How to Tell Video Surveillance Management and Situational Awareness Apart

Learn the definitive differences between video management systems (VMS) and physical security information management (PSIM) systems.

How to Tell Video Surveillance Management and Situational Awareness Apart

Adobe Stock image by Monopoly919

The operator sees the “swipe and show” of the access system in a prioritized view as the card was presented, but no PIN was entered. Pre and post video appears along with all nearby cameras displaying motion. The system automatically texts the owner of the misused badge and asks them to report in to verify they are safe. The situation is contained. The operator is free to engage in escalation procedures and counter the threat. They did not lose time moving between systems. The owner of the card reports back they are safe, but they now realize their wallet was stolen.

SIDEBAR: Looking to the Horizon for PSIM Trends

Additionally, since these products reside on a single server, this approach can require fewer licenses and reduce the burden of ongoing firmware and other software updates when compared with a traditional VMS with third-party integrations.

For an integrator, there are scenarios in which a VMS of either type may best serve the user. One is when the VMS user wants to manage systems, which can include video, access, intrusion and other security functions such as specific analytics packages, from a video perspective. Should the end user have two or three different manufacturers’ solutions, or be installing the system in a new facility and buying all new equipment, a VMS will most likely meet the end user’s needs.

End users that depend heavily upon physical security or surveillance, such as those in retail or casinos, are often good candidates for a VMS solution. Addition-ally, users who require a clear, intuitive solution to routinely view video after an event or for forensic purposes benefit the most from a VMS.

One of the lesser-known differences between VMSs and PSIMs is in how they are deployed and used. VMS systems are often maintained by dedicated departments responsible for the management of their physical security, which are less likely to be integrated with the rest of an enterprise.

PSIM systems, on the other hand, are often deployed on technology infrastructure and software maintained by the organization’s IT department, and might be integrated with a variety of enterprise and nonsecurity systems such as geographical information systems and building management systems. This distinction in organizational and IT infrastructure is one of the defining differences between traditional VMS and PSIM installations.

There are other instances, however, where PSIMs are used as dedicated security systems. For example, when an end user has many disparate security systems from different manufacturers that can’t easily be integrated with a VMS. A PSIM may also be used as the primary security system if the end user requires a high lev-el of customization, interoperability with third-party applications or a system that helps to manage the workflow and security processes.

P
SIM Not Just for Enterprise Users

PSIMs are quickly breaking from the stereotype of being best suited only for large enterprises and government organizations with deep pockets. Today, smaller organizations are looking for the same PSIM benefits.

At its core, the PSIM is an IT-based system. It does not rely upon one system, such as video, to play the role of primary system, but rather aggregates data from multiple, seemingly disparate systems to create a broad, comprehensive view for operators. As an IT system, a PSIM is not bound by brand or type of integration.

A PSIM can manage multiple video systems, multiple access control systems, radar systems, building management systems, elevators, weather feeds, national threat level information, and many other types of systems and corresponding data. This kind of broad capability is not typically possible with a traditional VMS platform.

RELATED: Parsing PSIM’s Advantages and Complexities

Correlative Intelligence and Business Logic Explained

One of the most significant differences between PSIM systems and VMS with added integrations is the PSIM’s correlative intelligence and business logic. A PSIM solution is designed and deployed to take advantage of these capabilities to add an additional layer of intelligence between systems and operators.

For example, a PSIM can use event data and correlative intelligence to raise alerts to operators only on events that are identified as important. When operators are not burdened with responding to false alarms or minor alarms, they can concentrate on real-time events. In addition, correlative intelligence and business logic simplifies the work of the operator, while providing data-driven consistency and removing human error and/or anecdotal interpretation from the response to events.

An example of a PSIM’s intelligence in action is in an airport setting, where multiple intrusion systems may be in use to protect the perimeter around a runway. Vibrations in the fence surrounding the runway from jet takeoffs might create a high volume of nuisance alarms.

A PSIM system can correlate the vibration alarm with video analytics of someone scaling the fence and flag the event as an alarm requiring response. The ability to set rules and correlate events greatly reduces false alarms and improves the workflow of the security personnel on staff, whether it’s the operator in the command center or a security guard who is being asked to physically check a location when an alarm sounds.

Another defining characteristic of a PSIM is the breadth of potential integrations. PSIMs can integrate not only with physical security systems, but also with other enterprise or operational systems present in a facility, such as a geographical information system (GIS).

A utility company may, for example, use GIS integration to view map information, detailed floor plans, heat maps and perhaps even crime statistics in the area in which an alert is received. Mass notification systems may also be integrated with a PSIM.

In such a scenario, the operator might receive notification of an impending hurricane through an ATOM feed, view the forecasted storm track and identify facilities in its path with GIS maps, and then send automated warnings via multiple channels to employees in these facilities. This could all be accomplished by the operator through the single PSIM interface.

Multiple Uses for PSIMs

PSIM solutions have traditionally been implemented in such environments as public utilities, government and nuclear facilities, mainly due to the solution’s ability to provide situational awareness and a higher level of security. The PSIM’s design center is that of an operator receiving multiple alerts and alarms, understanding situations based on information from the PSIM and then taking action, which is a good match for these environments.

The assessment of alarms and data from the PSIM can follow a standard operating procedure developed by the facility. In such a case, the operator would follow the directions on the PSIM screen in front of them and would be given step-by-step directions as to how to respond appropriately to an event.

In some instances, the operator may be instructed to handle the event and notify external security guards, but in other instances a security issue may require the operator to alert a manager or a corporate security director. The system can then gather the pertinent data relating to the security issue, share information with responders in the field through integration with a computer-aided dispatch system, and generate a report of the incident to assist in investigations.

PSIMs are beginning to be used in other applications as well. Some cities are using the solution in concert with surveillance systems that monitor city buildings, police/emergency dispatch systems and traffic cameras, for example. In this particular use case, a city command center has a holistic view of its entire security and can bring needed perspective to individual events.

Connected devices, mobility and data analysis have become embedded in our everyday life, and with that our expectations of what software products can do and how they can integrate with other systems are changing as well.

For both the VMS and PSIM platforms, the ability to leverage developments in cloud computing, new biometric capabilities, and the evolving Internet of Things (IoT) will result in exciting new capabilities we can only imagine now. The result is a security system built for the future no matter what the specific needs of your organization.

Michael Mesaros, CISSP, is Group Product Manager for Proximex, part of Tyco Security Products. He is responsible for product definition and delivery strategies for Surveillint, the company’s PSIM solution.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Get Our Newsletters