Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The Problem with PSIM

By Patrick Esposito
January 11, 2011

The use of information technologies (IT) for physical security is a no-brainer. This is likely why Physical Security Information Management (PSIM) has received such attention over the last few years.

PSIM combines physical security devices and systems with IT, improving situational awareness and response. With PSIM, new opportunities are created for enhanced data collection, management and analysis and more efficient and effective security operations. Despite these benefits, however, there are problems — both marketing and technical —with PSIM.

On the marketing front, PSIM has been positioned in a manner that oversimplifies reality. Because of the IT connection, PSIM is often envisioned as a front-end software product that resides in the operations center, providing a graphical view of security assets, some out-of-the-box integration with other devices and systems, a degree of centralized policy management (which governs relationships between devices and systems) and analysis and reporting capabilities.

Unfortunately, this marketing approach masks the technical challenges that inhibit PSIM success stories. The first challenge is integration. The integration of data, events and control functions from multiple devices and systems is the keystone of PSIM, since all other functions are contingent upon integration. Integration is a major problem, however, because different devices and systems cannot, in most instances, communicate without some type of normalization. For effective PSIM to occur, those devices and systems – from enterprise IT systems to building management systems and from monitoring technologies to emergency alert and notification systems – must be able to communicate.

However, most PSIM software products cannot natively tie together all of the different devices and systems witnessed in a given deployment. Often, integration is not a function of PSIM software, but a service typically performed by the PSIM software provider or third-party integrator. While some PSIM products may come with pre-configured hooks into some of the most popular access control, video management or other systems, integration with the vast majority of devices and systems involves laborious, hand-coding by engineers and software developers. End-users are often left with a custom and complex one-off that is not scalable (to accommodate new and different devices and systems) or portable (to accommodate easy replication across other facilities or locations). This seriously diminishes the value of many PSIM deployments beyond the short term.

Policy management is the second technical challenge, and it is equally critical to effective PSIM. The ability to set up dynamic rules and policies dictates automation and response capabilities. Yet, most policy management is centralized, i.e., located on a server in the operations center. All the data and events from the different devices and systems, sometimes remotely located, must flow back to one location, where automated decisions are then made and sent back to the assets. If there are bandwidth constraints or network connectivity issues, critical communications (e.g., automatic slewing of a camera to a specific position or distribution of a notification to first responders) may be delayed or interrupted. Under these conditions, centralized policy management could overwhelm the network and, thus, undermine the very capabilities that PSIM is supposed to enable.

To overcome these challenges, end-users must consider or reconsider what PSIM means. One-off deployments must give way to openness and scalability that consider the breadth and depth of capabilities that end-users require. Centralized policy management must yield to distributed, network-based policy management that lessens the burden on networks by putting automation in the field on multiple routers, servers or gateways.

Far from a single software product, these solutions will involve an ecosystem of products. Among the products will be configurable, network-based integration and distributed policy management software that can serve as the backbone for the graphical management, centralized policy management and reporting mechanisms of today’s PSIM. Fully productized PSIM offerings that feature all of these capabilities will provide the basis for effective PSIM solutions going forward.

PSIM has the opportunity to rewrite the rules of physical security, but security professionals must first overcome the limitations that result from one-off, hand-coded solutions and centralized policy management. IT approaches provide the answer for physical security challenges, but it is important to ask the right questions about PSIM solutions. End-users should make sure that proposed vendor products and services can achieve the open, scalable, distributed solutions that effective PSIM demands.

Patrick Esposito is co-founder, president and chief executive officer of Augusta Systems Inc.

KEYWORDS: psim software

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security-officer-freepik1170.jpg

    The problem with low end bids in the security guard industry

    See More
  • Investing for the Future with Video-Centric PSIM

    See More
  • home security

    The Problem with Traditional Locks and Managing Remote Access to Rental Properties

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing