PSIM or ‘physical security information management’ dates back to 2006, and since then has grown and improved to the level where it can benefit almost any business. It is an internet protocol (IP) based method of managing a whole variety of different security systems. Depending on the needs of the business this can be close circuit television (CCTV), access control, intruder and fire alarms, and more. Each individual method will work alongside the others in order to make them more effective than they would have been as standalone products. Because each and every product that we use to secure our businesses are controlled through data, it can all be analysed and used by your business as part of the BI, as well as simplified and managed. |
Collection. Data is collected from all your security systems and devices throughout your company. This can be alarms, monitoring devices, access control, and cyber security. Any attempts on security will be monitored. Next comes analysis. The system then processes all the given data to identify any existing or potential situations, allowing the security team (which might be an individual who is monitoring your system), to react and prioritise. It might be that the PSIM can even help advice on what needs to be dealt with as a first priority and what could be left for the moment.
It is important that the information is verified, as this will be how the information is presented to the operator. If they need to manually override the system (for example the access control has locked out someone it shouldn’t have), they will be able to do so.
Next the PSIM will work on a resolution and provide step by step instructions from its database about how the company’s policies suggest the situation might be dealt with, which speeds up the process as well as keeps it incredibly simple.
Reporting and an audit trail means that the company will be able to analyse any gaping holes in their security systems and make any changes which are necessary. Reaction times can be calculated and protocols adapted as required.
There are all sorts of businesses and individuals who can benefit from this sort of information management and business intelligence. As you add in new security it is possible to easily incorporate it into the system as well, which means it can grow and develop as you need it.
Joseph works for ISM-UK, a world pioneer in integrated security systems and PSIM. ISM are the UK's leading developer of integrated security management and, intercom and cell call systems. In his spare time he enjoys the finer things in life, including travelling and dining out.
Related Articles -