Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesPhysical Security

How the Right PSIM Can Take Security Careers from the Basement to the Boardroom

By Simon Morgan
control-enews
October 17, 2017

Not too long ago, security operations centers (SOCs) and the enterprise security executives and the staff who ran them were relegated to airless basement offices with little security equipment that did no more than monitor video and manage guards.  

Today’s SOCs have evolved into large financial investments that include surveillance and security technologies that enable an enterprise security executive to monitor global threats in real-time, tie in video feeds from other business units, employ analysts who monitor social media, share data with other enterprises, and more. They can form the heart of an enterprise’s operational defense against advanced physical and cyber-attacks.

With this growing importance and role of a SOC, the enterprise security executive’s role is changing as well. Many of today’s security executives may come from IT backgrounds as well as from law enforcement, and they have direct experience of using technology as it relates to security. This naturally leads them to look for solutions that leverage technology to automate processes and build efficiencies in response. To achieve these types of efficiencies, the IT industry has always looked towards solutions that have the power to aggregate multiple disparate systems into a single operational view. To fully realize and effectively implement the best security solution for their SOC, the selected approach now frequently includes a Physical Security Information Management (PSIM) solution.  

Implemented well, a PSIM can provide outstanding support for a broad range of security and business objectives. But, it is not without potential pitfalls. For example, setting up the proper inputs, operating procedures, and decision factors will require executive-level buy-in and support from both the senior staff and middle managers in multiple departments. In addition, the system itself will require set up and ongoing support from the organization’s IT team. The IT team is in a unique position to provide guidance and problem-solving support that can make or break the implementation. And of course, management must be clear on what the standard operating procedures and policies will be. It is impossible to implement a system to guide the response to trigger events if you don’t already have clarity on what those responses should be. Once a security executive has the support of the broader team, and clarity on the desired SOPs, then the stage is set for a big improvement in operational clarity, efficiency and effectiveness.

PSIM Criteria

PSIMs have emerged as the new control platform for total management of SOCs, due to their ability to integrate previously disparate access, video, notification, building operations and more onto a unified control and management platform.

But how do you pick a PSIM?

When selecting a PSIM, look for criteria such as easy operation, automated features and functions, open architecture for easy integrations, standardization, intelligence, stability and comprehensive metrics reporting. These criteria will assist a security executive in selecting the right PSIM, and provide them with the opportunity to demonstrate their expanded roles within an enterprise beyond conventional surveillance and security operations.

In a SOC, it’s easy for operators to become overwhelmed by the volume of alarms generated by the list of surveillance and security systems deployed. Best-in-breed PSIM systems solve this common problem with automation by identifying and automatically responding to non-critical events. This provides operators with the time and space they need to focus on important events that require human intervention and decision-making. Whether the response is automated or requires operators to act, all events are logged and audited, making them available for management reporting and information analysis. More important, the most critical events won’t get lost in the shuffle and will receive the full and timely attention they warrant. The enterprise security executive, in turn, can provide the C-suite with specific metrics about how security events were effectively and timely mitigated.

The ability to integrate multiple disparate systems into a single, centralized interface is a primary benefit that advanced PSIM systems offer that are documented to save money for an enterprise. The architecture of the solutions allows them to support and bridge the gap between a wide range of integrated systems over multiple physical locations, saving time and money for an enterprise.

To fully harness and maximize the power of integration, PSIMs must be built on open architecture that provides security executives with a standard tool for integrating many systems that is simple, easy to maintain, cost-effective and scalable. The flexibility to seamlessly integrate with virtually any solution from a variety of manufacturers – including legacy systems – saves money, streamlines operations and provides more complete information for incident response. But the nature of the systems that need to be integrated is changing too – they go beyond traditional physical security systems like video, access and alarms. More than ever, security executives are looking to integrate with business risk alert systems, building management systems, back office CRM systems, IT asset management platforms, ticketing and workforce automation, mapping and GIS platforms, and the list continues to grow. Advanced PSIMs don’t replace all the functional operations of these subsystems but become the central hub for coordinating response to events, pulling critical data from these various systems and posting updates to others.

This triage and response provides incredible value to an organization as the SOC, and in turn the security executive, become the 24/7 hub of all operational event coordination across the organization.

In addition to situational awareness, PSIMs can also analyze the data they capture to provide deep insights and intelligence about security, business and overall organizational operations, both in real time and over extended periods of time. Armed with this information, a security executive can better prepare for events and identify any potential changes that could improve response and staff adherence to SOPs. Incidents can be mitigated, and the security executive can show leadership on specific events.

Further, PSIMs should be capable of automating and standardizing the creation and initial completion of audit, legal and compliance reports within an incident management system. This generates significant savings in personnel time and ensures not only that the initial report follows a defined company standard, but also that all incidents are reported correctly.

Enterprise security leaders that place an emphasis on these important criteria when selecting a PSIM can ensure that they will reap the benefits of best-in-breed solutions that will meet their specific needs. With the ability to seamlessly integrate previously disparate systems into a unified control and management platform with automation and standardized interfaces, today’s advanced PSIMs deliver ease of use, faster and more effective response and most important, enhanced security.

KEYWORDS: C-suite security Global Security Operations Center (GSOC) psim Security Operation Centers

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Simon Morgan is Chief Product Manager of Tampa, Florida-based SureView Systems, a leading provider of next-generation PSIM platforms.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • active-enews

    3 Ways PSIM Can Help in Active Shooter Situations

    See More
  • cybersecurity

    New research shows how security teams can avoid cyberattacks by utilizing the right data and artificial intelligence

    See More
  • concerts-unplash

    How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing