Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

PSIM Stresses Analysis

By Steve Hunt
March 1, 2007


At the ISC West Show this month, and at boutique shows like Secure World Expo, you will see many exciting, innovative technologies.  But none with as much potential to transform your security enterprise as those falling into the category of PSIM: Physical Security Information Management.

PSIM technologies make your business better and your security operations, too. We all are watching as the IT security field evolves. Let’s remember that IT access control is valuable and mitigated threats but not necessarily in a coordinated way. IT created a more sophisticated information security effort that includes aggregating, collecting and coordinating related data.

Fortunately, some vendors understand this and came out with technical answers.

PSIM has measurable value. I have spoken to many security directors and they tell me that the reason they cannot get approval for their original budget is that their supervisors see them as second-class executives. They might be thinking and talking about of bad things that could happen, instead of good business things that could happen. Think about value.

Emerging Vendors

PSIM can report on how many unauthorized access attempts to doors were reported but also relative to one another. That piece of technology can produce reports showing operational improvements, how fast security personnel responded to incidents and class levels.

Orsus and Proximex dominate the situation management tier of this new category. Proximex is a bit prettier and more intuitive to use, but faces such challenges as funding and ability to execute enough sales to stay afloat.

Orsus is more feature-rich and very well funded and already includes some impressive video management, incident escalation and audit and reporting capabilities. Orsus’ customer list is impressive, too, with major enterprise deployments already in place despite a late 2006 start of U.S. sales operations.

Quantum Secure is the far and away leader of policy management across disparate security systems. 

VidSys has new ideas about how to manage video.

Augusta Systems has useful tools for the do-it-yourselfer.

Sentry Port is a newcomer with lots of potential, especially with an artificial intelligence engine designed to find the nuggets of very useful security information by mining all data flowing through many systems and correlating it.

I’m generally not prepared to be surprised when I come to the largest IT security trade show.  Like its counterparts in physical security (ISC and ASIS), there is not much new from one year to the next.  But that’s kinda nice, too.  Like walking into a McDonalds anywhere in the world, RSA feels familiar each year.

Maybe this year I had more of an open mind.  Or maybe it’s because I started my tour of the show floor at the extreme end where the smallest booths and newest, most innovative companies set up shop. I’ve seen Trusted Network Technologies before.  This year they were giving away rubber chicken squeak toys.

I know these guys at Trusted Networks are on to something cool.  They use a network device to monitor, then learn, then control access to resources. It’s a good idea.  And I’m certain there is an application for physical security, not just network security.  But I haven’t put my finger on it.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is founder of the Chicago-based research firm, 4A International, www.4ai.com. Contact him at info@4ai.com or visit his blog, www.SecurityDreamer.com.

SecurityDreamer is growing up fast. Since lauching Security- Dreamer in November 2006, readership has steadily grown. According to Hunt, he has recently added a daily email with recent updates. The site will soon feature more IT and IT security content -- especially information that relates to collaboration and communication across the lines of physical and homeland security with IT.

SecurityDreamer will host forums, or discussion boards, for topics like intelligent video, PSIM, security management best practices, endpoint security, FIPS 201 and needed technology standards.  Watch for a Wiki, too.  We are even going to list more than a hundred vendors and invite your comments on each.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Knock It Off!

    See More
  • Twitter, Chrome, Wiki and the New Lingo of Security

    See More
  • Business vs. Sales 101

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing