|(see bigger image)|
|The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems|
PSIM Within Physical Security Market
Nearly ten years ago, Vidsys helped define a new market category called PSIM, or Physical Security Information Management. Since about 2010, the physical security market has adopted PSIM as a new and separate category from Video Management Systems (VMS), Access Control, Intrusion Detection and others. Also, there are many companies around the world offering various PSIM products and capabilities as a key differentiator. The security market is inherently crowded and fragmented so creating legitimate value-adds continues to be challenging for vendors and integrators alike.
During the maturation of this category, the true definition of PSIM has become blurred and often mis-used. Many competitors and technologies that are not truly PSIMs say they can offer the same or similar features and benefits that only true PSIM software platforms can provide.
What Is True PSIM?
True PSIM can simply be described as intelligent software that converts massive amounts of data (which is meaningless without context) into meaningful and actionable information by filtering and correlating the data based on time, location, duration, frequency and type. The specifics of these criteria are defined by the organization’s risk policy, standards and compliance requirements.
PSIM is not simply an integration platform, nor is it a command and control platform such as C4ISR. It’s also not advanced Video Management, or Access Control, or even Computer Aided Dispatch software that has added basic device integration capabilities. The very nature of true enterprise PSIM software is that it has the capability to connect to other systems and subsystems, including sensors, devices, and even non-security related devices using industry- approved, open standards.
PSIM gains global momentum
During the past year, we have seen faster growth and stronger momentum in the marketplace for our software platform, not only in the United States, but also in many other regions around the world. In particular, in the Middle East, Asia Pac and South America there is increased awareness as well as defined requirements that are now driving large scale PSIM programs. In the US, major federal government agencies are also issuing RFPs for PSIM at an increasing pace.
True PSIM can simply be described as intelligent software that converts massive amounts of data (which is meaningless without context) into meaningful and actionable information
At Vidsys, we are continuing to innovate and accelerate our roadmap for PSIM toward what we call Converged Security and Information Management or CSIM. As the leader in this industry, we are committed to continue educating and supporting our customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organization.
New IoT world - Security As A Utility
We are well positioned to drive solutions around the Internet of Things (IoT) market as a fully web-enabled platform that will provide a foundation for future cities, smart buildings and even intelligent homes that will continue to evolve over the next decade into an enormous market segment.
Many analysts and organizations are projecting that by 2020, just five years from now, there may be anywhere between 25 to 50 billion objects connected to the cloud as part of the IoT market. This includes personal mobile devices, home appliances, smart buildings and other connected sensors. In this new IoT world, security will ultimately become a utility, much like power, water and cable are now.
Transition From PSIM to CSIM
So how is this transition from PSIM to CSIM going to be realized in the market?
With the trend toward converged security we are already seeing much more formal cooperation between previously disparate security functions, such as physical security and IT security. Today, there is stronger integration between CSOs and CIOs, pushing organizational convergence to align with operational convergence.
This coordination involves both process and accountability. It is a results-oriented effort to work collaboratively to create greater efficiencies and ultimately, to reduce overall risk to the organization. However, we are not talking about simply merging functions on an org chart, but about achieving true business integrations around risk and compliance.
Holistic security with Vidsys software
Holistic security also involves risk management disciplines such as loss prevention, fraud prevention, business continuity planning, legal/regulatory compliance, insurance, and others.
In the US, major federal government agencies are also issuing RFPs for PSIM at an increasing pace
We are adding advanced capabilities to our web-enabled platform. Today, we can present relevant and actionable information in a map-based format and our rules engine enables users to quickly access automated action plans based on the organization’s own policies and procedures. Our software can also integrate, monitor and assess external threats and vulnerabilities through seamless data visualization support. Our Enterprise Business Intelligence reporting features can help security professionals better chart performance metrics and enhance overall accountability.
Integration With Social Media And Other Intelligence
These capabilities combined with other features can be leveraged by global organizations or multi-site enterprises to gain valuable and real time situational awareness and management capability. Vidsys software can also integrate with big data analytics tools, social media and other intelligence inputs and correlate internal vulnerabilities with external threats. Situational awareness data from external sources are now included in our dynamic reporting feature so business leaders have a more comprehensive understanding of where these threats are happening and how they could potentially impact business operations.
In a Public Safety environment, our customers including some of the largest cities in the United States, can better manage disruptions and or threats such as protests, civil unrest or situations requiring emergency evacuation. In a crisis, business executives and public leaders want the ability to manage risk by having the timeliest and most accurate information possible. This includes using predictive policing tactics such as monitoring social media feeds to determine where crowds plan to assemble and what might present credible threats to both the public and property. All of this information combined enables a more accurate understanding of where key resources may be necessary and when they will be needed.