security Information Management (PSIM).

The purpose of PSIM is to turn previously disconnected data from various security applications and subsystems into a single-interface to provide well-organized, well-integrated security intelligence. With PSIM, security can be managed via the network, leveraging multiple data points to allow more proactive and nuanced execution of security.

Not only does security get smarter with PSIM, it also becomes much more personal. For example, when an employee swipes his or her access card to enter a secure section of the facility, they are not only confirmed or denied access, but all of their personal information—from his or her salary, position, security clearance level, even personal things like Facebook accounts—is immediately available via the network for the perusal of security or IT personnel. If there’s a problem, security professionals now have access to a great deal more information than they did in the past, allowing them to make more informed decisions in order to resolve situations more quickly and accurately.

It all adds up to what security pros call increased situational awareness. “PSIM empowers personnel to identify and proactively resolve situations,” says Larry Lien, vice president of Product Management for PSIM provider Proximex. “Organizations looking to increase control [and] improve situation awareness and management reporting are great candidates for adopting PSIM technology.”

Lien says PSIM is rapidly growing due to an increased interest in integrating information through the power of the IT network. Cost efficiencies in our changing economy are also a factor. “[Organizations] want to be able to better utilize new security technologies but often with limited operational staff,” he says. “PSIM solutions allow information from these systems to be integrated in an automated fashion to provide improved awareness of incidents, minimizing risks, managing compliance and reducing costs.

In addition, as security applications expand, it’s more incumbent than ever to have them fully integrated. “Enterprise-level organizations with robust security operations centers are no longer relegated to traditional intrusion alarm, access control alarm management or video surveillance, but instead are taking on additional facility management and operational tasks like handling power outages, water main breaks, public demonstrations and more,” says Lien. “PSIM technology like [our] Surveillint [system] allows these enterprises to quickly and seamlessly centralize existing systems to be monitored via a single console, without the expense of complicated integrations and increased staff resources.”

“The idea of having a centralized management console for important security controls just makes sense,” says Tamar Newberger, vice president of Marketing at Catbird Security. “One or two security devices alone do not tell much about a specific security event. [For example,] a firewall will report on the status of a connection, but not on the content related to that connection. An IDS [intrusion detection system] will report on an active exploit, but not on details of the attacker. The key to painting a detailed picture of an organization’s security posture is to combine multiple operational messages from within the infrastructure, which is what PSIM accomplishes. PSIM or PSIM-like solutions are essential to any organization holding proprietary information, such as financial institutions, healthcare organizations and government entities.”

To sum up, the core functions of a PSIM system are as follows:

  • It collects data from numerous security subsystems.
  • It analyzes the data and figures out what the situation is and how much attention it needs.
  • It presents those results in a clear, understandable way for security and/or IT personnel.
  • It explicitly advises the security operator what to do to resolve a situation.
  • It compiles reports for the purposes of analysis and compliance.
  • Because every action is recorded, it allows you to check up on the efficacy and performance of your security personnel.

On paper, PSIM is the consummate marriage of policy and security. It’s not as simple as one might hope, but it is an extremely worthy goal in today’s connected, data-driven world. Our slideshow gives you six things to think about when considering a PSIM solution.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate, Systems Monitoring

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.