Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Approaching a Market Size for PSIM

By Steve Hunt
March 1, 2009


Physical security information management, PSIM, is one of the most talked about and sometimes controversial topics in the security industry today. Is it a technology? Is it a marketing category? What is it? What does it do? Is there any money in it? I looked into it and came up with a clear understanding about what security executives want from PSIM and how much they are ready to spend.

First of all, here is my definition of PSIM. I call it software designed to aggregate, normalize, correlate, apply policy to and display diverse data as information to simplify and improve physical security incident response. Basically, it is a better, more flexible and much more useful way of managing security events and the information needed to respond to incidents than traditional command center solutions.


There’s Gold in Them There Hills

PSIM software solutions will earn $3 billion to $4 billion annually by 2012. Public and private organizations, large and small, are already assuming a growing trend in spending for PSIM solutions. The PSIM market is enjoying a convergence of trends that enhance its potential, namely: the continued adoption of computers, software and networking to perform business functions; lowering costs of networking sensors and systems globally; innovations in software for collecting, analyzing and responding to incidents.


Finding the Numbers

A top-down estimation of the potential PSIM spending would normally take total security spending and parse it out based on certain assumptions. For example, of the say $50 billion annually spent on security products and installation services, only a portion would be spent in organizations considered candidates for PSIM solutions, like corporate facilities, airports and the like. Further percentages would be peeled away, assuming the adoption lifecycle of PSIM-like technologies in those environments (long sales cycles, integrator reluctance, etc).

That sort of estimation could very reasonably find $1 billion to $5 billion or more of expected spending on PSIM products over the next few years. One magazine published a quote by a vendor claiming $10 billion by 2012.

That felt a little extreme, so my team and I decided to take a bottom up approach.

The Hunt Business Intelligence team and I sampled interviews we had previously conducted with 211 individuals in North America representing ten industries. See the accompanying chart.

Nearly half of the respondents work for organizations with annual revenues exceeding $3 billion. Roughly one-quarter represents organizations in the mid-market, with revenues in the range of $100 million to greater than $1 billion. Respondents held influential positions in corporate (physical) security, IT security, IT operations and compliance with the following titles (or equivalent):
  • Chief information officer
  • Chief information security officer
  • Chief network architect
  • Chief security officer
  • Chief technology officer
  • Director of infrastructure
  • Enterprise architect
  • Security director (corporate/physical)
  • Vice president of operations
In addition, we spoke at length to 25 end-user executives in seven industries and asked how much money they are likely to spend on PSIM technologies over the coming years. This first pass showed a clear trend. Among organizations with more than $1 billion annual revenues, PSIM-like technologies are already budgeted and planned. By 2012, these “technology workarounds” will account for at least a quarter-billion dollars.


Top Spending Amounts

But this was not sufficient for us, of course. That told us the bottom of the spending range, but what is the top? How many of those $1 billion+ organizations will spend $100,000 or even a million dollars by 2012? To determine that, end-user executives in 15 more companies were interviewed, who described scenarios where PSIM solutions could produce value. For example, we described specific uses of technology to handle situations involving three or more data types in corporate, transit and government environments.

The reaction was enthusiastic and indicated the prospect of three to five times current expected spending (that sudden increase was due to what we call the “aha!” factor). Once a person knows that a more efficient or effective solution exists, the budget will appear. It may take one to three years for the budget to go thru full internal adoption processes, but it is clear that there is interest in PSIM.

Therefore, among large organizations of $1 billion annual revenue or larger, we can safely assume $1-2 billion annual spending by 2012. Add smaller organizations and local governments which may be classified as smaller than a usual $1 billion company, and the total spend could be much higher. For every Global 3000 candidate able to spend

$100,000 or more, there will likely be three or four candidates in the much more populous mid-sized corporate or government categories spending $50,000 or more, effectively doubling the total spend of the large organizations.

With approximately $3 billion as our working assumption, I think it is fair to assume that special contracts to government, military or special events (e.g. Olympics) can safely add half a billion dollars in additional spending in any year.


Alternative View

While the estimates mentioned above may be based in sound reasoning, they are only estimates and do not fully take into account variables such as lack of vendor presence in certain geographies (like Asia), poor execution by vendors, or fluctuations in the dollar.

So far, this estimation is only substantiated by interviews in North America and greater Europe; Middle Eastern, Asia Pacific and southern hemisphere markets will constitute additional spending, of course, but we have little date to support an estimate. However, many technology companies, after establishing sales and marketing presence in Asia Pacific, achieve sales figures equal to those in North America. If PSIM vendors become effective selling in Asia, potential revenues could be considerably higher.

So there you have it. PSIM is here to stay and security executives are already planning to spend money on it this year and for years to come.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • One Size Does Not Fit All: Selecting a VMS for Your Enterprise

    See More
  • PSIM – New Tool for a New Age

    See More
  • control

    4 Best Practices for Deploying a PSIM Quickly and Efficiently

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing