Managing physical security information

This security management system integrates with badging software to automate who has access to what areas/buildings.
This security management system integrates with badging software to automate who has access to what areas/buildings.

The benefits of creating a single operating platform
Physical security information management integrates various subsystems into a single, common operating platform. These can include:

  • video;
  • audio;
  • access control;
  • intrusion alarm;
  • fire alarm;
  • building management;
  • computer-aided dispatch; and
  • power management.

Intelligent analysis of system information is then applied, automating system activities through rules-engine-based workflows. These workflows map the automated system activities and security operator actions in response to specific events. For example, in response to an alarm event, the software rules engine can direct video cameras to be displayed and recorded, controlled doors to be locked/unlocked, and template e-mail and text messages to be automatically sent to make notifications. For security control operators, pre-defined lists of instructions can be displayed to direct alarm response activities, which can be configured to change, as an event escalates.

This connects disparate security systems and devices to provide a common operating environment for shared data, enhanced event management, and improved situational awareness. Not only does the PSIM solution collect, normalize, correlate, and analyze information from these varying systems, but it can also interact with them to generate automated system activities. The solution can:

  • lock and unlock doors;
  • control pan-tilt-zoom (PTZ) cameras;
  • archive and access recorded video related to an event;
  • turn alarm zones on or off;
  • shut down elevators; and
  • send out evacuation messages.

PSIM software integrates disparate security subsystems into a single operating platform. Intelligent software modules collect, normalize, and correlate data from subsystems to operate in a common system language and protocol. Automated system activities are enabled by rule engine-based workflows, and visibility is maximized through customizable screens and user interfaces that display event information.

Components of PSIM
PSIM provides a complete situation awareness and physical security management solution to effectively manage any security, business-critical, or emergency situation in real-time. Unlike access control, alarms, or video systems, PSIM is not limited to managing events from a single input or trigger within a given subsystem, or within one group of hardware devices. A PSIM solution has the ability to aggregate information from all its connected systems for a more holistic view of a situation, automating processes and actions throughout to better manage the area. A scalable PSIM solution includes several primary components.

Open connectivity and integration
This component offers a platform for the connection and management of multiple disparate security systems. It should be capable of integration with other business systems within a corporate IT infrastructure, such as enterprise resource planning (ERP), data warehouses, and provisioning systems. The PSIM platform must be open and ‘vendor-agnostic,’ providing capabilities to connect to any input sensor or external application.

Real-time policy and configuration management
This element creates integrators to define and change policies and parameters related to various connected devices in the underlying subsystems, such as access control and video.

The data center at Florida’s Ave Maria University is where 23 systems, including IT, facility operations, and security.
The data center at Florida’s Ave Maria University is where 23 systems, including IT, facility operations, and security.

Correlation and verification engine
The engine generates the ability to integrate events and alarms from multiple systems along with other information––such as time and geography––to automatically assess situations, then responds to them in accordance with established rules and policies.

Rules engine
The rules engine allows a step-by-step action plan for security operators, based on pre-determined rules and policies, to more effectively respond to and manage security and critical events. The rules-based workflow includes the complexity to adapt to escalating situations.

Geospatial engine
This component uses location coordinates to dynamically locate various devices, people, and assets, and creates relationships between them. It instinctively knows which camera is closest to an event and can automatically provide the security operation with an image from that camera.

Dynamic mapping
Mapping offers the ability to graphically display situational information for security operators with a picture of the event, location, and scope in real-time.

Post-event reporting and analysis
Reporting and analysis create an audit log for the forensic review of event details, and record the actions taken during and after the event. This feature includes the capability to develop customized reports for analysis of multiple events and trends to optimize response operations.

Leave a Comment

Comments

Your email address will not be published. Required fields are marked *