Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Counting Up PSIM Benefits for the Business

By Diane Ritchey
October 1, 2014

It’s a mishmash of letters – PSIM – but what it stands for isn’t mishmash at all. PSIM, or Physical Security Information Management, is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.

A wide range of enterprises use PSIM today; they operate across both public and private organizations and vary in size. One point unites all of these organizations – they understand security is not an option and must deliver for them. Some of the key verticals include ports and airports, utilities, mining, banking and finance, pharmaceutical, border security and more.

According to PSIM provider CNL Software and The Ultimate Guide to PSIM, “The one thing the security industry agrees on is that there is and will be greater use of intelligence within the control room. This is being driven by costs and advances in technology. If security is to do more and have less people, it needs to get smart about how it uses technology.”

That was the situation with providing IBM with a method of ensuring consistent levels of security across its 26 locations in the UK. IBM needed to ensure better visibility of threats to all of their sites, assets and people. The solution was required to rationalize the number of control rooms, which would generate a rapid return on investment, provide improved efficiency and reduce on-going costs.

IBM wanted to proactively identify trends and irregularities across all the locations, allowing actions to be taken to reduce business risks. It had a number of unconnected systems from a variety of manufacturers over these sites totaling more than 700 security devices. IBM wanted to reduce redundancy in these security systems, maximizing the investment they had already made. Finally, the solution needed to be easy to use, ensuring that even during a major incident, operators were still able to easily navigate and utilize all of its features.

IBM is using IPSecurityCenter from CNL Software as a platform for their security solution. The solution helped IBM to create a centralized command and control center, which integrated its entire physical security infrastructure including access control, security video, intruder detection and fire alarm inputs across all locations. All of the information from the sub-system is collected in this centralized management system and presented on individual operator workstations and a strategically placed video wall. As increasing efficiency was part of the brief, routine tasks were automatically scheduled whether hourly, daily, weekly or monthly, which also eliminated human error. Additionally the system enabled the transfer of all paper-based policies into automated operator guidance, which improved efficiency and ensured consistent responses to incidents and events.

The workflows within the system have helped the IBM security staff to provide faster and more effective responses to incident and events, which has resulted in a reduced level of interruptions to business. The trend analysis has helped the security team identify frequently occurring incidents, allowing management to add resources to reduce these.

PSIM has helped the Massachusetts Bay Transportation Authority (MBTA) to not only integrate legacy security systems, have a centralized command and control strategy for its security operations, but also to save money by leveraging price points from different security vendors.

Three  years ago the MBTA transitioned from approximately 700 analog cameras to upwards of 10,000 cameras using VidSys to control and manage video, access control and monitoring, along with emergency phone and intercom systems. “We have we have spent tens of millions of dollars on security improvements and upgrades, including installing thousands of new security cameras,” says Randy Clarke, Senior Director of Security and Emergency Management for MassDOT/MBTA. “So this PSIM gives us one platform for all users with one interface for real time and recorded video. The system also helps us with training: we can train once.”

Because the PSIM that Clarke uses includes security technology from several vendors, Clarke says he can use the system to leverage price points. “Realistically now we have several vendors competing on different projects, so we get the best possible price. That’s been valuable as we’ve saved millions on competing
projects.”

In particular, the PSIM system helped Clarke and his team with video surveillance during this year’s Boston Marathon. Following the 2013 Boston Marathon attack, enhanced inter-agency video coverage and integration became a top priority for the 2014 event. MassDOT/MBTA and key local/state partners embarked on a challenging project to deploy and integrate cameras using a single video platform and identify and map relevant camera coverage along the marathon route.  Stakeholders worked with MassDOT/MBTA to integrate cameras from many vendors/networks. MBTA’s VidSys platform was used as a video user interface and was accessible from 10+ command and control centers. Cameras and fields of views were mapped and labelled in Google Earth. A comprehensive video surveillance map was developed and distributed to key agencies and command centers. 

 

Want to Learn More?

Check out the PSIM manufacturers included in this article:

 • CNL Software • Vidsys 

KEYWORDS: integrated security solutions integrated surveillance psim

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Corning Incorporated staff; security operations center, international security, security leadership, security command center

    The Risk Room: Building the Right GSOC for Your Business

    See More
  • It’s the Business Basics with ID Convergence

    See More
  • Getting ‘Bang’ for the Security Buck

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing