{"id":91953,"date":"2023-01-18T15:15:13","date_gmt":"2023-01-18T15:15:13","guid":{"rendered":"https:\/\/www.everbridge.com\/fr\/?p=91953"},"modified":"2023-01-18T15:15:15","modified_gmt":"2023-01-18T15:15:15","slug":"presentation-des-psim","status":"publish","type":"post","link":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","title":{"rendered":"Pr\u00e9sentation des PSIM"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-de-quoi-s-agit-il\"><strong><strong><strong>De quoi s&#8217;agit-il&nbsp;?<\/strong><\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Les PSIM (Physical Security Information Management) sont des logiciels d&#8217;hypervision con\u00e7us pour int\u00e9grer plusieurs applications de s\u00e9curit\u00e9 non connect\u00e9es, permettre l&#8217;automatisation des workflows et des processus, et assurer le contr\u00f4le des dispositifs au travers d&#8217;une exp\u00e9rience utilisateur unifi\u00e9e.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"mb-2\">Ils peuvent fonctionner en tant que plateforme d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 physique ou faire partie int\u00e9grante d&#8217;un syst\u00e8me plus vaste de <a href=\"https:\/\/everbridge.fr\/plate-forme\/critical-event-management\/\">gestion des \u00e9v\u00e9nements critiques (CEM, Critical Event Management)<\/a>.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-button-style-1 mb-2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.everbridge.com\/products\/control-center\/?_gl=1*a50t32*_up*MQ..*_ga*MTUxNjY4ODE1NC4xNjcyOTM0NjU3*_ga_868RLJ5KW2*MTY3MjkzNDY1Ny4xLjEuMTY3MjkzNDY4MC4wLjAuMA..\">D\u00e9couvrir les PSIM fournis avec Control Center<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-comment-fonctionnent-ils\"><strong><strong>Comment fonctionnent-ils&nbsp;?<\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"mb-2\">Les PSIM collectent et rapprochent les donn\u00e9es d\u2019\u00e9v\u00e9nements provenant de syst\u00e8mes de s\u00e9curit\u00e9 et d&#8217;information h\u00e9t\u00e9rog\u00e8nes (vid\u00e9o, contr\u00f4le d&#8217;acc\u00e8s, capteurs, analyse de donn\u00e9es, r\u00e9seaux, syst\u00e8mes \u00e9quipant les locaux, cybern\u00e9tique, etc.) pour permettre au personnel d&#8217;identifier avec pr\u00e9cision les situations critiques et d&#8217;y r\u00e9pondre de mani\u00e8re proactive.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-quel-interet-presentent-ils\"><strong><strong>Quel int\u00e9r\u00eat pr\u00e9sentent-ils&nbsp;?<\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"mb-2\">Les PSIM offrent de nombreux avantages organisationnels, notamment un contr\u00f4le accru, une meilleure connaissance de la situation et des rapports de gestion. Avec ces solutions, vous b\u00e9n\u00e9ficiez d&#8217;une meilleure efficacit\u00e9 et d&#8217;une connaissance accrue de la situation, ce qui se traduit par une r\u00e9duction des co\u00fbts et un dispositif de s\u00e9curit\u00e9 optimis\u00e9, notamment en termes de surveillance et de conformit\u00e9.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-fonctionnalites-des-plateformes-psim\"><strong><strong>Fonctionnalit\u00e9s des plateformes PSIM&nbsp;:<\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Un syst\u00e8me logiciel PSIM complet poss\u00e8de six&nbsp;fonctionnalit\u00e9s majeures qui permettent de le distinguer des autres formes de gestion de la s\u00e9curit\u00e9 physique&nbsp;:<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<ol class=\"wp-block-list\">\n<li><strong>Int\u00e9gration<\/strong>&nbsp;\u2013 Un PSIM offre une architecture ouverte permettant d&#8217;int\u00e9grer des donn\u00e9es provenant de tout un \u00e9ventail de dispositifs et syst\u00e8mes de s\u00e9curit\u00e9 h\u00e9t\u00e9rog\u00e8nes, quel que soit leur fournisseur.<\/li>\n\n\n\n<li><strong>Analyse<\/strong>&nbsp;\u2013 Un PSIM fournit un moteur de workflow qui analyse et corr\u00e8le les donn\u00e9es, les \u00e9v\u00e9nements et les alertes pour identifier les situations r\u00e9ellement probl\u00e9matiques et d\u00e9terminer leur priorit\u00e9.<\/li>\n\n\n\n<li><strong>V\u00e9rification<\/strong>&nbsp;\u2013 Un PSIM pr\u00e9sente les informations pertinentes concernant la situation et les proc\u00e9dures op\u00e9rationnelles standard (SOP, Standard Operating Procedures) en fonction des politiques de l&#8217;organisation.<\/li>\n\n\n\n<li><strong>R\u00e9solution<\/strong>&nbsp;\u2013 Un PSIM prend en charge l&#8217;activation et le contr\u00f4le des dispositifs pour permettre aux utilisateurs de prendre des mesures et de r\u00e9soudre les probl\u00e8mes sans passer par d&#8217;autres syst\u00e8mes logiciels.<\/li>\n\n\n\n<li><strong>Rapports<\/strong>&nbsp;\u2013 Un PSIM structure les donn\u00e9es des syst\u00e8mes int\u00e9gr\u00e9s, offrant ainsi une source de r\u00e9f\u00e9rence fiable et unique \u00e0 des fins de conformit\u00e9, de reporting et de formation.<\/li>\n\n\n\n<li class=\"mb-2\"><strong>Audit<\/strong>&nbsp;\u2013 Un PSIM assure \u00e9galement le suivi de l&#8217;ensemble des informations re\u00e7ues et garde trace des interactions avec les op\u00e9rateurs et des modifications du syst\u00e8me, ce qui permet des analyses approfondies.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-que-font-les-psim\"><strong><strong>Que font les PSIM&nbsp;?<\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Au-del\u00e0 des avantages en termes de gain de temps et d&#8217;efficacit\u00e9, une plateforme PSIM permet \u00e9galement de r\u00e9duire les risques gr\u00e2ce \u00e0 l&#8217;automatisation des t\u00e2ches, au respect des politiques, \u00e0 l&#8217;acc\u00e9l\u00e9ration des temps de r\u00e9ponse, \u00e0 la pr\u00e9cision des rapports intersyst\u00e8mes et \u00e0 la pr\u00e9vention des d\u00e9pendances technologiques.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"mb-2\">Un PSIM permet de mettre en \u0153uvre des processus op\u00e9rationnels essentiels \u00e0 tout service de s\u00e9curit\u00e9 moderne, en particulier des initiatives d&#8217;am\u00e9lioration continue des processus, des exercices de formation, des contr\u00f4les d&#8217;int\u00e9grit\u00e9 des syst\u00e8mes, et bien plus encore.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-verification-des-menaces\"><strong><strong>V\u00e9rification des menaces&nbsp;:<\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"mb-2\">Une bonne part des alertes parvenant \u00e0 l&#8217;environnement de s\u00e9curit\u00e9 ne constituent pas vraiment des menaces. Elles doivent \u00eatre class\u00e9es par ordre de priorit\u00e9 en fonction du risque qu&#8217;elles pr\u00e9sentent et de leur pertinence, en tenant compte de l&#8217;heure \u00e0 laquelle elles apparaissent, de la localisation du personnel et de nombreux autres facteurs critiques. Une \u00ab&nbsp;gestion dynamique des alarmes&nbsp;\u00bb s&#8217;av\u00e8re n\u00e9cessaire pour rep\u00e9rer les alarmes \u00ab&nbsp;urgentes&nbsp;\u00bb qui indiquent qu&#8217;une action doit \u00eatre entreprise. Les syst\u00e8mes connect\u00e9s et l&#8217;automatisation de processus tels que l&#8217;envoi d&#8217;alertes au personnel strat\u00e9gique, la v\u00e9rification vid\u00e9o et les accords de niveau de service (SLA, Service Level Agreements) contribueront \u00e0 une bonne connaissance de la situation, \u00e0 une prise en compte rapide des alertes et \u00e0 des d\u00e9cisions \u00e9clair\u00e9es.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-unification-de-la-securite\"><strong><strong>Unification de la s\u00e9curit\u00e9&nbsp;:<\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Les PSIM permettent \u00e0 des organisations comme la v\u00f4tre de mettre en place une strat\u00e9gie de s\u00e9curit\u00e9 convergente et unifi\u00e9e. Voici quelques-uns des avantages qu&#8217;ils vous procurent&nbsp;:<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<ul class=\"wp-block-list\">\n<li>Une connaissance compl\u00e8te de la situation couvrant tous les aspects relatifs \u00e0 la s\u00e9curit\u00e9<\/li>\n\n\n\n<li>Des niveaux de s\u00e9curit\u00e9 coh\u00e9rents dans toutes les localisations (pas de maillons faibles)<\/li>\n\n\n\n<li>Une r\u00e9duction des co\u00fbts gr\u00e2ce \u00e0 un gardiennage humain plus efficace<\/li>\n\n\n\n<li>Des co\u00fbts r\u00e9duits gr\u00e2ce \u00e0 la diminution du nombre de salles de contr\u00f4le et de l&#8217;espace requis<\/li>\n\n\n\n<li>Une surveillance \u00e0 distance avec commandes et contr\u00f4les distribu\u00e9s<\/li>\n\n\n\n<li class=\"mb-1\">Des rapports et des tableaux de bord automatis\u00e9s couvrant l&#8217;ensemble du dispositif de s\u00e9curit\u00e9<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-2 wp-block-heading\" id=\"h-\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-50938 size-fp-small aligncenter\" src=\"https:\/\/www.everbridge.com\/wp-content\/uploads\/2021\/11\/Control-Center-prevent-info-overload.jpg&quot;\" alt=\"\" width=\"640\" height=\"384\"><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"mb-1 wp-block-heading\" id=\"h-determination-du-retour-sur-investissement-en-matiere-de-securite\"><strong><strong><strong>D\u00e9termination du retour sur investissement en mati\u00e8re de s\u00e9curit\u00e9&nbsp;:<\/strong><\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>Les op\u00e9rations relatives \u00e0 la s\u00e9curit\u00e9 doivent aujourd&#8217;hui permettre de tirer parti de la puissance de l&#8217;automatisation pour&nbsp;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>prendre des d\u00e9cisions rapides et pr\u00e9cises, en se basant sur des politiques et des proc\u00e9dures organisationnelles sp\u00e9cifiques. De nombreuses op\u00e9rations de s\u00e9curit\u00e9 se sont d\u00e9velopp\u00e9es au fil des ans avec l&#8217;introduction progressive de solutions ponctuelles.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>D&#8217;un point de vue strat\u00e9gique, les grandes organisations ont tendance \u00e0 se concentrer sur le d\u00e9veloppement de leur strat\u00e9gie de s\u00e9curit\u00e9 en vue de renforcer leur r\u00e9silience op\u00e9rationnelle, au lieu d&#8217;essayer simplement de r\u00e9duire les co\u00fbts li\u00e9s \u00e0 la s\u00e9curit\u00e9. La s\u00e9curit\u00e9 n&#8217;est plus seulement une question de gardes, de barri\u00e8res, d&#8217;observation et de r\u00e9action&nbsp;: il s&#8217;agit d&#8217;automatisation, d&#8217;analyse et de contr\u00f4le proactif.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"mb-2\">Les PSIM font d\u00e9sormais office de catalyseur pour assurer cette transition des solutions ponctuelles, qui reposent sur la surveillance constante et les interventions du personnel de s\u00e9curit\u00e9, \u00e0 une plateforme ax\u00e9e sur les donn\u00e9es, qui g\u00e8re de mani\u00e8re proactive le volume croissant d&#8217;informations parvenant \u00e0 la salle de contr\u00f4le.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-button-style-1 mb-5\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/go.everbridge.com\/control-center-roi-wp-reg-page.html?trk=everbridge-blog-download&amp;utm_source=everbridge&amp;utm_medium=blog&amp;utm_campaign=2021-q1-na-corp-digital-asset-control-center-roi&amp;utm_content=download&amp;_gl=1*12y6ta6*_up*MQ..*_ga*Njk3NzI5NDkwLjE2NzIzMTgzMDQ.*_ga_868RLJ5KW2*MTY3MjMxODMwMy4xLjAuMTY3MjMxODMwMy4wLjAuMA..\">Retour sur investissement en mati\u00e8re de s\u00e9curit\u00e9&nbsp;: B\u00e2tir un meilleur argumentaire pour investir dans la s\u00e9curit\u00e9<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>De quoi s&#8217;agit-il&nbsp;? Les PSIM (Physical Security Information Management) sont des logiciels d&#8217;hypervision con\u00e7us pour int\u00e9grer plusieurs applications de s\u00e9curit\u00e9\u2026 <\/p>\n","protected":false},"author":127,"featured_media":91266,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_trash_the_other_posts":false,"_hide_footer":false,"card_image_id":0,"enable_toc":false,"enable_key_takeaways":false,"enable_post_cta":false,"enable_related_posts":false,"toc_ctas":[],"related_posts":[],"editor_notices":[],"footnotes":"","page_schemas":[]},"use_case":[62,70,63,66,67,69],"industry":[74,75,78],"resource_region":[],"additional_blogs":[],"coauthors":[],"class_list":["post-91953","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","use_case-anticipate-and-prevent-disruptions-to-operations","use_case-automate-it-response","use_case-crisis-communications","use_case-duty-of-care","use_case-keep-employees-safe-everywhere","use_case-workplace-violence","industry-corporate","industry-education","industry-hospitals-healthcare"],"yoast_primary_category":{"use_case":"Anticipate and Prevent Disruptions to Operations","industry":"Corporate"},"featured_image_src":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-1024x576.jpg","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pr\u00e9sentation des PSIM Guide sur le principe et les avantages des PSIM<\/title>\n<meta name=\"description\" content=\"Les PSIM (Physical Security Information Management) sont des logiciels d&#039;hypervision con\u00e7us pour int\u00e9grer les applications de s\u00e9curit\u00e9, permettre les automatisations et unifier le contr\u00f4le.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pr\u00e9sentation des PSIM Guide sur le principe et les avantages des PSIM\" \/>\n<meta property=\"og:description\" content=\"Les PSIM (Physical Security Information Management) sont des logiciels d&#039;hypervision con\u00e7us pour int\u00e9grer les applications de s\u00e9curit\u00e9, permettre les automatisations et unifier le contr\u00f4le.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/\" \/>\n<meta property=\"og:site_name\" content=\"Everbridge - Francais\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-18T15:15:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-18T15:15:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.everbridge.com\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rocio Ortega\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rocio Ortega\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/\"},\"author\":{\"name\":\"Rocio Ortega\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#\\\/schema\\\/person\\\/68dae21a17fc8b6d91e1b50207ad463d\"},\"headline\":\"Pr\u00e9sentation des PSIM\",\"datePublished\":\"2023-01-18T15:15:13+00:00\",\"dateModified\":\"2023-01-18T15:15:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/\"},\"wordCount\":1116,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2022\\\/09\\\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/\",\"url\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/\",\"name\":\"Pr\u00e9sentation des PSIM Guide sur le principe et les avantages des PSIM\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2022\\\/09\\\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg\",\"datePublished\":\"2023-01-18T15:15:13+00:00\",\"dateModified\":\"2023-01-18T15:15:15+00:00\",\"description\":\"Les PSIM (Physical Security Information Management) sont des logiciels d'hypervision con\u00e7us pour int\u00e9grer les applications de s\u00e9curit\u00e9, permettre les automatisations et unifier le contr\u00f4le.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2022\\\/09\\\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2022\\\/09\\\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"In the Government Surveillance Facility Team of Officers Organize Interception Plan with Help of Satellite Navigation. Big Screen Shows Top Down Images of the Target's Car.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/blog\\\/presentation-des-psim\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pr\u00e9sentation des PSIM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/\",\"name\":\"Everbridge - Francais\",\"description\":\"assurez la s\u00e9curit\u00e9 de vos employ\u00e9s et la continuit\u00e9 de vos activit\u00e9s\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#organization\",\"name\":\"Everbridge - Francais\",\"url\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2023\\\/03\\\/EVBG-Logo-Full-Color-RGB.svg\",\"contentUrl\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2023\\\/03\\\/EVBG-Logo-Full-Color-RGB.svg\",\"width\":1568,\"height\":310,\"caption\":\"Everbridge - Francais\"},\"image\":{\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.everbridge.com\\\/fr\\\/#\\\/schema\\\/person\\\/68dae21a17fc8b6d91e1b50207ad463d\",\"name\":\"Rocio Ortega\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5bf3b8ba622d1a03f8989f2aa965be3b8178810a7cd634cc8fe1dbb4d42ea0f?s=96&d=mm&r=g6caf65d09a42db81137d0b5dc44bb0a9\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5bf3b8ba622d1a03f8989f2aa965be3b8178810a7cd634cc8fe1dbb4d42ea0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5bf3b8ba622d1a03f8989f2aa965be3b8178810a7cd634cc8fe1dbb4d42ea0f?s=96&d=mm&r=g\",\"caption\":\"Rocio Ortega\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pr\u00e9sentation des PSIM Guide sur le principe et les avantages des PSIM","description":"Les PSIM (Physical Security Information Management) sont des logiciels d'hypervision con\u00e7us pour int\u00e9grer les applications de s\u00e9curit\u00e9, permettre les automatisations et unifier le contr\u00f4le.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","og_locale":"fr_FR","og_type":"article","og_title":"Pr\u00e9sentation des PSIM Guide sur le principe et les avantages des PSIM","og_description":"Les PSIM (Physical Security Information Management) sont des logiciels d'hypervision con\u00e7us pour int\u00e9grer les applications de s\u00e9curit\u00e9, permettre les automatisations et unifier le contr\u00f4le.","og_url":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","og_site_name":"Everbridge - Francais","article_published_time":"2023-01-18T15:15:13+00:00","article_modified_time":"2023-01-18T15:15:15+00:00","og_image":[{"width":2560,"height":1440,"url":"http:\/\/www.everbridge.com\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg","type":"image\/jpeg"}],"author":"Rocio Ortega","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rocio Ortega","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#article","isPartOf":{"@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/"},"author":{"name":"Rocio Ortega","@id":"https:\/\/www.everbridge.com\/fr\/#\/schema\/person\/68dae21a17fc8b6d91e1b50207ad463d"},"headline":"Pr\u00e9sentation des PSIM","datePublished":"2023-01-18T15:15:13+00:00","dateModified":"2023-01-18T15:15:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/"},"wordCount":1116,"commentCount":0,"publisher":{"@id":"https:\/\/www.everbridge.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg","inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","url":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","name":"Pr\u00e9sentation des PSIM Guide sur le principe et les avantages des PSIM","isPartOf":{"@id":"https:\/\/www.everbridge.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#primaryimage"},"image":{"@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg","datePublished":"2023-01-18T15:15:13+00:00","dateModified":"2023-01-18T15:15:15+00:00","description":"Les PSIM (Physical Security Information Management) sont des logiciels d'hypervision con\u00e7us pour int\u00e9grer les applications de s\u00e9curit\u00e9, permettre les automatisations et unifier le contr\u00f4le.","breadcrumb":{"@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#primaryimage","url":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg","contentUrl":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Risk-Intel-Control-Center-image-scaled-1-scaled.jpg","width":2560,"height":1440,"caption":"In the Government Surveillance Facility Team of Officers Organize Interception Plan with Help of Satellite Navigation. Big Screen Shows Top Down Images of the Target's Car."},{"@type":"BreadcrumbList","@id":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.everbridge.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Pr\u00e9sentation des PSIM"}]},{"@type":"WebSite","@id":"https:\/\/www.everbridge.com\/fr\/#website","url":"https:\/\/www.everbridge.com\/fr\/","name":"Everbridge - Francais","description":"assurez la s\u00e9curit\u00e9 de vos employ\u00e9s et la continuit\u00e9 de vos activit\u00e9s","publisher":{"@id":"https:\/\/www.everbridge.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.everbridge.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.everbridge.com\/fr\/#organization","name":"Everbridge - Francais","url":"https:\/\/www.everbridge.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.everbridge.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/EVBG-Logo-Full-Color-RGB.svg","contentUrl":"https:\/\/www.everbridge.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/EVBG-Logo-Full-Color-RGB.svg","width":1568,"height":310,"caption":"Everbridge - Francais"},"image":{"@id":"https:\/\/www.everbridge.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.everbridge.com\/fr\/#\/schema\/person\/68dae21a17fc8b6d91e1b50207ad463d","name":"Rocio Ortega","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b5bf3b8ba622d1a03f8989f2aa965be3b8178810a7cd634cc8fe1dbb4d42ea0f?s=96&d=mm&r=g6caf65d09a42db81137d0b5dc44bb0a9","url":"https:\/\/secure.gravatar.com\/avatar\/b5bf3b8ba622d1a03f8989f2aa965be3b8178810a7cd634cc8fe1dbb4d42ea0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5bf3b8ba622d1a03f8989f2aa965be3b8178810a7cd634cc8fe1dbb4d42ea0f?s=96&d=mm&r=g","caption":"Rocio Ortega"}}]}},"get_extra_meta_fields":{"date_format":"F j, Y","is_summary":false,"description":"De quoi s&#8217;agit-il&nbsp;? Les PSIM (Physical Security Information Management) sont des logiciels d&#8217;hypervision con\u00e7us pour int\u00e9grer plusieurs applications de s\u00e9curit\u00e9\u2026 ","external_url":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","link_text":"Read more"},"get_external_url":"https:\/\/www.everbridge.com\/fr\/blog\/presentation-des-psim\/","get_external_title":"Read more","get_term_title":{"post_format":"","use_case":"Anticipate and Prevent Disruptions to Operations","industry":"Corporate","resource_region":"","additional_blogs":"","author":""},"_links":{"self":[{"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/posts\/91953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/users\/127"}],"replies":[{"embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/comments?post=91953"}],"version-history":[{"count":0,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/posts\/91953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/media\/91266"}],"wp:attachment":[{"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/media?parent=91953"}],"wp:term":[{"taxonomy":"use_case","embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/use_case?post=91953"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/industry?post=91953"},{"taxonomy":"resource_region","embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/resource_region?post=91953"},{"taxonomy":"additional_blogs","embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/additional_blogs?post=91953"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.everbridge.com\/fr\/wp-json\/wp\/v2\/coauthors?post=91953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}