Nearly ten years ago, Vidsys helped define a new market category called PSIM, or Physical Security Information Management
(see bigger image)
The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems
In this article, James I. Chong, CEO & Founder of Vidsys, sheds light on true PSIM (Physical Security Information Management). He mentions how Vidsys is continually innovating and accelerating its roadmap for PSIM toward Converged Security and Information Management or CSIM. Citing various analysts’ projection, James states that there may be 25 to 50 billion objects connected to the cloud as part of the IoT market by 2020. Also, he highlights the advantages of Vidsys PSIM software for organisations and public sector.

PSIM within physical security market

Nearly ten years ago, Vidsys helped define a new market category called PSIM, or Physical Security Information Management.  Since about 2010, the physical security market has adopted PSIM as a new and separate category from Video Management Systems (VMS), Access Control, Intrusion Detection and others. Also, there are many companies around the world offering various PSIM products and capabilities as a key differentiator. The security market is inherently crowded and fragmented so creating legitimate value-adds continues to be challenging for vendors and integrators alike. 

During the maturation of this category, the true definition of PSIM has become blurred and often mis-used. Many competitors and technologies that are not truly PSIMs say they can offer the same or similar features and benefits that only true PSIM software platforms can provide.

What is true PSIM?

True PSIM can simply be described as intelligent software that converts massive amounts of data (which is meaningless without context) into meaningful and actionable information by filtering and correlating the data based on time, location, duration, frequency and type. The specifics of these criteria are defined by the organisation’s risk policy, standards and compliance requirements.

PSIM is not simply an integration platform, nor is it a command and control platform such as C4ISR. It’s also not advanced Video Management, or Access Control, or even Computer Aided Dispatch software that has added basic device integration capabilities. The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems, including sensors, devices, and even non-security related devices using industry- approved, open standards. 

PSIM gains global momentum

During the past year, we have seen faster growth and stronger momentum in the marketplace for our software platform, not only in the United States, but also in many other regions around the world.  In particular, in the Middle East, Asia Pac and South America there is increased awareness as well as defined requirements that are now driving large scale PSIM programs.  In the US, major federal government agencies are also issuing RFPs for PSIM at an increasing pace.

True PSIM can simply be described as intelligent software that converts massive amounts of data (which is meaningless without context) into meaningful and actionable information

At Vidsys, we are continuing to innovate and accelerate our roadmap for PSIM toward what we call Converged Security and Information Management or CSIM.  As the leader in this industry, we are committed to continue educating and supporting our customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.

New IoT world - Security as a utility

We are well positioned to drive solutions around the Internet of Things (IoT) market as a fully web-enabled platform that will provide a foundation for future cities, smart buildings and even intelligent homes that will continue to evolve over the next decade into an enormous market segment.

Many analysts and organisations are projecting that by 2020, just five years from now, there may be anywhere between 25 to 50 billion objects connected to the cloud as part of the IoT market. This includes personal mobile devices, home appliances, smart buildings and other connected sensors. In this new IoT world, security will ultimately become a utility, much like power, water and cable are now. 

Transition from PSIM to CSIM

So how is this transition from PSIM to CSIM going to be realised in the market?

With the trend toward converged security we are already seeing much more formal cooperation between previously disparate security functions, such as physical security and IT security. Today, there is stronger integration between CSOs and CIOs, pushing organisational convergence to align with operational convergence.

This coordination involves both process and accountability. It is a results-oriented effort to work collaboratively to create greater efficiencies and ultimately, to reduce overall risk to the organisation. However, we are not talking about simply merging functions on an org chart, but about achieving true business integrations around risk and compliance.

Holistic security with Vidsys software 

Holistic security also involves risk management disciplines such as loss prevention, fraud prevention, business continuity planning, legal/regulatory compliance, insurance, and others.

In the US, major federal government agencies are also issuing RFPs for PSIM at an increasing pace

We are adding advanced capabilities to our web-enabled platform. Today, we can present relevant and actionable information in a map-based format and our rules engine enables users to quickly access automated action plans based on the organisation’s own policies and procedures. Our software can also integrate, monitor and assess external threats and vulnerabilities through seamless data visualisation support. Our Enterprise Business Intelligence reporting features can help security professionals better chart performance metrics and enhance overall accountability.

Integration with social media and other intelligence

These capabilities combined with other features can be leveraged by global organisations or multi-site enterprises to gain valuable and real time situational awareness and management capability. Vidsys software can also integrate with big data analytics tools, social media and other intelligence inputs and correlate internal vulnerabilities with external threats. Situational awareness data from external sources are now included in our dynamic reporting feature so business leaders have a more comprehensive understanding of where these threats are happening and how they could potentially impact business operations.

In a Public Safety environment, our customers including some of the largest cities in the United States, can better manage disruptions and or threats such as protests, civil unrest or situations requiring emergency evacuation.  In a crisis, business executives and public leaders want the ability to manage risk by having the timeliest and most accurate information possible. This includes using predictive policing tactics such as monitoring social media feeds to determine where crowds plan to assemble and what might present credible threats to both the public and property. All of this information combined enables a more accurate understanding of where key resources may be necessary and when they will be needed.

Download PDF version Download PDF version

Author profile

James I. Chong Chief Executive Officer & Founder, Vidsys

In case you missed it

Honeywell - how disruptive technologies make security systems better
Honeywell - how disruptive technologies make security systems better

The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years.  There is a higher demand...

Has price inflation ended (or slowed down) in the security market?
Has price inflation ended (or slowed down) in the security market?

Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It hap...

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

Quick poll
Which feature is most important in a video surveillance system?