When you hear the term “perimeter security” it probably conjures up images of fences, video cameras, and sensors. There are literally hundreds of different sensors and systems that organizations can use today to protect the perimeter.In fact, it’s not uncommon to use multiple detection methods. The problem is, if these systems are working in isolation, they could each tell you something important, but they won’t tell you everything you need to know. That leaves security operators having to combine different pieces of information manually to come to a conclusion. Is this a false alarm, or is it a genuine perimeter breach? And if it’s real, how critical is it?
For example, if you’ve got a large perimeter you might have thermal imaging cameras that look far beyond the perimeter. Similarly, with radar, you might know there’s something out there – but you don’t know who or what it is. An alert from a fence shake detector can also be helpful, but it could be something other than a person. Cameras with video analytics can be similarly effective, but there’s no way to completely eliminate false alarms.
What you really want to do is correlate the information coming from all of your different sensors to increase the probability of a good detection. This is where PSIM comes in.
PSIM can cross-correlate information from all your perimeter intrusion detection systems to provide a higher level of situational awareness. For example, a strong wind could set off a fence shake detector, but combine that alert with a video analytics alert that tells you someone just climbed over the fence and you know you’ve got a serious situation. PSIM can also apply logic based on the location of the sensors and the time of the alert. Say for example you get an alarm from a camera with video analytics at the northern part of the fence and ten minutes later you get an alert from a fence shake detector on the southern perimeter – the PSIM system could treat this differently than if the alarms were closer together (in time and proximity).
Once you know there has been a breach, the next question is what should you do about it? Your security operators need to know how to respond consistently and effectively. That’s another area where PSIM can help by guiding operator responses through automated workflows.
Finally, after a breach, someone always invariably wants to know what happened. Did the operator follow the necessary steps and procedures? What was the outcome of the situation? PSIM allows you to literally reenact the scenario as it unfolded. You can see each completed step and action taken by your operators, review recorded video, listen to the radio transmissions, see your mobile assets moving around the perimeter, and retrace door activity. You see all of this visually simply by moving a slider along a time scale. The ability to record actions in this detailed manner allows you to verify that procedures were followed, implement process improvements, retrain security operators, and learn from mistakes.