Managing (crisis) situations: PSIM or SMS?

Due to the increase in threats and security risks, companies and organizations are looking for resources to secure their processes and locations efficiently and effectively.
A solution that often comes up in this context is a Physical Security Information Management (PSIM) system.
But what exactly is a PSIM?
And is that what you are looking for, or is a Security Management System (SMS) sufficient?
Over the past 15 years, the growth of IP-based security systems has led to a development from separate, single systems (such as access control, camera surveillance, burglar alarm and fire detection systems) to more integrated solutions.
Moreover, these systems became increasingly versatile and extensive.
This is how Security Management Systems were created, which unite many of the single systems present and also PSIM solutions that go a step further and are intended to manage (crisis) situations and get them under control quickly.

Security Management System

With an SMS, the individual safety and security systems can be linked to each other and operated centrally, from a single application.
To operate the various security systems, in-depth knowledge of the underlying security systems is no longer necessary, but only knowledge of the SMS.
An SMS also takes care of the interaction between different security systems, for example by linking a camera image to an ‘event’ in the access control or burglar alarm system.
In addition, an SMS can have a filtering effect and only generate an alarm for events that meet certain criteria.
This way, users have the most relevant information at their disposal at all times.
Usually, an SMS is based on an access control system or a Video Management System (VMS), with additional functionalities and integrations.
The basic configuration is still done in the underlying systems, which function autonomously.

Physical Security Information Management

Serious incidents such as September 11, 2001, the London Underground attacks and recent attacks in Paris, Berlin and Cologne have increased the need for PSIM systems.
PSIM systems have been developed by software companies based on the vision that in the event of (serious) incidents, it is essential to have a clear picture of the situation on site in all its aspects, including the threat level.
So that operators have a full overview of the incident and always take the right measures.
After all, in the event of (serious) incidents, the interpretation of data and images should not be entirely dependent on an operator and its knowledge or experience.
The emphasis of a PSIM is on managing and quickly bringing (crisis) situations under control, so that damage can be prevented or limited.
By linking a large number of external (security) systems in a PSIM, logical connections can be made and operators in crisis situations are guided with a real-time Common Operational Picture and step-by-step response plans.
The software toolbox can be used to set up a command and control infrastructure aimed at crisis management.
A PSIM is hardware and software independent; via connectors, data is extracted from underlying systems and made accessible in the PSIM.

PSIM-organisatorisch

When to send an SMS?

Organizations often have various systems in use for the security of building(s) or grounds.
These sometimes function separately from each other and sometimes linked to each other.
Each system has its own interface with its own passwords and its own logic.
This is a nightmare from a management point of view and also from a security point of view.
Security risks can only be optimally controlled when the technical installations work together and it is possible to switch quickly.
For example, switching up camera images in the event of an intruder or to verify a fire.
This can be done with an SMS.
There are several SMS systems available.
Some systems are open for links with systems of other brands, other SMS systems are completely closed.
So that’s a point to consider when you select an SMS.
It is precisely the degree of openness that determines the added value.
After all, the more smart links and logic can be built in, the better your systems can work together and the better the risks are managed.
In many cases, a simple script can be called up in an SMS to follow up on incidents according to a standard flow, including a logging function.
However, these functions in an SMS are limited, because the emphasis is on the integration of technical systems and not on organizational processes and procedures.
An SMS is especially suitable for medium-sized organizations with limited complexity and variety of security systems.
By integrating these systems with an SMS, the systems can be operated centrally.
Synergy is created because the linked systems offer more intelligence and therefore a higher level of security than the sum of the separate systems.
The investment in an SMS is limited and the return is high.

Volg ons op Linkedin

When to get a PSIM?

Organizations with complex processes and where the consequences of a calamity can be far-reaching would be better off opting for a PSIM.
A PSIM integrates safety and security systems and procedures and therefore functions as the heart of safety and security in an organization.
With a PSIM, operators and all other internal and external stakeholders are optimally supported in handling (crisis) situations.
They immediately receive all relevant information (also from linked databases or systems such as production, process, HR, IT, building automation or visitor registration systems) in order to jointly handle the situation as quickly and effectively as possible.
A PSIM can also limit strict liability, for example by logging all actions and providing a full audit trail.
The success and efficiency of a PSIM is largely determined by its design and implementation.
Processes must be mapped and deviations defined, as well as realistic threats and scenarios.
The corresponding follow-up procedures must be worked out (in detail) and then incorporated into the system in the form of (dynamic) workflows.
The better this is done, the more effective the PSIM will be for the organization.
Usually, a team is appointed for a PSIM implementation with stakeholders from the entire organization and both ICT and safety and security experts.
There are several PSIM systems available, which differ in particular in the degree of flexibility and user-friendliness.
Not only do you have to choose the most suitable PSIM system for your organization, the choice of supplier is also of great importance in this case.
Such a complex security solution requires extensive experience and expertise.
And that goes beyond technical knowledge; In particular, the implementation and management process, in which the client and supplier have to work closely together, have a major impact on the success and return on investment of the chosen solution.

Schema vergelijking SMS en PSIM

Conclusion

In many cases, the choice to technically integrate separate systems by means of an SMS increases the level of security.
This increases the ease of operation and gets the most out of the underlying systems.
The implementation is clear and the costs are limited.
A PSIM goes a step further.
A PSIM also supports and optimizes the organizational aspects of security.
Significant savings can be made on security costs and, more importantly, threatening situations are under control more quickly.
Through early recognition and adequate handling, damage can be limited or prevented.
For both solutions, the success depends on the implementation and the knowledge and experience of the supplier.

Whitepaper Situatiemanagement met PSIM