Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Counting Up PSIM Benefits for the Business

By Diane Ritchey
IBM is using a PSIM to create a centralized command and control center

IBM is using a PSIM to create a centralized command and control center, which integrated its entire physical security infrastructure including access control, security video, intruder detection and fire alarm inputs across all locations. Photo courtesy of CNL Software 

The MBTA is the public operator of most bus, subway, commuter rail, and ferry routes in the greater Boston area.

 The MBTA is the public operator of most bus, subway, commuter rail, and ferry routes in the greater Boston area. 

A PSIM system helped MassDOT/MBTA integrate multiple video surveillance systems

 A PSIM system helped Randy Clarke, Senior Director of Security and Emergency Management for MassDOT/MBTA and his teams integrate multiple video surveillance systems from multiple public agencies during this year’s Boston marathon.  

IBM is using a PSIM to create a centralized command and control center
The MBTA is the public operator of most bus, subway, commuter rail, and ferry routes in the greater Boston area.
A PSIM system helped MassDOT/MBTA integrate multiple video surveillance systems
October 1, 2014

It’s a mishmash of letters – PSIM – but what it stands for isn’t mishmash at all. PSIM, or Physical Security Information Management, is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.

A wide range of enterprises use PSIM today; they operate across both public and private organizations and vary in size. One point unites all of these organizations – they understand security is not an option and must deliver for them. Some of the key verticals include ports and airports, utilities, mining, banking and finance, pharmaceutical, border security and more.

According to PSIM provider CNL Software and The Ultimate Guide to PSIM, “The one thing the security industry agrees on is that there is and will be greater use of intelligence within the control room. This is being driven by costs and advances in technology. If security is to do more and have less people, it needs to get smart about how it uses technology.”

That was the situation with providing IBM with a method of ensuring consistent levels of security across its 26 locations in the UK. IBM needed to ensure better visibility of threats to all of their sites, assets and people. The solution was required to rationalize the number of control rooms, which would generate a rapid return on investment, provide improved efficiency and reduce on-going costs.

IBM wanted to proactively identify trends and irregularities across all the locations, allowing actions to be taken to reduce business risks. It had a number of unconnected systems from a variety of manufacturers over these sites totaling more than 700 security devices. IBM wanted to reduce redundancy in these security systems, maximizing the investment they had already made. Finally, the solution needed to be easy to use, ensuring that even during a major incident, operators were still able to easily navigate and utilize all of its features.

IBM is using IPSecurityCenter from CNL Software as a platform for their security solution. The solution helped IBM to create a centralized command and control center, which integrated its entire physical security infrastructure including access control, security video, intruder detection and fire alarm inputs across all locations. All of the information from the sub-system is collected in this centralized management system and presented on individual operator workstations and a strategically placed video wall. As increasing efficiency was part of the brief, routine tasks were automatically scheduled whether hourly, daily, weekly or monthly, which also eliminated human error. Additionally the system enabled the transfer of all paper-based policies into automated operator guidance, which improved efficiency and ensured consistent responses to incidents and events.

The workflows within the system have helped the IBM security staff to provide faster and more effective responses to incident and events, which has resulted in a reduced level of interruptions to business. The trend analysis has helped the security team identify frequently occurring incidents, allowing management to add resources to reduce these.

PSIM has helped the Massachusetts Bay Transportation Authority (MBTA) to not only integrate legacy security systems, have a centralized command and control strategy for its security operations, but also to save money by leveraging price points from different security vendors.

Three  years ago the MBTA transitioned from approximately 700 analog cameras to upwards of 10,000 cameras using VidSys to control and manage video, access control and monitoring, along with emergency phone and intercom systems. “We have we have spent tens of millions of dollars on security improvements and upgrades, including installing thousands of new security cameras,” says Randy Clarke, Senior Director of Security and Emergency Management for MassDOT/MBTA. “So this PSIM gives us one platform for all users with one interface for real time and recorded video. The system also helps us with training: we can train once.”

Because the PSIM that Clarke uses includes security technology from several vendors, Clarke says he can use the system to leverage price points. “Realistically now we have several vendors competing on different projects, so we get the best possible price. That’s been valuable as we’ve saved millions on competing
projects.”

In particular, the PSIM system helped Clarke and his team with video surveillance during this year’s Boston Marathon. Following the 2013 Boston Marathon attack, enhanced inter-agency video coverage and integration became a top priority for the 2014 event. MassDOT/MBTA and key local/state partners embarked on a challenging project to deploy and integrate cameras using a single video platform and identify and map relevant camera coverage along the marathon route.  Stakeholders worked with MassDOT/MBTA to integrate cameras from many vendors/networks. MBTA’s VidSys platform was used as a video user interface and was accessible from 10+ command and control centers. Cameras and fields of views were mapped and labelled in Google Earth. A comprehensive video surveillance map was developed and distributed to key agencies and command centers. 

 

Want to Learn More?

Check out the PSIM manufacturers included in this article:

 • CNL Software • Vidsys 

KEYWORDS: integrated security solutions integrated surveillance psim

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Corning Incorporated staff; security operations center, international security, security leadership, security command center

    The Risk Room: Building the Right GSOC for Your Business

    See More
  • It’s the Business Basics with ID Convergence

    See More
  • Getting ‘Bang’ for the Security Buck

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×
IBM is using a PSIM to create a centralized command and control center, which integrated its entire physical security infrastructure including access control, security video, intruder detection and fire alarm inputs across all locations. Photo courtesy of CNL Software 
 The MBTA is the public operator of most bus, subway, commuter rail, and ferry routes in the greater Boston area. 
 A PSIM system helped Randy Clarke, Senior Director of Security and Emergency Management for MassDOT/MBTA and his teams integrate multiple video surveillance systems from multiple public agencies during this year’s Boston marathon.  

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!