SlideShare a Scribd company logo
068 | Software FM

PSIM’s potential:

SUPERIOR
SITUATIONAL
AWARENESS

Luke Percy-Dove.

A new software application can provide a
means of linking these disparate building
control systems without throwing out
what you have and starting again.
	 Physical security information
management (PSIM) is a generic
industry term in much the same way as
BMS is used in the controls industry. As
the name suggests, it is an application
that has evolved from the security
industry where these applications are
used to integrate a variety of systems
and sensors into a centralised command
and control system.
PSIM is now emerging as an
application that can bring its unique
benefits to the commercial property
sector. In the commercial space,
PSIM is used to build relationships
between building control systems and
events in ways that have not previously
been possible.
For example, a typical building
alarm event might involve the activation
of a high temperature sensor. In this

The possibilities offered by a new
platform that integrates disparate building
and security systems into a common
management system – namely PSIM –
are revealed by LUKE PERCY-DOVE,
principal consultant at Matryx Consulting.

I

f you are like most facilities
managers, you will need to control
access to certain areas of your
building and monitor who is coming
and going. This will mean that you
have an electronic access control
system installed and probably a CCTV
system to complement it.
Security has been managed this
way for many years and not a lot has
changed over time. Sure, we have moved
to Internet protocol (IP) and embraced
technology to some degree, but security
has remained one of those things that is
often only deployed because we have to
have it. It doesn’t necessarily add to the
client’s experience or provide a return on
investment for property managers.
But, that is now changing, thanks to
new applications for building systems
integration and CCTV management that
can add value and provide a return on
security investment.

Physical security
information
management
Most commercial buildings have
independent control systems for HVAC,
lighting, evacuation, personal address,
lifts, the building management system
(BMS), fire and security. Each system will
have its own dedicated controllers, data
servers and workstations where events
are logged and reports generated.
Unless real planning has gone into the
initial procurement, they are probably also
from different vendors, meaning there is
little if any integration between systems.

FM OCTOBER | NOVEMBER 2013

As events escalate, so
can the actions of the
PSIM, with alerts, public
broadcast and even
social media updates
part of pre-programmable
responses.

instance, let’s say the event is caused by
a key piece of control equipment being
switched off when a contractor was
granted access to a service riser.
This one event is likely to generate
three different alarms – a riser alarm,
a power fail alarm and the high
temperature alarm. These alarm events,
while linked, will seem unrelated as they
appear in the event logs within their
respective control systems. The critical
event is the high-temperature alarm,
which is investigated as a high priority
and attended to by maintenance staff.
Using PSIM, a natural relationship
is created between these events, so
that alerts can be generated as soon
as it becomes clear that something
that should not have happened has
happened. As events escalate, so can
the actions of the PSIM, with alerts to
key personnel, public broadcast and
even social media updates part of preprogrammable responses. Instead of
three unrelated events, PSIM knows that
the events are one and the same, so a
response can be managed in a far more
logical and efficient manner.
PSIM can also incorporate standard
operating procedures, policies and
competencies (client specific) to
form rules around alarm events and
aid in the enforcement of a building’s
risk management strategy. PSIM
brings greater operational control
and situational awareness to building
management. These applications also
provide opportunities for operational
savings, as building control can be
simplified, monitoring and reporting
streamlined and activities measured.
The opportunities for large
commercial, retail and multi-site
operations are extensive and will
become more apparent as PSIM
evolves from being a security
application and finds its feet in the
commercial property sector. FM

The generic industry
term 'physical security
information management'
(PSIM) refers to
applications used to
integrate a variety of
systems and sensors into a
centralised command and
control system.

www.fmmagazine.com.au

More Related Content

Similar to Superior Situational Awareness - PSIM (Physical Security Information Management)

Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management market
RishabhJain1113
 
Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)
JeremyGarcia46
 
Be wp cybersmart_buildings
Be wp cybersmart_buildingsBe wp cybersmart_buildings
Be wp cybersmart_buildings
JeremyGarcia46
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
Iron Mountain
 
The digital transformation in physical security
The digital transformation in physical security   The digital transformation in physical security
The digital transformation in physical security
Paolo Sciarappa
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
ADGP, Public Grivences, Bangalore
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
Dr. Maceo D. Wattley
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
Adlan Hussain
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Tripwire
 
Weathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceWeathering the Storm of IT Security Compliance
Weathering the Storm of IT Security Compliance
Condition Zebra (CONZebra)
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Ben Amaba, PhD, P. Eng, CPIM®, LEED® AP BD+C
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
Lockheed Martin
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
Luxembourg Institute of Science and Technology
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
serve&solve
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Corporation
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
14 june
14 june14 june
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Corporation
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 

Similar to Superior Situational Awareness - PSIM (Physical Security Information Management) (20)

Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management market
 
Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)
 
Be wp cybersmart_buildings
Be wp cybersmart_buildingsBe wp cybersmart_buildings
Be wp cybersmart_buildings
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 
The digital transformation in physical security
The digital transformation in physical security   The digital transformation in physical security
The digital transformation in physical security
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
Weathering the Storm of IT Security Compliance
Weathering the Storm of IT Security ComplianceWeathering the Storm of IT Security Compliance
Weathering the Storm of IT Security Compliance
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
14 june
14 june14 june
14 june
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 

Recently uploaded

Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 

Recently uploaded (20)

Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 

Superior Situational Awareness - PSIM (Physical Security Information Management)

  • 1. 068 | Software FM PSIM’s potential: SUPERIOR SITUATIONAL AWARENESS Luke Percy-Dove. A new software application can provide a means of linking these disparate building control systems without throwing out what you have and starting again. Physical security information management (PSIM) is a generic industry term in much the same way as BMS is used in the controls industry. As the name suggests, it is an application that has evolved from the security industry where these applications are used to integrate a variety of systems and sensors into a centralised command and control system. PSIM is now emerging as an application that can bring its unique benefits to the commercial property sector. In the commercial space, PSIM is used to build relationships between building control systems and events in ways that have not previously been possible. For example, a typical building alarm event might involve the activation of a high temperature sensor. In this The possibilities offered by a new platform that integrates disparate building and security systems into a common management system – namely PSIM – are revealed by LUKE PERCY-DOVE, principal consultant at Matryx Consulting. I f you are like most facilities managers, you will need to control access to certain areas of your building and monitor who is coming and going. This will mean that you have an electronic access control system installed and probably a CCTV system to complement it. Security has been managed this way for many years and not a lot has changed over time. Sure, we have moved to Internet protocol (IP) and embraced technology to some degree, but security has remained one of those things that is often only deployed because we have to have it. It doesn’t necessarily add to the client’s experience or provide a return on investment for property managers. But, that is now changing, thanks to new applications for building systems integration and CCTV management that can add value and provide a return on security investment. Physical security information management Most commercial buildings have independent control systems for HVAC, lighting, evacuation, personal address, lifts, the building management system (BMS), fire and security. Each system will have its own dedicated controllers, data servers and workstations where events are logged and reports generated. Unless real planning has gone into the initial procurement, they are probably also from different vendors, meaning there is little if any integration between systems. FM OCTOBER | NOVEMBER 2013 As events escalate, so can the actions of the PSIM, with alerts, public broadcast and even social media updates part of pre-programmable responses. instance, let’s say the event is caused by a key piece of control equipment being switched off when a contractor was granted access to a service riser. This one event is likely to generate three different alarms – a riser alarm, a power fail alarm and the high temperature alarm. These alarm events, while linked, will seem unrelated as they appear in the event logs within their respective control systems. The critical event is the high-temperature alarm, which is investigated as a high priority and attended to by maintenance staff. Using PSIM, a natural relationship is created between these events, so that alerts can be generated as soon as it becomes clear that something that should not have happened has happened. As events escalate, so can the actions of the PSIM, with alerts to key personnel, public broadcast and even social media updates part of preprogrammable responses. Instead of three unrelated events, PSIM knows that the events are one and the same, so a response can be managed in a far more logical and efficient manner. PSIM can also incorporate standard operating procedures, policies and competencies (client specific) to form rules around alarm events and aid in the enforcement of a building’s risk management strategy. PSIM brings greater operational control and situational awareness to building management. These applications also provide opportunities for operational savings, as building control can be simplified, monitoring and reporting streamlined and activities measured. The opportunities for large commercial, retail and multi-site operations are extensive and will become more apparent as PSIM evolves from being a security application and finds its feet in the commercial property sector. FM The generic industry term 'physical security information management' (PSIM) refers to applications used to integrate a variety of systems and sensors into a centralised command and control system. www.fmmagazine.com.au