The security operator wants to lock all adjacent doors and find out whose badge was used for the swipe. They will also want to contact the owner of that badge. The operator now must exit the video system, log into the access system, find the associated doors and perform those tasks. Can they do it fast enough to contain the situation?
Conversely, some security manufacturers that supply multiple elements of security (a combination of cameras, VMS, access control or intrusion) offer a single solution with deeper interoperability between functions than are available between third-party APIs. These are often called “unified” systems, which operate a single-event engine and enable traditionally separate systems to function as one.
RELATED: A Closer Look at PSIM’s Advantages and Complexities
For instance, a unified solution can have active knowledge of other nodes on the network, generate associations between them and imbed workflows. Intrusion detectors can act in conjunction with video analytics to reduce false alarms. Access card readers and door contacts can associate with views from cameras with far less integrator programming and real-time interoperability. This also tends to reduce “broken” integrations as systems change versions.
In all, this form of enhanced integration can change the response profile of security operators through tighter interoperability. Let’s revisit the scenario of the data intruder: The intruder gains access by forcing the door. In the same user interface and in real-time, all adjacent doors are locked down automatically.
The operator sees the “swipe and show” of the access system in a prioritized view as the card was presented, but no PIN was entered. Pre- and post-video appears along with all nearby cameras displaying motion. The system automatically texts the owner of the misused badge and asks them to report in to verify they are safe. The situation is contained. The operator is free to engage in escalation procedures and counter the threat. They did not lose time moving between systems. The owner of the card reports back they are safe, but they now realize their wallet was stolen.
Additionally, since these products reside on a single server, this approach can require fewer licenses and reduce the burden of ongoing firmware and other software updates when compared with a traditional VMS with third-party integrations.
There are scenarios in which a VMS of either type may best serve the user. One is when the VMS user wants to manage systems, which can include video, access, intrusion and other security functions such as specific analytics packages, from a video perspective. Should the end user have two or three different manufacturers’ solutions or be installing the system in a new facility and buying all new equipment, a VMS will most likely meet the end user’s needs.
End users that depend heavily upon physical security or surveillance, such as those in retail or casinos, are often good candidates for a VMS solution. Additionally, users who require a clear, intuitive solution to routinely view video after an event or for forensic purposes benefit the most from a VMS.
One of the lesser-known differences between VMSs and PSIMs is in how they are deployed and used. VMS systems are often maintained by dedicated departments responsible for the management of their physical security, which are less likely to be integrated with the rest of an enterprise.
PSIM systems, on the other hand, are often deployed on technology infrastructure and software maintained by the organization’s IT department, and might be integrated with a variety of enterprise and nonsecurity systems, such as geographical information systems and building management systems. This distinction in organizational and IT infrastructure is one of the defining differences between traditional VMS and PSIM ins
tallations.
There are other instances, however, where PSIMs are used as dedicated security systems. For example, when an end user has many disparate security systems from different manufacturers that can’t easily be integrated with a VMS. A PSIM may also be used as the primary security system if the end user requires a high level of customization, interoperability with third-party applications or a system that helps to manage the workflow and security processes.