Open systems enable change, advancement

August 2015 Integrated Solutions

In the realm of security and security solutions, change is constant. Systems continue to advance, threats evolve and business security priorities are continuously revised to defend and protect against new challenges. To maintain agility, maximise security system investments and ensure scalability and long-term affordability, open security management platforms are indispensable.

A core benefit of open security management platforms is their ability to integrate almost any component solution – e.g., CCTV, fire, intrusion, access control and building management systems (BMS), and provide an interface that allows these solutions to work together dynamically and seamlessly.

For users, there are two key arguments for the adoption of open security management platforms: the fact that no two businesses have the exact same security needs, and the constantly evolving protocols, standards, features and technologies of security systems.

Business security needs will differ depending on the type of business and the threats it faces based on location and other external factors. A corporation may prioritise access control and protection of data; a manufacturing operation may focus on safety in the workplace and warehousing operations; a mine may prioritise protection of high value assets, perimeter security and workplace safety. Location also influences security requirements. Businesses in the crowded inner city may have very different needs to those situated in business parks or industrial areas. This boils down to one sure fact: no two businesses will use the same systems. There is no ‘one size fits all’.

Integration with ease

One measure of the value of open security management platforms is their ability to hook into any system via application program interfaces (APIs) that are either released by system vendors, developed by the platform vendor or by the community of users that has grown around the platform. It’s a critical consideration.

While the basic security systems (CCTV, fire, intrusion, access control, etc.) remain the same, they all make use of different protocols. In addition, most have advanced significantly in just a few short years, albeit at different rates. While keeping current with new releases is a priority for some businesses, others find particular systems remain useful for many years. This makes backward compatibility and the ability to integrate security systems of different vintage and type an important feature when selecting a security management platform.

Developments in the CCTV arena are a good example of how fast systems change. The shift from analogue to digital and the sharp ramp up in software capabilities to incorporate video analytics resulted in a step change in infrastructure as well as surveillance approaches. It has also had an impact on other related security systems, such as access control. In addition, the components of the CCTV system, the camera, servers and PCs, have different lifecycles and may have to be upgraded or refreshed at different rates. An open security management platform is flexible enough to facilitate all this change.

The integration capabilities of the security management platform enable the user to manage a number of individual security solutions from a single interface. This provides significant benefits – the user gains an overview of security system performance and can manage incidents through the many layers of security. There are additional benefits such as standardisation of security processes.

Which solution should you select?

The best ones have been around for some time and have a large user base. They keep pace with the global technology roadmaps of major system developers, constantly add new features to meet users’ needs and keep them current, and have a solid community adding APIs to an API stack they actively refresh. This will enable the organisation to ride the wave of technology change, maintain connectivity and integrate solutions seamlessly.

Johnson Controls’ P2000 security management system, launched in the late ‘70s, is an open security management platform for the integration of security solutions (from non-standard solutions to best of breed products) that takes backward compatibility and technological advancement seriously. The P2000’s market share – over 50 000 global users – is a reflection of its capabilities: it has taken users from wired Ethernet into the era of the Internet of Things (IoT) where everything communicates with everything, and integration, automation and intelligent response are the norm.

The P2000 is Johnson Controls’ primary platform for integration and management of security and related building systems. In South Africa, it has found a home in a number of multi-facetted environments, such as airports, financial and corporate environments, and the mining and education sectors where safety, environmental control and critical assets to protect are compelled to meet stringent regulatory and governance requirements.

Neil Cameron, Johnson Controls.
Neil Cameron, Johnson Controls.

The P2000 is adaptable to small and large applications, and is geared to leverage current and future technologies. Its open system technology uses information technology (IT) network infrastructure and integrates multiple systems and devices, including intrusion detection, video surveillance, enterprise IT (e.g., SAP, Oracle, and VIP), access control, fire control, intercoms, elevators and building management, and can plug-and-play with equipment from dozens of manufacturers. It uses Building Automation and Control Network (BACnet) and Internet Protocol (IP) connectivity to integrate to third-party building management systems but offers high levels of functionality when paired with Johnson Controls’ Metasys Building Management System (BMS).

Open security management platforms are the smart choice when it comes to enabling greater control, flexibility and adaptability. Point-to-point integration has forever given way to open systems and integration platforms with intelligent user interfaces. If you are in the process of selecting a platform, consider the following: the ability to adapt and keep pace with change is what differentiates a winning solution. Furthermore, there is great change on the horizon. Even as we continue to battle physical intrusion and data theft, the world considers the next evolution in integration and human-computer interface, a future in which ZeroUI, gesture and bio markers are role players.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...