In all, this form of enhanced integration can change the response profile of security operators through tighter interoperability. Let’s revisit the scenario of the data intruder: The intruder gains access by forcing the door. In the same user interface and in real-time, all adjacent doors are locked down automatically.
The operator sees the “swipe and show” of the access system in a prioritized view as the card was presented, but no PIN was entered. Pre- and post-video appears along with all nearby cameras displaying motion. The system automatically texts the owner of the misused badge and asks them to report in to verify they are safe. The situation is contained. The operator is free to engage in escalation procedures and counter the threat. They did not lose time moving between systems. The owner of the card reports back they are safe, but they now realize their wallet was stolen.
Additionally, since these products reside on a single server, this approach can require fewer licenses and reduce the burden of ongoing firmware and other software updates when compared with a traditional VMS with third-party integrations.
There are scenarios in which a VMS of either type may best serve the user. One is when the VMS user wants to manage systems, which can include video, access, intrusion and other security functions such as specific analytics packages, from a video perspective. Should the end user have two or three different manufacturers’ solutions or be installing the system in a new facility and buying all new equipment, a VMS will most likely meet the end user’s needs.
End users that depend heavily upon physical security or surveillance, such as those in retail or casinos, are often good candidates for a VMS solution. Additionally, users who require a clear, intuitive solution to routinely view video after an event or for forensic purposes benefit the most from a VMS.
One of the lesser-known differences between VMSs and PSIMs is in how they are deployed and used. VMS systems are often maintained by dedicated departments responsible for the management of their physical security, which are less likely to be integrated with the rest of an enterprise.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!
Leave a Reply