As security environments evolve to include more and more systems, end users are bombarded with a deluge of video, alarms and data while responding to increasingly sophisticated threats against the safety of people and assets. Solution providers continue to advance development of security command and control platforms to enable a more streamlined response pipeline. For integrators, the pressure is on to deliver fully integrated security solutions that will satisfy growing demands by end users to manage the inevitable system overload.
Over the past few years, a new top layer of security management has been created to bring all the systems in an enterprise together into one central platform. The result is a range of Physical Security Information Management (PSIM) applications that offer sophisticated situational management functionality. Since this product category emerged, many have jumped on the PSIM bandwagon resulting in various levels of “true” solutions to “partial” or “lite” options (not all of which deliver the flexibility that comes with product-agnostic PSIM).
Educate yourself on the different versions, costs
While warnings are circulating among industry analysts and consultants about the risks of partial and lite PSIM, the costs associated with true PSIM applications are significant, causing some end users to consider more affordable options. Additionally, the effort required to make true PSIM technology work can be daunting. Considering that business environments have many disparate systems needing to work together in real time to make a PSIM solution effective, the road to integration can be a long and winding one.
Before you get completely overwhelmed with the idea of implementing a PSIM solution, there are steps you can take to move from point A to point Z without self-destructing in the process. Think of it like dating before you get married.
If you are embarking on PSIM implementation, it will help to put some strong pillars in place on which you will build your platform (see graphic on page 18).
Here are some steps to consider with end users on the journey to achieving a successful PSIM solution.
1. Understand the data
With multiple systems managing different aspects of a business operation, there is a huge amount of data, alarms and events generated that can point to incidents worth evaluating. Each incident is different so methodologies can be difficult to quantify. To better understand how to evaluate all the data being produced, first identify which events trigger threats, fraud, risk or loss. Create metrics and “acceptable thresholds” and look for non-obvious relationships between data sets. Learn about the systems you’re trying to converge and partner with managers of those systems to understand the information generated. Do this research prior to any automation and consider developing manual methods first, i.e. spreadsheet analysis of the core problem on which you are focusing.
2. Find the right technology
There are a host of PSIM applications on the market, as well as a range of VMS and access control platforms that offer PSIM functionality at various levels, so get educated. PSIM is a hot topic these days and you can find excellent online resource material by joining PSIM discussion groups or subscribing to security-related Web sites. Once you narrow down the choices, make sure the technology you select will actually do what it says and what you need it to do. If you have taken the time to understand the systems and data, you’ll be in a better position to find the right solution.
3. Rally the troops
In addition to the cash investment required to acquire PSIM technology, an organization also needs to commit the people, time and coordination effort to successfully implement such a complex integrated solution. Advise end users to begin sooner than later to generate support internally and externally. Work with them to write an implementation plan that identifies the “who, how, what and when” of their PSIM roadmap. Depending on the complexity of the end-user’s requirements, consider bringing in a consultant with expertise in PSIM deployment planning to help with this process.