The state of integration

August 2011 Perimeter Security, Alarms & Intruder Detection

Bernard Senekal starts a series of articles on integration and PSIM.

That word again?!

(in·te·gra·tion) – Combining parts so that they work together or form a whole.

By now most of you want to turn the page and I, for one do not blame you. I do however want to offer you this. Would you be interested in a solution that provides a honest and true approach to integration of physical electronic security equipment, allows you to leverage from existing spend in your enterprise and crosses all boundaries not caring which vendor or sub system you want to integrate too? Rather providing a truly agnostic approach to integrating the various technologies and solutions from multiple vendors presenting absolute value from your systems for the first time?

Over the next few months I will present you as reader with a view on what I believe to be true integrated systems. Ability that allows the voice of the end user to be heard, truly enhances operational efficiency, seriously proves reduction of costs and adds value to the spend that many organisations have made on several vendor-based systems over the years and will be making going forward. By no means are we stating that a purpose built subsystem (for example CCTV or fire) should be replaced by this technology, rather that the value of these systems talking together and across various vendors enhances the ability and other areas of an organisation positively.

We have all heard vendors claim that they are open, integrate to anything and that open standards like ONVIF (which by the way is not a standard yet, it s a work in progress with a very lengthy road ahead and pertains to video over IP only) are everything the industry hopes for. The key word here of course is hope because that is exactly what the status of integration in the South African market is based on today. When you actually contact certain vendors and ask them to talk to opposition vendors as far as integration, the reluctance to do so far outweighs the willingness.

Why? Because every vendor wants to rule the world and believes that in certain cases they have a full line-up of products that cater for the every need of an end user. Wrong! I state for the record that in no case does a single vendor have best of breed technologies in all areas of security and/or building management. You get best of breed in fire, video management systems, thermal cameras, megapixel and HD cameras, access control, analytics, intruder, perimeter, building management, video walls, and the list goes on.

No single vendor provides best-of-breed technology across all systems. To further complicate the case of the vendor, one year Vendor-A will have the best-of-breed in, say fire, and another year Vendor-B surpasses that mark with better technology and features. In all fairness this leaves the end user with a dilemma because the investment he made yesterday is not the investment he should be making tomorrow, thus the rip-and-replace culture was born. In the economic climate we live in today (and for the best part of tomorrow) organisations cannot afford to rip-and-replace, they need to find ways to create value and standard policy across all systems without having to replace those they invested in the day before. So how do we do this?

They say to understand where you are going you need to understand where you are coming from, so as a case in point I refer to the IT industry to sketch a picture that depicts the evolution that we in security are only now beginning to understand.

The IT world

If you were a banking environment, many years ago you would turn to a vendor to supply some mainframes and terminals and then appoint a dedicated team of the most creative Cobol programmers to write bespoke pieces of software to suit your needs. The dependence on these programmers and the hardware vendors were key to the success of the operations of the organisation. Times changed and vendors started developing more intelligent software packages that would be installed in client-server type environments where big software companies and some hardware companies benefitted from developing dependencies on their unique brand of solutions to gain market share.

But end users felt

1. Limited in what could be achieved by the features made available by these vendors, and

2. Entirely dependent on vendors dictating to them how they can and cannot operate based on the limited features available from these vendors for their specific business needs.

Some clever person then came around and stated that surely one bank looks pretty much like another, the same way that one distribution centre and retail operation looks similar to another. So why not create software that allows addressing functionality for these industries as 80% out of the box and 20% customisable? Finally, the call of the end user was answered and in IT today we have distributed intelligent systems architectures with everyone integrating to everyone else, or if you do not then you are out of business in no time.

And in security?

The sad reality is that security is only now starting to wake up to this demand from end users and many security strongholds today are still vendor driven and of the old-school approach. Security is integrating into the environment of IT faster than anticipated, specifically in South Africa where we find the so called tipping point (adoption of new and best-of-breed technologies) is faster than other areas of the world. It is reality that any good security consultant and end user managing a security portfolio for an organisation can no longer afford to be bound to the rules of yesterday.

So how do we present a solution to the challenge? In the next article I will focus on how this is solved through the introduction of software, that like in IT, present out of the box solutions to industry with customisable features to meet the requirements of the end user and the operational challenges they face daily. In short the acronym is PSIM or physical security information management. Creating software-based platforms that talk to many vendors and across all sub-systems in order to interconnect process, procedure and policy management across the enterprise.

For more information contact Sentronics, +27 (0)11 312 4147,  [email protected] www.sentronics.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
What not to do: Key ‘don’ts’ in perimeter security systems
Fang Fences & Guards Perimeter Security, Alarms & Intruder Detection
Many people know what to do when securing a perimeter; in this article, Johan van Wyk highlights the important ‘don’ts’ to consider when implementing a turnkey perimeter security solution.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...