Invalid card swipes
Numerous enterprises use PSIM software to automatically identify potential situations based on multiple invalid card swipes on a specific door within a defined time period. Operators are automatically presented with relevant video and card information to quickly validate whether or not the card holder and individual in the video match. Integration with an HR system provides the operator with seamless information as to whether or not the individual is an active employee. If not, action can be taken immediately. Prior to having the PSIM software in place, each system was looked at individually by different operators. The operators would then have to coordinate information and determine whether or not action was needed.
Prior to the City of Baltimore’s inaugural Grand Prix last year, its PSIM software was put through an impromptu test when the city experienced an earthquake and the remnants of a hurricane just one week before the race. The events proved to be the perfect catalyst to test the system, providing city officials with access to real-time information during the recovery effort. More specifically, it allowed the mayor to have a visual tour of the city, reviewing the live video feeds from helicopters so assessments and decisions related to impacted areas—specifically those without power—could be made. The city conducted real-time analysis of the natural disasters from one location with video, without needing to rely on radio communications - a capability that very few cities in the nation can claim. By having the PSIM software in place, the city was able to more rapidly and effectively respond to the situations resulting from the natural disasters.
Intellectual property (IP) protection
With PSIM, an organization is able to link RFID tags to ID cards. If an RFID tag alarms indicating property is outside of a building or secure area, the individual’s ID card tied to the RFID can be immediately viewed by a security operator and the owner’s location determined. This empowers security personnel to quickly and effectively respond to the potential IP breach. Prior to PSIM, the RFID tags and ID cards were managed in siloed systems, preventing data from being immediately correlated. As a result, the data had to be manually correlated, a time intensive process that would prevent security personnel from being able to take swift action.
Suspect identification and capture
After a distinguished U.S. university implemented PSIM software on its campus, its police were able to identify, track and retain five individuals involved in an attempted robbery on campus. Specifically, an officer saw a vehicle fleeing the scene and captured the license plate. PSIM software was used to verify the plate number, immediately pull up the video from the location and visually identify the suspects. As a direct result, four of the five suspects were criminally charged and the video evidence was used during the prosecution phase of the investigation. Without PSIM, the police would have spent hours after the incident sifting through video to identify the suspects, rather than taking swift action as the situation was unfolding.