ASG's Security Solutions Blog

Great Conversation Button

Connect with ASG

Don't miss a conversation! Continue the Conversation by email.

Your email:

Current Articles | RSS Feed RSS Feed

PSIM Webinar features Aronson Security Group

Plante web

On July 30, 2014, starting at 11:00 AM  PST, Commercial Integrator (CI), a leading publication addressing the needs of professional integrators, has asked Aronson Security Group (ASG) to participate in a live, free webinar entitled “PSIM: The Basics and Beyond.”

According to CI’s website, when people think and talk about physical security information management (PSIM), they realize it’s a critical tool in preventing security breaches and major incidents, as well as providing a predictive and proactive response.

CI believes the idea of PSIM seems to still be somewhat contained within and discussed by a select group of people. Those who aren’t part of the “in” crowd don’t always know how they can get involved with PSIM installations or understand why they should, especially in an age when the thirst for security management is at an all-time high.

According to William Plante, Director of Professional Services, ASG believes part of the challenge with integrators is they often lead with products. ASG, however, believes PSIM is a strategy posing as a product. Which is why ASG often pulls their clients back from a product decision and attempts to help them navigate the people, process, and technology strategies first. “We are a risk, resilience, and security solutions provider first,” said Plante. “We are interested in the intersection of risk and value for the business. This will often lead to a roadmap for a common operating picture where “integration” and information management tools are needed.”

Plante will be joining Michael Lamarca, Director of the IP Systems Group of Tyco Integrated Security and CI editor-at-large Craig MacCormack, to discuss the reasons why PSIM is gaining traction, how other integrators can become part of this lucrative but difficult-to-navigate space, and which markets still hold untapped PSIM opportunities.

However, Plante see this as a good webinar for clients as well. This is a healthy discussion that needs to be initiated more often since our industry is changing rapidly. This change will impact how we will optimally manage our people, processes, tools, our risk, and the value proposition of security.

Plante will be sharing some of ASG’s “secret sauce” when it comes to positioning information management within their client’s programs. ASG has done the research, listened intently to comments from the CSO membership community within the Security Executive Council, and had experience with enterprise level migrations of security systems.

Because of this research and partnerships, ASG knows that corporate executives are dealing with more risks than ever. Consequently, security operations need to be more effective and also streamline operations. That means reducing the complexity of collecting, managing, and communicating information. The security program is no different than operations, supply chain management, and sales. All mission critical functions must deliver information at the point of need, at the time of need, and in the context of need. In the end, the business of security is the business.

This means our clients are looking for a new level of leadership, metrics that really matter, a technology platform and strategy that allows them to measure risk, as well as their own processes, and standards.

They can no longer afford silos within their corporate infrastructure or their data. The days of buying point solutions without aligning them with a information management strategy are numbered.

The technology and service vendors must understand this as well.

“Our message to the integrator community is “Don’t think you have to do it all yourself,” said Plante. ASG has architected a ‘Global Security Network’ that believes in process optimization that saves the client time and money and reduces the amount of waste in typical project cycles. Since ASG has that experience, integrators who are close to their clients may want ASG to be partners in helping them roll out an enterprise information management strategy and architecture. “We have a program that is tried and tested and is based on best practices developed over many programs and projects,” said Plante. “We regularly and programmatically work with 20-30 consultants and integrators across the world to deliver quality solutions for our clients.”

CI is accepting questions before the webinar. They can be emailed to in advance of the event and the panelists will be sure to address them during their presentations.

Or let us know your questions directly and we can get back to you with our opinions and share our experience. Click here to go to form.


Filling the Gaps in Security Information Management

binary code 10891596


There has been a debate within the industry for some time now over what exactly constitutes a true security information management solution. Everyday, security personnel at organizations both big and small are bombarded with data from the security devices they use, be it alerts from video analytic software monitoring surveillance feeds or alarms triggered by intrusion detection sensors. While having more data to work with can be a good thing, the challenge comes in being able to aggregate all of this information into actionable intelligence.

Integrators Face A New Business Model

Ron Worman, The Sage Group

Featured on

Ron Worman, Managing Partner of The Sage Group was asked to comment on conversations he had while at ASIS 2012:

  • The emergence of the cloud and the readiness of the channel

The Biggest Hurdle to PSIM Adoption: Integrators?


By Sage Conversations... Featured in July's issue of SD & I Magazine

Sage has been monitoring the conversations and the case studies in and around Physical Security Information Management (PSIM). Much of the conversation focuses on the lack of traction PSIM is getting in the marketplace. We thought it would be interesting for dealers and integrators to share our findings.

There's No Such Thing as Too Much Information


By Debjit Das, Vice President of Global Marketing, Verint Video Intelligence Solutions

In a modern security environment, information is a critical asset, and organizations rely on a wide array of information systems and technology solutions to protect people, property, and assets. Unfortunately, these organizations are now swimming, if not drowning, in wave after wave of business and security system data. In order to quickly identify potential security problems and avoid undesirable outcomes, organizations must be able to more efficiently view, correlate, and analyze the information their enterprise systems provide.

Transforming Overload into Opportunity
With the information explosion, we have progressed from asking how we can collect information to how we can transform it into the opportunity to make faster and smarter decisions for enhancing security and operating more efficiently.  

The answer comes in two parts.  First, organizations need to implement tools for understanding more of the information at hand – not just structured information (such as the names of employees who swiped their ID cards to enter a restricted facility), but also unstructured information (such as video showing how many people actually entered the facility and what they did while there). Second, organizations should consider solutions for correlating and viewing all of the pertinent data in a meaningful way for more rapid and complete situational awareness, better emergency preparedness, and fast and effective response.  

Powerful Insight with a Robust and Integrated Video Portfolio
A comprehensive IP video portfolio that addresses virtually every aspect of video surveillance – from video capture to video viewing to video analysis – enables information to be more readily shared and used.  Add video analytics to the mix, and security staff need no longer be tied to scrutinizing banks of security screens for detecting suspicious activity. For example, when an intruder enters a restricted area, video analytics can quickly detect that a virtual tripwire has been crossed, and the video system can automatically send alerts and related video to the appropriate security staff, while repositioning PTZ cameras to capture the intruder’s activity.  

The optimal video system is built on an open architecture for easier integration with other enterprise systems: fire alarm, intrusion detection, access control, perimeter protection, Point of Sale, business systems, and databases, among others. This integration allows the video system to leverage the important information these security and business systems provide and produce more timely and valuable intelligence. For instance, a large retailer might generate several million transactions daily, making it all but impossible to detect theft and fraud. But video integration with the Point of Sale system, combined with sophisticated analytics software, makes it possible to detect suspicious activity that might not otherwise be found: a sales associate who processes repeated returns with no customer present or multiple price overrides for a single customer, common in “sweet-hearting.”

The optimal video system can be easily administered and maintained from a central location, regardless of how many sensors are added. So, when an organization grows to span cities or even continents, the IP video system scales to accommodate new locations and changing objectives without forklift upgrades or armies of new staff.     

But, the most effective video systems are those that also incorporate a Physical Security Information Management solution – PSIM – that fuses information from security, safety, and building management systems. PSIM enables users to more quickly view and analyze events that occur over large areas and initiate and manage response, often in concert with multiple agencies.

In Conclusion: Actionable Intelligence for a Safer World
Clearly, organizations around the globe are flooded with more information than they can rapidly assess and understand. Without the proper tools, many organizations will continue to use just a fraction of available information to make decisions that impact lives and assets. However, robust, integrated video portfolios – especially those that include Physical Security Information Management ― can transform information overload into Actionable Intelligence for a safer world and more secure and effective operations.

A New Script for Jack Bauer's "24" - the Virtual SOC


By ASG's Professional Services Group

Fade in:  Unknown location

Jack Bauer quickly runs down a hallway chasing someone in a dark blue suit, gun in hand.  

Jack:  CTU, this is Bauer, where is this guy headed?

CTU Analyst:  Bauer, this is CTU, suspect moving towards the ammunition dump. 

Zoom in: CTU Analyst’s fingers on the keyboard

Span up: to view the blip on the screen moving through a building.

Span out: to full room to show the large back lit screen on the wall ahead where everyone else in the room can see the situation as it transpires. Typing feverishly, she provides Jack with more information about the missing warhead from a screen on her desktop that can access procedures, radiation detectors and a myriad of other applications all at once.
-End Scene

The New Buzz Word: PSIM Does it Apply?

Fingerprint keyboard

By Nigel Waterton

I would like to take a closer look at one of the highly talked about buzz words at ISC West – PSIM.  As a relatively new term used in the industry, it is important first to know how it is defined as well as if it is something that can be applied across channels and organizations alike.

ISC West - What Did You Gain From This Year's Event?

ISC West 2011

A recap of ISC West from Nigel Waterton, Director of Business Development

It was a great show this year! There were lots of new products and solutions showcased. Traffic was high as well as the energy from sponsors and attendees alike. Now that I have returned to my desk & gathered my thoughts, I want to share some of them with you.

All Posts