Physical security information management

Last updated

Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.

Contents

A complete PSIM software system has six key capabilities:

  1. Collection: Device management independent software collects data from any number of disparate security devices or systems.
  2. Analysis: The system analyzes and correlates the data, events, and alarms, to identify the real situations and their priority.
  3. Verification: PSIM software presents the relevant situation information in a quick and easily digestible format for an operator to verify the situation.
  4. Resolution: The system provides standard operating procedures (SOPs), step-by-step instructions based on best practices and an organization’s policies, and tools to resolve the situation.
  5. Reporting: The PSIM software tracks all the information and steps for compliance reporting, training and potentially, in-depth investigative analysis.
  6. Audit trail: The PSIM also monitors how each operator interacts with the system, tracks any manual changes to security systems and calculates reaction times for each event.

PSIM-based integration

A key differential between PSIM based integration and other forms of physical security system integration is the ability for a PSIM platform to connect systems at a data level, contrasting other forms of integration which interface a limited number of products. PSIM allows use of open technologies which are compatible with a large number of manufacturers. These PSIM products offer more opportunities for expansion and can reduce implementation costs through greater use of existing equipment. PSIM solutions in general are deployed to centralize information to single or multiple control hubs. These are referred to as control rooms or command and control centres (CCC, C4I, etc.). To be connected with other technologies, is an important feature of any basic PSIM as is the capability to integrate with Open Industry Standards such as (PSIA, ONVIF, ODBC, etc.)

Security systems typically integrated into a PSIM solution include:

Operator guidance

PSIM solutions manage all of the data produced by the various security applications (where the security application manufacturers API or SDK allows), aggregates them to produce meaningful intelligence and can be enhanced with modern information management technology.[ citation needed ] This in turn is converted to create graphical situation management content; combining relevant visual intelligence, workflow based on on-screen guidance and automated tasks (also referred to as a Common Operating Interface). This is used for both event management and for day-to-day security operations. Some of the more advanced PSIM products offer dynamic guidance, which can be changed according to the perceived threat level. This threat level is governed by both external intelligence, such as DHS advice and internal intelligence, such as the number of attempted breaches. This level of dynamic guidance again relies on the level of integration achieved with any given manufacturers API or SDK.

Typical deployments

PSIM solutions can be found in a wide range of industry and government sectors across the globe. The following are industries where PSIM deployments can be found;

Examples of PSIM deployments:

Industry bodies

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security is the protection of computer systems and networks from threats that may result in unauthorized information disclosure, theft of hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Physical security</span> Measures designed to deny unauthorized access

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

<span class="mw-page-title-main">Closed-circuit television</span> Use of video cameras to transmit a signal to a specific place on a limited set of monitors

Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

<span class="mw-page-title-main">Intelligent transportation system</span> Advanced application

An intelligent transportation system (ITS) is an advanced application that aims to provide innovative services relating to different modes of transport and traffic management and enable users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks.

<span class="mw-page-title-main">Security alarm</span> System that detects unauthorised entry

A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security alarms protect against burglary (theft) or property damage, as well as against intruders. Examples include personal systems, neighborhood security alerts, car alarms, and prison alarms.

<span class="mw-page-title-main">Motorola Solutions</span> American data communications and telecommunications equipment provider

Motorola Solutions, Inc. is an American video equipment, telecommunications equipment, software, systems and services provider that succeeded Motorola, Inc., following the spinoff of the mobile phone division into Motorola Mobility in 2011. The company is headquartered in Chicago, Illinois.

Building automation (BAS), also known as building management system (BMS) or building energy management system (BEMS), is the automatic centralized control of a building's HVAC, electrical, lighting, shading, access control, security systems, and other interrelated systems. Some objectives of building automation are improved occupant comfort, efficient operation of building systems, reduction in energy consumption, reduced operating and maintaining costs and increased security.

<span class="mw-page-title-main">HID Global</span> American manufacturer

HID Global is an American manufacturer of secure identity products. The company is an independent subsidiary of Assa Abloy, a multinational door and access control conglomerate. Björn Lidefelt was appointed CEO on 27 January 2020. He succeeded Stefan Widing, who led HID Global for over four years.

<span class="mw-page-title-main">Axis Communications</span> Swedish manufacturer of surveillance cameras

Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. Since 2015, it operates as an independent subsidiary of Canon Inc.

<span class="mw-page-title-main">IP camera</span> Network-connected digital video camera

An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. They are commonly used for surveillance, but, unlike analog closed-circuit television (CCTV) cameras, they require no local recording device, only a local area network. Most IP cameras are webcams, but the term IP camera or netcam usually applies only to those that can be directly accessed over a network connection.

ONVIF is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products. ONVIF creates a standard for how IP products within video surveillance and other physical security areas can communicate with each other. ONVIF is an organization started in 2008 by Axis Communications, Bosch Security Systems and Sony.

Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events.

CS Group, initially known as Communication & Systèmes (CS), is a French information-technology service company listed on the Paris Bourse as a member of the CAC Small index. The company designs information systems, develops and integrates software, manages projects and deploys industrial applications. Apart from that, it provides science, technology, and consulting services. CS Group is the French leader in air traffic control, the third-biggest supplier of traffic-management systems in the world and provides information technology consulting services.

<span class="mw-page-title-main">Avigilon</span>

Avigilon is a Canadian subsidiary of Motorola Solutions, which specializes in the design and development of video analytics, network video management software, surveillance cameras, and access control products.

<span class="mw-page-title-main">Pelco</span>

Pelco Incorporated is an American security and surveillance technologies company. Founded in 1957 and headquartered in Fresno, California, Pelco is a wholly owned subsidiary of Motorola Solutions. The company's products include security cameras, recording and management systems, and video analytics software.

The Physical Security Interoperability Alliance (PSIA) is a global consortium of more than 65 physical security manufacturers and systems integrators focused on promoting interoperability of IP-enabled security devices and systems across the physical security ecosystem as well as enterprise and building automation systems.

<span class="mw-page-title-main">Eagle Eye Networks</span> American cloud-based video surveillance firm

Eagle Eye Networks, Inc. (EEN) is an American company providing cloud-based video surveillance products for physical security and business operations applications.

Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. TIPs have evolved to address the growing amount of data generated by a variety of internal and external resources (such as system logs and threat intelligence feeds) and help security teams identify the threats that are relevant to their organization. By importing threat data from multiple sources and formats, correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management and mitigation. A true TIP differs from typical enterprise security products in that it is a system that can be programmed by outside developers, in particular, users of the platform. TIPs can also use APIs to gather data to generate configuration analysis, Whois information, reverse IP lookup, website content analysis, name servers, and SSL certificates.

Brivo, Inc. is a smart building company providing cloud-based access control and video surveillance products for physical security and internet of things applications.

Senstar Corporation develops and manufactures perimeter intrusion detection systems, video management software, security lighting, personal duress systems, and access control software for the physical security and video surveillance industries. Its headquarters are located in Ottawa, Ontario. Senstar products protect facilities around the world, including critical infrastructure sites, military bases, nuclear power plants, airports, personal estates, borders, and correctional facilities.

References

  1. Craighead, Geoffrey (2013-06-21). "Special Report: Government Security - Sharing Video with Police". SecurityInfoWatch.com. Cygnus Business Media. Retrieved 24 April 2014.
  2. "Atlanta Operation Shield". Atlanta Police Foundation. Archived from the original on 15 March 2016. Retrieved 24 April 2014.
  3. "CCTV on track against terror". Professional Security Magazine pg. 46. Retrieved 24 April 2014.
  4. Jackson, William. "Force multiplier: PSIM leverages video surveillance networks in Baltimore". GCN. 1105 Public Sector Media Group. Retrieved 24 April 2014.
  5. Craighead, Geoffrey (2013-06-21). "Special Report: Government Security - Sharing Video with Police". SecurityInfoWatch.com. Cygnus Business Media. Retrieved 24 April 2014.
  6. "Video Camera Community Partnership Program". City of Ventura Police. City of Ventura. Retrieved 24 April 2014.
  7. Rothman, Paul (2012-12-10). "STE Security Innovation Awards Silver Medal: Technology Makeover". SecurityInfoWatch.com. Cygnus Business Media. Retrieved 24 April 2014.