• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security

How to Tell Video Surveillance Management and Situational Awareness Apart

Learn the definitive differences between video management systems (VMS) and physical security information management (PSIM) systems.

April 15, 2015 TD Staff 1 Comment

It is not a new debate. A good deal has been reported on whether projects are better served by a physical security information management (PSIM) system or instead leverage the integration capabilities available with a video management system (VMS). The answer, of course, is both are excellent solutions that can help make sense of the multiple streams of data bombarding security system operators in today’s physical security environment.

The choice between the two approaches hinges on the needs of the users and variety and types of systems requiring integration. Though both the PSIM and the VMS offer their own sets of benefits, there are some definitive differences between each system and philosophical approach.

Some of these differences are obvious, while others are more nuanced and perhaps not apparent until you’re in the thick of things using the system in a real-world setting.

A VMS Prologue

VMSs have become increasingly sophisticated and capable of integrating multiple types of physical security information and environmental systems into a cohesive and understandable interface, providing a broad view of an environment’s physical security. These systems are most commonly used with surveillance-related applications such as access control, license plate recognition (LPR) and video analytics.

As a central point (or anchor) of system integrations, a VMS is often applied in active surveillance environments where the security requirements demand full-time video use. In this capacity, a VMS typically treats other integrated systems as playing a supporting role, augmenting the VMS’s existing view of a facility. Data from these other systems is incorporated into the VMS through the lens of the video surveillance system.

While other types of physical security data can be fed into a VMS, these outside data sources are measured against and related to video, the primary source of data.

Integrated vs. Unified VMSs

Historically, a VMS stood as an anchor platform through which other systems integrated via an application programming interface (API). In these cases, licensing must be maintained for each of the different vendors’ systems in addition to maintenance and updates for each.

The video or anchor interface only enabled basic interaction between the integrated systems. This allowed an operator to gain some level of situational awareness, i.e. video related to an alarm. How-ever, if an operator needed to investigate further, they had to exit the VMS and use another interface to attain the details necessary for a holistic understanding of an event.

Take the following scenario as an example: After normal business hours a person approaches an external door to a building holding sensitive customer data. This organization requires personnel to both swipe a valid badge and enter a four-digit PIN to gain access. On approach, the person triggers a video analytic alarm. They attempt to gain access using a stolen badge. The door does not open, so the person forces the door open. A “door forced” alarm moves from the access control system to the video system via the integration.

The security operator wants to lock all adjacent doors and find out whose badge was used for the swipe. They will also want to contact the owner of that badge. The operator now must exit the video system, log into the access system, find the associated doors and perform those tasks. Can they do it fast enough to contain the situation?

Conversely, some security manufacturers that supply multiple elements of security (a combination of cameras, VMS, access control or intrusion) offer a single solution with deeper interoperability between functions than are available between third-party APIs. These are often called “unified” systems, which operate a single-event engine and enable traditionally separate systems to function as one.

For instance, a unified solution can have active knowledge of other nodes on the network, generate associations between them and imbed workflows. Intrusion detectors can act in conjunction with video analytics to reduce false alarms. Access card readers and door contacts can associate with views from cameras with far less integrator programming and real-time interoperability. This also tends to reduce “broken” integrations as systems change versions.

In all, this form of enhanced integration can change the response profile of security operators through tighter interoperability. Let’s revisit the scenario of the customer data intruder: The intruder gains access by forcing the door. In the same user interface, and in real-time, all adjacent doors are locked down automatically.

Pages: Page 1 Page 2 Page 3

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate, Surveillance

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • AtlasIED North Syracuse Central School Dist 2 North Syracuse Central School District Streamlines Communications with…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • NSA Programming Languages The Cyberattacks and Insider Threats During The Development…

Free downloadable guide you may like:

  • 10 Reasons Why School Administrators Should Consider These Tech Tools for Emergency Preparedness

    Working in an educational facility is more complicated than ever before. There are so many more situations to be aware of, so much more to have to communicate to others. Communication is paramount for the safety of students and staff and to keep daily operations flowing smoothly. Where once a PA system was all that […]

Reader Interactions

Trackbacks

  1. Portable Security Unit from V5 Systems Protects Moscone Center - My TechDecisions says:
    October 24, 2018 at 12:00 pm

    […] V5 Portable Security Unit (V5 PSU) provides the security team at the convention center with situational awareness around the facility, enabling real-time monitoring via a smartphone […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.