Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Think About the Platform

June 1, 2007
“Despite the staggering number of cameras, alarms and sensors feeding data to an operations center, they lacked a physical security information management platform,” said Chuck Teubner.


Chuck Teubner is chairman and CEO of VidSys and has significant experience in the security and government market sectors. VidSys is a provider of Physical Security Information Management (PSIM) solutions to enable public safety and security personnel to focus exclusively on awareness, assessment and action.


Security Magazine: What is the major trend in the security market for 2007?
   
Teubner: Over the past year, it’s evident that the trend of physical and IT security convergence has transitioned from prognostication by industry pundits to the commercialization of real products that are transforming the industry.  This trend will continue to gain traction in 2007 as organizations realize that they need to correlate what’s happening on the physical side with what’s happening on the IT side of security.  For too long, these systems and operational teams have existed in silos, but through open standards and a common goal of improving security effectiveness, the shift is on to more effectively bridge physical and IT security.
   
One of the first steps to support this convergence is instituting a more holistic approach to collecting and analyzing the overwhelming amount of data from physical and IT-based systems to ensure the right response to a given security event.  The abundance of security equipment including inexpensive digital cameras, network video recorders, alarms and motion sensors are adding to the data fire hose, compounding the data management challenge for operations center personnel.
   
Until now, there has been a void in the physical security market at the intersection of IT security.  Despite the staggering number of cameras, alarms and sensors feeding data to an operations center, there lacked a PSIM platform that could take in all the data, correlate it with data from IT security systems and provide security personnel with the insight to make effective decisions and respond to security events.

Security Magazine: What is this emerging PSIM market?

Teubner: A product category within the physical security market, PSIM is the marriage of video management for security and surveillance applications, with incident and event management.   
  • PSIM products provide a unified management platform to tie the disparate physical and logical systems (video surveillance, recording, analytics, sensors, access control, etc.) together enabling security personnel in operations centers to better manage security events, instead of the underlying technology and systems.  This is accomplished through: 
  • Enabling the integration of disparate products and systems, including various video protocols and formats, into a single seamless management platform
  • Capturing and correlating real-time events from multiple systems
  • Providing real-time collaboration, escalation and notification by integrating with existing communications infrastructure
  • Providing an easy-to-use user interface that includes geographical information systems to graphically manage and represent data and current status


There are various phases of convergence but at the heart is a need to better manage all the types of information being collected.

4A International projects the overall security technologies market to reach approximately $70 billion globally, rising 15 percent annually.  The PSIM market potential is estimated at 10-15 percent of this total number, or approximately $10 billion by 2012.
   
This is a logical evolution.  The IT security market holds a perfect, recent analogy.  In the 90’s, new network technologies and devices – firewalls, honeypots, IDS, IPS, etc. – were deployed generating tons of log files and reports that practically made the benefits of those technologies moot because there was so much data to sift through. Then came security information and event management solutions that pulled data from all those technologies, correlated what was going on in the network and produced useful information on what events required a response, while weeding out peripheral noise. 
   
The physical security market is facing similar challenges today as executives and operations personnel look to better secure and manage their assets, and do so more efficiently and cost effectively.

Security Magazine:  What security problems does this PSIM category address?

Teubner: PSIM products help to solve two fundamental problems.  First, they glean the most relevant and interesting data from the deluge of security information sources, including cameras, video analytics, access control event logs, intrusion sensors, HVAC and environmental sensors, fire and other alarms, and crime statistics.  Second, PSIM products provide a comprehensive view into security system usage, performance, regulatory compliance and general security anomalies that previously were very difficult to obtain. 
   
An effective PSIM solution supplies security teams with the necessary information to plan for and intelligently anticipate the next security threat; quickly detects when threats are beginning and alerts relevant personnel through a variety of communications channels; and coordinates a rapid response to threats by security and operations personnel.
   
Having the ability to manage, analyze and correlate data from both physical and IT security sources enables an organization to secure the people, property and assets more effectively.  PSIM also applies policies and procedures to this data to produce a recommended plan of action for a given event, and ties into the communications infrastructure to distribute the information to the appropriate parties.


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • hotel bed and side table

    Traveling for the holidays? Think carefully about public Wi-Fi

    See More
  • Metrics on a screen

    A New Way to Think About Metrics in Security Operations

    See More
  • Think You Know How to Investigate a Theft or Fraud? Think Again. Here’s the Right Way to Do It

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing