Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Edge Smarts Demands Incident Analysis

By Bill Zalud
May 1, 2009
An incident reporting and risk management system allows a casino to bring together access control and security video incident reports into one display. Casinos have two separate systems – security and surveillance – that must remain separate. But incident reporting can bring together data for a total review for action and improvement.


With security access decision making, like security video, at the edge, there is a shift to incident reporting and analysis and its cousin, physical security information management (PSIM).
     
Incident reporting has long been a security procedure but has been recently souped up with computer-based tools. It’s a way to categorize what has happened and reach conclusions for better protection.
     
For example, Prairie Band Casino and Resort considered the various options for an incident reporting and risk management system and chose iView System’s iTrak Incident Reporting Platform.
     
The system has given the business the ability to go paperless.  No more making unnecessary copies.  All you have to do is simply log in and view the details of the daily activities.  Having a multiple client access system enables all regulatory departments to sign on and review both security and surveillance reports, eliminating the need for paper reports and reducing the cost of purchasing paper to print out the reports.


SHARING THE REPORTING SYSTEM

Incident reporting allowed both security and surveillance to share a common system. The security department’s main issue was they were using an outdated Microsoft Access database that only allowed them to create reports with no capability to integrate other programs, thus creating more paperwork and record storage issues.
     
Michael Jackson, director of security, said, “The software allows us to bring together all of our reports in one system. Another major reason was the ability to add additional modules in the future like risk management that automatically connects to the system without worry.”
     
Together with dispatch and a lost & found module, Prairie Band Casino and Resort has an all in one solution that allows both security and surveillance to share a fully converged platform. This enables both departments to create their own reports, with the capability to share information, while ensuring all regulatory procedures are followed.
     
PSIM is a “while it is happening” tool to help provide the best response.
     
There is a heavy buzz over PSIM.
     
But as Gavin Long of BAE Systems pointed out, “When the buzz takes place, numerous people begin to latch on to language. The language of PSIM is now being more fluently used and, unfortunately I think, can create some confusion. It’s really the placing into one system the intelligence to give people who are managing the situations all they need to understand the situation quickly. It’s providing analyzed, intelligent information that’s actually necessary for a response and, one step further, to create better policies to what we’ve learned through that system of information sharing, information integration.”


TOTAL INTEGRATION

PSIM must integrate applications and devices from multiple vendors. It must leverage the enterprise infrastructure investments. PSIM also must be preventative and reactive, not just limited to forensics, according to Long, who added that it must gather, analyze, disseminate mobile data, “including, I would say especially video. Video in this environment is the most difficult area to manage.” PSIM must reduce data flow and technological concerns to empower the security leader.
     
David Fowler of VidSys has a number of essentials of physical security information systems.
     
“The first is the ability to collect all of the information from the physical security devices.  We typically find when we get into an organization that they not only have a lot of different devices that they want to communicate with, whether NVRs or access control systems or RFID or sensor environments or building control, but they also have this equipment from multiple vendors and the difficulty they struggle with is how to collect the information from all these different systems and bring it all together.”
     
He added that it is also important to integrate in a way to actually analyze the information as it’s coming in.


FROM BOOK TO AUTOMATION

The goal in any PSIM system is to take what would normally be the standard operating procedure in a book and get it into the system.  Not just in the form of a static document, but actually in a form of activities that can be executed either automatically by the system or manually by an operator.
     
Karen Steinfeld at Raytheon agreed. “PSIM is really not about a bunch of disparate applications that are stitched together, but it’s about a single integrated solution that allows security leaders to effectively manage and resolve situations. So planning for that by having a system that’s based on open standards is very important.  Open standards will allow you to more easily integrate the pieces as technology needs arise.  The other piece is scalability.  Even without the need for new applications and services, there is going to always be an increased demand for bandwidth and for numbers of users on a system.” Her point: Leverage existing investments where possible. “And that means really doing an assessment of what assets you have and what the remaining useful life is and how they would fit into your solution that you have planned going forward.”
     
A pilot program in the quad-cities area of Illinois and Iowa that Raytheon was involved proves the benefits of an integrated PSIM solution that would really improve both the communication and the information sharing ability of the public safety agencies within this area.  The quad cities are really two different states, encompasses Iowa and Illinois, four major cities and a population greater than 400,000 people. So it’s a good sized area that faces a lot of the same challenges that most cities in mid-America face. “What the quad cities looked to do was first to go and form a governance model that brought these jurisdictions together so that they could work together and share information and honestly what we learned was that was the hardest part,” said Steinfeld.
     
The second challenge was developing network solutions to enhance the region’s infrastructure in terms of voice and video and data communications. “So we brought in a number of things in addition to the video surveillance. We had license plate recognition, we had interoperable communications gateways, collaboration tools, and a number of other applications including patient tracking that were available on the wireless network. So a fully integrated solution provided the situational awareness and gave the public safety officials the ability to respond more effectively.”


A new crime vulnerability database from CAP Index compared 2008 and 2009 information and found that, among changes, crime has shifted noticeably from inner cities to sprawling suburban areas. Pictured is Charlotte 2008 at top and 2009.

SIDEBAR: The Ultimate: Crime Forecasting

A number of crime forecasting tools, fed with crime statistics and other data, can help security leaders determine vulnerability of their facility locations or a potential acquisition location or proposed new site.
     
One such service, CAP Index, just introduced its 2009 Crimecast crime vulnerability database. At the advent of the recent economic downturn, the firm anticipated a dramatic shift in crime. The new model reflects rapidly changing patterns of crime across the country and reveals some surprising shifts about where that crime is occurring.
     
For example, there has been an up tick on robberies, property crime, shoplifting and larcenies in business. It addition, there has been a movement from the inner cities to sprawling suburban areas as housing moved out.
     
The updated database is the culmination of a two-year long development process. “When signs of weakness in the housing market first began appearing, we anticipated that early softness in this arena would have a long and deep impact on the overall economy, and that this sustained downturn could cause some dramatic – even unanticipated – shifts in crime,” said Jon D. Groussman.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Passengers purchase the RFID bag tags which provide convenience and unique services for passengers as well as operations data for airlines.

    Just How Versatile is RFID Technology?

    See More
  • ip feat

    Measuring the Next Step in IP-Based Access Control

    See More
  • Smartphone used for security

    Another Evolution?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!