What is PSIM?

Physical Security Information Management (PSIM) is a category of software that provides a platform and applications created by middleware developers,

Designed to integrate multiple standalone security applications and devices and control them through one comprehensive user interface in order to provide a unified and complete situation and incident management solution


It collects and correlates events from existing disparate security

devices and information systems

  • video,
  • access control,
  • sensors,
  • analytics,
  • networks,
  • building systems, etc.

to empower personnel to identify and proactively resolve situations.


PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting.

Ultimately, these solutions allow organizations to reduce costs

through improved efficiency and to improve security through increased intelligence.

PSIM – Does the following:

Collection: Device management independent software collects data

from any number of disparate security devices or systems.

Analysis: The system analyses and correlates the data, events,

and alarms, to identify the real situations and their priority,

Verification: PSIM software presents the relevant situation information in a quick and

easily digestible format for an operator to verify the situation,

Resolution: The system provides Standard Operating Procedures (SOPs), step-by-step

instructions based on best practices and an organization’s policies,

and tools to resolve the situation.

Reporting: The PSIM software tracks all the information and steps for compliance

reporting, training and potentially, in-depth investigative analysis.

Audit trail: The PSIM also monitors how each operator interacts with the system,

tracks any manual changes to security systems.


Security integrated into a PSIM solution include but not limited to:

  • Access control systems
  • Automated barriers & bollards
  • Building management systems like Heating, HVAC, lifts/elevators control, etc.
  • CCTV- Closed Circuit TV
  • Control Rooms
  • Data Centers
  • Electronic article surveillance – EAS
  • Fire detection
  • GIS mapping systems
  • Intrusion systems
  • Intercom & IP phone
  • Lighting control system
  • Perimeter Intrusion detection system
  • Radar based detection & Perimeter surveillance radar
  • Power monitoring system
  • Security alarm
  • Server Rooms
  • Video content analysis
  • Video wall

PSIM – Validation of Coercion / Threats

Many of the alarms and alerts that come into the security environment are not always threats.

These need to be prioritised according to risk, such as:

  • Time of day,
  • location of personnel
  • Location of live stock
  • and a whole range of other critical factors

‘Dynamic alarm management’ is required to find the ‘hot’ zones which indicate that some action may need to be taken.

Connected systems and automation of processes such as key personnel alerting, video verification, and Service Level Agreements (SLA) will help to enable situational awareness and ensure alarms/alerts are followed up quickly and in a relevant manner.

PSIM – Centralised

PSIM is enabling companies such as yours to create centralised security infrastructures, some of the advantages this provides includes:

  • Complete situational awareness
  • Consistent levels of security across all sites, so no weak links
  • Cost reductions through reduced manned guards
  • Cost reductions through fewer control rooms
  • Better use of remote monitoring
  • Reports and dashboards covering the entire security estate
  • Ensuring SLA – Maintenance being conducted

Putting you back in charge!

Xi IOT Bridge

Xi IOT Bridge control solution provides a hardware interface for devices that are not IP based acting as the Ethernet gateway for device integration.

IP Devices
2 Wire Analogue Devices
3 Wire Analogue Devices

Xi Connect

Xi Connect is the Xi SCADA Agent using a SOA interface.

Supervisory control and data acquisition framework that is designed to provide control of protocol based equipment.

Xi Integration Capabilities

– CCTV and VMS applications
– Access control
– Intrusion detection
– Intercoms
– Biometric applications
– License Plate Recognition
– Gensets