Approaching a Market Size for PSIM

Hunt, Steve
March 2009
Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p40
Trade Publication
In this article the author focuses on the market size approach for physical security information management (PSIM) in the business security industry. He gives a clearer understanding on how PSIM works in the business and how security executives benefit from PSIM. He also presents a convergence of trends for the PSIM market, seeing an enhancement of its potential in the adoption of computers, software and networking and the innovations in software.


Related Articles

  • Losing Customer Trust. Allen, Martin // Credit Control;2006, Vol. 27 Issue 2, p57 

    The article focuses on the effect of security breaches on companies in the banking and finance sector. Security breaches can have a devastating effect on companies, like Boeing Co. who lost a laptop containing personal financial data on 161,000 current and former employees. The author examines...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Securing Business, As Usual. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Sep2014, Vol. 51 Issue 9, p10 

    The article discusses the trends in security programs for businesses. It mentions the investments in security operations centers (SOCs), intelligence services and travel support companies as best practice for leading security programs. The author also presents scenarios that prove that leading...

  • The threat within: Keeping malicious insiders from compromising corporate assets. Passman, Pamela // InsideCounsel;Jul/Aug2015, Vol. 26 Issue 282, p39 

    The article discusses the threats to valuable information and assets in companies. It highlights the full-scope monitoring in insider crimes and incidents due to external adversaries. It also emphasizes the significant of imposing and developing a specific company-wide integrated insider-threat...

  • Establishment of Improved Business Security Systems. Wookjae Cha; Dongho Won // World Academy of Science, Engineering & Technology;Feb2011, Issue 50, p1 

    No abstract available.

  • Eye On Your Enterprise. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p20 

    The article focuses on the contributions of physical security information systems (PSIM) to several business enterprises and other facilities in the U.S. The system is indicated as the combination of diverse physical security sensors and devices that have been managed from a single platform....

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics