Lighthouse PSIM System

Our LightHouse™ PSIM system unifies every component of a user's security system.

Security Audit

The LightHouse™ PSIM system results from over fourteen years and 200,000 person-hours of R&D development, testing, and quality assurance. It is designed to seamlessly unify every user's security system component and provide comprehensive control within a single, intuitive interface. Our physical security information management system supports virtually any component, sub-system, or third-party security product on the market. Our PSIM system has been successfully deployed in Federal, Military, and energy-based installations as well as Municipal and Commercial sites.

FPS Logo
FIPS 140-2 Inside

(NOTE: TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments) 

Contact us at sales@networkharbor.com.

The Media Management System (MMS) for LightHouse(tm) is a component that integrates disparate video and audio surveillance and communication systems into a single coherent system for viewing live media as well as recording and review of media, in a standardized and vendor-independent fashion.

The Text Management System (TMS) for LightHouse(tm) is a component that integrates text-based notification and communication systems into a single coherent system for sending both pre-configured and extemporaneous messages to text-receiving endpoints, both manually and automatically, as well as handling responses.

User layouts are an important feature of the NHI LightHouse user interface.  A layout, which might also be called a 'dashboard', is a configurable representation of informational controls presented to the user as their primary view of system operations, device states and locations. 

One area of any comprehensive security solution that is nonetheless largely outside the purview of Network Harbor software is in regards to the reliability and fault tolerance of the infrastructure upon which the integrated security system operates.  This infrastructure includes the computing hardware that all of the security software runs upon, the network used for communications, electrical power, necessary non-security software/hardware systems such as databases, etc.