The operator sees the “swipe and show” of the access system in a prioritized view as the card was presented, but no PIN was entered. Pre and post video appears along with all nearby cameras displaying motion. The system automatically texts the owner of the misused badge and asks them to report in to verify they are safe. The situation is contained. The operator is free to engage in escalation procedures and counter the threat. They did not lose time moving between systems. The owner of the card reports back they are safe, but they now realize their wallet was stolen.
Additionally, since these products reside on a single server, this approach can require fewer licenses and reduce the burden of ongoing firmware and other software updates when compared with a traditional VMS with third-party integrations.
For an integrator, there are scenarios in which a VMS of either type may best serve the user. One is when the VMS user wants to manage systems, which can include video, access, intrusion and other security functions such as specific analytics packages, from a video perspective. Should the end user have two or three different manufacturers’ solutions, or be installing the system in a new facility and buying all new equipment, a VMS will most likely meet the end user’s needs.
End users that depend heavily upon physical security or surveillance, such as those in retail or casinos, are often good candidates for a VMS solution. Addition-ally, users who require a clear, intuitive solution to routinely view video after an event or for forensic purposes benefit the most from a VMS.
One of the lesser-known differences between VMSs and PSIMs is in how they are deployed and used. VMS systems are often maintained by dedicated departments responsible for the management of their physical security, which are less likely to be integrated with the rest of an enterprise.
PSIM systems, on the other hand, are often deployed on technology infrastructure and software maintained by the organization’s IT department, and might be integrated with a variety of enterprise and nonsecurity systems such as geographical information systems and building management systems. This distinction in organizational and IT infrastructure is one of the defining differences between traditional VMS and PSIM installations.
There are other instances, however, where PSIMs are used as dedicated security systems. For example, when an end user has many disparate security systems from different manufacturers that can’t easily be integrated with a VMS. A PSIM may also be used as the primary security system if the end user requires a high lev-el of customization, interoperability with third-party applications or a system that helps to manage the workflow and security processes.
PSIM Not Just for Enterprise Users
PSIMs are quickly breaking from the stereotype of being best suited only for large enterprises and government organizations with deep pockets. Today, smaller organizations are looking for the same PSIM benefits.
At its core, the PSIM is an IT-based system. It does not rely upon one system, such as video, to play the role of primary system, but rather aggregates data from multiple, seemingly disparate systems to create a broad, comprehensive view for operators. As an IT system, a PSIM is not bound by brand or type of integration.
A PSIM can manage multiple video systems, multiple access control systems, radar systems, building management systems, elevators, weather feeds, national threat level information, and many other types of systems and corresponding data. This kind of broad capability is not typically possible with a traditional VMS platform.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!